Search:
Type: Posts; User: tenzenryu; Keyword(s):
Search:
Search took 0.02 seconds.
-
Hi,
It depends on what you want to achieve. Most taught Masters teach a mixture of technical and business skills and are particularly suited to someone with a bit of industry experience who wants...
-
Royal Holloway, University of London also runs a distance learning course at about £ 10000 pounds. These taught Masters courses seem to come in at around the same price. Have you considered a...
-
January 3rd, 2006, 12:30 PM
Hi,
The problem with what you are describing is the maths. Essentially, an ennumerator program (which can be quite easily written using C++ for example using a data structure to hold 24 x 255...
-
December 21st, 2005, 12:06 PM
Hi,
Human beings live in a hierarchical social system (i.e. there is a pecking order) which is a necessity for the kind of social cooperation (i.e. team work) which is the root of all successful...
-
December 20th, 2005, 06:20 PM
Hi,
Wouldn't another reason be that the Rainbow project is nearly in which will seriously undermine password cracking as a pastime?
Yurt Ennez
-
December 18th, 2005, 01:44 AM
Hi,
I am neither anti estab nor non anti estab. I just think MS are headed in a direction which will include security but is not security up to the eyebrows in the way we would like to see it.
...
-
December 16th, 2005, 10:57 AM
Hi,
Why don't you put the RSS feed from The Register on the site? If nothing else, you get to see some of my articles.
Ntyru Zene
-
December 15th, 2005, 10:15 PM
Hi,
Actually this is quite amusing when you think of it in terms of the Internet. It was not designed with security in mind (or at least not what we mean by security) and I haven't heard anyone...
-
December 15th, 2005, 04:42 PM
Hi,
D**n, I'll have to up the 'anti'.
I think you have to remember the background to all OS security development over the past few years. The previous thing was 'functionality' up to the gills,...
-
December 15th, 2005, 01:02 AM
Hello-o
It's just I am really getting tired of people who declare themselves l33t because a) they dis MS and b) they can spell l33t - get a life!
I don't think MS have got it wrong - they...
-
December 13th, 2005, 12:05 AM
Hi,
Google Earth would work in some areas. Although slightly out of date, the pictures could give away features of someone's house, car, nearest shops, restaurants. This would allow you to send...
-
December 12th, 2005, 09:47 PM
Hi,
I think the main point I was making was that I was tired of people dissing Microsoft. It's old is what I am saying. I also think my argument about network economics stands. While you can't...
-
December 12th, 2005, 01:44 AM
Hi,
Actually, the discovery of multiple securities in Windows derives exactly from the fact that it is the largest in the marketplace. This is network economics at work. Windows is dissected...
-
November 23rd, 2005, 01:01 PM
Hi,
There are a lot of problems with Common Criteria assessments, not the least of which is that the economics of the way tests are carried out means that CLEFs that test rigorously will go out of...
-
November 1st, 2005, 11:25 PM
You are still mixing up a management policy (which is normally a bunch of useless platitudes) with an engineering concept that can be used to verify your security architecture. However I agree about...
-
November 1st, 2005, 05:23 PM
And this is precisely where the problem lies. The threat model should drive the security policy model which in turn should drive the procedural (external legislative and as well as internal...
-
November 1st, 2005, 04:44 PM
I rather think you have missed the point. This is an engineering model which should be capable of expressing mathematically or algorithmatically any external legislative requirement.
It is not...
-
November 1st, 2005, 04:15 PM
Devising Information Security Policies
Introduction
Is your organisation's information security a bunch of meaningless soundbites or a soundly engineered set of principles by which you devise...
-
October 28th, 2005, 11:53 AM
Hi
O I dunno, I liked the one which invited me to participate in criminal fraud for untold sums of money. At least it was reasonably original.
Richard
-
October 18th, 2005, 10:51 PM
Hi
I was on pen testing training recently and we were introduced to the Paros tool which acts as a software proxy for IE (Mozilla has something similar built in) and allows you to trap your POSTS...
-
October 14th, 2005, 03:43 PM
Hi,
SQL injection happens when an improperly validated data field can be used to inject SQL statement or exec commands into your dbms.
The validation can fail either at the client end (i.e....
-
October 8th, 2005, 01:23 AM
Thanks for the head's up. what is the best software to do this?
R
-
October 7th, 2005, 11:08 PM
I would like to know if it is legal to crack the copy protection on Playstation 2 games and on computer games. My kids go through the disks like wildfire meaning that I essentially pay £ 30 or £...
-
August 3rd, 2005, 11:20 AM
The implication is then that the hacker sets up a script up to scan a range of hosts on a particular port which is likely to be open (one of the common ones that normally has to be open e.g. 53, 80,...
-
August 2nd, 2005, 11:20 AM
I think the problem is that, as The Specialist rightly says, the word 'hacker', 'cracker' usw are chucked around too much. It should be clear by now that different people criminally infiltrate...
|
|