terrorist “weakest link”terrorist “weakest link”
In the game show The Weakest Link competitors get voted off, usually not on whether they are weak but on whether the other contestents consider them to be a threat.[...]
In the game show The Weakest Link competitors get voted off, usually not on whether they are weak but on whether the other contestents consider them to be a threat.[...]
I am constantly amazed at the apparent lack of interest in car-pooling when travelling between LUV meetings and the restaurant where we have dinner. After the last meeting I was[...]
After a recent mailing list discussion about computer security I’m going to be quoted in someone’s .sig so I think that I need to write a blog entry. Here is[...]
There has been a lot of discussion recently about how to take laptops on planes following the supposed terror threat in the UK which has been debunked by The Register[...]
In response to my last entry about anti-spam measures and the difficulty of blocking SPAM at the SMTP protocol level I received a few responses. Brian May pointed out that[...]
There are two critical things that any anti-spam system must do, it must not lose email and it must not cause damage to the rest of the net. To avoid[...]
An anti-spam measure that is used by a very small number of people is that of verifying the sender address by connecting to the sending mail server. For example when[...]
The recent news from the UK gives us an example of invasive security. Preventing passengers carrying on any hand luggage (even wallets) and frisking all of them is the type[...]
As I mentioned in my first post the amount of effort I’m prepared to invest in posting to a small group of people is limited. I don’t think that I[...]
It’s often the case with technology that serious changes occur at a particular price or performance point in development. Something has small use until it can be developed to a[...]