The YubikeyThe Yubikey
Some time ago Yubico were kind enough to send me an evaluation copy of their Yubikey device. I’ve finally got around to reviewing it and making deployment plans for buying[...]
Some time ago Yubico were kind enough to send me an evaluation copy of their Yubikey device. I’ve finally got around to reviewing it and making deployment plans for buying[...]
The Security Token Wikipedia page doesn’t seem to clearly describe the types of token. Categories of Security Token It seems to me that the following categories encompass all security tokens:[...]
Brendan Scott linked to a couple of articles about CAL (the Copyright Agency Limited) [1]. I have previously written about CAL and the way that they charge organisations for the[...]
The Threat Bruce Schneier’s blog post about the Mariposa Botnet has an interesting discussion in the comments about how to make a secure system [1]. Note that the threat is[...]
In a comment on my post Shared Objects and Big Applications about memlockd [1] mic said that they use memlockd to lock the entire root filesystem in RAM. Here is[...]
The Opera-Mini Dispute I have just read an interesting article about the Opera browser [1]. The article is very critical of Opera-Mini on the iPhone for many reasons – most[...]
Diagnosis A few weeks ago I was referred to a specialist for the treatment of Carpal Tunnel Syndrome. I first noticed the symptoms in early January, it started happening at[...]
The German supermarket chain Aldi recently had a special deal of a “wine-fridge” for $99. A wine fridge really isn’t that specialised for wine, it is merely a fridge that[...]
Due to the comments on my blog post about Divisive Behavior [1] I’ve been considering the issue of terms of abuse of minority groups – a topic of which racial[...]
Past Sins Sam Varghese wrote an article about Matthew Garrett’s LCA talk “The Linux community: what is it and how to be a part of it” [1]. In page 2[...]