Frequently Asked Questions - Kudos, Opinions and Rants
Questions:
- Challenging Conventional Wisdom
- An Anniversary of Continuing Excellence
- The RSA 2019 Conference
- Spaf videos, blasts from the past, future thoughts
- Another Surprise for Spaf
- Initial Thoughts on the RSA 2015 Conference
- Buy a book for entertainment and for charity
- What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security
- Patching is Not Security
- Thoughts on the RSA Conference, Boycotts, and Babes
- Telling the Future, Looking at the Past: A Few Short Items
- We’re Out of Balance
- Happy Anniversary—Bang My Head Against A Wall
- On Student Projects, Phoenix, and Improving Your IT Operations
- Gene Schultz, R. I. P.
- Bullies, Pirates and Lulz
- An old canard reappears (sort of)
- What About the Other 11 Months?
- Odds & Ends
- Still no sign of land
- More customer disservice—This time, Facebook
- A Cynic’s Take on Cyber Czars and 60-day Reports
- Do we need a new Internet?
- A Modest Proposal
- Customer (dis)service
- Follow-up on the CA Hack
- A Serious Threat to Online Trust
- Word documents being used in new attacks
- Rethinking computing insanity, practice and research
- Failures in the Supply Chain
- Presidential Politics
- Barack Obama, National Security and Me, Take II
- Centers of Academic .... Adequacy
- Who ya gonna call?
- Barack Obama, National Security, and Me
- Virtualization Is Successful Because Operating Systems Are Weak
- Confusion of Separation of Privilege and Least Privilege
- Another untimely passing
- Looking for Trustworthy Alternatives to Adobe PDFs
- Legit Linux Codecs In the U.S.
- Solving some of the Wrong Problems
- Some comments on Copyright and on Fair Use
- Spaf Gets Interviewed
- What did you really expect?
- This Week at CERIAS
- Cyberwar
- Fun video
- Items In the news
- Complexity, virtualization, security, and an old approach
- More JavaScript Browser Attacks… Meanwhile (ISC)2 Requires JavaScript, and All Is Well
- Think OpenOffice is the solution? Think again.
- Irony and DHS
- Google 419, Part II
- Google learning from the Nigerians?
- The gutting of cybersecurity
- This Week at CERIAS
- “Verified by VISA” Issues
- More on passwords
- Quicktime flaw on Macs brings out the crazies
- I told you so
- What security push?
- The Vulnerability Protection Racket
- On standard configurations
- Surprise, Microsoft Listed as Most Secure OS
- Do Open Source Devs Get Web App Security? Does Anybody?
- Stuck in a Rut—Still
- As if we needed more evidence that register_globals is bad
- 2007: The year of the 9,999 vulnerabilities?
- Security Vigilantes Becoming Small-Time Terrorists
- Interesting reading
- Are You Still E-mailing Word documents?
- On Opinion, Jihad, and E-voting
- Community Comments & Feedback to Security Absurdity Article
- The Dilbert Blog: Electronic Voting Machines
- Who do you trust?
- So you think AJAX and Web 2.0 are all that and a bag of chips
- OSCON 2006: Where’s the Security?
- The biggest mistake of Myspace
- Reporting Vulnerabilities is for the Brave
- Re: Security Absurdity
- What is Higher Education’s Role in Regards to ID Theft?
- Useful Awareness Videos
- Using Virtual Machines to Defend Against Security and Trust Failures
- Didn’t we learn anything from WarGames?
- Managing Web Browser risks with the NoScript extension
Q:
Challenging Conventional Wisdom
A:
Q:
An Anniversary of Continuing Excellence
A:
Q:
The RSA 2019 Conference
A:
Q:
Spaf videos, blasts from the past, future thoughts
A:
Q:
Another Surprise for Spaf
A:
Q:
Initial Thoughts on the RSA 2015 Conference
A:
Q:
Buy a book for entertainment and for charity
A:
Q:
What is wrong with all of you? Reflections on nude pictures, victim shaming, and cyber security
A:
Q:
Patching is Not Security
A:
Q:
Thoughts on the RSA Conference, Boycotts, and Babes
A:
Q:
Telling the Future, Looking at the Past: A Few Short Items
A:
Q:
We’re Out of Balance
A:
Q:
Happy Anniversary—Bang My Head Against A Wall
A:
Q:
On Student Projects, Phoenix, and Improving Your IT Operations
A:
Q:
Gene Schultz, R. I. P.
A:
Q:
Bullies, Pirates and Lulz
A:
Q:
An old canard reappears (sort of)
A:
Q:
What About the Other 11 Months?
A:
Q:
Odds & Ends
A:
Q:
Still no sign of land
A:
Q:
More customer disservice—This time, Facebook
A:
Q:
A Cynic’s Take on Cyber Czars and 60-day Reports
A:
Q:
Do we need a new Internet?
A:
Q:
A Modest Proposal
A:
Q:
Customer (dis)service
A:
Q:
Follow-up on the CA Hack
A:
Q:
A Serious Threat to Online Trust
A:
Q:
Word documents being used in new attacks
A:
Q:
Rethinking computing insanity, practice and research
A:
Q:
Failures in the Supply Chain
A:
Q:
Presidential Politics
A:
Q:
Barack Obama, National Security and Me, Take II
A:
Q:
Centers of Academic .... Adequacy
A:
Q:
Who ya gonna call?
A:
Q:
Barack Obama, National Security, and Me
A:
Q:
Virtualization Is Successful Because Operating Systems Are Weak
A:
Q:
Confusion of Separation of Privilege and Least Privilege
A:
Q:
Another untimely passing
A:
Q:
Looking for Trustworthy Alternatives to Adobe PDFs
A:
Q:
Legit Linux Codecs In the U.S.
A:
Q:
Solving some of the Wrong Problems
A:
Q:
Some comments on Copyright and on Fair Use
A:
Q:
Spaf Gets Interviewed
A:
Q:
What did you really expect?
A:
Q:
This Week at CERIAS
A:
Q:
Cyberwar
A:
Q:
Fun video
A:
Q:
Items In the news
A:
Q:
Complexity, virtualization, security, and an old approach
A:
Q:
More JavaScript Browser Attacks… Meanwhile (ISC)2 Requires JavaScript, and All Is Well
A:
Q:
Think OpenOffice is the solution? Think again.
A:
Q:
Irony and DHS
A:
Q:
Google 419, Part II
A:
Q:
Google learning from the Nigerians?
A:
Q:
The gutting of cybersecurity
A:
Q:
This Week at CERIAS
A:
Q:
“Verified by VISA” Issues
A:
Q:
More on passwords
A:
Q:
Quicktime flaw on Macs brings out the crazies
A:
Q:
I told you so
A:
Q:
What security push?
A:
Q:
The Vulnerability Protection Racket
A:
Q:
On standard configurations
A:
Q:
Surprise, Microsoft Listed as Most Secure OS
A:
Q:
Do Open Source Devs Get Web App Security? Does Anybody?
A:
Q:
Stuck in a Rut—Still
A:
Q:
As if we needed more evidence that register_globals is bad
A:
Q:
2007: The year of the 9,999 vulnerabilities?
A:
Q:
Security Vigilantes Becoming Small-Time Terrorists
A:
Q:
Interesting reading
A:
Q:
Are You Still E-mailing Word documents?
A:
Q:
On Opinion, Jihad, and E-voting
A:
Q:
Community Comments & Feedback to Security Absurdity Article
A:
Q:
The Dilbert Blog: Electronic Voting Machines
A:
Q:
Who do you trust?
A:
Q:
So you think AJAX and Web 2.0 are all that and a bag of chips
A:
Q:
OSCON 2006: Where’s the Security?
A:
Q:
The biggest mistake of Myspace
A:
Q:
Reporting Vulnerabilities is for the Brave
A:
Q:
Re: Security Absurdity
A:
Q:
What is Higher Education’s Role in Regards to ID Theft?
A:
Q:
Useful Awareness Videos
A:
Q:
Using Virtual Machines to Defend Against Security and Trust Failures
A:
Q:
Didn’t we learn anything from WarGames?
A:
Q:
Managing Web Browser risks with the NoScript extension
A: