Thursday, October 8, 2009

Authentication Techniques

I thought you would all enjoy reading about one of those "Why didn't I think of that!?" ideas...

PassWindow is a visual-authentication system that uses pattern-matching techniques to provide verification every time a person attempts to log on a web site.

Those Australians... first they get the cool accents and now this!! :)

Thursday, August 13, 2009

Street Value...Of A Human!?!?

Well, if you have ever wondered "What am I worth?"... You can now find out the answer! I followed the very scientific questionnaire and found out that I am worth.... Drum roll please!.... $2.65 million! Not too bad I guess. I would buy me!

Give it a try! Just click the image above.

Monday, August 3, 2009

Conficker - Why you little #@$*!

Dr. James Lyne examines Conficker from a technology perspective, reviews the various methods by which Conficker can spread, and explains what IT managers can do to protect themselves from future iterations.

Monday, July 20, 2009

Dilbert Videos

These are just a couple entertaining videos that I think anyone can enjoy - whether in IT or not...

Monday, June 29, 2009

Internet traffic - like Michigan x-ways... SLOWWW!!

As I am sure most of you were - I found myself online investigating the news of Michael Jackson's passing last week. The immediacy of news medium today still amazes me and how quickly word travels around the world. Especially in the realm of IT security, we come across instances of system/network attacks (eg. DoS, etc.) where systems are brought to their "knees" but we don't really see un-intentional situations of this magnitude very often. This is mainly because of strategic monitoring, configuration, and load balancing performed by IT professionals. Yet, the Internet traffic spurred by this one news story can demand such resources that it causes major interruption and difficulties for large [technology based] companies such as AOL and Google - among others. Very interesting...

Friday, March 27, 2009

What To Do!?!?

So as it turns out, I guess that I am kind of a big deal in Russia. I mean how else would a "good looking female" from abroad single me out from the millions of other people online?? Come on ladies... Don't you know that I am married!?

This is one of the five VERY similar (some might even say identical) emails that I received this week from females who are supposedly coming to the US from Russia and need a "good man" to spend time with.

I am not exactly sure what the tactic or goal is here. They don't seem to be asking for money or other material goods... yet!

Wednesday, March 25, 2009

BIT 546 - Information Systems Security

Well, the Spring 2009 semester is almost upon us. Begining next week I will venture into the world of online learning with BIT 546 at Walsh college. This will be my first [completely] online based course I have taken since enrolling at Walsh about a year ago... Has it been that long already!?! Boy, time sure does fly by! Anywho, here is the course description:

BIT 546 Information Systems Security:
An exploration of the components of a comprehensive information
systems security plan including such critical areas as planning
and administration of security, the security program, access
control and network security measures, Internet and e-commerce
security issues, physical protection of computing facilities, and
the legal and regulatory aspects of information security. Students
will learn how to protect an organization from computer crime and
potentially malicious behavior, and to ensure confidentiality,
availability and data integrity through several hands-on case

I am really looking forward to this class (except the part about reading the 1145 page book). The book used for this course is the CISSP Certification All-in-One Exam Guide, Fouth Edition [description]. I ordered it from Amazon two days ago, so we'll see if I get it in time to start reading come Monday...