| from Tony Bradley, CISSP-ISSAP Twitter. Unless you're just coming out of a very long coma, you've probably at least heard of it. The social media that asks the question "What are you doing?" and gives you a maximum of 140 characters to answer the question. It seemed silly to me at first. Pointless. Useless. How naive was I? Twitter is emerging as one of the primary methods of communication- a sort of RSS feeds meets text messaging meets search engine meets social networking. If you haven't joined the Twitter bandwagon yet, I suggest you take a look and give it some consideration. | | In the Spotlight | Twitter for Computer and Network Security Are you still trying to understand the value of exchanging 140-character status updates with the world? I did as well at first. I orginally created my Twitter account a while back. I followed the 'tweets' of a couple other people and I got to learn things like 'flight delayed. waiting at airport. why don't they have free wifi?' or 'overslept this morning. need coffee. I hate Mondays'. I then let it lay dormant because it seemed like a useless novelty. Eventually I came back though...read more | | Book Review: Hacking VoIP Himanshu Dwivedi and I worked together a few years back as co-authors of Hacker's Challenge 3. That was a fun project and I still enjoy reading the stories. That style of book - providing information or education in the guise of a fictional story - just works for me. Dwivedi has written or contributed to a number of other books as well, the latest of which is Hacking VoIP: Protocols, Attacks, and Countermeasures...read more | Surviving Conficker- Now What? It's April 2nd. If you are reading this message then the Conficker apocalypse was a failure and the world as we know it did not end. Whew! Dodged that bullet. Ok. So....now what? Do we just pretend Conficker never existed and blame 60 Minutes, Good Morning America, and the Today Show for making a much bigger deal out of it than was necessary? No. Conficker is a threat...read more | Sponsored Links | | | | Internet / Network Security Ads Advertisement | |
No comments:
Post a Comment