adv

Opinions

Aug 4, 2008
"I want you to explore DNS...I've done everything in my power to get the patches available, no matter the platform. But the code doesn't (always) install itself....
Aug 1, 2008
A recent study of Web browser installations showed that far too few are up to date with the latest security patches. And browsers aren't alone; as my dear old mum can attest,...
Jul 31, 2008
Friends from overseas often ask me about Hong Kong's governmental system. I tend to use business analogies for our government. Few places have such an efficient blend of...
Jul 25, 2008
One of the hot topics on VMware lately has been about the advisability of using virtual firewalls within the VMware Virtual Infrastructure. The main question is whether it's a...
Jul 23, 2008
I have a nightmare vision of storage administrators becoming clones of the mail carrier Newman from the TV sitcom Seinfeld, who once bemoaned the endless pressures of his job,...
Jul 21, 2008
Some events require appearance-in-person. Entering countries, court testimony, live performance...all require personae, front-and-center.Purchasing souvenirs, however, does not....
Jul 18, 2008
How does identity monitoring fit into an overall core security program. Is it necessary?Identity monitoring combines the user- and role-management capabilities of an identity...
Jul 14, 2008
A while back, I wrote about the concept of social networking. The upshot: Although the wisdom of crowds may be overhyped, the phenomenon of social networking isn't....
Jul 9, 2008
About 20 years ago, one of my first programming assignments as a Unix systems software developer related to backup. Specifically, I was to modify the device driver for a quarter-...
Jul 8, 2008
On June 4, network security firm McAfee released a report claiming that Hong Kong's country-code top-level domain (ccTLD) ".hk" is the "riskiest" in the...