Sunday, February 18, 2007

Weekend Reading

Why Vista's DRM Is Bad For You

Windows Vista includes an array of "features" that you don't want. These features will make your computer less reliable and less secure. They'll make your computer less stable and run slower. They will cause technical support problems. They may even require you to upgrade some of your peripheral hardware and existing software. And these features won't do anything useful. In fact, they're working against you. They're digital rights management (DRM) features built into Vista at the behest of the entertainment industry.

And you don't get to refuse them.

Take a look HERE.

==================================================================
Mouse-Trapped

Substitute teacher Julie Amero faces up to 40 years in prison for exposing kids to porn using a classroom computer, but the facts strongly suggest that she was wrongfully convicted. Many issues remain, from the need for an independent computer forensics investigation and the presence of spyware and adware on the machine, to bad or incomplete legal work on both sides of this criminal case.

A recent criminal case in Connecticut points out the problems of computer forensics and aggressive law enforcement. It also points out how companies can get themselves and their employees into legal hot water by failing to take reasonable computer security procedures.

The problem with computer forensics - Detective Lounsbury explained later in an online article his process and thinking for the collection of forensic evidence in the Amero case.

Take a look HERE.

==================================================================
Guidelines for Evidence Collection and Archiving

A "security incident" as defined in the "Internet Security Glossary", RFC 2828, is a security-relevant system event in which the system's security policy is disobeyed or otherwise breached. The purpose of this document is to provide System Administrators with guidelines on the collection and archiving of evidence relevant to such a security incident.
If evidence collection is done correctly, it is much more useful in apprehending the attacker, and stands a much greater chance of being admissible in the event of a prosecution.

Read the article HERE.

==================================================================
Microsoft dirty tricks that were never revealed

I’ve written before about Burst v. Microsoft, but the short story here is that Burst lawyers caught a pattern of apparent destruction of e-mail evidence on the part of Microsoft. Microsoft claimed it was “too hard” to search for the lost e-mails (Burst had copies from its side so many of the messages were known to exist) but the judge finally ordered Microsoft to do whatever it took to dig up the tapes and find the e-mails.

Take a look HERE.

==================================================================

My Microsoft Google Yahoo Stories

Everything you've ever wanted to know about being an employee at Google, Microsoft, and Yahoo. "Tastyresearch" describes the past few years interning and working at the three companies. Things I didn't know from before: Bill Gates wears old shoes, Google's internal security watches you like a hawk, the office styles of each company, and how to fill your suitcase with Google T-shirts. These few select companies are the 'prestigious internship circle', noting 'once you have worked at one, it's a lot easier to get into another'.

Take a look HERE.

0 Comments:

Post a Comment

<< Home