Sunday, July 15, 2007

Weekend Reading

"I've Got Nothing to Hide" and Other Misunderstandings of Privacy

In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the "nothing to hide" argument. When asked about government surveillance and data mining, many people respond by declaring: "I've got nothing to hide." According to the "nothing to hide" argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The "nothing to hide" argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the "nothing to hide" argument and exposes its faulty underpinnings.

Take a look HERE.


==================================================================
How to Beat a Security Audit


Nobody passes a security audit on the first try. You might have your access control process fixed, but you probably haven't adequately trained your administrators on how to manage it. You might have your configuration and change control systems in place, but you probably haven't sufficiently documented the process for using them. If you've adopted strict security policies, your users likely have found a way of avoiding or bypassing them altogether.

Make no mistake - auditors will find fault with your systems, your processes, and the people who operate them. They're auditors. It's their job.

Take a look HERE.

==================================================================
Second open Linux phone goes on sale

Another fully open-source-based phone went on sale on Monday, offering developers the chance to build their own mobile Linux applications. The Neo1973 is the first mobile phone to be designed to run the open-source operating system OpenMoko.

Take a look HERE.


==================================================================
The ABCs of learning online

Like many 7- and 8-year-old girls online, Emily and Kayla Strickland are regulars to Barbie.com and the virtual world Webkinz. But much to their mom's delight, the sisters also have been longtime fans of Starfall, an educational Web site whose star is quickly rising among parents, teachers and kids as young as 2 years old.

Take a look HERE.


==================================================================
Top 15 Ways to Extend Your Laptop’s Battery Life

Number 14 is my favourite - who woulda thunk?

Take a look HERE.


==================================================================
Security theatre

Steve Riley of Microsoft is a controversial figure. Some believe he's a hacker and others that he's a social engineer. Having argument with him is very difficult. Steve's got great mind and unique aility to inspire people, get them thinking about information security. Recently I have read about security theater in his newsgroup posting, in response to suggestion to rename Administrator account as a security measure:

Take a look HERE.

==================================================================
The most exciting boring job ever

What do you get when you combine CSI Miami with a reality TV called Who Wants to be an Accountant? Although it has little to do with dead bodies and murder mysteries, there is plenty of excitement to be had in the world of forensic accounting. Welcome to the most exciting boring job ever!

Take a look HERE.


==================================================================
Google in Colorado safe cracking caper

It's true. Google can help with anything. Minutes before they operned several locked safes at a "family fun center" in Colorado Springs, a team of masked bandits sat down at a nearby PC and Googled "safe-cracking."

Take a look HERE.

==================================================================
Online Gaming's Seamy Underside

You're playing an online game in which players are warriors who can only walk, jump, or run. Suddenly, another player appears out of nowhere, draws his sword, and hacks you to bits.

Game over. But were you really beaten by a superior player? Or did a hacker or cheater simply rig the game? A new book that will be published tomorrow suggests that in the gamers' world, the cheaters often win.

Take a look HERE.


==================================================================
Mac OS X with 100 bugs still safer than Windows?

Apple has plugged around 100 vulnerabilities in OS X so far this year but the malware threat to Mac customers is "insignificant" compared to users of Microsoft Windows.

Take a look HERE.

0 Comments:

Post a Comment

<< Home