Hmmm ...
2009-10-29
This, if true, is the classic mark of a security operation that is more or less permeable depending on an entrant's place in the pecking order. If the security officer delays the Secretary General (or someone else high up in the pecking order), he will get in trouble or fired or some other undesirable outcome, so the officer makes sure that he/she doesn't execute the security routine when the Secretary General comes through. Because the security officers are always deciding whether to execute the routine or not, when something they don't really understand come along they tend to error on the side of the entrant being high up ("What the hell is Colonel Sanders doing here ... I don't know but it's probably important. We better walk him through!") It would never happen in an operation where everyone goes through the exact same vetting process, regardless of who they are, prior to be allowed through a particular checkpoint.
2009-10-28
2009-10-26
2009-10-25
2009-10-22
2009-10-21
2009-10-20
It's hard to call without having been there. Security always has the home court advantage but the S/O that's doing the talking isn't really providing any information and he could have just as easily been talking a mile a minute about "Look the promoter has pulled the plug because things are getting explosive out there. The shows been canceled but if you step over here we can call the promoter, Look, I don't have any choice, the property managers have told us we have to trespass you and have you arrested if you try to go on, etc." DMX et al. appear to have come to a stop for some talk-talk, but all that's being said is "We're badder than you" which typically doesn't promote a positive outcome. Practitioners of the Security Craft should try to remember that the guy your messing with may be able to afford better attorneys than you can and there isn't anything that guarantees that you'll be dropped from the suit or that you'll prevail, so you should probably exhaust all the non-provocative and non-violent possibilities before moving on to name calling and so forth ...
2009-10-19
2009-10-18
2009-10-16
2009-10-14
Perez-Hernandez, a painter by trade, was having trouble finding jobs because of 2002 felony domestic violence convictions in King County, Engle said.A mug shot to compare to the ATM caps would be helpful, here ...
2009-10-12
I was looking at these at Fry's over the weekend and found that there was almost no information about the encryption on the box (it said there was encryption but not what kind or anything). I guess it's a sign that you're getting old when you expect manufacturers to talk about their products on the containers ...
2009-10-11
You might try memorizing a long poem or something like that and then cycle through uses of the first letter of however many words are needed to hit the right password strength, next pass use the first and third letter, etc. It makes it easier to remember the new password each time because you remember the previous password from having used it for 3 months and you know the algorithm for choosing each 'next' password ...
One of the first two guys looks like he is aware that something is amiss but doesn't seem to realize what. (my guess is there's a distinct lack of water in the area where he's used to seeing the ocean.) The third person definitely realizes what's wrong and high-tails it. Presumably the video ends when the power shorted out ...
2009-10-10
From the user's perspective, however, the drive is almost as easy to use as any thumbdrive. I tried it with a few computers and it worked very well. The drive comes with two separate partitions. One is a fixed 30MB read-only partition that contains the security software. The second is the rest of the drive's capacity to store data. The first time you insert the drive into a computer, be it a PC or a Mac, its self-contained security software will prompt you to pick a password and a security question for retrieving password when it's forgotten. Once a password is chosen, you'll need to run the software again each time you connect the drive to a computer, then enter the password to gain access to the drive's data partition. After that, the drive works just like any other thumbdrive.
I'm happy to see more folks getting into the biz, maybe the prices will come down ...
2009-10-08
2009-10-06
2009-10-05
The article doesn't really say whether they have someone watching the cameras all the time or whether there are people on campus that, once notified that something is going on, will be able to respond and come up with the right answer. The fact that they plan on reviewing potential security breaches at 'day's end' doesn't really load me with confidence that they have any idea what security is all about.
2009-10-04
Subscribe to:
Posts (Atom)