|Many people (including myself) have tried to “hide” SSID as a security measure. Unfortunately, efforts to hide SSID ultimately fail and degrade overall WLAN performance.
Lisa Phifer, Configuring service set identifiers
SSIDs are analogous to Windows workgroup names. PCs use those names to browse a network neighborhood and discover others in the same workgroup. When a PC actually tries to access a fileshare, permission is determined by computer name, user name and password. Similarly, stations use SSID to discover APs in the same ESS, but access depends upon other parameters like the station’s address, WEP keys and 802.1X credentials. Access requests must carry the right name, but the workgroup or ESS name is not a password – it identifies the resource to be accessed.
|The biggie in regards to Extrusion Detection is what ports are allowed egress at the perimeter. If you are serious about stopping information from leaking out, then you must enforce policy regarding what ports you allow egress, then you must have a way to apply policy to what is traveling egress on those ports. Your culture in regards to “acceptable use” will drive the solution.
Corey Elinburg, Some Thoughts On Data Leakage / Extrusion Prevention
[kml_flashembed movie="http://youtube.com/v/c91mSYYIJ5U" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://youtube.com/v/F4ZaFlcNynM" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://youtube.com/v/AKabY1iPaBQ" width="425" height="350" wmode="transparent" /]
|I am so far behind on e-mail that I am declaring bankruptcy. If you’ve sent me an e-mail (and you aren’t my wife, partner, or colleague), you might want to send it again. I am starting over.
Fred Wilson, Declaring Bankruptcy
|Now that Sony has emerged victorious in the HD disc format war, it appears as if they will be turning their attention to the next great HDTV technology, OLED.
Charlie Robb, Sony to Spend $200 Million on new OLED Technology
|Here’s a pretty easy way to automatically collect unused memory. Put a counter on each object, signifying how many outside references there are to this object. When it gets to zero, you know there are no references to it, so it can be deleted.
When another object starts referencing that object, it needs to increment the reference count by one. When it stops referencing it, the referrer needs to decrement the reference count.
Daniel Ehrenberg, A quick intro to garbage collection
|Has anyone else noticed a trend in open-source operating systems lately — a certain movement toward green? No, not money or the environment, as important as those things are: I’m talking desktop color schemes.
Brian Donohue Green is the Color
Scott Moulton explains how he recovers data from flash drives.
[kml_flashembed movie="http://www.youtube.com/v/xj_81H-yC3k" width="425" height="350" wmode="transparent" /]