Our Latest Discovery:

Security


March 2, 2009  1:56 PM

Closed-circuit TV “a high-tech Panopticon”



Posted by: Ivy Wigmore
CCTV, CIO, civil rights, closed circuit television, Panopticon, privacy, Security, surveillance

Bookmark and Share     0 Comments     RSS Feed     Email a friend

August 7, 2008  4:31 PM

How you can watch the Olympics live online (and what sysadmins can do about it)



Posted by: GuyPardon
communications, cool, event, feeds, free, Google, government, hacking, howto, interactive media, Internet, IPTV, media, Microsoft, multimedia, participation, resource, streaming, Sun Microsystems, Technology, useful, video, Web applications, Web services, wiki, Yahoo!, YouTube

After years of buildup, the Olympics are about to kick off tomorrow in Beijing. As Shamus McGillicuddy reports,


April 10, 2008  10:23 AM

Video: Install and configure SNORT on an XP PC



Posted by: GuyPardon
applications, downloads, free, howto, learning, open source, screencast, Security, tool, tutorial, useful, video, YouTube

In this video, the instructor goes through the process of downloading, installing and configuring Snort as a sniffer and an intrusion detection system on a Windows XP machine....


April 9, 2008  11:00 AM

Video: Botnets, Botmasters, Zombies and the greatest threat to online security?



Posted by: GuyPardon
academics, applications, code, hacking, Internet, media, Security, video, YouTube

Professor Merrick Furst, associate dean at the College of Computing at Georgia Tech, explains how botmasters use


April 8, 2008  9:08 AM

Video: Secure Programming with Static Analysis



Posted by: GuyPardon
Development, discussion board, programming, Security, software, video, YouTube

In this video, Brian Chess and Jacob West from Fortify Software talk about the importance of security at the software development level. [kml_flashembed movie="http://www.youtube.com/v/OVWHpyjqBkI" width="425"...


March 19, 2008  3:26 PM

Video: Defense-in-depth with end-to-end network security



Posted by: GuyPardon
books, hacking, Security, YouTube

Network security expert Omar Santos presents material from his latest book,


March 10, 2008  9:13 AM

Video: FBI can listen even when a cellphone is turned off



Posted by: GuyPardon
applications, Audio, communications, email, government, hacking, information, Mobile, politics, Security, Technology, tool, tracking, traffic, video, YouTube

Fox News aired a report in 2006 that described how the FBI can turn on the mic on a cellphone and eavesdrop -- even if the phone is turned off. [kml_flashembed movie="http://www.youtube.com/v/O61YfvPZGJs" width="425" height="350" wmode="transparent" /] Today's Word of the Day,


January 4, 2008  11:40 AM

The future is now. And the silicon cockroach has evolved and flourished



Posted by: Ivy Wigmore
Apple, Audio, Bluetooth, futurism, gadgets, geek, grayware, hardware, messaging, Mobile, MP3, multimedia, science, Security, Technology, telephony, texting, traffic, trend

It's sometimes said that the only constant that you can count on is change. Change is necessary, after all -- "Adapt or die" being an imperative of the natural world. And perhaps even more so in the world of technology... These are the sorts of thoughts that occur as I poke around in the...


August 27, 2007  12:26 PM

Facebook: A social network evolves into a social utility



Posted by: GuyPardon
applications, business, buzz, buzzword, collaboration, college, community, creativity, culture, data, directory, discussion board, education, entrepeneurship, innovation, interesting, Internet, mashup, new media, portal, privacy, programming, public domain, recruiting, Security, Silicon Valley, social, social networking, social publishing, startup, trend, Web 2.0, Web applications

What can I say about Facebook that hasn't been said? Newsweek has placed Mort Zuckerberg, the founder of the social networking giant


July 5, 2007  5:56 PM

Hacker or cracker?



Posted by: Ivy Wigmore
commentary, controversy, conversation, hacking, hacks, word meanings

Throughout the years I've been writing and editing on WhatIs, I don't think there's been another issue that's cropped up as often or been as gnarly to try to settle as the question of whether a person who attacks computers and networks is a hacker or a cracker. Just about everyone but the serious...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: