The cost of preparing and averting war will always be inferior to the cost of war itself. Sun Tzu deals extensively with the costs of war in chapter two. The OECD evaluated conflict prevention too and concludes that wars are generally more expensive than war prevention.
The attack code that was used against UkrEnergo’s industrial control systems, which in turn lead Kiev loosing power, is so well written, so modular, that Dragos suspect that it was only a proof of concept. Information Systems Security Partners agree the attackers are only testing their techniques. No matter, this high-tech attack has a low-tech
Bot driven vulnerability detection, automatic patching by bot, and automated reverse engineering from sniffed traffic: DARPA’s Cyber Grand Challenge shows us where information systems’ security is heading tomorrow, today. Watch the 10 minute summary of their 2016 capture the flag contest.
If your desktop becomes cluttered with open app windows, you can use Spaces to organize the windows into groups. Some Apps create a new Space automatically when you switch to full-screen view. The trouble is, sometimes you cannot delete or remove these Spaces, even when the App has stopped running.
Want to run a bittorrent client on CentOS Linux 7? Here’s how. There are two tricks to bear in mind: i) you’ll need to add a library manually, ii) Transmission is now maintained on GitHub. First, you’ll need to add the EPEL repository: yum install epel-release yum -y update Once that is done, add the
Apple’s SuperDrive is able to burn data to a blank CD or DVD. No need for special software, Finder can do it for you. Except if you’ve told it not to. See here how to resolve the issue of the blank media not showing up in Mac OS X Finder, or “Burn XYZ to Disk…”
The social commentary of Asterix comic books completely eluded me when I was a child. Reading the newest volume, “Le Papyrus de César”, I was surprised to find the authors directly addressing information security issues (Confidentiality, Integrity, and Availability) in no uncertain terms.
This guide is for allowing a user to login via SSH and/or use scp to copy files to a system. I’m on CentOS 7 and most of the documentation I found does not address this particular situation. They either use jailkit, which is not available in the stock repository for CentOS 7, or incorrectly declare
Instructions how to make a Raspbian bootable SD card for Raspberry Pi. Download the most recent version from Raspberry Pi, via their general page, or direct link. Insert the SD Card into your laptop. It must be a single partition volume, formatted FAT32. Run mount to see where the SD card is. You can see