My workshop notes that build on the previous session where we assembled their Raspberry Pi. We will first review what we have done during the previous session, put the Raspberry Pi systems back together into a useful computer, then take a look at the network, web pages, and some coding.
The NHS (National Health Service, the healthcare system for England) has issued guidance affirming that “NHS and social care organisations can safely locate health and care data, including confidential patient information, in the public cloud including solutions that make use of data off-shoring”.
My workshop notes for a group of kids who assembled their Raspberry Pi with me and got it to a useful state. We start with Raspbian Lite, do some basic configuration on the command line, and then add the graphical user interface on-top. There are three parts to this workshop: i) assembly of the hardware
In 2013 Microsoft were issued a Search and Seizure Warrant for data associated with an e-mail address. Microsoft’s GCC (Global Criminal Compliance) team responded with data that was collected from US systems, but refused to disclose data that was located on servers hosted by an Irish Microsoft entity on systems physically located in Ireland. Microsoft
People choose outrageously simple passwords for their web mail. Perhaps because they don’t care about the accounts these passwords protect, or because a standard from 1985 has conditioned us to use bad passwords. Yet a better way has existed for just as long.
The cost of preparing and averting war will always be inferior to the cost of war itself. Sun Tzu deals extensively with the costs of war in chapter two. The OECD evaluated conflict prevention too and concludes that wars are generally more expensive than war prevention.
The attack code that was used against UkrEnergo’s industrial control systems, which in turn lead Kiev loosing power, is so well written, so modular, that Dragos suspect that it was only a proof of concept. Information Systems Security Partners agree the attackers are only testing their techniques. No matter, this high-tech attack has a low-tech