Please enter your username below and press the send button.A password reset link will be sent to you.
If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.
This link recently saved by dontpanic2 on February 09, 2011
Washington, D.C., Feb. 3, 2011 — The Securities and Exchange Commission today charged three AXA Rosenberg entities with securities fraud for concealing a significant error in the computer code of the quantitative investment model that they use to manage client assets. The error caused $217 million in investor losses.
This link recently saved by dontpanic2 on November 01, 2010
This link recently saved by dontpanic2 on October 07, 2009
This link recently saved by dontpanic2 on September 04, 2009
After a consultant performed a security assessment for a client, he was rehired a few months later to examine his client's progress. Here's what he found when he took a look at the client's approach to passwords and the corrections he had to make. http://www.techrepublic.com/article/when-a-best-practice-isnt-best-for-your-organization/
This link recently saved by dontpanic2 on April 01, 2009
n the United States, the concept of "expectation of privacy" matters because it's the constitutional test, based on the Fourth Amendment, that governs when and how the government can invade your privacy. The problem is, in today's information society, that definition test will rapidly leave us with no privacy at all.
This link recently saved by dontpanic2 on March 09, 2009
This link recently saved by dontpanic2 on March 04, 2009
Beet armyworm caterpillars react to the sound of a passing wasp by freezing in place, or even dropping off the plant. Unfortunately, armyworm intelligence isn't good enough to tell the difference between enemy aircraft (the wasps that prey on them) and harmless commercial flights (bees); they react the same way to either. So by producing pollen for bees, plants not only get pollinated, but also gain some protection against being eaten by caterpillars.
This link recently saved by dontpanic2 on February 12, 2009
This link recently saved by dontpanic2 on November 27, 2008
One of the standard software security prescriptions for the SDLC is to data classification and enforce least privilege. From a security perspective this sounds fantastic, especially on a whiteboard. When the rubber meets the real world road, things often turn out slightly different. It turns out that it is hard to conduct business with excessive granularity.
This link recently saved by dontpanic2 on November 24, 2008
Rules pertaining to government need to be different, because of the power differential. Subjecting the president's communications to eventual public review increases liberty because it reduces the government's power with respect to the people. Subjecting our communications to government review decreases liberty because it reduces our power with respect to the government.