-
Recent Posts
Archives
- January 2026
- March 2024
- February 2022
- September 2021
- August 2021
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- August 2019
- May 2019
- March 2019
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- April 2017
- April 2016
- March 2015
- February 2015
- November 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- September 2010
- July 2009
- March 2009
- January 2009
- December 2008
- September 2008
- May 2008
- April 2008
- December 2007
- November 2007
- September 2007
Categories
Meta
Category Archives: Security
Sadly, data breaches are all too common
After blogging about BP’s lost laptop this morning I was checking my mail and discovered a note from one of my financial institutions about a breach at bulk email sender Epsilon that impacts me. Three of the largest credit card issuers … Continue reading
Posted in Computer and Internet, Privacy, Security
Tagged Data Breach, Epsilon, Phishing, SPAM
Comments Off on Sadly, data breaches are all too common
BP loses a laptop containing (unencrypted) personal information
Sadly A BP employee had the personal information about claimants from the Deepwater Horizon spill on a laptop with neither the files nor hard drive encrypted. And it was stolen (http://content.usatoday.com/communities/ondeadline/post/2011/03/bp-worker-loses-laptop-holding-data-for-13k-gulf-oil-spill-claimants/1?csp=34news). It isn’t clear if BP has inadequate policies, inadequate … Continue reading
When are we going to get serious about computer/network security (Part 2)?
Consider the first sentence of Internet Engineering Task Force (IETF) RFC 4272 published in 2006 and be afraid, be very afraid. It reads “Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet … Continue reading
When are we going to get serious about computer/network security (Part 1)?
I’m going to start a little series of posts to demonstrate that “we” aren’t serious about computer and network security. By “we” I mean everyone from individual users of mobile phones and computers through to the government, telecommunications carriers, and … Continue reading
The rebirth of True Mountain Group
After I retired from Microsoft in 2002 I started doing some part-time consulting for fun, to keep my hand in the IT world, and of course for a little extra spending money. I put that business, True Mountain Group LLC, on hold … Continue reading
Posted in Computer and Internet, Database, Google, Microsoft, Mobile, Security, SQL Server, True Mountain Group
Tagged Consulting, Google Voice, Microsoft, SQL Server, Startup, True Mountain Group
Comments Off on The rebirth of True Mountain Group
Microsoft Security Essentials
A little housekeeping before I talk about MSE…. I’m going to be starting a separate blog for work-related items and will post the address for that when it is ready. I mention that because this blog entry is about something … Continue reading
Posted in Computer and Internet, Microsoft, Security, Windows
2 Comments