Monthly Archives: July 2014

Threat: Sam the Disgruntled Employee

I’m going to assert that Sam is the second greatest security you face. (We will encounter the greatest thread in a few more posts.) Depending on who you talk to, between 60% and 90% of corporate losses due to theft … Continue reading

Posted in Security | 2 Comments

Threat: Tom the Programmer

No discussion of system integrity and security would be complete without Tom. Without the applications, tools, and utilities that Tom writes, computers would be nothing but expensive space heaters. Software, especially applications software, is the reason computers exist. Tom is … Continue reading

Posted in Security | Leave a comment

Threat: Fred the System Administrator

In terms of threat potential, Fred is off the charts. In order to do his job, he has essentially uncontrolled access to all computer resources. Fred can damage software and data in obvious or subtle ways. He can wipe out … Continue reading

Posted in Security | Leave a comment

Threats: William the Manager

William is concerned with his group getting their job done. He is under budget pressure, time pressure, and requirements to deliver. William is a good manager – he is concerned for his people and dedicated to removing obstacles that get … Continue reading

Posted in Security | 2 Comments

Threats: Stan the Security Czar

What?!? The security guy is listed as a threat to system security? Absolutely. Stan is knowledgeable. He knows that the world is filled with evil. And he is determined to protect his company from it. There is a famous saying: … Continue reading

Posted in Security | Leave a comment

Is there a Java Binding for LMIShell?

An interesting question just came up: β€œis there a Java binding for LMIShell?” Hmm, good question – let’s answer it by digging into the OpenLMI architecture a bit. LMIShell is a client framework written in Python. It consists of a … Continue reading

Posted in System Management | Leave a comment

Threats: Sphinx the Script Kiddie

Sphinx the Script Kiddie Unlike Igor, Sphinx doesn’t have deep skills or knowledge. But he does have access to very powerful cracking toolkits that other people have developed and to people who can provide guidance and answer questions. This makes … Continue reading

Posted in Security | Leave a comment