-
Recent Posts
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 3)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 2)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 1)
- Incorporating Disruptive Technologies into Existing Products
- Investing in Disruptive Technologies
Articles
Major articles in chronological order:
Archives
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- November 2019
- October 2017
- August 2017
- July 2017
- November 2016
- July 2016
- June 2016
- August 2015
- July 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
Categories
Monthly Archives: July 2014
Threat: Sam the Disgruntled Employee
The last post looked at programmers. Now let’s consider another active threat: I’m going to assert that Sam is the second greatest security you face. (We will encounter the greatest thread in a few more posts.) Depending on who … Continue reading
Posted in Security
2 Comments
Threat: Tom the Programmer
The previous article explored the threat system administrators pose; now let’s look at another internal threat: No discussion of system integrity and security would be complete without Tom. Without the applications, tools, and utilities that Tom writes, computers would be … Continue reading
Posted in Security
Leave a comment
Threat: Fred the System Administrator
We last looked at the threat of a manager determined to make the business succeed; now let’s consider an inside threat: In terms of threat potential, Fred is off the charts. In order to do his job, he has essentially … Continue reading
Posted in Security
Leave a comment
Threats: William the Manager
In our last post we looked at the threats a security czar can create. Let’s now look at another surprising threat: William is concerned with his group getting their job done. He is under budget pressure, time pressure, and requirements … Continue reading
Posted in Security
2 Comments
Threats: Stan the Security Czar
Our previous posts looked at the stereotypical threat of hackers. Let’s now look at some less obvious threats: What?!? The security guy is listed as a threat to system security? Absolutely. Stan is knowledgeable. He knows that the world is … Continue reading
Posted in Security
Leave a comment
Is there a Java Binding for LMIShell?
An interesting question just came up: βis there a Java binding for LMIShell?β Hmm, good question β let’s answer it by digging into the OpenLMI architecture a bit. LMIShell is a client framework written in Python. It consists of a … Continue reading
Posted in System Management
Leave a comment
Threats: Sphinx the Script Kiddie
Our previous post considered skilled hackers – but not all hackers are skilled… Sphinx the Script Kiddie Unlike Igor, Sphinx doesn’t have deep skills or knowledge. But he does have access to very powerful cracking toolkits that other people have … Continue reading
Posted in Security
Leave a comment
LMIShell on RHEL 7
Someone reported that they were having problems using LMIShell on a RHEL 7 system – they didn’t have any of the friendly commands that we have been talking about. And they were right; the full set of LMIShell scripts that … Continue reading
Posted in System Management
Leave a comment