Showing 218 results for the search term "John McDermott".
In security courses such as Learning Tree’s System and Network Security Introduction, we often hear about the insecurity of protocols such as Telnet. These older protocols send their data – including login credentials – over the network in the clear. While ssh, a secure alternative to Telnet, is used in many applications today, many sites […]
A critical skill for leaders and aspiring leaders is storytelling. Throughout history, stories have been an essential form of communication. Brain science even gives us reasons why. I love to listen to and tell stories. Most people do. We tell stories to friends at social gatherings, share stories about work successes and failures, tell stories […]
Learning Tree’s System and Network Security Introduction course begins with a description of the four fundamental concepts of cyber security: authentication, confidentiality, integrity, and availability. That leads into a discussion of authorization: “who is allowed to do what.” The conclusion is the “access equation”: Authentication + Authorization = Access (We also discuss situations where access is […]
“Don’t share your passwords with anyone!” We say it repeatedly in Learning Tree’s System and Network Security Introduction, and I’m sure I’ve said it on this blog more than once. It’s bad practice; it leads to potential insecurity, and it means systems aren’t able to properly account for use. Sharing passwords is also illegal in some […]
I bought an Amazon Echo Dot. It arrived earlier this week. I love playing with it, and I think I will try writing a skill for it, just to see if I can. The Dot works sort of like Apple’s Siri: the user says a word to awaken Alexa (the service) and then asks a […]