Showing 218 results for the search term "John McDermott".
Amazon announced in a blog post on April 19 that they had made their natural language tool, Amazon Lex, generally available. First of all, Amazon Lex is – according to the Amazon website – “a service for building conversational interfaces into any application using voice and text.” Lex provides natural language understanding and speech recognition; […]
Security expert and writer Brian Krebs was the victim of a distributed denial of service attack that used the Mirai botnet. His site discusses the source code used on the compromised computers. Others have provided analysis of the code. The software is used to infect Internet of Things or IoT devices. Examples include webcams, DVRs, […]
Two-step or two-factor authentication provides better security than a single factor. For instance, a fingerprint and PIN is stronger than either alone. Security professionals generally divide authentication techniques into three categories: something you have, something you know, and something you are. Corresponding examples would be a token or an app on a smartphone, a password, and […]
Recently, I posted about basic permissions for Linux files; now let’s look at how to access those in a shell script. Testing file permissions is an essential part of enforcing an access control policy. Two common ways to test files for readability, writability, zero size and so forth are the if and the test. For […]
As I write this, I am developing a skill (app) for Amazon’s Alexa voice service. A couple of days into the development I thought I’d accidently corrupted a critical file. Fortunately, I hadn’t, but it reminded me of the practice of discovering file changes by comparing file hash values against a baseline. The basic idea […]