Showing 226 results for the search term "John McDermott".
In my last post, I wrote about the benefits of U2F – Universal Two-Factor Authentication. Here are the three phases of installing it as the second factor on a Linux VM. For this article, I assume you have a Linux VM (or computer) configured with access to a USB port. I did this more as […]
A participant in a critical thinking class I taught recently suggested a solution to a problem I’d posed to the group. “Let’s do a PMI analysis,” I suggested, expecting the class to be familiar with the tool. None were. The tool can be a very productive way to frame a discussion. What is a PMI […]
NIST, the US National Institute of Standards and Technology, released a report last December, “Dramatically Reducing Software Vulnerabilities.” It has multiple useful and interesting ideas for improving vulnerabilities in software. I want to highlight two that I felt were most important. 1. Education There is no technological substitute for developer discipline. Education is not just […]
The ability to disable computers, cars, or other machinery from a distance without being easily detected has fascinated me for a long time. Years ago I worked for defense cub-contractor founded by engineers who had worked on the Airborne LASER Laboratory (ALL). They successfully used a LASER on board an airplane to shoot down drones. […]
In a previous post, I wrote about attackers using default passwords in FTP and Telnet to compromise devices (especially IoT ones such as cameras). The compromised devices were then used to attack other devices on the Internet. I suggested users change passwords on the devices where possible but acknowledged that some were not changeable. I […]