Take All Your Music To Linux
“I own many CDs”, the Sphinx said. “I listen to music all the time. But I never play my CDs. What is happening?” That’s easy, a minor-league Sphinx question at best. She ripped her CDs. She used software to read the audio data, convert it to a compressed format, and store the songs as files […]
Understanding Cyber Security: Confidentiality Becomes Privacy
In early August I made the heretical suggestion of replacing “CIA” with “PAR”, as in Privacy, Accuracy, and Reliability. Grim talk about “The CIA Triad” suggests to many users that it is nothing for them. But we can’t have information security without user understanding and involvement! We talk about CIA in Learning Tree’s System and […]
Do You Know the New Linux Networking Commands?
Back in April, I explained the new network interface names. Instead of eth0 it’s something like enp0s4 or p7p1. Let’s see how to check the settings. Run these commands on your system and play along! Physical Devices First, what are the network class devices? This system has two Ethernet interfaces: $ ls -l /sys/class/net total […]
How Can We Help Users Improve Security?
Maybe we should rename CIA. I don’t mean the government agency by that name. I’m risking heresy by saying that the tired old acronym CIA for Confidentiality, Integrity, and Availability isn’t sacred text. We talk about CIA in Learning Tree’s System and Network Security Introduction course. Let’s take a critical look at it here. I’ve […]
The Next Big Thing in Biometric Authentication: Ephemeral Biometrics
A device like a FitBit may soon greatly improve user authentication. The key to this will be ephemeral biometrics. We talk about biometric authentication in some of Learning Tree’s cyber security courses, including the System and Network Security Introduction course and the CompTIA Security+ test-prep course. But how are ephemeral biometrics different? Biometrics Today Biometric authentication […]