What is a False Flag?

The other day I watched a World War II documentary on internet TV. The story was about a British ship attempting to get past Nazi defenses by altering its deck profile and flying the Reichkriegsflagge or ensign of the Kriegsmarine – the German navy. As part of the rules of war, they had to switch […]
Read More ›

How I Was Wrong About Kerberos

Microsoft’s Active Directory includes a version of Kerberos that has had a bad reputation. There were problems several years ago, but the criticisms are now outdated. What was the problem, and how has it been fixed? Origins of Active Directory Windows 2000 was originally going to be called Windows NT 5.0. It was released in […]
Read More ›

GDPR: What You Need to Know and Do

GDPR or the General Data Protection Regulation takes effect next May. It’s an EU regulation. However, everyone must comply with it or else suffer heavy financial penalties and risk criminal prosecution. What Is GDPR? Simply put, the GDPR requires strong protection of personal privacy of people in the EU. Violations can lead to crippling fines, […]
Read More ›

How to Configure Linux for U2F Authentication

In my last post, I wrote about the benefits of U2F – Universal Two-Factor Authentication. Here are the three phases of installing it as the second factor on a Linux VM. For this article, I assume you have a Linux VM (or computer) configured with access to a USB port. I did this more as […]
Read More ›

Helping Users Understand Cybersecurity: Availability Becomes Reliability

Last week I explained how I thought that “Accuracy” was a better term than “Integrity” when we are communicating with users. The week before that, I said that “Privacy” is a better term than “Confidential”. This is part of my wild idea for replacing “CIA” with “PAR”. Privacy, Accuracy, and Reliability. What Does “Available” Mean […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.