Showing 227 results for the search term "John McDermott".
This past week (as I write this) security researcher Mark Burnett (who literally wrote the book on passwords) released ten million passwords gathered from security breaches. He went one step further and released the account names (without the domain part) of the associated email addresses. That’s a lot of passwords. Here’s why you should care. […]
The other day I watched a World War II documentary on internet TV. The story was about a British ship attempting to get past Nazi defenses by altering its deck profile and flying the Reichkriegsflagge or ensign of the Kriegsmarine – the German navy. As part of the rules of war, they had to switch […]
In my last post, I wrote about the benefits of U2F – Universal Two-Factor Authentication. Here are the three phases of installing it as the second factor on a Linux VM. For this article, I assume you have a Linux VM (or computer) configured with access to a USB port. I did this more as […]
A participant in a critical thinking class I taught recently suggested a solution to a problem I’d posed to the group. “Let’s do a PMI analysis,” I suggested, expecting the class to be familiar with the tool. None were. The tool can be a very productive way to frame a discussion. What is a PMI […]
NIST, the US National Institute of Standards and Technology, released a report last December, “Dramatically Reducing Software Vulnerabilities.” It has multiple useful and interesting ideas for improving vulnerabilities in software. I want to highlight two that I felt were most important. 1. Education There is no technological substitute for developer discipline. Education is not just […]