Selasa, 31 Mei 2011

Making the ultimate exercise equipment on the cheap!

Exercise equipment is great, but can have a lot of drawbacks. To name a few, exercise equipment is a bother to move around, takes up space in the home, and is expensive. I prefer to use dumbbells for weight lifting but at about $1/lb it can get expensive to upgrade my weights. Not only that, but I find that since I move around a lot, lugging the dumbbells around is not very practical.I have decided to solve this problem by making the ultimate exercise...

Sabtu, 21 Mei 2011

Five Qualities of Real Leadership

I've noticed coverage of "leadership" in IT magazines recently, but I'm not comfortable with the approach they take. For example, this editorial in CIO Magazine titled Leadership Isn't a Fairy Tale After All has "Personal attention and hands-on involvement can make good IT managers great IT leaders" as the subtitle. The text then says:Our story spells out detailed tactics and practical ideas that CIOs can use to turn good IT managers into potentially...

CIO Magazine Realizes "IT Alignment" Is Dead

I took a look at the newest print edition of CIO Magazine and saw the story IT Value Is Dead. Long Live Business Value. (Registration is needed for the whole article, but you don't need it.) The article includes these gems:The end of IT-business alignment is nigh. And no one is happier about it than the business-focused CIO.“If you stand in front of an audience of CIOs and start talking about IT-business alignment, at best you get eye rolls, and...

Rabu, 18 Mei 2011

Bejtlich Teaching at USENIX Security in San Francisco 8-9 Aug

For the first time in four years, I will teach for the USENIX organization! I'm pleased to announce that on August 8-9 at USENIX Security 2011 in San Francisco, I will teach a special two-day edition of TCP/IP Weapons School 3.0. This class is designed for junior and intermediate security analysts. The "sweet spot" for the potential student is someone working in a security operations center (SOC) or computer incident response team (CIRT), or someone...

America the Vulnerable Arrives This Fall

Today I attended a talk by Joel Brenner, formerly national counterintelligence executive (NCIX) and now a lawyer with Cooley LLP. He talked about the threat to national and economic security posed by our overseas friends. I was most excited to learn that he has a new book arriving this fall titled America the Vulnerable: New Technology and the Next Theat to National Security. Given his experience as NCIX, his former role at NSA, and his current...

Senin, 09 Mei 2011

Some tips for hand made cards

Growing up, I remember my older brother was always really good at making cards. I don't remember if he actually taught me how to make cards, or if I just picked it up from watching him make them, but I have also come to enjoy the art of card making. It is something that can be somewhat time consuming, but I think it means a lot more to someone that you spent the time to make something yourself than you going out and buying something.I don't claim...

Kamis, 05 Mei 2011

RAW Photo Editing - Darktable Review/Tutorial

As I have continued to play with RAW images, and have been continually looking for the best software. Previously I had mentioned that RawTherapee was my favorite RAW editor. Looks like it has been bested by Darktable. Darktable is amazing! I have done a video tutorial/review as well as listed some pros and cons. Read article...

Rabu, 04 Mei 2011

Opting Out of Junk Mail

This is a list of links to take you to company pages where you can opt out of receiving junk mail. If you would like something else added, please add it in the comments below.BanksChaseBank of AmericaWells Fa...

Senin, 02 Mei 2011

Security Process Document

I've created four separate documents outlining The Security Process for a consultant. The documents detail work flow from initial client meeting, to engaging The Security Process, and transitioning to monitoring/training of completed work. My text is intended as an outline for consultants and clients interested in understanding the steps of the The Security Process. The text is intended to function as a guideline to the process of developing security independent of operating system, network or company size. Additionally, the document is designed...