/Telecommunications Security: An intro to the 10 domains in the CISSP

Fall 2011 Exam 1
Remember the quiz on Tue 11/15!

Security Policy Paper

  1. Write a document creating an organization wide security policy (If you have no clue look at power points for the first chapters or pages 18-22 in the book).  The paper should give me a real world example of a security policy, security standards, and security guidelines for a real business.  I prefer one written for an orgainzation where you have worked. However, if that is not possible the pick one you are familiar with, for instance your parents' business or a University Business School.

  2. Use of the vulnerabilities, risks, threats, and and other pertinant information from our links would be a good place to start.

  3. Given that most of you have never worked on this type of thing in the “real world” this paper is briefer that the those which would be implemented. Work for applicable but brief (maybe 5 or so pages) paper.

  4. Due NO LATER THAN 12/10


  Google for Developers: 8 Hot New Tools - Application Development - News & Reviews - eWeek.com How To Take Control of Your Next Job Interview The 50 Best Websites of 2011 - TIME
  Information Security Interview Questions | danielmiessler.com Hack This Site! Apple iOS is safer than Android, McAfee says | Security - CNET News
  How to Root Kindle Fire for Mac OSX or Linux! | RootKindleFire.com File Management Apps : How and Why to Root your Android: 15 Worthwhile Apps Kindle Fire Auto-Update Scorches Roots and Potentially Shutters Android Marketplace
  Hackers break into car using a mobile phone - News | TopGear.com.ph As SOPA/PIPA Still Loom, Techies Already Creating Workarounds | Techdirt Steve Jobs Says This Will Be Your Greatest Life Revelation
  App scans Facebook for unflattering photos you haven't been tagged in - Techworld.com Netflix want cloud alternatives to Amazon Web Services - Techworld.com AMD moves away from Intel rivalry, rethinks course | Computer Hardware - InfoWorld
  10 Ways to Protect Your Privacy Online ~ LockerGnome The Strange Birth and Long Life of Unix - IEEE Spectrum MasterCard further invests into mobile payments via mFoundry | ZDNet
  8 nice text-based applications in Linux ~ Linux and Life iPhone 4S satisfies 96 percent of owners, ChangeWave says | The Digital Home - CNET News Bitdefender officially releases Mobile Security app for Android - Yahoo! News
  The Best System Tweaker for Linux External desktop hard drives buying guide | Macworld Research team finds disk encryption foils law enforcement efforts
  Five Best Video Editors The Always Up-To-Date Guide to Rooting Any Android Phone Facebook Is Tracking Your Every Move on the Web; Here's How to Stop It
12/6  How to Completely Anonymize Your BitTorrent Traffic with BTGuard Best of Lifehacker 2011 News, Videos, Reviews and Gossip - Lifehacker Texas Tech University :: Advanced IT Security Training
  Amazon Kindle Source Code
The Promise Of The 15-Inch MacBook Air
New Tool Keeps Censors in the Dark
  How to Mentally Prepare Yourself to Start a New Job
The Pirate Bay Dancing for Firefox Bypasses National IP and DNS Blocks
Synapse Is a Super-Fast, Tightly Integrated Application Launcher for Linux
  1000+ UN emails, usernames and passwords leaked
A Step By Step Debunking Of US Chamber Of Commerce's Dishonest Stats About 'Rogue Sites'
7 hot jobs for 2012
  The Get More Out of Google Infographic Summarizes Online Research Tricks for Students
Android malware problems continue to grow
Google’s Chrome Browser Edges In Front Of Firefox To Become Worlds Second Most Popular Browser
  Most Common iPhone Passcodes
Netflix is 'broken' with no fix in sight, analyst says
Hackers post UN staffer user names, passwords
  Apple TV or Roku Set-top Box: Which is Right for You?
Carrier IQ: The Sony rootkit all over again

Carrier IQ: How the Widespread Rootkit Can Track Everything on Your Phone, and How to Remove It
Strange Security: Hackers Could Set Your Printer on Fire from a Distance
  Is Technology Destroying Jobs?
9 Gadgets That Prove You’re a Hard-Core Early Adopter
How to connect to Thunderbolt
  Understanding Windows 7's 'GodMode'
Developer builds Siri proxy server
Find Out How “In Demand” You Are in The Job Market With Identified
 12/1 Seven Security Habits of Successful Admins
Seven Kindle Fire Apps for Getting Work Done
Try OpenSUSE Linux 12.1 for Stability and Flexibility
  Five Best Online File Storage Services
Researchers Crack Blu-Ray Encryption With Cheap Hardware
Virtualization With KVM On Ubuntu 11.10
  The Hacker Quarterly
Two-thirds of firewall managers lack confidence in their security posture
Finally, Some Privacy! Cool LCD Monitor Hack Helps Keep Your Secrets
  Apple's telly vision
Hackers prey on smartphone use at work during holidays
Top 10 Dumb Computer Security Notions and Myths
  Controversial New Website Spies on Voicemail, says P.I.
Slide Show: 10 Tips And Best Practices For Becoming A Data Security Detective
Linux, Open Source & Ubuntu: 10 Custom Linux Distros That Ease IT Administrators` Workload
  Doomed by default passwords
TTU/HSC: Programmer/Analyst II
Industry says Africa fastest growing mobile market
  The Best Disc Burning App for Linux
The Jerk
The 101 Best Chrome Extensions
  Headphones buying guide
Best SSDs For The Money: November 2011
Macs, Kindle Fire, and managing files
  Black Friday iTunes infected credit malware alert
McAfee Protects Your Mac Without Affecting Performance
How to Fix Your Family’s Computer This Holiday So the Rest of the Year Is Easy
 11/29 The Best Paying Jobs of The Future
How to Choose A Cloud Storage Provider: Security
Toilet gaming technology targets urinal boredom
  Ten Tips for Public Wi-Fi Hotspot Security
Which VPN Providers Really Take Anonymity Seriously?
AMD introduces world’s first 16-core PC microprocessor
  Breakthrough chip mimics human brain function
Playing with Project Management
European Parliament votes in favour of net neutrality
  Treehouse Is an Elegant, Focused Online Learning Resource for Aspiring Designers and Developers
Sloppy use of Amazon cloud can expose users to hacking
DARPA Seeks New Methods For Biometric Authentication
  Don’t Say You’re "Experienced" on Your Resume (and Other Words to Banish)
The Pros and Cons of a Tethered Jailbreak on Your iPhone, iPad, or iPod touch
Report: $79 Amazon Kindle Costs $84 to Make
  Facebook tracking is under scrutiny
Enabling and disabling cookies
A Real-World Approach to Improving Security in the Cloud
  How to Securely Wipe Your Data from Any Phone on Any Platform
How to Improve Your iPhone’s Battery Life
Old Java versions breed new security exploits
  Remotely Opening Prison Doors
Why healthcare IT security is harder than the rest
This Brilliant Door Prank Will Terrify and Maybe Kill Your Friends
11/17  4 spear-phishing hooks for the holidays
Stephen King’s Rules for Time Travel
FBI investigating intrusion into university records system to alter grades
  Anti-Hacking Law Criminalizes Most Computer Users, Former Prosecutor Says
Disable AutoRun to Stop 50% of Windows Malware Threats
Kindle Fire Creates Dilemma for Android
  CNBC: Codewars
FBI stop hackers using
Apple’s Cloud-Based Music Service Now Live On iTunes
11/15  Synergy / QuickSynergy How-To SSH Tunneling made easy
iOS Developer Center Pending
  Linux World Map
Sloppy use of Amazon cloud can expose users to hacking
  World's smallest computer measures just 1mm
Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon
Researchers recover typed text using audio recording of keystrokes
  Electronic medical records rarely encrypted: expert
Senators Introduce Internet Sales Tax Bill
Amazon Has Acquired Yap, the Closest Thing to a Siri Clone It Can Find
  Sign legal documents with your finger, your iPad and Softsign
Add Lifehacker and Its Writers to Your Circles on Google+ to Breathe New Life into Your Stream
Fedora 16 now being served, with large side order of cloud
  Reed's Mail
What is the best scientific paper you have read
ArchBang Brings Arch Linux’s Greatest Features to Your PC Without the Stressful Installation
  WebTalks Reads Your RSS Feeds for You Off Your Android Device
Toyota’s New Infotainment System Mirrors Your Smartphone’s Display
Apple requires Mac App Store candidates to be sandboxed
  MIT server hijacked and used in drive-by attack campaign
So many risks, so little time
Bank Adopts 'Security Data Warehouse' to Fight Persistent Security Threats
  Norton Tablet Security
Job Outlook: The Candidate Skills/Qualities Employers Want
Game Over: Amazon Prime Is Officially the Greatest Deal in Tech
  How Can Malware Be Stopped?
Study: Signature-based antivirus can't stop polymorphic malware, unknown malcode
5 Things You Need to Know About Android Phones
  Adobe's decision to ditch mobile Flash: What you need to know
Teenagers Tell Researchers It’s a Cruel, Cruel Online World
Common sense wanted in the IT department
11/10  Revealed: the material properties of memristors
How to Use Photoshop to Pop Pimples, Change Facial Expressions, and Alter Reality As We Know It
How to Make (and Sustain) a Good First Impression Every Time
  Synergy lets you easily share your mouse and keyboard
KDE 3.5 Fork Trinity Releases First Major Update
5 More PC Upgrade Mistakes (And How To Avoid Them)
  Best 5 monitors for professionals
5 Hot Tech Projects to Boost Your IT Career
Entertainment Industry Gets Another Usenet Provider To Shut Down: Is Usenet Illegal?
  Wi-Fi security do's and don'ts
Top 10 Disruptive Techs from the Last Century
The Best Terminal Emulator for Mac OS X
  1Password vs. DataVault for iPhone: Fight!
Six Good Reasons to Try Fedora 16
Everything You Always Wanted to Know About Web Tracking (But Were Too Paranoid to Ask)
  Fedora Core 16 released
What Would The Movie Business Be Like If The MPAA Succeeded In Killing The VCR?
  15 Apps and Tweaks That May Convince You to Jailbreak Your iPhone
U.S. Counts on the Cloud to Boost Cyber–Security
Fedora to simplify filesystem hierarchy
  40 People Who Changed the Internet
iPhone Security Bug Lets Innocent-Looking Apps Go Bad
Busted! Two New Fed GPS Trackers Found on SUV
  Screen-spy program can read texts and emails
Cyber-espionage attempts on US businesses are on rise
How To Never Bust Through Your Smartphone’s Data Cap Again
11/8  From College Major to Career
Hijacking Google Analytics
Microsoft issues workaround for Duqu attack while it prepares a patch
  Customized, stealthy malware growing pervasive
They are the 11 percent (or less) who really get security
iOS 5 Shortcut Feature Enables A Hilarious Prank
  Network World's Hottest Tech Arguments
How to find out if your email address has been compromised
New Apple Store app launches Thursday; here’s how it will change Apple’s retail operations
  Ubuntu Linux heads to smartphones, tablets, and smart TVs
Browser wars: IE vs. Firefox vs. Chrome vs. Safari vs. Opera
Check Out the Guide to 400 Essential Apps By Wired and Gizmodo
  New cyber attack targets chemical firms: Symantec
Governments turn to hacking techniques for surveillance of citizens
Half of all spam is relayed via Asian computers
  Sony splits TV business in three as trouble persists
Disney-ABC Signs Streaming Deals With Amazon And Netflix
Moving On? 5 Things NOT To Do When You Quit
  Five Best Disk Defragmentation Tools
How to Make the Most of Airplane Wi-Fi and Never Pay Full Price Again
IT's guide to managing Macs in the OS X Lion era
  How to Crack a Wi-Fi Network’s WEP Password with BackTrack
US Copyright Office Still Out Of Touch; Supports PROTECT IP/E-PARASITE & Felony Streaming Bills
A Sister’s Eulogy for Steve Jobs
  Amazon Kindle Fire Poised to Reshape Tablet Market: 10 Reasons Why
Siri iPhone Voice App Is Important to Apple`s Future: 10 Reasons Why
68 great ideas for running a security department
  Keyport Slide
Portable Software Applications that run from USB
Uptick in tainted ads hurts consumers, advertisers
 11/3 Applying to grad schools? Clean up your Facebook
Facebook Timeline a new privacy test
Amazon launches Lending Library for Kindle owners
  Macs are invading the business world, study says
How to Break Into a Windows PC (And Prevent It from Happening to You)
Warner Bros. Hates Libraries, Wants To Embargo DVD Sales To Libraries For A Month
  Amazon Kindle 4 review
PandoraEnhancer for Chrome Removes Ads, Adds Desktop Notifications for Song Changes
(At least) 4 web authentication authorities breached since June
ssl as good as broken

  Making UEFI Secure Boot Work With Open Platforms
9 Essential Geek Books You Must Read Right Now
These Are the Greatest Geek Books of All Time
  Kernel for Linux Data Recovery Software
Linux Journal
MPAA Lists “Notorious” Pirate Sites To U.S. Government
  Ubuntu vs Fedora: which is best?
Dropbox adds new file-sharing service for work groups
Want a raise? 11 IT jobs set for 6%-9% pay hikes in 2012
  Books Unbound or What is a book
It’s 3-D, High Definition and in Your Face
Top 10 Ways to Unlock the Unlockable
  Hacks make large-scale sabotage possible
Watch Out for Fake Untethered iOS 5 Jailbreak Tools
iPhone 4S Battery Problems May Be a Bug with iOS Location Services
  Computer program could point police to gang-crime suspects
How to Break Into a Mac (And Prevent It from Happening to You)
When passwords attack: the problem with aggressive password policies
  Hacking the Google TV Box Without Rooting It
BofA Calls Off Debit-Fee Plan
Get real about your security risks
11/1  The 40 Most Popular Tools For Your System Admin Bag
Google's Maps Street View service pilots indoor photos
Microsoft has figured out how to turn any surface into a touch pad
  BT ordered to block Newzbin2 filesharing site within 14 days A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It) public vpn service
  HTC's on the Hotseat for Allowing Critical Smartphone Security Flaw
Facebook Enlists Websense for Neighborhood Watch
GotYa For Android Takes Geo-tagged Photos Of Person Who Stole Your Phone
  Enterprise Mobility: Apple iPad's Reign as Top Tablet Won't Last Forever: 10 Reasons Why
Safety in the Cloud - Best Practices for Private and Public Models
Hands On With Nokia's Crazy Flexible Phone
  Researchers Demo Cloud Security Issue with Amazon AWS attack
Citrix: Virtual desktops about to become cheaper than physical ones
Researcher finds major flaw in Facebook
  FBI Wishes for a Network Security Utopia That Can Never Exist
One in five IT staff expected to quit current employer within 12 months
How to Spoof Caller ID
  'Big Data' Prep: 5 Things IT Should Do Now
5 Signs Technology is Moving Too Fast
Researchers find "massive" security flaws in cloud architectures
  5 Tech Pros Companies Want to Hire
A Gadget for the Home Learns by Degrees
High-speed Ethernet Planning Guide
  Congress asked to investigate internet “supercookies”
Linux Desktop Faceoff: GNOME 3 vs Ubuntu Unity
Consumerization 101: How to crack the iPad password in 5 seconds
  PROTECT IP Renamed E-PARASITES Act; Would Create The Great Firewall Of America
The best tidbits from the Steve Jobs bio
What to Do When You’ve Forgotten Your Smartphone’s Passcode
10/27  LIAN LI Lancool PC-K56 Black 0.8 mm SECC, Plastic + Mesh ATX Mid Tower Computer Case $59
TR's fall 2011 system guide
Discover What’s New in CSS 4
  Windows XP hacks Books by O'Reilly : 100 Industrial Strength Tips and tools
You say you want a revolution? It's called post-PC computing
How to Read Body Language to Reveal the Underlying Truth in Almost Any Situation
  Apple quietly bumps MacBook Pro processors, graphics
Silence Noisy Neighbors by Transmitting Your Music to Their Speakers
HTC partners with Dropbox, 5GB free on every Android
  Smartphone sales fell in the U.S. for the first time during Q3
Apache Web server security
More Gyroscope-based smartphone keylogging attack
  Police use Facebook to track down man who stole booze from bar
Laser attacks on planes continue, despite greater penalties
Myspace: Five lessons learned from the front
  The Most Common Hiding Places for Workplace Passwords
Google Explains Online Safety and Privacy at Good to Know
How to Get iOS 5’s Biggest Features in Android Right Now
  Get your scroll bars back in OS X Lion
HowTo Pick Locks
Bump Key HOWTO
  New Mac malware variant disables OS X defenses
How to Get All Your Apps Everywhere
5 Ways to Fix a Slow PC
  The 5 biggest gripes so far about the iPhone 4S
Lytro wants to reinvent photography
The IPad's Secret Abilities
  Hacker's phone call to police saying he defaced their website.. because he was bored
Microsoft's YouTube channel has been hacked
Want To Easily Boot Users Off Your Wi-Fi Network? WiFiKill Can Take Care Of That For You
  The “world’s most wanted hacker,” Kevin Mitnick, has gone straight (interview)
Zimperium Finally Releases 'Anti' For Android, Allows You To Use Penetration Testing Tools On The Go
How to find out everything that Facebook *really* knows about you
10/25  How to put your logo in a QR code
The Internet of Things [INFOGRAPHIC]
55 Portable Apps for Making a USB Super Stick
  Kaspersky Pure Total Security (3 User) Free AR at Newegg
For iPads in the enterprise, hassles aplenty
Doxie Go: Wireless Scanner (mostly) Cuts the Cord
  Crypto is cracked: How not to fall in
Turn your nose up at Dart and instead smell the CoffeeScript
Apple's Siri is AI with an attitude
  Should tech pros get an MBA?
Websites leak more info than most know: study
45 Minutes to a Linux Terminal Server
  Outside Boulder this weekend
A Day in the Life of Privacy
How to Fix Internet Embarrassments and Improve Your Online Reputation
  Should I Switch to iCloud From Google?
Amazon Bypassing Publishers By Signing Authors Directly
Thousands of Social Security Numbers Leaked Yearly
  Is Your Car Tweeting? -- What's Next for Connected Devices
The Perfect Desktop - Ubuntu 11.10 (Oneiric Ocelot)
Installing Apache2 With PHP5 And MySQL Support On Ubuntu 11.10 (LAMP)
 10/18 Some things to consider before switching your bank
New Gadgets, Without the New Car
Tips for Using Wi-Fi Securely
  INSIDE EDITION Investigates Electronic Pickpocketing Dart: a language for structured web programming Anonymous 'hacktivists' briefly take down NYSE.com
  Government' backdoor R2D2 Trojan discovered by Chaos Computer Club How NOT to redact a PDF - Military radar secrets spilled DoJ’s WikiLeaks Probe Widens to Include Gmail, ISP
  Mythbusters to Host Discovery’s Documentary on Steve Jobs Flashback contains a Mac Trojan iOS 5 now protects against DigiNotar, MD5-signed certs
  The Federal Reserve Plans To Monitor Facebook, Twitter, Google News Enterprise Mobility: Buy iPhone 4 Instead of iPhone 4S: 10 Reasons Why Qwikster dies before it is born
  How to Hack the New Road Signs (Updated) Computer virus hits US Predator and Reaper drone fleet The Best System Monitor for Linux
10/13; How to build a Linux media server Tom's Hardware (Fall 2011)
Best Graphics Cards 3TB Harddrives
Tom's Hardware Home
  Supreme Court Declines Music Download Case TechAmerica: US IT industry adds jobs in 2011 Protecting iPad data without hobbling users
  Check your machines for malware, Linux developers told iPhone and iPad Security: The Human Element This is how Windows get infected with malware
  Amazon Adds Free Encryption to Storage Service Amazon Adds Free Encryption to Storage Service Hide Your Stuff in Plain Sight
  Ten Security Essentials for the Networked Enterprise Mobile Security Threats Are Heating Up iOS 5: What you need to know
  How Secure Is My Password? New OS X Trojan horse sends screenshots, files to remote servers Microsoft addresses Windows 8 secure boot issue
  Uniform Traffic Ticket Scam email
Steve Jobs (1955-2011) WiFi users blissfully ignorant about real security, research finds
  Adobe: We've got the Touch for tablets
What does your mobile carrier know about you?
How to Use the Internet to Investigate Your Next Date, Coworker, or New Friend (Without Being Creepy)
  Federal IT security incidents increasing rapidly
Facebook looks to San Diego's Websense to improve security
Hackers may target cars next, McAfee says
10/6  AT&T Begins Sending Throttling Warnings to Top Data Hogs
Apple unveils iPhone 4S
TONIDO Plug Linux mini computer
  Congress Is About to Make It Legal to Robocall Your Cell Phone; Here’s How to Speak Up Against It
Firefox devs mull dumping Java to stop BEAST attacks
Rhapsody to Acquire Napster in Deal With Best Buy
  email: Reminder: Employer Panel
Isaac Asimov on Security Theater
An Incredibly Simple Way to Escape from Wrist-Binding Zip Ties
  Paid Internships Key to Job-Search Success
Reed's email about job fair & other stuff
The next frontier in fearing the iPad
  Diebold voting machines can be hacked by remote control
Java, Adobe vulns blamed for Windows malware mayhem
Global Internet governance fight looms
  Problems with Mac OS X Lion Passwords
How Does the Amazon Kindle Fire Tablet Stack Up to the Competition?
Hackers disguise malware as emailed docs from smart printers
  The Future Of Books: A Dystopian Timeline
15 Free Apps for Personalizing Your Android Phone
More ways to move data to a new Mac
  Top 10 Kindle Hacks
Firefox Add-On Cocoon – Strengths and Weaknesses
Groovy a dynamic language for java
  Buy This Movie Or Legally Download It For Free: Your Call
'Bring your own device' programs give Apple a boost in the enterprise
Incredibly Useful CSS Snippets
  Decoding Twitter
25 Free eBooks for Web Developers and Designers
Force Windows Recycle Bins to Empty for Every User on a System
 10/4 HTC Android 'massive security' flaw leaks private info like a sieve
Windows XP Usage Share Falls by Record Amount
Innovatio’s Infringement Suit Rampage Expands To Corporate Hotels
  What to Do if You've Been Hacked  The Best Hacker Films  CSS Awards – 15 Awesome Websites 
  What's a Company's Biggest Security Risk? You.   Facebook tracks what you do online, even when you’re logged out

The Most Prevalent Attack Techniques Used By Today's Hackers 
    Mac trojan spreads under guise of PDF document
Pentagon extends cyberattack defense program  Concern over U.S. snoops drives Canadian political party to cloud-based encryption  
  How to Stop Facebook From Tracking You Across the Internet  Android powered 56 percent of smartphones sold in the last three months  Facebook Gold

Snopes Article
  Make Your Own RFID Shielded Wallet To Foil ID Thieves   5 Ways QR Codes could change the 2012 Election
Changes to Facebook 
   Typosquatting hacks: Finger slips sink ships Twitter Bans Bad Passwords  VITAband Holds Emergency Medical Info, Visa RFID Credit Card For Joggers 
  Zite The 10 Most Lovable Creatures in Science Fiction Keep your Mac safe from Web security flaws
  Make Your Own Windows 8 Tablet with Off-the-Shelf Gear Most — But Not All — Big Magazine Publishers Sign On for Amazon's Tablet 5 Dirty Tricks: Social Engineers' Latest Pick-up Lines
  Learn How to Pick Locks from a Competitive Lockpicker Who Truly Loves Locks Austin Police Planned... Then Postponed Wardriving Plans In An Attempt To Shutdown Open WiFi

Security becoming a must on smartphones (Inside Apps)

The Always Up-To-Date Guide to Rooting Any Android Phone
APP Guide: New Fall Season Thunderbolt Display
  Adobe patches Flash bug hackers are already exploiting
Bigger isn't better when it comes to social engineering attacks
Wrapping Personal Devices and Critical Data in Stale Policies
  Windows 8 Certified Computers May Not Be Able To Boot Linux
The best changes IT can make: top 5 reader suggestions
3 Hacks for Firefox That Will Double Your Internet Browsing Speed

Apple iPad 3 Might Face Trouble at Launch: 10 Reasons Why
Groovy, JavaScript, Ruby Among Fastest Growing Programming Languages
Smartphone to measure radiation
  How a Quick WiFi Tweak Could Double Your Phone's Battery Life
Google improves video chat opens to the world
iPad: About backups
  How Do I Protect My OS X Lion Passwords from Being Easily Hacked?
McAfee Delivers Comprehensive Protection for Mobile Devices
Stubbornness Increases the More People Tell You You’re Wrong

Legal risks abound for firms without a mobile device security policy
Relive The Classics DRM-Free: GOG.com Interview
Mounting Remote Directories With SSHFS On Debian Squeeze
  5 Secrets to Building a Great Security Team
System Builder Marathon, Sept. 2011: $2000 Performance PC
Skype for iPhone makes stealing address books a snap

Angry IP Scanner?
Top 4 Port Scanners
11 Android Apps to Boost Speed and Battery Life
9/22  nmap.org
TCP/IP Reference

Protect your privacy with a new crop of security suites
Five Reasons to Try Joomla for Content Management
Travel Back in Time to Usenet 30 Years Ago
  UBS Rogue Trader Underscores Insider Threats Facing Enterprises
Capitol Alert: Computer hacking sparks Assembly warning to dozens of aides
Intel officials' emails posted after hack of cybersecurity group

$700 / 2br - 3 BEDROOM HOME FOR RENT (Lubbock, TX)
Electronic Medical Records Service Practice Fusion Raises $6M From SV Angel, Founders Fund
Organizations Over-Confident About Security Strategy: Survey
  Call It Your Online Driver’s License
How to Turn Your Nook Color into an Android Tablet
Iran blocks Tor; Tor releases same-day fix

Linux Home Networking
Quick HOWTO : Ch14 : Linux Firewalls Using iptables
Tyler Technologies Jobs
  Gauge Your Mobile Internet Usage
Capitol Alert: Computer hacking sparks Assembly warning to dozens of aides
16 essential Android apps for IT pros

Wired and Tired: The Long View on the New Netflix

Netflix Stock
Google Wallet Goes Live On Sprint, Visa/Discover/AmEx Support On The Way
Hackers break SSL encryption used by millions of sites
15 essential open source tools for Windows admins
OS X Lion passwords can be changed by any local user

Privacy at risk: Who's watching you? (roundup)
The World's Largest Photo Libraries
Quickly open unlinked URLs in Terminal
Mac OS X: How to start up in single-user or verbose mode
AITP and Marathon Oil invite you to attend a special event on Tuesday, September 27th at 5:30pm in BA 55
NI September 22 at 4:30pm in BA 365. Did we mention that free food and drinks from Rosa's Cafe

Obama administration seeking tougher penalties for cybercrimes like hacking
Hidden Wi-Fi Diagnostics Tool In Mac OS X 10.7 Lion
Forensic Tool Unlocks Online History

Network trust and security in doubt
RIAA Sending DMCA Takedowns On *FREE* Music Being Distributed Directly Off Universal Music Website & Promoted By The Artist
How You Should Be Using LinkedIn: Tips from an Insider

Windows 8 Screenshot Tour: Everything You Possibly Want to Know
Microsoft Ditches Flash on Metro Version of Internet Explorer 10
Newzbin2 Release Encrypted Client To Defeat Website Blocking
  Google Building Maker  Newseum     What Should I Read Next Everything SSH 
   Homeland Security Digital Library - Priceless resource VMware updates Windows-on-a-Mac software  Review: Track your stolen laptop for free with Prey 
   Vocre Turns Your iPhone Into a Near-Instant Universal Speech Translator  VC legend Doerr: Tech is booming, not in a bubble
 McAfee and Intel partner up to put anti-theft tech in Ultrabooks
   Book Review: Metasploit The Penetration Tester's Guide  How Do I Get Cool Desktop Effects in Linux? Windows 8 Will Run From USB Thumb Drive 
   Cracks in security leave DHS financial systems vulnerable to abuse  Windows 8 on Workstation 7.1.4? Microsoft download from The Garage: Mouse without Borders 
   Prompt The Best Disk Cloning App for Windows   Risk Perception and Terrorism: Applying the Psychometric Paradigm
 9/15  QR codes and security – my take  Bitcasa moves your hard drive to the cloud
Why Sprint Offering Unlimited Data for iPhone 5 Is No Big Deal 
   TED: Ideas worth spreading

eMail!!  New emotion detector can see when we're lying 
   How I Got My Stolen Laptop Back Within 24 Hours Using Prey  How to Turn Your FreeNAS Box Into an Internet PVR with SABnzbd and Sick Beard Authors Guild sues universities over online books 
   Linux.com pwned in fresh round of cyber break-ins Researchers develop botnet drone that targets Wi-Fi networks      Gizmodo Link
E-mail typos result in 20GB of stolen data 

This Day in Tech: Data from Stanford Hospital patients found online

Systemd Open Security Screws with a Rotary Tool
  Everpix: All Your Photos, Automatically Organized And Accessible From Anywhere Can Irrational Decisions Be Corrected? A Football Case Study Windows 8 Gets Ready for Its Big Debut
Top 8 expected features of Windows 8
  Spool Is Instapaper On Steroids Six Ways Amazon Book Streaming Could Help Small Business Net neutrality rules move closer to implementation
  The Best Disk Cloning App for Mac OS X Installing MySQL Administrator Tool To Connect To Remote Databases Top 10 Video Game Cheat Codes
9/13  Amazon 'to launch book rental service HP Introduces New Enterprise Security Software 10 Hackers Who Made History
   Could DigiNotar Hack Lead to a Cyberattack on You? Linux Init Process / PC Boot Procedure  Low blow: Phishers target student loan applicants 
  Cutting the Gordian Knot of Web Identity   Daily iPad App: PDF Expert Car Hacking: Researchers Highlight Emerging Risks and Lack of Security in Automobiles 
   IT Security & Network Security News & Reviews: 10 Notorious Hackers Who Went to Work for 'The Man' MPAA's Bogus 'Piracy' Numbers Mean It Thinks Downloaders Would Buy 200 More DVDs Per Year  Cloud Encryption and Security Tips 
   Cybersecurity Focus Increasing as Organizations Adopt New Computing Models Senators Push for Changes in Cybercrime Law  This Is How Insanely Fast the Texas Wildfires Are Spreading 
   RFID credit cards easily hacked with $8 reader
 Encryption and Privacy
Many US schools adding iPads, trimming textbooks 
 9/8 How to Build a Remarkable Computer and Save $  Unbelievable solutions to common tech problems
Java or Python Reddid display 
   Hacking ATMs With Infrared Cameras History of Software Piracy  How to Use LinkedIn to Increase Your Hirability 
   6 Javascript Libraries for Developers Diamond Wireless Range Extender WR300n Review  UPDATE: TrueCrypt v7.1! 
  Some Guy Pranked YouTube Into Taking Down Justin Bieber’s Official Videos Because of a Fake Copyright Claim Wired: eReaders Comparied  WikiLeaks: MPAA behind Aussie ISP lawsuit
(but don't tell anybody) 
  What do top CIOs make MIT researchers craft defense against wireless man-in-middle attacks The GRUB Boot Loader
  How to root and hack your Android phone Students Find Ways to Thwart Facebook Bans Understanding the Insider Threat
  It's still good to have gatekeepers TV In The Cloud Why iPad is Conquering the Workplace
  OS - Browser market share August 2011 How-To significantly increase volume on iPad. etc DHS Warns of Anonymous Cyber-Attack Tools, Planned Mass Protests
  How the Starz-Netflix Divorce Will Remake Video Why the Number of Apps in an App Store Doesn't Matter Irongeek.com
9/6 The road forward for systemd The Efficacy of Post-9/11 Counterterrorism JavaScript-Toolkit-V110-Released
   http://bensbargains.net/deal/212705/?referrer=rss%2F/ OpenDNS and Google working with CDNs on DNS speedup   10 Secure Linux Distributions You Need Know About 
   How to install Grub to the MBR Occupational Outlook Handbook, 2010-11 Edition  Would We Have Art Without Copyright Law? 
  Is There One Image That Makes You Laugh Every Time You See It . . . No Matter How Many Times You See It? Boot with GRUB VMware CEO: Cloud to end computer desktop era
  Linux Now Runs on iPad; Tuxedo Optional Linux at 20: New Challenges, New Opportunities Software tracking could turn Chinese piracy into revenue
  Survey: IT Pros Split on Allowing End Users to Download, Install Software Speech recognition leaps forward Jailbreaking 101: Which Tool to Use to Hack Your iDevice
  Codecademy Is a Free, Interactive Webapp That Teaches You How to Code How Do I Securely Wipe a Computer Five Good Reasons to Try Mandriva Linux 2011
  Yale gives iPads to med school students

Why did CNN buy the news aggregator Zite?

Book Review: CoffeeScript
  Hard Drives 101: Magnetic Storage How To Install VMware Player On Ubuntu 11.04/Linux Mint 11 "those who are too smart to engage in politics are punished by being governed by those who are dumber."--Plato 2005
9/1 Hoot Turns Facebook into a Study Hall and Project Collaboration App Top 5 Recession-Proof Careers Pakistan to ban encryption software
   Deeper Is a Lion Tweaking Tool with Dozens of Customization Options  Browsing and Privacy: How to Not Get Tracked  How to Share Your Wi-Fi Network with Android Users, No Password Typing Required 
   Five Best Phone Recovery Tools Print to PDF Can Create a PDF from Any Printable Content on Your iPhone or iPad  Apple's iOS 5 Beta 6 Jailbroken 
  Tiered pricing comes to the Internet backbone  How To Prevent IT Sabotage Inside Your Company  Dear MPAA: Stomp Your Feet And Repeat It As Many Times As You Want, But Infringement Is Not Theft

 The collar bomber's explosive tech gaffe

Fired techie created virtual chaos at pharma company
Free Textbooks For Students Will Break Greedy Monopoly
Investigation reveals widespread insider hacking at immigration agency

Apple Neutralizes Jailbreaking Threat – By Employing Him
How Hackers Perpetrate Click-Fraud
Google's War Against Scraper Sites Continues

Lawsuit Accuses comScore of Major Privacy Violations
50 books that were banned
How Can I Make the Windows Command Prompt Better?
8/30 Top 10 Secret Agent Security Tips and Tricks  The Perfect Server - CentOS 6.0 x86_64   Five Best Hard Drive Space Analyzers 
  Amazon Student for iOS Makes Buying, Selling Textbooks a Breeze Why Software Is Eating The World How To Prevent IT Sabotage Inside Your Company

August 29th Time
Password Article


SF-Wireshark (ethereal)

YouTube-History of Hacking

W:Max Butler--Stolen Credit Cards





History of Hacking (Video)

JohnRDurrett on Twitter


Learn 10 good Unix usage habits

Protecting MySQL database from SQL injection attacks with GreenSQL


Misc Summer

All Things Digital

Cool Tools

Linux/NIX Web Authoring Tools