In a recent Infoworld article by Tom Sullivan it is pointed out that companies are investigating or implementing policies and procedures to allow users to manage their own information technology assets. Link to infoworld story This is of course a…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
ITS 472: Phase 2 Navy Marine Corps Intranet Project
Here are the links to the presentations: Group 1 Presentation Questions DOCUMENT 6.9 MB Group 2 Presentation DOCUMENT 15.5 MB Click here to go to the final document & presentation link
Hacking a computer with a microphone
While talking with one of my students tonight I was reminded of this article. How about using a microphone to hack the key of a system? Using acoustic signature to get the encryption key and other information as a passive…
The Air Force is moving ahead with work on the cyber command
The Air Force is moving ahead with work on the cyber command (LINK). Air Force moving ahead with Cyber Command The Air Force is moving ahead on establishing its new Cyber Command, searching for permanent facilities and planning meetings to…
Future technology
The Army has embarked on a 200 billion dollar project to increase the technology that it uses and has some interesting implications. When we talk about security we often talk about defense in depth. In computers it is a series…
A mild rebuttal to John Robb’s open source warfare
“The US military is on the slow path to the realization that nation-building — from reconstruction to other forms of traditional COIN dogma that serve to return legitimacy to the government — doesn’t work. Politics and populations in our new…
Cyber-warfare threat or hype?
Center of gravity constructs look at the strategic, operational, and tactical elements of an adversary to identify weak points in the over all capability of resistance. Cyber-warfare attacks the computing and communication infrastructure of the adversary through a variety of…
Economic collapse
Is it possible that economic warfare could be waged on the United States or that we could be in the middle of a form of economic warfare? Some would say business is warfare and there is an expansive library of…
Partial Bibliography of cyber-warfare topics
This list is not comprehensive but a selected sampling of work going down the path of cyber-warfare.
Apple personal computer versus Microsoft based personal computer
When we’re talking about the personal computer world we can divide the world into three camps; Wintel; Apple; and Linux. For the scope of this discussion and due to the almost frenzy of Linux advocates they’re out of the discussion.…
I’m terrified of the terrorism(ist)
I’ve been thinking about the concepts of terrorist, terrorism, insurgent, and what these terms mean to our resulting interest in international relations. The discussion keeps popping up to delineate the terms and codify the meanings. Coming to a common consensus…
Generational assumptions of warfare
I’ve been looking at generational warfare from a slightly different perspective. As we have agricultural revolutions, industrial revolutions, and the information revolution it appears there is a corresponding relationship to the generations of warfare. We did not give up agriculture…
Looking at the Microsoft file format for Office 2007
Office 2007 uses an XML based file format which have included bin files and formatting files in a single container. The actual container is a file folder or cabinet file that appears as a document file. This packaging convention is…
Evidentiary and Forensic Analysis of Wireless Signals
Abstract This paper discusses as an overview of the current methods and practices available to forensics investigator in order to ascertain whether a radio frequency device has been participating in a wireless network. Though many of the techniques are applicable…
A wayward academic moves to the other side
Hi I henceforth will be known as an Apple fan boy, Mac addict, snob, elitist media junky or other epithets heaped upon me by the sad and sordid people living the PC lifestyle. I now work exclusively on an Intel…