Cyber crime is so pervasive that no single entity can hope to map them all which makes the argument that threat feeds are not worthless but merely meant to work as a collective. It’s no surprise that intrusion prevention systems are designed to accept multiple feeds, you just need to utilize this feature and configure multiple feeds, the more the better!
Read MoreThe government’s generic arguments for and against closed and open source software are not compelling. They really don’t make a strong case for the use of either. Though they once recommended using open source software, the government is rightly concerned with security. Unfortunately their “Security Considerations When Using Open Source Software” document attacks open source software unjustly, often arguing that OSS’ pros are actually cons. It seems the author is unnecessarily biased, but regardless, the real argument should be that all software needs heavy scrutiny by both it’s authors and users. You need to find the holes before the hackers do.
Read MoreThe next development is enhancing the attacker database logging to enable the creation of the LARGfeed. The honeypot now reports back to a central server that processes attack data and produces a threat feed.
Read MoreAdobe Flash used to be fantastic! It enabled even novice users to build nice websites and the admittedly simple video games were amazingly fun.
Read MoreLast week’s PineBook Pro review was so well received I thought you’d enjoy a some tips on using it. Here’s a list that’s come in very handy for me as I break mine in:
Read MoreThe Pinebook Pro ships with Manjaro + KDE. Manjaro is very popular at Distrowatch and it’s been some time since I last tried it so I’m having fun checking it out again.
Read More