Browse by Tags

Tagged Content List
  • Blog Post: Jobs in securing code: An answer to email from student whose name starts with a B at Rio Hondo

    Hey Blake, you forgot to include your email on the email response to my blog.  So I will answer your questions here: Hi Sam, We met briefly in the Rio Hondo C++ class. I know you are working with us for the Imagine Cup but I wanted to ask you a career question. Do you have any contacts in Microsoft...
  • Blog Post: The Osama Bin Laden picture virus: a real threat or phony

    With the announcement that Osama Bin Laden is dead, the scammers will likely pop up with social engineering around this news item.  If you are a regular reader of this blog, it is likely that you are fully patched, have an anti-virus and can deal with malware, but what about your Mom?  Older...
  • Blog Post: University of Wisconsin, Madison finds GIANT number of security bugs during Windows 7 production

    In a paper titled: Incremental Compositional Dynamic Test Generation , researchers from the University of Wisconsin, Madison, during the production phase of Windows 7, found one-third of all of the security bugs in Windows 7, using a process called Satisfiability Modulo Theories (SMT) solver or as it...
  • Blog Post: Thoughts on the Kinect hacks and iPad Hacks

    Wow, wouldn’t it be nice to have tools like XNA Game studio to  build an application that used Kinect on the Xbox?  I think it would be a great idea.  On the other hand, using Kinect hacks outside of academics?  Waste of time.  Focus on Windows Presentation Foundation, learn...
Page 1 of 1 (4 items)