Browse by Tags

Tagged Content List
  • Blog Post: IOT: Texas Instruments FRAM Microcontroller or System on Chip

    Sometimes you wonder if a company is just gone.  Texas Instruments is one of those companies I don’t think about too often these days, but more and more you find that they are a foundational chip manufacturer.  LighBlue Bean, Spark.IO, both owe their existence to the low-power but non-encrypted...
  • Blog Post: List of four Kinect Security items

    For a device that should be all about games, people are sure thinking up ways to use the Kinect for things like medicine and security.  With security you might want to take a look at the following URLs: In home paranoia: Kinect Long Term Privacy Issues Daunting? A cover for your Kinect: Address...
  • Blog Post: Jobs in securing code: An answer to email from student whose name starts with a B at Rio Hondo

    Hey Blake, you forgot to include your email on the email response to my blog.  So I will answer your questions here: Hi Sam, We met briefly in the Rio Hondo C++ class. I know you are working with us for the Imagine Cup but I wanted to ask you a career question. Do you have any contacts in Microsoft...
  • Blog Post: The Osama Bin Laden picture virus: a real threat or phony

    With the announcement that Osama Bin Laden is dead, the scammers will likely pop up with social engineering around this news item.  If you are a regular reader of this blog, it is likely that you are fully patched, have an anti-virus and can deal with malware, but what about your Mom?  Older...
  • Blog Post: University of Wisconsin, Madison finds GIANT number of security bugs during Windows 7 production

    In a paper titled: Incremental Compositional Dynamic Test Generation , researchers from the University of Wisconsin, Madison, during the production phase of Windows 7, found one-third of all of the security bugs in Windows 7, using a process called Satisfiability Modulo Theories (SMT) solver or as it...
  • Blog Post: Thoughts on the Kinect hacks and iPad Hacks

    Wow, wouldn’t it be nice to have tools like XNA Game studio to  build an application that used Kinect on the Xbox?  I think it would be a great idea.  On the other hand, using Kinect hacks outside of academics?  Waste of time.  Focus on Windows Presentation Foundation, learn...
  • Blog Post: Linux, Apple or Windows: Security-Linux Loses the 3 month vulnerabilities listing

    Rule one of security: Don’t assume that your software is safe.  Apple users (not Apple Corporation) make the assumption that their software is secure from viral attacks.  Is this true?  How do you determine if one system is more secure than the other? You could ask Apple or Microsoft,...
  • Blog Post: Study Guide for the Windows Presentation Framework exam 70-511

    Well, my manager has made a reasonable request that I study for and take the Windows Presentation Framework exam 70-511.  Which means I have to structure what is my usual random and haphazard way of learning.  To prepare for the 70-511 exam, my process is usually to: Whine about having to take...
  • Blog Post: Free information on how secure your code: Prism and Windows Phone 7

    With WikiLeaks, and Christmas, I am certain that you may be thinking about what you should be learning during that time between Christmas and New Years.  How about how to write secure code in Windows Presentation Foundation?  How do you create code in a way that is repeatable.  If you...
Page 1 of 1 (9 items)