| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Shamir's Three Laws of Security have been known for quite some time now:- Absolutely secure systems do not exist- To halve your vulnerability, you have to double your expenditure- Cryptography is typically bypassed, not penetratedLikewise for Morris's Three Golden Rules of Computer Security:- do not own a computer;- do not power it on;- and do not use it.But, it appears, we suck at heeding such good advice. Stories of failure,ranging from small to epic, let me tell you them. Perhaps they even havesomething in common, some sort of moral or lessons we might learn?Something uplifting that helps those of us not completely ground topieces by our own cynicism? Naaah, unlikely. But a man can dream,though, a man can dream.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast