Recent Posts


Media and Communications

« Previous Entries

Privacy is not an option, is it?

Sunday, September 30th, 2012

TED Talks are always full of interested/informative/thought-proviking/useful content – here are a few links from 2012.  This list is a bit security/privacy biased but a finish with simply being creative… 7/2012 – some very interesting Geo-political points (impacts of social media & how governments deal with it – or not…) Weibo (Chinese Twitter clone) Continue reading →

Abuse from BingBot – 2012

Tuesday, March 13th, 2012

Stardate errr, ummm, well 3/12/2012 (Monday.) Hopefully this will not persist… I have sent a message via the  ‘feedback’ page. I have sent an email via a published bingbot email address. No response from after ~15 hours… I have established a ‘503’ response for ALL Bingbot requests. Update 3/15/2012 Late in the day Continue reading →

Social Media, Cyber Warfare & Cyber-Economics

Friday, September 16th, 2011

This is an interesting 2011 interview covering  the connections between  web/Internet social media, terrorism, cyber-terrorism, cyber warfare, and our global economy. With 2011 being a banner year for large commercial enterprise cyber-hacks (i.e. Sony & Epsilon breaches)  cyber warfare is clearly expanding into global-economic-cyber-warfare – lots to consider within this realm… Should you care? (pause Continue reading →

How ‘secure’ is ‘secure enough’?

Monday, December 6th, 2010

How secure is secure enough?  With yet another round of Wiki-Leaks releases of sensitive US government documents you might be wondering: who is providing these sensitive documents? (aka, ‘the leak’, ‘the spy’, ‘the hacker’, ???) why would they release sensitive documents? (reverse espionage? or espionage subterfuge? some pervertedlogic?) is this a real problem? (yes – Continue reading →

Yahoo SPAM & MARF – RFC 5965

Friday, December 3rd, 2010

12/1/2010 – Yahoo no longer accepts email abuse reports from ‘humans‘… Hmm, who is else it getting SPAMmed by YAHOO email accounts? (other computers without users/real people?) Automation can be a great solution – but what happens when real people are entirely removed from the loop? My normal approach for SPAM that reaches my server/inbox: Continue reading →

« Previous Entries

YOUR GeoIP Data | Ip:
Continent: NA | Country Code: US | Country Name: United States
Region: | State/Region Name: | City:
(US only) Area Code: 0 | Postal code/Zip:
Latitude: 38.000000 | Longitude: -97.000000
Note - if using a mobile device your physical location may NOT be accurate...

Georgia-USA.Com - Web Hosting for Business