VMyths: Truth About Computer Security Hysteria

http://vmyths.com/about Vmyths traces its roots to a “Computer Virus Myths treatise” first published in 1988. It evolved into the critically acclaimed “Computer Virus Myths home page” in 1995, then it moved to Vmyths.com in 2000. Its name has changed over the years, but Vmyths remains true to its original goal: the eradication of computer security …

Journal: Private Security Contractors (Blackwater Xe Specifically) In Court Over Epidemic Steroid & Drug Use, Psychotic Behavior, in Iraq

David Isenberg Private Security Contractors (PSCs) on Drugs Media reports regarding the lawsuits prompted a third party named Howard Boardman Lowry to contact Relators‟ Counsel. Mr. Lowry’s sworn testimony is attached in its entirety as Exhibit B. Mr. Lowry testified he purchased steroids, human growth hormones, and testosterone for Blackwater employees and his observation of …

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don’t think this is it.  This is a simplistic approach, the sort of thing …

Journal: UN on Food Security, It’s All Connected

Renewed instability in global food markets requires urgent response, UN expert said An independent United Nations human rights expert today called on governments and the international community to promptly tackle the renewed instability of global food markets, noting the related social unrest that has hit some countries in recent weeks. Tip of the Hat to …

Event: 15-16 Feb 2011 Phoenix AZ Border Security 5th Annual on People Terrorism Contraband

The Border Security Expo & Conference 2010 brought over 800 government and industry leaders and others to the Phoenix Convention Center on April 28-29, 2010, for exhibit hall displays of cutting-edge technology, workshops and speaker presentations on critical issues, and free certified training for law enforcement professionals.  Focus is on international borders, not just the …

Google, MSoft, IBM, HP, Oracle, Intel (chips), National Security and Perceived Internet Threats

U.S. Strategy: Control The World By Controlling The Internet A Chinese Perspective, by Chen Baoguo, August 24, 2010 In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company …