Peter Loshin

@PeterLoshin

Technical writer and editor, author of "TCP/IP Clearly Explained," "IPv6: Theory, Protocol, and Practice"; he/him

Massachusetts, USA
Vrijeme pridruživanja: siječanj 2010.

Tweetovi

Blokirali ste korisnika/cu @PeterLoshin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @PeterLoshin

  1. proslijedio/la je Tweet
    Poništi
  2. proslijedio/la je Tweet

    is similar to -- but they're NOT the same. Find out more from about those differences.

    Poništi
  3. proslijedio/la je Tweet

    Does a hold the key 🔑 to educating users in ? discusses.

    Poništi
  4. 26. ruj 2019.

    If you're not certain you know the difference between and , you should read this by Charles Shirer

    Poništi
  5. proslijedio/la je Tweet
    Odgovor korisniku/ci

    I’ll leave this here.

    Poništi
  6. proslijedio/la je Tweet
    25. ruj 2019.

    Good news: 12,000 unique WannaCry variants (!!!) are still broken. Bad news: The variants are also still infecting systems and are spreading more effectively. Worse news: A few modifications could potentially fix these variants and make them lethal again.

    Poništi
  7. 25. ruj 2019.

    So great to talk to John Bambenek about how to use RPZs to promote I just wish we could have posted the meme too...

    Poništi
  8. 17. ruj 2019.

    Twitter: What's happening? me: Well, this is, for some reason, and ... y tho?

    Poništi
  9. proslijedio/la je Tweet
    16. ruj 2019.

    So the FBI was actively trying to weaken encryption tech all these years knowing its own encrypted comms were already broken. by Russian intelligence.

    Poništi
  10. 3. ruj 2019.

    There are no easy answers for the facing the industry, other than working harder to diversify and expand the , according to 's .

    Poništi
  11. proslijedio/la je Tweet

    attacks have been on the OWASP Top 10 list for 15 years, yet still trouble developers. Read up on the types of attacks how to prevent them.

    Poništi
  12. proslijedio/la je Tweet

    Parents: talk to your kids about ISO 8583 before it's too late

    Poništi
  13. 23. kol 2019.

    Are you doing everything you can to prevent attacks? explains how they work and how to foil them

    Poništi
  14. proslijedio/la je Tweet
    19. kol 2019.

    A panel, moderating: "What does a question contain?" Audience: A QUESTION "How many parts to a question?" Audience: ONE "How long is a question?" Audience: A TWEET

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    From 1995, the first two pages of a PC World manuscript I thought I'd edited, with further edits by my bosses (senior editor, executive editor, editor). (This was normal, and an education.) (ps: Word revision marking existed, but we apparently hadn't discovered it yet.)

    Poništi
  16. 30. srp 2019.

    cryptography is coming, and maybe faster than you thought. Find out more, from Tim Hollebeek.

    Poništi
  17. proslijedio/la je Tweet

    A few cybersecurity terms and their definitions: "Hacked" = defeated/penetrated a system's defenses or non-existent defenses "Targeted" = chose a specific system of interest for exploration "Probed" = explored the system for vulnerabilities that might be used to penetrate it

    Prikaži ovu nit
    Poništi
  18. 26. srp 2019.

    Think you're ready for practical ? Because it's going to be ready for you, in a year or so. 's Tim Hollebeek explains.

    Poništi
  19. proslijedio/la je Tweet
    24. srp 2019.

    breach blamed on poor password security

    Poništi
  20. 15. srp 2019.

    .@CarbonBlack_Inc head of strategy, , explained island hopping attacks, which are campaigns where attackers exploit third parties that have some degree of access to the attacker's network target.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·