Short essay on five things I love most - PreserveArticlescom

There are many reasons for this, but the most important is the complexity of these systems. More complexity means more people involved, more parts, more interactions, more mistakes in the design and development process, more of everything where hidden insecurities can be found. Computer-security experts like to speak about the attack surface of a system: all the possible points an attacker might target and that must be secured. A complex system means a large attack surface. The defender has to secure the entire attack surface. The attacker just has to find one vulnerability ­- one unsecured avenue for attack -­ and gets to choose how and when to attack. It's simply not a fair battle.

The Age of the Essay - Paul Graham

I agree with this article, there is absolutely no market demand for security. At most, there is a demand for token compliance to satisfy insurance eligibility. For some reason, we decided that faulty cheap software is desirable, and are now boiling like frogs as this faulty software is spreading to all aspects of our lives.


September 2004 Remember the essays you had to write in high school

29/03/2017 · The 5 Most Important Things You Can Do for the Environment Environmental issues like overpopulation, water scarcity require serious action

The term "open source", however, had not yet emerged; it wouldnot do so until early 1998. When it did, most of the hacker communityadopted it within the following six months; the exceptions were aminority ideologically attached to the term "free software". Since1998, and especially after about 2003, the identification of 'hacking'with 'open-source (and free software) development' has becomeextremely close. Today there is little point in attempting todistinguish between these categories, and it seems unlikely that willchange in the future.


The Big Five Project - Personality Test

Like most cultures without a money economy, hackerdom runs onreputation. You're trying to solve interesting problems, but howinteresting they are, and whether your solutions are really good, issomething that only your technical peers or superiors are normallyequipped to judge.

10 Things Moms of Boys Must Do – Scary Mommy

In 1996, when I first published this Hacker HOWTO, the hackercommunity was rapidly reorganizing around Linux and a handful of otheropen-source operating systems (notably those descended from BSDUnix). Community memory of the fact that most of us had spent decadesdeveloping closed-source software on closed-source operating systemshad not yet begun to fade, but that fact was already beginning to seemlike part of a dead past; hackers were, increasingly, definingthemselves as hackers by their attachments to open-source projectssuch as Linux or Apache.

5 Reasons Why Trump Will Win | MICHAEL MOORE

To behave like a hacker, you have to believe that the thinking time ofother hackers is precious — so much so that it's almost a moral dutyfor you to share information, solve problems and then give thesolutions away just so other hackers can solve problems instead of having to perpetually re-address old ones.

Can we speak honestly, just among ourselves

When you burn wood in a typical wood stove most people do not realise that something like two thirds of the available energy goes up the chimney much of this energy is in the form of combustible CO or hydrocarbons and heat. The trick is to just have only moderatly warm CO2 as the finale output (that was used experementaly to force tomato plants grown under plastic).