|
A collection of thoughts on information management and privacy in the information age, injected with a few personal stories.
http://jeffjonas.typepad.com/jeff_jonas/
popularity:
blog
security
datamining
privacy
surveillance
semantic
identity
information
blogs
software
|
|
One of my favorite things to do is help organizations think about next generation ... When talking to IT executives about them, one of the more common things I hear ...
similarity:
popularity:
blog
privacy
security
datamining
intelligence
ibm
data
blogs
technology
information
|
|
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
|
No information avaiable
similarity:
popularity:
security
blog
spyware
blogs
software
anti-spyware
news
technology
malware
virus
|
![]() |
Blog hosting and publishing service, creating full-featured blogs built on Movable Type's publishing platform. Post your vacation photos, comment on the news or world events, or share your experiences with friends.
similarity:
popularity:
blog
blogging
blogs
tools
web2.0
software
typepad
hosting
web
webdesign
|
|
But as we saw in a previous article, users often expect more subtle distinctions, ... To stay on top of future posts on 33bits.org, subscribe to the RSS feed or follow me on ...
similarity:
popularity:
privacy
security
blog
anonymity
research
socialnetworking
internet
blogs
datamining
anonymous
|
|
A contrario, depuis que j'ai aussi écrit Vie privée : le point de vue des " ... qui m'ont remercié d'avoir ainsi décrit ce que les internautes vivent et sont, ...
similarity:
popularity:
blog
internet
privacy
politique
sécurité
surveillance
security
informatique
hack
blogs
|
![]() |
Commentary on text mining, data mining, social media and data visualization. ... It is a fun visualization, and a great example of free data and dev ecosystems ...
similarity:
popularity:
datamining
visualization
blog
data
blogs
web2.0
design
social
mining
research
|
|
VM escapes, hypervisor compromises (via "classic" rootkits, as well as Bluepill ... The training offers quite a unique chance, I think, to absorb the results of 1 ...
similarity:
popularity:
security
blog
hacking
blogs
malware
rootkits
research
virtualization
hack
software
|
|
This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...
similarity:
popularity:
security
blog
blogs
crypto
cryptography
linux
software
research
computers
opensource
|
|
OpenPacket-users Mailing List https://lists.sourceforge.net/lists/listinfo/openpacket ... TaoSecurity Blog http://taosecurity.blogspot.com. Welcome! C'mon in. ...
similarity:
popularity:
security
blog
network
blogs
freebsd
infosec
networking
sysadmin
bsd
linux
|