Jeff Jonas
A collection of thoughts on information management and privacy in the information age, injected with a few personal stories.
http://jeffjonas.typepad.com/jeff_jonas/
popularity:
blog
security
datamining
privacy
surveillance
semantic
identity
information
blogs
software
|
Jeff Jonas
One of my favorite things to do is help organizations think about next generation ... When talking to IT executives about them, one of the more common things I hear ...
similarity:
popularity:
blog
privacy
security
datamining
intelligence
ibm
data
blogs
technology
information
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
SunbeltBLOG
No information avaiable
similarity:
popularity:
security
blog
spyware
blogs
software
anti-spyware
news
technology
malware
virus
|
Blogging Software, Business Blogs & Blog Services at TypePad.com
Blog hosting and publishing service, creating full-featured blogs built on Movable Type's publishing platform. Post your vacation photos, comment on the news or world events, or share your experiences with friends.
similarity:
popularity:
blog
blogging
blogs
tools
web2.0
software
typepad
hosting
web
webdesign
|
33 Bits of Entropy
But as we saw in a previous article, users often expect more subtle distinctions, ... To stay on top of future posts on 33bits.org, subscribe to the RSS feed or follow me on ...
similarity:
popularity:
privacy
security
blog
anonymity
research
socialnetworking
internet
blogs
datamining
anonymous
|
BUG BROTHER - Blog LeMonde.fr
A contrario, depuis que j'ai aussi écrit Vie privée : le point de vue des " ... qui m'ont remercié d'avoir ainsi décrit ce que les internautes vivent et sont, ...
similarity:
popularity:
blog
internet
privacy
politique
sécurité
surveillance
security
informatique
hack
blogs
|
Data Mining: Text Mining, Visualization and Social Media
Commentary on text mining, data mining, social media and data visualization. ... It is a fun visualization, and a great example of free data and dev ecosystems ...
similarity:
popularity:
datamining
visualization
blog
data
blogs
web2.0
design
social
mining
research
|
invisiblethings' blog
VM escapes, hypervisor compromises (via "classic" rootkits, as well as Bluepill ... The training offers quite a unique chance, I think, to absorb the results of 1 ...
similarity:
popularity:
security
blog
hacking
blogs
malware
rootkits
research
virtualization
hack
software
|
root labs rdist
This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...
similarity:
popularity:
security
blog
blogs
crypto
cryptography
linux
software
research
computers
opensource
|
TaoSecurity
OpenPacket-users Mailing List https://lists.sourceforge.net/lists/listinfo/openpacket ... TaoSecurity Blog http://taosecurity.blogspot.com. Welcome! C'mon in. ...
similarity:
popularity:
security
blog
network
blogs
freebsd
infosec
networking
sysadmin
bsd
linux
|