Daily Archives: February 17, 2008

Spy Satellites

Spy satellites will be used by local law enforcement to enforce the laws against United States citizens. Should this make us feel safer or more scared of our government? On the one hand I expect any government to use the … Continue reading

Posted in Miscellaneous, Privacy | 3 Comments

Security Review: Blogging at the Olympic Games

Summary: The International Olympic Committee will be granting Olympic athletes the right to blog at this year’s summer games in China, and there will be a few interesting restrictions placed on what they can say. In addition to the standard … Continue reading

Posted in Security Reviews | 1 Comment

Amazon’s S3 Outage: Usage spike or DDoS attack?

Amazon’s Simple Storage Service (S3) experienced an outage on the morning of February 15th, causing inaccessible content in the thousands of websites that rely on S3 for data storage. According to Amazon’s official explanation, the outage was due to a … Continue reading

Posted in Availability, Current Events | Comments Off on Amazon’s S3 Outage: Usage spike or DDoS attack?

Security Review: ASIMO Robot

ASIMO is a robot that resembles a human that is created by Honda Motor Company. It was created at the Wako Fundamental Technical Research Center in Japan. The current version of this robot is version eleven. This robot, which is … Continue reading

Posted in Miscellaneous, Physical Security, Security Reviews | Comments Off on Security Review: ASIMO Robot

Microsoft bad practices

Given all the Microsoft-bashing that takes place among Linux-users, I’m surprised that no one has posted an article (that I’ve seen, at least) that clearly has an anti-Microsoft bias. Despite the bias of the following article, it makes a valid … Continue reading

Posted in Policy | 2 Comments

Smart Pillbox Security Review

Summary “Smart pillbox could be a lifesaver” that is the title on the recent news in MIT in the world. It is design to be used by elderly people so they can properly take their medication. The purpose will be … Continue reading

Posted in Security Reviews | Tagged , , | 1 Comment