by wwarren | Nov 11, 2014 | Cloud Computing, Government Regulations, Net Neutrality
Karl Denninger really explains succinctly about the way this regulation would work using examples of the past. This post really does a good job of succinctly exposing exactly what would happen in an Internet regulated inside of a Title II environment. It quickly boils...
by wwarren | Nov 11, 2014 | Cloud Computing, General, Government Regulations, Net Neutrality
It is too bad this sentence was at the end of the article and not the beginning. You really should read the entire article..multiple times if needed to fully gras the insidious nature of Net Neutrality and why it must be stopped. Net Neutrality is just left-wing...
by wwarren | Oct 25, 2014 | Cloud Computing, Security, Security Alerts
I don’t always agree with Steve Gibson. On this particular attack the one thing that makes this a non-issue is that you have to have active malicious code running in the browser. Once your machine is compromised in any way you aren’t secure, it is really...
by wwarren | Oct 21, 2014 | Cloud Computing, Security, Security Alerts
Really this is only a problem is you are surfing on a public wifi point then somebody can intercept your traffic..cause an error in your secure communications and then insert themselves into your data stream. Keep in mind ssl v3 is nearly 15 years old and has been...
by wwarren | Oct 15, 2014 | Cloud Computing
This is one reason i am not a fan of putting ANYTHING critical on the cloud. It takes one bug..or hack..or mistake and your data is gone. I posted long ago about what the cloud is. It isn’t anything revolutionary but de-evolutionary and worse on security....
by wwarren | Oct 2, 2014 | Apple, Cloud Computing, Hardware, Smartphone
Apple introduced the Activation Lock feature in iOS 7 to help deter phone theft—if you’ve signed into iCloud and enabled Find My iPhone/iPad/iPod Touch, you can’t erase your phone without entering your account password first. Even if a thief put your phone...