Categories: "Endorsement"

Pages: 1 2

  2013-12-28

Book review: Little Brother

  11:25, by Hagai Bar-El   , 336 words
Categories: Security Policies, Sources, Security

I have just finished reading Little Brother by Cory Doctorow. This book presents the story of a typical but tech savvy teenager who falls victim to harassment by the Department of Homeland Security and the police state, where every citizen is constantly tracked and monitored as a potential terrorist. The story is fictitious, of course, but those who follow the reaction of some nations to the terrorism threat and the ever increasing amplitude and sophistication of wholesale surveillance, cannot miss that while the story is factually fictitious, it is not at all implausible.

Full story »

  2013-02-22

Book Review: Liars and Outliers

  11:36, by Hagai Bar-El   , 189 words
Categories: Sources

I finally got to read Bruce Schneier's new book: "Liars and Outliers". The book is pleasant to read, but truth be told, I was slightly, just slightly, disappointed.

The book is written in Bruce's style, which I like and appreciate. Like all of his books and essays, it is crystal clear, and is extremely well-written. It is written in a way that makes it comprehensible by absolutely everyone. Not too many people with Bruce's knowledge can write in such clear style.

What I less liked about this book is its overall triviality. Bruce Schneier is excellent in using trivial down-to-earth facts and notions to get his point across. This is one of the best features of his texts. However, in "Liars and Outliers" I feel it went a bit too far. The book does not take you from the trivial to the "Wow!" but mostly repeats the discussion of trivial phenomenons that bring to trivial conclusions. The discussions are interesting, and the points made are valid and worthy, but I cannot avoid suspecting that the book could be cut down to half of its length without losing much of its substance.

  2011-03-05

Book: The Myths of Innovation, by Scott Berkun

  23:24, by Hagai Bar-El   , 224 words
Categories: Sources

I have just finished reading The Myths of Innovation by Scott Berkun. This 248-pages book describes how the work on innovation, and innovation in general, deviate from how we often perceive it, and from how it is presented by the media. It essentially carries the message that innovation is not some “magic” happening, but rather it is a lot of hard work, often carried out by many people.

Full story »

  2010-11-05

Recommended Podcast: Security Now

  22:43, by Hagai Bar-El   , 307 words
Categories: Sources

There are many IT security podcasts out there; too many, perhaps. Certainly too many to listen to. The challenge is to decide on which ones to follow on a regular basis. I became aware of a good candidate a couple of years ago, and since it retained its qualities (listed below) over time, I figured it is worth mentioning.

This podcast is called: “Security Now” and it is featured by Steve Gibson and Leo Laporte. Leo is a good host. He manages the show and its topics well, all in a healthy, joyful, spirit. Steve is a well-known security expert, and the creator of SpinRite — a disk maintenance and recovery tool.

Full story »

  2005-11-12

Evaluating Commercial Counter-Forensic Tools

  21:30, by Hagai Bar-El   , 548 words
Categories: IT Security, Sources

I have just enjoyed reading "Evaluating Commercial Counter-Forensic Tools" by Matthew Geiger from Carnegie Mellon University. The paper presents failures in commercially-available applications that offer covering the user's tracks. These applications perform removal of (presumably) all footprints left by browsing and file management activities, and so forth. To make a long story short: seven out of seven such applications failed, to this or that level, in fulfilling their claims.

Full story »

  2005-04-29

Open Source Disk Encryption

  01:11, by Hagai Bar-El   , 163 words
Categories: IT Security, Products

About two months ago I was delighted to see the new version of what I consider to be the first open source drive encryption program for Win32. It's name is TrueCrypt, and it provides functionality that resembles that of DriveCrypt from SecurStar.

Full story »

1 2