In this article about privacy, civil liberties and the way the “war on terror” has become a war on all of us, John Pilger asks “What are you going to do about it?”
Well, here’s my question, John: What can I do about it?
Continue reading
In this article about privacy, civil liberties and the way the “war on terror” has become a war on all of us, John Pilger asks “What are you going to do about it?”
Well, here’s my question, John: What can I do about it?
Continue reading
A discussion started on a network operators list I frequent, about a case where an apparently innocent party, Melbourne Free University, had had its website blocked. Aside from a terse “yes it’s blocked” from one provider concerned, no further information was forthcoming. Here’s one report about it. Continue reading
Just read this article on the ABC website, about securing your enterprise against malware. They gave great advice – “detect and block at the perimeter and inside the network”, “assess and protect endpoints”, “analyse threats through context”, “eradicate malware and prevent reinfection”, “remediate attacks with retrospective security” and “be sure to implement integrated rules on the perimeter security gateway”. But one important bit of advice was missing.