• About the Author

  • Enter your email address to follow this blog and receive notifications of new posts by email.

    Join 85 other followers

  • Archive

  • Categories

  • June 2015
    M T W T F S S
    « May   Jul »
    1234567
    891011121314
    15161718192021
    22232425262728
    2930  
  • Disclaimer

    The following are INFORMATION, ARTICLES and OTHER that I found interesting for the day, week , month. My PROFESSIONAL OPINIONS are added to the information based on my EXPERIENCES in the SECURITY and INTELLIGENCE professions. If YOU have ARTICLES or OTHER you would like placed on the site, please do not hesitate to send them to me with YOUR OPINIONS at efpipps@gmail.com. I look forward to ALL of your comments and information.

RDP SECURITY BLOG / JUNE 26, 2015 / FRIDAY

ON COMPUTER INSECURITY, AND WAKING UP TO THE REAL WORLD…

06/26/15 – HACKER STOLE SECRETS OF U.S. GOVERNMENT WORKER’ SEX LIVES
http://www.cnn.com/2015/06/03/middleeast/isis-conflict/?iid=ob_videoleaf_organicfooter&iref=obnetwork

COMMENTS: You know it is one thing to have your information stolen by the Chinese. It is another thing all together to be lied to by the U.S. Government about how much was stolen, and about how many people. The final and biggest lie is the FACT that NO computer information is safe. The computer is a toy that has been place under the greatest of weight and responsibility of being the savior of mankind. It is not. It has limited, let me say again LIMITED abilities. Picture peddling your BIG WHEEL into battle against an F-35. It is not just the point that you are going to lose, you are going to lose in many, many different ways. This is the dilemma of a computer, there are too many ways it can be defeated and no one on the planet, no matter how smart or how much money you throw at it is going to change it. PEOPLE, quit lying to yourselves with this computer stuff. They cannot be secured, DO NOT PUT ANYTHING ON THEM YOU DO NOT WANT TO LOSE! That is the absolute TRUTH. China, Russia, India, Israel, France, etc. are attacking our computers, stealing our information, committing corporate espionage every day, every hour, every second. we are not going to outsmart the problem, you are not going to outwork the problem, you are not going to outspend the problem, and finally YOU ARE NOT GOING TO OUTLIE the problem so stop. The U.S. needs to come up with other options to care for its secrets, and none of them have to do with THE CLOUD, WIFI, yada, yada, yada, but it does have to do with ‘old school’ so get to work, oh, and damn the Chinese!

06/26/15 – MANY BIG COMPANIES LIVE IN FEAR FOR THEIR FUTURE IN DIGITAL AGE
http://news.yahoo.com/many-big-companies-live-fear-future-digital-age-132019448–sector.html

06/26/15 – INSIDE THE HACK OF THE CENTURY, SONY’S CONTINUING NIGHTMARE
http://fortune.com/sony-hack-part-1/

“This article is based on more than 50 interviews with current and former high-level executives at Sony (all of whom insisted on not being identified by name), cybersecurity experts, and law-enforcement officials. It is also based, in large part, on Sony emails and documents stolen by the hackers. Beyond generating Hollywood gossip, which they already have, they offer a remarkable window into the business of Sony Pictures at the time of the hack: the personalities of its leaders, the pressures they faced in their relationship with the business’s Tokyo-based parent, and the challenges of running an entertainment studio in the 21st century. (We’ve preserved the emails’ original punctuation and often sloppy spelling.)”

COMMENTS: If there is any article you read on computer insecurity this year, make it this one. The negligence, the finger-pointing, the negligence, the equipment, the software it shows just some of the many weaknesses that Sony suffered from.

ON BOXING AND CRIME,…

06/26/15 – BOXING AND THE MAFIA (VIDEO)

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: