Andrew 'bunnie' Huang Talks Hardware, Hacking and His Nickname
As one of the most famous hardware and software hackers in the world, Andrew "bunnie" Huang keeps busy with a number of projects that range from autonomous robotic submarines to peel-and-stick electronics. He recently took a time out to answer your questions on hardware, hacking, his open source hardware laptop Novena and the story behind his nickname.
As one of the most famous hardware and software hackers in the world, Andrew "bunnie" Huang keeps busy with a number of projects that range from autonomous robotic submarines to peel-and-stick electronics. He recently took a time out to answer your questions on hardware, hacking, his open source hardware laptop Novena and the story behind his nickname.
============================== ============================== ========
Dangerous File-Sharing
To the shock of many, the greatest threat to data security today is not targeted cyber-attacks or fraudulent hackers, it's the carelessness of corporate employees. Find out what tools your colleagues use most to share data, and how to facilitate safe file sharing through improved policies and better tools.
To the shock of many, the greatest threat to data security today is not targeted cyber-attacks or fraudulent hackers, it's the carelessness of corporate employees. Find out what tools your colleagues use most to share data, and how to facilitate safe file sharing through improved policies and better tools.
============================== ============================== =========
Additional Features
Grumpy Programmer's Advice for Young Computer Workers
How Prepared Are You For an Earthquake?
Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques
How Prepared Are You For an Earthquake?
Book Review: Social Engineering In IT Security Tools, Tactics, and Techniques
============================== ============================== ========
Keeps to Keeping Data Safe in a Collaborative WorkplaceIT pros have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?