<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-13050774</id><updated>2024-09-22T19:57:15.176Z</updated><title type='text'>Schiebel-isms</title><subtitle type='html'>&lt;A HREF=&quot;http://en.wikipedia.org/wiki/Isms&quot;&gt;The English suffix -ism was first used to form a noun of action from a verb, as in baptism, from baptein, a Greek word meaning &quot;to dip&quot;. Its usage was later extended to signify systems of belief.&lt;/A&gt;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>17</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-13050774.post-2728893444551928417</id><published>2007-11-20T16:38:00.000Z</published><updated>2007-11-21T01:24:02.324Z</updated><title type='text'>How do you measure security?</title><summary type="text">A perennial type of question that comes up is how to know if you are secure or measure your security.&amp;nbsp; I have spent some time answering the question here, here, here, here, here, and here.&amp;nbsp; As you can tell by the multiple ways of asking the same question and the huge differences in opinion expressed in people&amp;#8217;s answers, the one underlying trend is that Information Security, as a </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/2728893444551928417/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/2728893444551928417' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/2728893444551928417'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/2728893444551928417'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2007/11/fw-how-do-you-measure-security.html' title='How do you measure security?'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-4839970803299598533</id><published>2007-11-19T13:35:00.000Z</published><updated>2007-11-19T14:03:04.705Z</updated><title type='text'>How do you feel Mr. IDS ?</title><summary type="text">I recently answered this question where the person wanted to get people&#39;s opinion on Gartner&amp;#8217;s take on Intrusion Detection Systems (IDS).Gartner says that intrusion detection systems are a costly and ineffective investment that does not add an additional layer of security as promised by vendors. The company recommends that enterprises redirect their security expenditures to firewall vendors</summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/4839970803299598533/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/4839970803299598533' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/4839970803299598533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/4839970803299598533'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2007/11/how-do-you-feel-mr-ids.html' title='How do you feel Mr. IDS ?'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-224434348315026277</id><published>2007-11-17T13:29:00.001Z</published><updated>2007-11-17T13:29:58.091Z</updated><title type='text'>Close Source or Open Source?</title><summary type="text">This is my answer to this question.  Open source is definitely a factor to consider as part of a comprehensive needs assessment. What are you/your client attempting to achieve?  What does their environment already contain?  What impact from a user/maintenance standpoint?  Is there in house expertise to support it?  Does the product meet all the business requirements?  What are the support costs?</summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/224434348315026277/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/224434348315026277' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/224434348315026277'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/224434348315026277'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2007/11/close-source-or-open-source.html' title='Close Source or Open Source?'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-1517202363262056880</id><published>2007-11-16T03:35:00.000Z</published><updated>2007-11-16T03:40:28.708Z</updated><title type='text'>Defining INFOSEC</title><summary type="text">The below excerpt if from this LinkedIn question. I was attempting to point out that  we already had the tools and methods we needed to do our jobs if we only took the time to realize what our jobs actually were.
I love the saying &quot;There is nothing new in the world, just different perspectives.&quot; INFOSEC is no different. We are grappling with the age old impact of human nature at it&#39;s worst. Greed</summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/1517202363262056880/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/1517202363262056880' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/1517202363262056880'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/1517202363262056880'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2007/11/defining-infosec.html' title='Defining INFOSEC'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-585818483232625102</id><published>2007-11-15T22:49:00.000Z</published><updated>2007-11-15T23:01:58.315Z</updated><title type='text'>How should best practices be developed, who should be involved, and how are they shared in a manner that will make them most credible?</title><summary type="text">My answer to the question was long and rambling.
Your question assumes that these decisions are best made using a top down organization where certain select few experts decide what should and shouldn&#39;t be. I am not going to debate that point; I just want to highlight a hidden assumption and offer a different way.
Humans as a species work from a bottom up thought process. We, as social animals, </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/585818483232625102/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/585818483232625102' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/585818483232625102'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/585818483232625102'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2007/11/how-should-best-practices-be-developed.html' title='How should best practices be developed, who should be involved, and how are they shared in a manner that will make them most credible?'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-6549139764386897332</id><published>2007-11-15T22:36:00.000Z</published><updated>2007-11-15T22:40:24.201Z</updated><title type='text'>Blog restart</title><summary type="text">Well, after a long absence I plan on restarting this blog.  For those of you not using LinkedIn, I have been spending my energy answering people&#39;s security questions in their forums.  I plan on taking some of the questions and my answers that I found interesting and reposting them here.  Stay tuned.</summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/6549139764386897332/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/6549139764386897332' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/6549139764386897332'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/6549139764386897332'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2007/11/blog-restart.html' title='Blog restart'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-115322290359454657</id><published>2006-07-18T11:37:00.000Z</published><updated>2006-07-18T11:44:04.996Z</updated><title type='text'>You can&#39;t fix stupid</title><summary type="text">What a great line.
I was watching Comedy Central the other night and heard
Ron White utter those perfect words &quot;You can&#39;t fix stupid.&quot;  In one line he
summed up why I can spend the rest of my life working in Information Security.The truth is no matter how smart we think we are we make mistakes.  Big ones,
small ones, can&#39;t believe you had the gall ones. The problem is the people you
have trusted </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/115322290359454657/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/115322290359454657' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/115322290359454657'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/115322290359454657'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2006/07/you-cant-fix-stupid.html' title='You can&#39;t fix stupid'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-114900782068704476</id><published>2006-05-30T16:22:00.000Z</published><updated>2006-08-02T17:12:31.610Z</updated><title type='text'>The Monoculture Myth</title><summary type="text">People build models to understand the world.We sort our world into neat categories to aid in our understanding and decision making.  Us vs. Them, Dark vs. Light, Good vs. Bad; used to help us make snap decisions in a hostile world.  It is understanding that each of us carry around these mental models that we use to understand and navigate the world that is key; we respond to the world based on </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/114900782068704476/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/114900782068704476' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/114900782068704476'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/114900782068704476'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2006/05/monoculture-myth.html' title='The Monoculture Myth'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-114728299910634148</id><published>2006-05-10T17:28:00.000Z</published><updated>2006-05-10T17:54:48.326Z</updated><title type='text'>Secure at any price?</title><summary type="text">I was doing my daily scan of Slashdot this morning when I came across the following article - The Failure of Information Security written by Noam Eppel. Embedded within all that doom and gloom is the following premise - security professionals have failed because our computers and networks are still not “secure.”  Noam Eppel has shown us all exactly what is wrong our profession – Noam believes </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/114728299910634148/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/114728299910634148' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/114728299910634148'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/114728299910634148'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2006/05/secure-at-any-price.html' title='Secure at any price?'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-113459065925646283</id><published>2005-12-14T19:40:00.000Z</published><updated>2005-12-15T17:46:43.820Z</updated><title type='text'>Forensic analysis of Microsoft Hotmail</title><summary type="text">I was talking with a friend the other day about how malware uses email to hack into computers.  What’s malware? Read my previous article: Adware and Spyware – are they really consensual? Anyway, my friend responds back that he uses Hotmail to protect his identity and to avoid malware.  Instead of getting into Internet Explorer or Microsoft bashing, I instead chose to focus on his comment of </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/113459065925646283/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/113459065925646283' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113459065925646283'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113459065925646283'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/12/forensic-analysis-of-microsoft-hotmail.html' title='Forensic analysis of Microsoft Hotmail'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-113440409474761372</id><published>2005-12-12T16:01:00.000Z</published><updated>2005-12-12T16:25:07.586Z</updated><title type='text'>Forensic analysis of Microsoft Word documents</title><summary type="text">Microsoft Word documents are stored in a proprietary binary file format that records additional information, known as metadata, beyond just the text of the document in it.  Some of the information contained in the documents that you create and distribute may be embarrassing or private in nature and has shown up in several news stories much to the sources embarrassment. A forensic analysis of </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/113440409474761372/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/113440409474761372' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113440409474761372'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113440409474761372'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/12/forensic-analysis-of-microsoft-word.html' title='Forensic analysis of Microsoft Word documents'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-113233074667207658</id><published>2005-11-28T15:30:00.000Z</published><updated>2005-12-09T20:13:10.553Z</updated><title type='text'>Security through obscurity</title><summary type="text">Protecting your identity online using anonymityIt seems like every week the newspapers are filled with horror stories of people’s identities being stolen, of millions of credit card numbers being stolen, of lives being ruined.  People have been buying and selling goods and services literally since the dawn of humankind; so what has changed to cause this sudden massive increase in fraud?  How are </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/113233074667207658/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/113233074667207658' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113233074667207658'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113233074667207658'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/11/security-through-obscurity.html' title='Security through obscurity'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-113199239151706572</id><published>2005-11-14T18:18:00.000Z</published><updated>2005-12-13T20:32:14.016Z</updated><title type='text'>Microsoft Encrypted File System - Digital Forensic Analysis</title><summary type="text">OverviewMicrosoft has provided its customers with the ability to protect their sensitive files using its Encrypting File System (EFS).  EFS allows for the transparent encryption and decryption of sensitive files and is billed as a solution to protect documents in the event of the physical compromise of a computer. This article will show that it is possible to forensically recover documents </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/113199239151706572/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/113199239151706572' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113199239151706572'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/113199239151706572'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/11/microsoft-encrypted-file-system.html' title='Microsoft Encrypted File System - Digital Forensic Analysis'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-111945139802794041</id><published>2005-06-22T13:19:00.000Z</published><updated>2005-06-22T17:17:48.076Z</updated><title type='text'>Trust no one.</title><summary type="text">Let&#39;s play the finger pointing gameUnless you have been living under a rock for the last few years you’ve probably heard about “Identity Theft” and all the major security breaches of sensitive information.  No really good story can exist without your duly elected representatives, the media, and unpaid pundits including yours truly from expressing their biased and largely uneducated opinion on who</summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/111945139802794041/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/111945139802794041' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111945139802794041'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111945139802794041'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/06/trust-no-one.html' title='Trust no one.'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-111809226503899864</id><published>2005-06-06T20:50:00.000Z</published><updated>2005-06-06T21:18:02.996Z</updated><title type='text'>What is a good password?</title><summary type="text">Welcome to the 21st century where the average person has to remember more passwords than family member birthdays.  Stop right now and think about just how many passwords you use on a daily basis:
ATM pin(s)
Credit card pin(s)
Work computer(s)
Home Computer(s)
Email account(s)
Online banking account(s)
Online shopping store account(s)
The list just keeps growing.  In the 21st Century we are what </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/111809226503899864/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/111809226503899864' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111809226503899864'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111809226503899864'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/06/what-is-good-password.html' title='What is a good password?'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-111720840540182575</id><published>2005-05-27T15:29:00.000Z</published><updated>2005-05-31T16:49:48.876Z</updated><title type='text'>Adware and Spyware - are they really consensual?</title><summary type="text">What is this Adware and Spyware stuff anyway?Adware and Spyware are a class of Malware that some will argue is legal due to the user accepting an end user licensing agreement (EULA.)  The basic excuse is that the end user downloaded this really cool game/screensaver/program for free and accepts that the program or another bundled program will make money off the end user in some way. In short, the</summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/111720840540182575/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/111720840540182575' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111720840540182575'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111720840540182575'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/05/adware-and-spyware-are-they-really.html' title='Adware and Spyware - are they really consensual?'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-13050774.post-111694610594624604</id><published>2005-05-24T14:46:00.000Z</published><updated>2005-06-01T16:14:40.786Z</updated><title type='text'>The word on Information Security</title><summary type="text">Word gamesListed below are two sentences. Read each sentence in turn, close your eyes, and imagine the scene described:An elderly gentleman waiting patiently.An old geezer slouching in the corner.How different were your mental images?Were they of the same individual?Who would you want to meet?It is well known that the words we use have a noticeable effect on how we think and behave. This is </summary><link rel='replies' type='application/atom+xml' href='http://schiebelisms.blogspot.com/feeds/111694610594624604/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/13050774/111694610594624604' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111694610594624604'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/13050774/posts/default/111694610594624604'/><link rel='alternate' type='text/html' href='http://schiebelisms.blogspot.com/2005/05/word-on-information-security.html' title='The word on Information Security'/><author><name>Michael Schiebel</name><uri>http://www.blogger.com/profile/03864870289477883863</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>