<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jeremy&#8217;s Brain Dump</title>
	<atom:link href="http://blog.finke.ws/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.finke.ws</link>
	<description>Some worthless information from my brain.</description>
	<lastBuildDate>Sun, 12 Aug 2012 00:40:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>
	<item>
		<title>Mountain Lake</title>
		<link>http://blog.finke.ws/2012/08/11/mountain-lake/</link>
					<comments>http://blog.finke.ws/2012/08/11/mountain-lake/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Sun, 12 Aug 2012 00:40:02 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/?p=42</guid>

					<description><![CDATA[Mountain Lake, originally uploaded by jfinke.]]></description>
										<content:encoded><![CDATA[<div style="text-align: left; padding: 3px;">
<a href="http://www.flickr.com/photos/eknif/7762352728/" title="photo sharing"><img decoding="async" src="http://farm8.staticflickr.com/7246/7762352728_697b65ce9d.jpg" style="border: solid 2px #000000;" alt="" /></a><br />
<br />
<span style="font-size: 0.8em; margin-top: 0px;"><a href="http://www.flickr.com/photos/eknif/7762352728/">Mountain Lake</a>, originally uploaded by <a href="http://www.flickr.com/photos/eknif/">jfinke</a>.</span>
</div></p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2012/08/11/mountain-lake/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FISMA</title>
		<link>http://blog.finke.ws/2008/05/15/fisma/</link>
					<comments>http://blog.finke.ws/2008/05/15/fisma/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Thu, 15 May 2008 13:24:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/security/fisma/</guid>

					<description><![CDATA[Here is the first part of an article I wrote that tries to explain what the Federal Information Security Management Act is. It gives a brief overview and the starts through the 7 steps.]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">H</span>ere is the first part of an <a href="http://www.csc-inc1.com/blog/2008/05/14/what-is-fisma/">article</a> I wrote that tries to explain what the Federal Information Security Management Act is.  It gives a brief overview and the starts through the 7 steps.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2008/05/15/fisma/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Access Controls Article</title>
		<link>http://blog.finke.ws/2008/05/07/access-controls-article/</link>
					<comments>http://blog.finke.ws/2008/05/07/access-controls-article/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Wed, 07 May 2008 20:18:01 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/security/access-controls-article/</guid>

					<description><![CDATA[Here is an article I wrote regarding the basics of Access Controls. It deals mostly with AC in Information Assurance.]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">H</span>ere is an <a href="http://www.csc-inc1.com/blog/2008/05/05/access-controls">article</a> I wrote regarding the basics of Access Controls.  It deals mostly with AC in Information Assurance.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2008/05/07/access-controls-article/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PMP Equations</title>
		<link>http://blog.finke.ws/2007/11/04/pmp-equations/</link>
					<comments>http://blog.finke.ws/2007/11/04/pmp-equations/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Sun, 04 Nov 2007 22:58:54 +0000</pubDate>
				<category><![CDATA[PMP]]></category>
		<category><![CDATA[FV]]></category>
		<category><![CDATA[PERT]]></category>
		<category><![CDATA[PV]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/pmp/pmp-equations/</guid>

					<description><![CDATA[Here are some equations which are important points when studying for your PMP exam. Program Evaluation Review Technique (PERT) This equation takes three estimates, Optimistic, Realistic, and Pessimistic, and averages them out with a weight given to Realistic. Three point estimation just uses the average. Standard deviation and Variance use Pessimistic and Optimistic as well. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">H</span>ere are some equations which are important points when studying for your PMP exam.</p>
<p>Program Evaluation Review Technique (PERT)<br />
This equation takes three estimates, Optimistic, Realistic, and Pessimistic, and averages them out with a weight given to Realistic.<span id="more-29"></span></p>
<p><img decoding="async" src="/cgi-bin/mathtex.cgi?PERT=\frac{O+P+(4R)}{4}"></p>
<p>Three point estimation just uses the average.</p>
<p><img decoding="async" src="/cgi-bin/mathtex.cgi?3pt=\frac{O+P+R}{3}"></p>
<p>Standard deviation and Variance use Pessimistic and Optimistic as well.</p>
<p><img decoding="async" src="/cgi-bin/mathtex.cgi?SD=\frac{P-O}{6}"></p>
<p><img decoding="async" src="/cgi-bin/mathtex.cgi?V=\left(\frac{P-O}{6}\right)^2"></p>
<p>Present Value and Future Value are financial calculations.<br />
p=the number of periods, i=interest rate</p>
<p><img decoding="async" src="/cgi-bin/mathtex.cgi?PV=\frac{FV}{\left(1+i\right)^p}"></p>
<p><img decoding="async" src="/cgi-bin/mathtex.cgi?FV=PV\left(1+i\right)^p"></p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2007/11/04/pmp-equations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Math</title>
		<link>http://blog.finke.ws/2007/11/03/math/</link>
					<comments>http://blog.finke.ws/2007/11/03/math/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Sun, 04 Nov 2007 02:19:08 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/uncategorized/math/</guid>

					<description><![CDATA[This uses LaTeX to generate equations. Then an image is generated from the LaTeX. Tutorials for this: http://www.andy-roberts.net/misc/latex/latextutorial9.html http://www.andy-roberts.net/misc/latex/latextutorial10.html http://www.forkosh.com/mimetextutorial.html]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" src="/cgi-bin/mathtex.cgi?x=\frac{-b\pm\sqrt{b^2-4ac}}{2a}"><br />
This uses LaTeX to generate equations.  Then an image is generated from the LaTeX.<br />
Tutorials for this:<br />
http://www.andy-roberts.net/misc/latex/latextutorial9.html<br />
http://www.andy-roberts.net/misc/latex/latextutorial10.html<br />
http://www.forkosh.com/mimetextutorial.html</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2007/11/03/math/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is security</title>
		<link>http://blog.finke.ws/2007/10/29/what-is-security/</link>
					<comments>http://blog.finke.ws/2007/10/29/what-is-security/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Tue, 30 Oct 2007 04:26:41 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[availability]]></category>
		<category><![CDATA[confidentiality]]></category>
		<category><![CDATA[integrity]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/security/what-is-security/</guid>

					<description><![CDATA[How do you define security? To some people, firewalls immediately comes to mind. To others, process and procedures are the first things they think of. Other people think about guards and guns. I like to think of security as risk management. A vulnerability exists. This is a possible flaw in your system. A threat exists. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">H</span>ow do you define security?  To some people, firewalls immediately comes to mind.  To others, process and procedures are the first things they think of.  Other people think about guards and guns.</p>
<p>I like to think of security as risk management.  A vulnerability exists.  This is a possible flaw in your system.  A threat exists.  This is something to take advantage of the vulnerability.  This is your threat vulnerability pair.  When you put these together you get your risk. To protect yourself you need to mitigate and manage this risk.<span id="more-27"></span></p>
<p>Information security types tend to think of protecting three different items for an information system.  They are confidentiality, integrity, and availability.  Confidentiality deals with who can and who cannot have access to the system.  Integrity deals with whether or not the system has been altered in a way not intended.  Availability deals with whether or not the system is accessible when it is supposed to be accessible.</p>
<p>These three items are usually weighted.  The weights tend to be Low, Moderate, or High.  Different groups and systems are weighted differently.  For instance, government systems tend to weigh confidentiality and integrity higher than availability.  Commercial companies tend to weigh integrity and availability higher than confidentiality. An example would be a public web server being used as a marketing device.  This system may be rated as CIA:LMM.</p>
<p>After a system has been rated, vulnerabilities to CIA should be identified.  For instance, say your public web server was located in New Orleans, LA.  A vulnerability to availability may be that it is a single instance server.  A threat to this availability would be a hurricane.  The likelihood of a hurricane happening is high.  The likelihood that a hurricane will affect the web server is moderate.  Putting the two together, you have a real risk to the system.</p>
<p>A method to mitigate the risk of the system is to have plan in place to deal with losing the web server.  You should take backups of the existing system.  You may have a backup site somewhere else that is geographically separated.  Utilizing those two items, you may be able to get your web server up and running within 48 hours of a catastrophic failure (Katrina).  In this case, you have successfully mitigated and managed your risk to the availability of your system.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2007/10/29/what-is-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Hosting</title>
		<link>http://blog.finke.ws/2007/10/08/new-hosting/</link>
					<comments>http://blog.finke.ws/2007/10/08/new-hosting/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Mon, 08 Oct 2007 16:26:28 +0000</pubDate>
				<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/wordpress/new-hosting/</guid>

					<description><![CDATA[If you can see this post, then you are viewing this from my new hosting provider. I am going to give Virtual Private Servers (VPS) a try. I just need to migrate the rest of the sites over.]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">I</span>f you can see this post, then you are viewing this from my new hosting provider.  I am going to give Virtual Private Servers (VPS) a try.  I just need to migrate the rest of the sites over.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2007/10/08/new-hosting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 2.3 and Feedburn Widget</title>
		<link>http://blog.finke.ws/2007/10/04/wordpress-23-and-feedburn-widget/</link>
					<comments>http://blog.finke.ws/2007/10/04/wordpress-23-and-feedburn-widget/#comments</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Fri, 05 Oct 2007 01:55:49 +0000</pubDate>
				<category><![CDATA[Feedburner]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/wordpress/wordpress-23-and-feedburn-widget/</guid>

					<description><![CDATA[I have just upgraded to WordPress 2.3. So far, so good. My feedburn widget is running correct as far as I can tell. If anyone has any problems please let me know. Apparently, the google sitemap plugin 2.7.1 is not WP 2.3 compatible.]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">I</span> have just upgraded to WordPress 2.3.  So far, so good.  My <a href="http://blog.finke.ws/wordpress/announcing-a-feedburner-wordpress-widget/">feedburn widget</a> is running correct as far as I can tell. If anyone has any problems please let me know.</p>
<p>Apparently, the google sitemap plugin 2.7.1 is not WP 2.3 compatible.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2007/10/04/wordpress-23-and-feedburn-widget/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>So, what is a CISSP anyways?</title>
		<link>http://blog.finke.ws/2007/06/05/so-what-is-a-cissp-anyways/</link>
					<comments>http://blog.finke.ws/2007/06/05/so-what-is-a-cissp-anyways/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Wed, 06 Jun 2007 04:48:52 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/security/so-what-is-a-cissp-anyways/</guid>

					<description><![CDATA[A CISSP is a certification given out by ISC2.org. They state: As the first credential accredited by ANSI to ISO Standard 17024:2003 in the field of information security, the Certified Information Systems Security Professional (CISSPÃ‚Â®) certification provides information security professionals with not only an objective measure of competence but a globally recognized standard of achievement. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">A</span> CISSP is a certification given out by <a href="https://www.isc2.org/cgi-bin/content.cgi?category=97">ISC2.org</a>.  They state:</p>
<blockquote><p>As the first credential accredited by ANSI to ISO Standard 17024:2003 in the field of information security, the Certified Information Systems Security Professional (CISSPÃ‚Â®) certification provides information security professionals with not only an objective measure of competence but a globally recognized standard of achievement. The CISSP credential demonstrates competence in the 10 domains of the (ISC)Ã‚Â² CISSPÃ‚Â® CBKÃ‚Â®. </p></blockquote>
<p>So, it is a internationally known information security certification.  It is generally recognized as one of the toughest and most comprehensive security certifications out there.  However, it is not necessarily a technical certification such as a Checkpoint certification or a Bluecoat certification.  It covers a broad spectrum of topics.  In fact, it covers 10 domains of information as you can see in the quote above.<span id="more-24"></span></p>
<p>Most people refer to the CISSP certification as a mile wide and an inch deep.  This is because the knowledge required for a certification covers a lot of topics.  However, it does not require you to be an expert in all of them.  Though, most people who are taking the test are security professionals and can answer some of the topics comprehensively.</p>
<p>So, what are the subjects that are covered?  These are the 10 domains referenced earlier.</p>
<p>These are the 10 domains (they have been renamed recently):</p>
<p>Access Control<br />
Application Security<br />
Business Continuity and Disaster Recovery Planning<br />
Cryptography<br />
Information Security and Risk Management<br />
Legal, Regulations, Compliance and Investigations<br />
Operations Security<br />
Physical (Environmental) Security<br />
Security Architecture and Design<br />
Telecommunications and Network Security</p>
<p>This is just a brief introduction in the requirements for the CISSP.  Later I will break down each domain and discuss some of the information required.  For more information, visit <a href="http://www.cccure.org">CCCure</a>.  There is a whole host of information there.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2007/06/05/so-what-is-a-cissp-anyways/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Upgrading the OS on my MythBox</title>
		<link>http://blog.finke.ws/2007/04/08/upgrading-the-os-on-my-mythbox/</link>
					<comments>http://blog.finke.ws/2007/04/08/upgrading-the-os-on-my-mythbox/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Sun, 08 Apr 2007 16:58:23 +0000</pubDate>
				<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[MythTV]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<guid isPermaLink="false">http://blog.finke.ws/uncategorized/upgrading-the-os-on-my-mythbox/</guid>

					<description><![CDATA[Well, I did an apt-get upgrade on my Ubuntu 6.10 based mythtv box. It upgraded the kernel for me. This always provides a problem with the IVTV drivers which provide support for my Hauppaugh capture card. This means that I have to recompile them and reinstall. Usually, for good measure, I download the latest driver [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap">W</span>ell, I did an apt-get upgrade on my Ubuntu 6.10 based mythtv box.  It upgraded the kernel for me.  This always provides a problem with the IVTV drivers which provide support for my Hauppaugh capture card.  This means that I have to recompile them and reinstall.</p>
<p>Usually, for good measure, I download the latest driver for my kernel.  Since the update to Dapper Drake kept me at 2.6.15 (upgrade to -28 from -27), I downloaded the <a href="http://dl.ivtvdriver.org/ivtv/archive/0.4.x/ivtv-0.4.10.tar.gz">0.4.10</a> driver.</p>
<p>I also had to rebuild my build environment so that I could recompile and reinstall the driver.  I just follow section 5 off of <a href="http://hyams.webhop.net/mythtv/myth_ubuntu.html">Hyam&#8217;s website</a> regarding a MythTV 0.19 install on a Breezy Badger box.  It is a little out of date, however, this section is still very relevant.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://blog.finke.ws/2007/04/08/upgrading-the-os-on-my-mythbox/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
