How often in the past have ignorant ivory tower government officials tried to impose supposedly inane IT security measures, which on closer inspection are completely infeasible in terms of the existing technologies? Going overboard along a single front line of defense is not the right answer and is plainly insane. As even more draconian measures are imposed, following a just-in-case mentality, there remain much easier and less obvious means to hack into a given corporation. Remember the Maginot line which was simply bypassed by the Germans during the first world war? We should learn from our mistakes in the past and just get along with our work without unnecessary barbed wire, trenches and imaginary Maginot lines.
Pages
Random entries
Here are some random entries that you might be interested in:
Tag Cloud
Golf Handicap
Archives
Information
Most popular
These are the ten most popular blog entries in the last six months:
Important events
Graduated from Stanford 6-5-1979 ago.
Kiffin Rockwell was shot down and killed 9-23-1916 ago.
Believe it or not but I am 10-11-1957 young.
First met Thea in Balestrand, Norway 6-14-1980 ago.
Began well-balanced and healthy life style 1-8-2013 ago.
My father passed away 10-20-2000 ago.
My mother passed away 3-27-2018 ago.
Started Gishtech 04-25-2016 ago.
Favorite Links
- A List Apart
- Ars Technica
- BBC SPORT | Golf
- Big Think
- Boing Boing
- Buienradar
- Christian Science Monitor
- Clojure
- Digital Web Magazine
- DZone
- Edge of Human Knowledge
- Everything2
- FreeBSD
- De Hooge Bergsche
- Jargon File
- jQuery
- Kuro5hin
- Lua
- Minecraft
- Neil's Garage
- National Public Radio
- nixCraft
- Online Golf UK
- Perl Monks
- PGA Tour
- Radioparadise
- Route Planner
- Slashdot
- SomaFM
- Stack Overflow
- SICP
- TechCrunch
- The Working Geek
- TED Talks
- The Onion
- use Perl
- Windley's Technometria