Status Updates From Information Security: The C...
Information Security: The Complete Reference by
Status Updates Showing 1-13 of 13
Justin
is 38% done
This guy talks way too much about IRM, comparing it to DRM and talking about it in other chapters besides the entire chapter he dedicated to it.
— Feb 24, 2016 08:54AM
Add a comment
Justin
is 28% done
"To run within the kernel, the executable must be privileged, and this right is usually restricted to native operating system components." Wrong. Any process can access the kernel through system calls, and almost all processes do. Also, /proc filesystem entries affect kernel
— Feb 19, 2016 03:41PM
Add a comment
Justin
is 20% done
Still very high level. Detail reminds me of CISSP material
— Feb 17, 2016 09:30AM
Add a comment
Justin
is 13% done
Ethereal is wireshark and has been for MANY years
— Feb 16, 2016 04:00PM
Add a comment



