Binary Blogger

Regular guy, techie at heart.
Added: August 19, 2011
Authority: 30.6567
Language: English
Type: Blog
Your Comments:
Your Email (optional):
  Analytics | see more
  Latest Posts | read more

NIST – Passwords, Old And Busted; Memorized Secrets, New Hotness

The National Institute of Standards and Technology (NIST) released a new draft of its Digital Identity Guidelines. The Authentication and Lifecycle Management document, special publication 800-63-3, is one of the evolution documents to strengthen ...

Part 3 – The Security Failures Of Star Wars: Revenge Of The Sith

The Revenge Of The Sith is the final chapter of the first trilogy, chronologically, of the Star Wars story. The first two movies, The Phantom Menace and Attack of the Clones, covered the planning of the new corporation. We saw how Palpatine ...

Part 2 – The Security Failures Of Star Wars: Attack of the Clones

Ten years after The Phantom Menace is where Attack of the Clones begins. During that time the foundation of the Empire was being created in secret. The Republic is crumbling as thousands of worlds are breaking away in favor of the separatist ...

  Similar Listings