[wikileaks ]PRISM – DHS PRISM 2004 – Requirements for Installation (original doc)
Saturday, June 8th, 2013original PRISM docs from wikileaks
original PRISM docs from wikileaks
Posted in infosec, policy, politics, privacy, Security, wikileaks | Comments Off | permalink
original PRISM docs from wikileaks
Posted in infosec, policy, politics, privacy, Security, wikileaks | Comments Off | permalink
Excellent essay, very eloquent. I do not agree with all points, but this is definitely a worth a read.
Posted in academia, essay, policy, public, review, startup | Comments Off | permalink
Excellent essay, very eloquent. I do not agree with all points, but this is definitely a worth a read.
Posted in academia, essay, policy, public, review, startup | Comments Off | permalink
Notes on how to get sane traffic flows for a linux box that has 2 network cards connected to the same network. NOTE: this is a required setup if you are using multiple network cards feature on AWS VPC
Posted in amazon, aws, cloud, default, gateway, kernel, Linux, multiple, policy, routing, sysadmin | Comments Off | permalink
Notes on how to get sane traffic flows for a linux box that has 2 network cards connected to the same network. NOTE: this is a required setup if you are using multiple network cards feature on AWS VPC
Posted in amazon, aws, cloud, default, gateway, kernel, Linux, multiple, policy, routing, sysadmin | Comments Off | permalink
Notes on how to get sane traffic flows for a linux box that has 2 network cards connected to the same network. NOTE: this is a required setup if you are using multiple network cards feature on AWS VPC
Posted in amazon, aws, cloud, default, gateway, kernel, Linux, multiple, policy, routing, sysadmin | Comments Off | permalink
Guide to Computer Security – Log Management, NIST Publication 800-92 (SEP-2006) / Describes enterprise log management, collection & analysis from policy and technology perspectives.
Posted in analysis, compliance, enterprise, infosec, it, log, management, policy | Comments Off | permalink
Guide to Computer Security – Log Management, NIST Publication 800-92 (SEP-2006) / Describes enterprise log management, collection & analysis from policy and technology perspectives.
Posted in analysis, compliance, enterprise, infosec, it, log, management, policy | Comments Off | permalink
Posted in configuration, for:@twitter, for:collidr, has:for, management, policy, site-config, sysadmin | Comments Off | permalink
You are currently browsing the archives for the policy category.
Konstantin Antselovich (c) 2004-2011
powered by WordPress
Entries (RSS)
and Comments (RSS).