One of my talks at RSA 2014 tried to convince attendees that they shouldn’t fear root on mobile. The talk, while lightly attended, seemed well received. Max Eddy of PCMag did a nice write up on it entitled Phones Can’t Be Trusted, Security Needs Root in Mobile. Abbreviated “history” of root access It’s funny if you think about the history of privilege on computer systems (this is a broad generalization of computer history).
My website has annoyed me for years. I’ve built custom sites, used wordpress, and many others I’ve simply forgotten. My first webpage ever was coded for an independent study during college. For years, my site simply said: note to self: use drop database with extreme caution I read a lot (online) and have much I’d like to share. So I’m excited to finally bring my website back online. I host using GitHub Pages and look forward to sharing things again.
Communication is one key component to succeeding as a comany. For me, that means email and other communication mediums are critical to viaForensics success. My unstructured database Years ago, when I was still on Outlook and Exchange, I abandoned folders and kept everything in my Inbox. While the Microsoft search add-on was not great, it did a decent job. I reazlied that all the time I had spent organizing emails into folders was better spent elsewhere.