"More and more programmers, designers, and even IT people are starting to use Macs, because a Mac is the ultimate computer. Here you have the ability to run Windows and Linux, and virtually any operating system you could want, along with OS X, and you have Unix built right in."
Blog
Mac users are power users
More and more programmers, designers, and even IT people are starting to use Macs, because a Mac is the ultimate computer. Here you have the ability to run Windows and Linux, and virtually any operating system you could want, along with OS X, and you have Unix built right in.(Via Apple Matters | Macs: Computers for Everyone.)
Notes from Secure Computing’s Web Gateway Security Workshop
http://feeds.feedburner.com/~r/islandinthenet/feed/~3/184185350/
Web Gateway Security
Grant Murphy - Director, Web Gateway Security
Negative security model ( known bad ). Must know about all possible attack vectors. Not possible.
Reference: Metasploit, HD Moore, VoMM.
Positive security model. Intent and reputation model. Something is good because of its known intent and reputation. Real world example. Credit score. If I have a reputation for defaults or late payments then I will get a lower credit score than someone who pays bill on time or…