[Log In] []

Exploring the science and magic of Identity and Access Management
Saturday, October 24, 2020
 

links for 2009-08-20

General
Author: Mark Dixon
Thursday, August 20, 2009
2:00 am
  • "The technology behind Computrace┬« LoJack┬« for Laptops by Absolute┬« Software is the Computrace Agent, a small software client that is embedded into the BIOS firmware of most computers at the factory. Or you can install it yourself."
    "The Agent in your computer maintains daily contact with the Absolute Monitoring Center. If you report your computer stolen, Agent contact will increase to every 15 minutes. Increased contact allows us to obtain specific details like the physical location of your computer, any activity that has occurred post-theft, and other important data that will aid us in working with local law enforcement."
  • "After months of committee meetings and hundreds of hours of heated debate, the United States Congress remained deadlocked this week over the best possible way to deny Americans health care."
  • "Joshua Corman would seem an unlikely critic of IT security vendors. After all, he works for one. Yet Corman, principal security strategist for IBM's Internet Security Systems division, is speaking out about what he sees as eight trends undermining the ability of IT security practitioners to mount an effective defense against online outlaws. "
Comments Off on links for 2009-08-20 . Permalink . Trackback URL
 

Comments are closed.

Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.