“
After iris-scanning was legally accepted as identity verification for drivers licenses, passports and so much more, anyone could securely log onto the Internet from any computer anywhere via such a scan.
Elections (much less air travel) have never been the same
”
”
Nancy Omeara (The Most Popular President Who Ever Lived [So Far])
“
Primary aim of quantum artificial intelligence is to improve human freedom, dignity, equality, security, and total well-being.
”
”
Amit Ray (Compassionate Artificial Intelligence: Frameworks and Algorithms)
“
I wish that in order to secure his party’s nomination, a presidential candidate would be required to point at the sky and name all the stars; have the periodic table of the elements memorized; rattle off the kings and queens of Spain; define the significance of the Gatling gun; joke around in Latin; interpret the symbolism in seventeenth-century Dutch painting; explain photosynthesis to a six-year-old; recite Emily Dickenson; bake a perfect popover; build a shortwave radio out of a coconut; and know all the words to Hoagy Carmichael’s “Two Sleepy People”, Johnny Cash’s “Five Feet High and Rising”, and “You Got the Silver” by the Rolling Stones...What we need is a president who is at least twelve kinds of nerd, a nerd messiah to come along every four years, acquire the Secret Service code name Poindexter, install a Revenge of the Nerds screen saver on the Oval Office computer, and one by one decrypt our woes.
”
”
Sarah Vowell (The Partly Cloudy Patriot)
“
In the underworld, reality itself has elastic properties and is capable of being stretched into different definitions
of the truth.
”
”
Roderick Vincent (The Cause (The Minutemen Series, #1))
“
I wish it were different. I wish that we privileged knowledge in politicians, that the ones who know things didn't have to hide it behind brown pants, and that the know-not-enoughs were laughed all the way to the Maine border on their first New Hampshire meet and greet. I wish that in order to secure his party's nomination, a presidential candidate would be required to point at the sky and name all the stars; have the periodic table of the elements memorized; rattle off the kings and queens of Spain; define the significance of the Gatling gun; joke around in Latin; interpret the symbolism in seventeenth-century Dutch painting; explain photosynthesis to a six-year-old; recite Emily Dickinson; bake a perfect popover; build a shortwave radio out of a coconut; and know all the words to Hoagy Carmichael's "Two Sleepy People," Johnny Cash's "Five Feet High and Rising," and "You Got the Silver" by the Rolling Stones. After all, the United States is the greatest country on earth dealing with the most complicated problems in the history of the world--poverty, pollution, justice, Jerusalem. What we need is a president who is at least twelve kinds of nerd, a nerd messiah to come along every four years, acquire the Secret Service code name Poindexter, install a Revenge of the Nerds screen saver on the Oval Office computer, and one by one decrypt our woes.
”
”
Sarah Vowell (The Partly Cloudy Patriot)
“
the cipher was based on the product of two hundred-digit prime numbers, and the National Security Agency had staked its reputation on the claim that the fastest computer in existence could not crack it before the Big Crunch at the end of the Universe.
”
”
Arthur C. Clarke (2010: Odyssey Two (Space Odyssey, #2))
“
The computer system is secure.
”
”
Michael Crichton (Jurassic Park (Jurassic Park, #1))
“
Some viruses don’t actually harm the system itself, but all of them cause network slowdowns due to the heavy network traffic caused by the virus replication
”
”
Chuck Easttom (Computer Security Fundamentals)
“
(State Security may not have been full of computer geniuses, but still, I had to be careful).
”
”
Wael Ghonim (Revolution 2.0: The Power of the People Is Greater Than the People in Power, A Memoir)
“
Google attracts the best talents of the world; why their cloud computing will not be the most secure?
”
”
Enamul Haque (The Ultimate Modern Guide to Digital Transformation: The "Evolve or Die" thing clarified in a simpler way)
“
Computer hacking was like a chemical bond holding us all together.
”
”
Rachel Zhang (The Emotional Embodiment of Stars)
“
The more I came to know about the fragility of computer security, the more I worried over the consequences of trusting the wrong machine.
”
”
Edward Snowden (Permanent Record)
“
Some research suggests that collecting vast amounts of data simply can’t predict rare events like terrorism. A 2006 paper by Jeff Jonas, an IBM research scientist, and Jim Harper, the director of information policy at the Cato Institute, concluded that terrorism events aren’t common enough to lend themselves to large-scale computer data mining.
”
”
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
“
It's proper Netiquette to view in-App webpages in a mobile browser for better security. NetworkEtiquette.net
”
”
David Chiles
“
To have paranoia, it's nothing bad it's like your antivurs system on your computer, it makes as much secure as possible.
”
”
Deyth Banger
“
The main element you cannot delegate to your cloud service provider is your responsibility for security, compliance and customer trust.
”
”
Stephane Nappo
“
You correctly predicted the rise of heroin while Bush was in office,” he said. “And people still don’t think to ask why his Yale Skull and Bones fraternity name is ‘Poppy.’ Since Clinton is more heavily involved in cocaine ops than he is Bush’s heroin ops7, the price of coke and crack will probably drop in this country while availability soars. ” Mark agreed. “The Presidency switched parties all right, from a heroin party to a coke party with all the same players involved.” “Except for the kids Bush used and abused,” I said. “Neither Hillary nor Bill believe in pedophilia. From my point of view, that is a major difference between the Bushes and Clintons. Other than that, they’re playing the same DARPA-Sandia Labs computer game.
”
”
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
“
Today there is big money for those who can stealthily invade computer networks, or construct a secure botnet, and no modern military arsenal is complete without state-of-the-art malware.
”
”
Mark Bowden (Worm: The First Digital World War)
“
It might seem that security should gradually improve over time as security problems are discovered and corrected, but unfortunately this does not seem to be the case. System software is growing ever more complicated, hackers are becoming better and better organized, and computers are connecting more and more intimately on the Internet. Security is an ongoing battle that can never really be won.
”
”
Evi Nemeth (Unix and Linux System Administration Handbook)
“
Anyone who uses Windows on their home computer is familiar with routine security updates, which Microsoft issues on the second Tuesday of each month. In the Tribe it has become known as “Patch Tuesday.
”
”
Mark Bowden (Worm: The First Digital World War)
“
Further expanding the already large class of Foucauldian apparatuses, I shall cal an apparatus literally anything that has in some way the capacity to capture, determine, intercept, model, control , or secure the gestures, behaviors, opinions, or discourses of living beings. Not only, therefore, prisons, madhouses, the panopticon, schools, confession, factories, disciplines, juridical measures, and so forth (whose connection with power is in a certain sense evident), but also the pen, writing, literature, philosophy, agriculture, cigarettes, navigation, computers, cellular telephones and - why not - language itself, which is perhaps the most ancient of apparatuses - one in which thousands and thousands of years ago a primitive inadvertently let himself be captured, probably without realizing the consequences that he was about to face.
”
”
Giorgio Agamben (What Is an Apparatus? and Other Essays)
“
When you decide to put your business online it is a little bet tricky step for novice computer users because they want to keep data safe & secure.
This problem developed from companies which did not take security seriously
”
”
Mohamed Saad
“
Someone comes.” Tyler looks up from the server, elbow-deep in cable. “You sure?” I peer back down the corridor at the approaching Terran. He carries an armload of computer equipment and wears a tool belt full of e-tech. He is three days unshaven, glares at the security personnel around him with an air of undisguised contempt, and looks as though he has not slept in seven years. “He certainly has the appearance of a man who works with computers, yes.
”
”
Amie Kaufman (Aurora Rising (The Aurora Cycle, #1))
“
If we are lucky, they were never retarded enough to create computer viruses and will have no such things as firewalls and security like we have. If they have never experienced a full blown computer failure we'll introduce them to the concept
”
”
Thomas Wilson
“
Our plutocracy, whether the hedge fund managers in Greenwich, Connecticut, or the Internet moguls in Palo Alto, now lives like the British did in colonial India: ruling the place but not of it. If one can afford private security, public safety is of no concern; to the person fortunate enough to own a Gulfstream jet, crumbling bridges cause less apprehension, and viable public transportation doesn’t even compute. With private doctors on call and a chartered plane to get to the Mayo Clinic, why worry about Medicare?
”
”
Mike Lofgren (The Deep State: The Fall of the Constitution and the Rise of a Shadow Government)
“
generic definition of a blockchain: a distributed, append-only ledger of provably signed, sequentially linked, and cryptographically secured transactions that’s replicated across a network of computer nodes, with ongoing updates determined by a software-driven consensus.
”
”
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
“
China has secretly developed an army of 180,000 cyber spies and warriors, mounting an incredible ninety thousand computer attacks a year against the U.S. Defense Department networks alone. The totality of the thefts and their impact on American national security are breathtaking.
”
”
Marc Goodman (Future Crimes)
“
He was an accomplished computer hacker. During the past two years, he’d penetrated highly protected computer systems, in which he had planted rootkits that allowed him to swim through their networks without their security becoming aware that a secret fish explored the data depths.
”
”
Dean Koontz (Devoted)
“
For example, in 2012 researchers at Kaspersky Lab in Moscow uncovered a highly complex piece of malware known as Flame that had been pilfering data from information systems around the world for more than five years before it was detected. Mikko Hypponen, the well-respected chief research officer at the computer security firm F-Secure, called Flame a failure for the antivirus industry and noted he and his colleagues may be “out of their leagues in their own game.” Though millions around the world rely on these tools, it’s pretty clear the antivirus era is over.
”
”
Marc Goodman (Future Crimes)
“
Didn’t they know that the only unhackable computer is one that’s running a secure operating system, welded inside a steel safe, buried under a ton of concrete at the bottom of a coal mine guarded by the SAS and a couple of armoured divisions, and switched off? What did they think they were doing?
”
”
Charles Stross (The Atrocity Archives (Laundry Files, #1))
“
We may, in our darker thoughts, care little about whether a suspected terrorist is extradited to a state where he might be executed, or tortured, or might not receive a fair trial; but a legal system which permits this for a suspected terrorist would have to allow it for your partner, or friend, or teenage son whose computer whizz-kiddery lands him in hot water with the security services of a foreign power. Tearing down the edifice of human rights, as we are urged is in our interests, simply because it occasionally results in a benefit to people we don’t like, is the politics of the kindergarten.
”
”
The Secret Barrister (Fake Law: The Truth About Justice in an Age of Lies)
“
What do these decades-old international organizations see in an arcane digital technology built by the crypto-libertarians and Cypherpunks who gave us Bitcoin? It’s the prospect that this decentralized computing system could resolve the issue of social capital deficits that we discussed in the context of the Azraq refugee camp. By creating a common record of a community’s transactions and activities that no single person or intermediating institution has the power to change, the UN’s blockchain provides a foundation for people to trust that they can securely interact and exchange value with each other.
”
”
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
“
Well, besides, I’ve arranged with the computer that anyone who doesn’t look and sound like one of us will be killed if he—or she—tries to board the ship. I’ve taken the liberty of explaining that to the Port Commander. I told him very politely that I would love to turn off that particular facility out of deference to the reputation that the Sayshell City Spaceport holds for absolute integrity and security—throughout the Galaxy, I said—but the ship is a new model and I didn’t know how to turn it off.”
“He didn’t believe that, surely.”
“Of course not! But he had to pretend he did, as otherwise he would have had no choice but to be insulted. And since there would be nothing he could do about that, being insulted would only lead to humiliation. And since he didn’t want that, the simplest path to follow was to believe what I said.”
“And that’s another example of how people are?”
“Yes. You’ll get used to this.
”
”
Isaac Asimov (Foundation's Edge (Foundation, #4))
“
By some estimates, there are 250 hacker groups in China that are tolerated and may even be encouraged by the government to enter and disrupt computer networks,” said the 2008 U.S.–China Security Review. “The Chinese government closely monitors Internet activities and is likely aware of the hackers’ activities. While the exact number may never be known, these estimates suggest that the Chinese government devotes a tremendous amount of human resources to cyber activity for government purposes. Many individuals are being trained in cyber operations at Chinese military academies, which does fit with the Chinese military’s overall strategy.
”
”
Mark Bowden (Worm: The First Digital World War)
“
Zbigniew Brzezinski, head of our National Security Council, writes that ‘with the use of computers, human behavior itself will become more determined and subject to deliberate programming,’ and that ‘it will soon be possible to assert almost continuous surveillance over every citizen.’ “I believe that the Nazis and the Minutemen and the Christian movement are going to get very strong, and at the same time there’s going to be a massive depression. I see large masses of people around the world being deliberately starved every day. I see terrible things happening to reduce the population of this earth, so that those who control the corporations don’t have to provide for the needs of the poor.
”
”
Mae Brussell (The Essential Mae Brussell: Investigations of Fascism in America)
“
At the Pentagon, for instance, in the NMCC’s secure Emergency Actions room, military officials could find anyone in the Constitution’s line of succession by checking the screen of a dedicated Zenith Z-150 Central Locator System computer. The CLS computers are protected by a special NSA protocol known as TEMPEST that shields them from electromagnetic snooping. II
”
”
Garrett M. Graff (Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself--While the Rest of Us Die)
“
At a boardroom or at a 'nuke proof' datacenter, a Chief Information Security Officer 2.0 participates in creating and protecting the digital value. The role of a CISO evolves from a ´policeman of computers´ to a ´dietician of risk appetite´. For success in digital transformation, turn the comprehensive risk management and cybersecurity into key business differentiators.
”
”
Stephane Nappo
“
Finding a zero day is a little like entering God mode in a video game. Once hackers have figured out the commands or written the code to exploit it, they can scamper through the world's computer networks undetected until the day the underlying flaw is discovered. Zero day exploitation is the most direct application of the cliche 'knowledge is power if you know how to use it.
”
”
Nicole Perlroth (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race)
“
Industry leaders like IBM, Google, and Microsoft have been at the forefront, channeling significant portions of their extensive R&D budgets into quantum computing research and development. Alongside these tech giants, a dynamic landscape of startups has emerged, with companies such as Rigetti Computing, IonQ, and D-Wave collectively securing hundreds of millions of dollars in funding.
”
”
L Venkata Subramaniam (Quantum Nation: India's Leap into the Future)
“
New York City manages expertly, and with marvelous predictability, whatever it considers humanly important. Fax machines, computers, automated telephones and even messengers on bikes convey a million bits of data through Manhattan every day to guarantee that Wall Street brokers get their orders placed, confirmed, delivered, at the moment they demand. But leaking roofs cannot be fixed and books cannot be gotten into Morris High in time to meet the fall enrollment. Efficiency in educational provision for low-income children, as in health care and most other elementals of existence, is secreted and doled out by our municipalities as if it were a scarce resource. Like kindness, cleanliness and promptness of provision, it is not secured by gravity of need but by the cash, skin color and class status of the applicant.
”
”
Jonathan Kozol (Savage Inequalities: Children in America's Schools)
“
Why would people write down their passwords on Post-it notes and stick them on their computers? Because making people change them every two weeks and requiring that they be at least twenty characters long, with an uppercase letter, a number, a symbol, a haiku, and in iambic pentameter, is just too much for the average user to handle. So people subvert the security systems in place so that they can get their work done.
”
”
Marc Goodman (Future Crimes)
“
When you are finished creating your Master Password you should have a good
strong 12+ character password that has random letters, numbers, and special
character with upper and lowercase capitalization in other words it is
UNHACKABLE well that’s not completely true, they did run the numbers on how
long it would take to crack a password of this type and it was something like
10,000 plus years on a super quantum computer.
”
”
Greg Fultz (The GEFNET Methodology of Password Creation: Never Forget Your Password Again!)
“
Chloe's fingers flew over her keyboard. I raised an eyebrow at Hunter. "Is she Googling hunter-assholes? I doubt they have their own Web page."
Chloe snorted. "You'd be surprised."
"She's hacking the school files," Hunter said. "She does it all the time."
"Don't they have security for that kind of thing?"
Chloe snorted again. "Please." I knew that tone. Connor used it whenever someone called his computer mojo into question.
”
”
Alyxandra Harvey (Blood Moon (Drake Chronicles, #5))
“
The only job security, to the extent that it exists, will reside in your ability to be “high concept high touch”: to come up with inspired and innovative ideas, gain creative insights, and connect with people on an emotional level through empathy, story or design. To do what computers can’t, or that dude in China or India for only so many dollars an hour. To create experiences that people didn’t know they wanted or needed but soon refuse to live without.
”
”
Srinivas Rao (The Art of Being Unmistakable)
“
Your computer operates automatically in a default mode unless you deliberately tell it to do something else. So Luther says that even after you are converted by the gospel your heart will go back to operating on other principles unless you deliberately, repeatedly set it to gospel-mode. We habitually and instinctively look to other things besides God and his grace as our justification, hope, significance, and security. We believe the gospel at one level, but at deeper levels we do not. Human approval, professional success, power and influence, family and clan identity—all of these things serve as our heart’s “functional trust” rather than what Christ has done, and as a result we continue to be driven to a great degree by fear, anger, and a lack of self-control. You cannot change such things through mere will-power, through learning Biblical principles and trying to carry them out. We can only change permanently as
”
”
Timothy J. Keller (The Prodigal God: Recovering the Heart of the Christian Faith)
“
We do everything wrong: instead of spending years perfecting our technology, we build a minimum viable product, an early product that is terrible, full of bugs and crash-your-computer-yes-really stability problems. Then we ship it to customers way before it’s ready. And we charge money for it. After securing initial customers, we change the product constantly—much too fast by traditional standards—shipping new versions of our product dozens of times every single day.
”
”
Eric Ries (The Lean Startup: How Today's Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses)
“
Who cheats?
Well, just about anyone, if the stakes are right. You might say to yourself, I don’t cheat, regardless of the stakes. And then you might remember the time you cheated on, say, a board game. Last week. Or the golf ball you nudged out of its bad lie. Or the time you really wanted a bagel in the office break room but couldn’t come up with the dollar you were supposed to drop in the coffee can. And then took the bagel anyway. And told yourself you’d pay double the next time. And didn’t.
For every clever person who goes to the trouble of creating an incentive scheme, there is an army of people, clever and otherwise, who will inevitably spend even more time trying to beat it. Cheating may or may not be human nature, but it is certainly a prominent feature in just about every human endeavor. Cheating is a primordial economic act: getting more for less. So it isn’t just the boldface names — inside-trading CEOs and pill-popping ballplayers and perkabusing politicians — who cheat. It is the waitress who pockets her tips instead of pooling them. It is the Wal-Mart payroll manager who goes into the computer and shaves his employees’ hours to make his own performance look better. It is the third grader who, worried about not making it to the fourth grade, copies test answers from the kid sitting next to him.
Some cheating leaves barely a shadow of evidence. In other cases, the evidence is massive. Consider what happened one spring evening at midnight in 1987: seven million American children suddenly disappeared. The worst kidnapping wave in history? Hardly. It was the night of April 15, and the Internal Revenue Service had just changed a rule. Instead of merely listing the name of each dependent child, tax filers were now required to provide a Social Security number. Suddenly, seven million children — children who had existed only as phantom exemptions on the previous year’s 1040 forms — vanished, representing about one in ten of all dependent children in the United States.
”
”
Steven D. Levitt (Freakonomics: A Rogue Economist Explores the Hidden Side of Everything)
“
The world is broken up by tribalism—the British, the German, the Swiss, the Hindu, the Buddhist, are tribes. See the fact that they are tribes, glorified as nations, and that this tribalism is creating havoc in the world, bringing wars in the world. Each tribe thinks in its own culture opposed to other cultures. But tribalism is the root, not the culture. Observing the fact of that is the action that frees the brain from the condition of tribalism. You see actually, not theoretically or ideationally, the fact that tribalism glorified as nations is one of the causes of war. That is a fact. There are other causes of war, economics and so on, but one of the causes is tribalism. When you see that, perceive that, and see that cannot bring about peace, the very perception frees the brain from its conditioning of tribalism.
One of the factors of contention throughout the world is religion. You are a Catholic, I am a Muslim, based on ideas, propaganda of hundreds or thousands of years; the Hindu and the Buddhist ideas are of thousands of years. We have been programmed like a computer. That programming has brought about great architecture, great paintings, great music, but it has not brought peace to mankind. When you see the fact of that, you do not belong to any religion. When there are half a dozen gurus in the same place, they bring about misery, contradiction, conflict: “My guru is better than yours; my group is more sanctified than yours; I have been initiated, you have not.” You know all the nonsense that goes on. So when you see all this around you as an actual fact, then you do not belong to any group, to any guru, to any religion, to any political commitment of ideas.
In the serious urgency to live peacefully there must be freedom from all this because they are the causes of dissension, division. Truth is not yours or mine. It does not belong to any church, to any group, to any religion. The brain must be free to discover it. And peace can exist only when there is freedom from fallacy. You know, for most of us, to be so drastic about things is very difficult, because we have taken security in things of illusion, in things that are not facts, and it is very difficult to let them go. It is not a matter of exercising will, or taking a decision: “I will not belong to anything” is another fallacy. We commit ourselves to some group, to an idea, to religious quackery, because we think it is some kind of security for us. In all these things there is no security, and therefore there is no peace. The brain must be secure; but the brain, with its thought, has sought security in things that are illusory.
”
”
J. Krishnamurti (Where Can Peace Be Found?)
“
When we take an active interest in matters of doubtful relevance at moments that are chosen by tyrants and spooks, we participate in the demolition of our own political order. To be sure, we might feel that we are doing nothing more than going along with everyone else. This is true - and it is what Arendt described as the devolution of a society into a "mob." We can try to solve this problem individually, by securing our own computers; we can also try to solve it collectively, by supporting, for example, organisations that are concerned with human rights.
”
”
Timothy Snyder (On Tyranny: Twenty Lessons from the Twentieth Century)
“
For me, I will take freedom over security and I will take security over convenience, and I will do so because I know that a world without failure is a world without freedom. A world without the possibility of sin is a world
without the possibility of righteousness. A world without the possibility of crime is a world where you cannot prove you are not a criminal. A technology that can give you everything you want is a technology that can take away everything that you have. At some point, in the near future, one of us security geeks will have to say that there comes a point at which safety is not safe.
”
”
Dan Geer
“
Here’s a fact for you: In 1995, according to the Washington Post, computer hackers successfully breached the Pentagon’s security systems 161,000 times. That works out to eighteen illicit entries every hour around the clock, one every 3.2 minutes. Oh, I know what you’re going to say. This sort of thing could happen to any monolithic defense establishment with the fate of the earth in its hands. After all, if you stockpile a massive nuclear arsenal, it’s only natural that people are going to want to go in and have a look around, maybe see what all those buttons marked “Detonate” and “Code Red” mean. It’s only human nature.
”
”
Bill Bryson (I'm a Stranger Here Myself: Notes on Returning to America After 20 Years Away)
“
Security is a big and serious deal, but it’s also largely a solved problem. That’s why the average person is quite willing to do their banking online and why nobody is afraid of entering their credit card number on Amazon. At 37signals, we’ve devised a simple security checklist all employees must follow: 1. All computers must use hard drive encryption, like the built-in FileVault feature in Apple’s OS X operating system. This ensures that a lost laptop is merely an inconvenience and an insurance claim, not a company-wide emergency and a scramble to change passwords and worry about what documents might be leaked. 2. Disable automatic login, require a password when waking from sleep, and set the computer to automatically lock after ten inactive minutes. 3. Turn on encryption for all sites you visit, especially critical services like Gmail. These days all sites use something called HTTPS or SSL. Look for the little lock icon in front of the Internet address. (We forced all 37signals products onto SSL a few years back to help with this.) 4. Make sure all smartphones and tablets use lock codes and can be wiped remotely. On the iPhone, you can do this through the “Find iPhone” application. This rule is easily forgotten as we tend to think of these tools as something for the home, but inevitably you’ll check your work email or log into Basecamp using your tablet. A smartphone or tablet needs to be treated with as much respect as your laptop. 5. Use a unique, generated, long-form password for each site you visit, kept by password-managing software, such as 1Password.§ We’re sorry to say, “secretmonkey” is not going to fool anyone. And even if you manage to remember UM6vDjwidQE9C28Z, it’s no good if it’s used on every site and one of them is hacked. (It happens all the time!) 6. Turn on two-factor authentication when using Gmail, so you can’t log in without having access to your cell phone for a login code (this means that someone who gets hold of your login and password also needs to get hold of your phone to login). And keep in mind: if your email security fails, all other online services will fail too, since an intruder can use the “password reset” from any other site to have a new password sent to the email account they now have access to. Creating security protocols and algorithms is the computer equivalent of rocket science, but taking advantage of them isn’t. Take the time to learn the basics and they’ll cease being scary voodoo that you can’t trust. These days, security for your devices is just simple good sense, like putting on your seat belt.
”
”
Jason Fried (Remote: Office Not Required)
“
I don't know the odds of an earthquake, but I can imagine how San Francisco might be affected by one. This idea that in order to make a decision you need to focus on the consequences (which you can know) rather than the probability (which you can't know) is the central idea of uncertainty. Much of my life is based on it.
You can build an overall theory of decision making on this idea. All you have to do is mitigate the consequences. As I said, if my portfolio is exposed to a market crash, the odds of which I can't compute, all I have to do is buy insurance, or get out and invest the amounts I am not willing to ever lose in less risky securities.
”
”
Nassim Nicholas Taleb
“
Some of the ideas were silly, thanks to Molly, who, despite being upset with Jones, was still trying to keep the mood upbeat.
They had boxes and boxes of copy paper. They could make thousands of paper airplanes with the message, “Help!” written on them and fly them out the windows.
Could they try to blast their way out of the tunnel? Maybe dig an alternative route to the surface? It seemed like a long shot, worth going back in there and taking a look at the construction—which Jones had done only to come back out, thumbs down.
Two of them could create a diversion, while the other to took the Impala and crashed their way out of the garage.
At which point the Impala—and everyone in it—would be hit by hundreds of bullets.
That one—along with taking their chances with the far fewer number of soldiers lying in wait at the end of the escape tunnel—went into the bad idea file.
Molly had thought that they could sing karaoke. Emilio had a Best of Whitney Houston karaoke CD. Their renditions of I Will Always Love you, she insisted, would cause the troops to break rank and run away screaming.
Except the karaoke machine was powered by electricity, which they were trying to use only for the computer and the security monitors, considering—at the time—that the generator was almost out of gasoline.
Yeah, that was why it was a silly idea.
It did, however, generate a lot of desperately needed laughter.
”
”
Suzanne Brockmann (Breaking Point (Troubleshooters, #9))
“
By tracing the early history of USCYBERCOM it is possible to understand some of the reasons why the military has focused almost completely on network defense and cyber attack while being unaware of the need to address the vulnerabilities in systems that could be exploited in future conflicts against technologically capable adversaries. It is a problem mirrored in most organizations. The network security staff are separate from the endpoint security staff who manage desktops through patch and vulnerability management tools and ensure that software and anti-virus signatures are up to date. Meanwhile, the development teams that create new applications, web services, and digital business ventures, work completely on their own with little concern for security. The analogous behavior observed in the military is the creation of new weapons systems, ISR platforms, precision targeting, and C2 capabilities without ensuring that they are resistant to the types of attacks that USCYBERCOM and the NSA have been researching and deploying. USCYBERCOM had its genesis in NCW thinking. First the military worked to participate in the information revolution by joining their networks together. Then it recognized the need for protecting those networks, now deemed cyberspace. The concept that a strong defense requires a strong offense, carried over from missile defense and Cold War strategies, led to a focus on network attack and less emphasis on improving resiliency of computing platforms and weapons systems.
”
”
Richard Stiennon (There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar)
“
We've got two kinds of language in our heads. The kind we're using now is
acquired. It patterns our brains as we're learning it. But there's also a
tongue that's based in the deep structures of the brain, that everyone shares.
These structures consist of basic neural circuits that have to exist in order to
allow our brains to acquire higher languages."
"Linguistic infrastructure," Uncle Enzo says.
"Yeah. I guess 'deep structure' and 'infrastructure' mean the same thing.
Anyway, we can access those parts of the brain under the right conditions.
Glossolalia -- speaking in tongues -- is the output side of it, where the deep
linguistic structures hook into our tongues and speak, bypassing all the higher,
acquired languages. Everyone's known that for some time."
"You're saying there's an input side, too?" Ng says.
"Exactly. It works in reverse. Under the right conditions, your ears -- or
eyes -- can tie into the deep structures, bypassing the higher language
functions. Which is to say, someone who knows the right words can speak words,
or show you visual symbols, that go past all your defenses and sink right into
your brainstem. Like a cracker who breaks into a computer system, bypasses all
the security precautions, and plugs himself into the core, enabling him to exert
absolute control over the machine."
"In that situation, the people who own the computer are helpless," Ng says.
"Right. Because they access the machine at a higher level, which has now been
overridden. In the same sense, once a neurolinguistic hacker plugs into the
deep structures of our brain, we can't get him out -- because we can't even
control our own brain at such a basic level.
”
”
Neal Stephenson (Snow Crash)
“
And I will read part, as much as time allows in the second half, of the new issue of Computer and Automation, the November 1971 issue. And the statement above the article is on the assassination of President Kennedy. It’s the pattern of coup d’état and public deception. And it begins with this quotation of author Edmund Berkeley. We must begin to recognize history as it is happening to us. We can no longer toy with illusion. Our war adventures in Asia are not related to national security in any rational sense. A coup d’état took place in the United States on November 22, 1963, when President John F. Kennedy was assassinated. That came eight years after I began my research. People talk about never having fascism in this country or never being overthrown – they have already been overthrown, and they’re not aware of it.
”
”
Mae Brussell (The Essential Mae Brussell: Investigations of Fascism in America)
“
Yuppieville. The fourteenth floor of Lock-Horne Investments & Securities reminded Myron of a medieval fortress. There was the vast space in the middle, and a thick, formidable wall—the big producers’ offices—safeguarding the perimeter. The open area housed hundreds of mostly men, young men, combat soldiers easily sacrificed and replaced, a seemingly endless sea of them, bobbing and blending into the corporate-gray carpet, the identical desks, the identical rolling chairs, the computer terminals, the telephones, the fax machines. Like soldiers they wore uniforms—white button-down shirts, suspenders, bright ties strangling carotid arteries, suit jackets draped across the backs of the identical rolling chairs. There were loud noises, screams, rings, even something that sounded like death cries. Everyone was in motion. Everyone was scattering, panicked, under constant attack. Yes,
”
”
Harlan Coben (Drop Shot (Myron Bolitar, #2))
“
He was almost at his door when Vik’s earsplitting shriek resounded down the corridor. Tom was glad for the excuse to sprint back toward him. “Vik?”
He reached Vik’s doorway as Vik was backing out of it. “Tom,” he breathed, “it’s an abomination.”
Confused, Tom stepped past him into the bunk. Then he gawked, too.
Instead of a standard trainee bunk of two small beds with drawers underneath them and totally bare walls, Vik’s bunk was virtually covered with images of their friend Wyatt Enslow. There were posters all over the wall with Wyatt’s solemn, oval face on them. She wore her customary scowl, her dark eyes tracking their every move through the bunk. There was a giant marble statue of a sad-looking Vik with a boot on top of its head. The Vik statue clutched two very, very tiny hands together in a gesture of supplication, its eyes trained upward on the unseen stomper, an inscription at its base, WHY, OH WHY, DID I CROSS WYATT ENSLOW?
Tom began to laugh.
“She didn’t do it to the bunk,” Vik insisted. “She must’ve done something to our processors.”
That much was obvious. If Wyatt was good at anything, it was pulling off tricks with the neural processors, which could pretty much be manipulated to show them anything. This was some sort of illusion she was making them see, and Tom heartily approved.
He stepped closer to the walls to admire some of the photos pinned there, freeze-frames of some of Vik’s more embarrassing moments at the Spire: that time Vik got a computer virus that convinced him he was a sheep, and he’d crawled around on his hands and knees chewing on plants in the arboretum. Another was Vik gaping in dismay as Wyatt won the war games.
“My hands do not look like that.” Vik jabbed a finger at the statue and its abnormally tiny hands. Wyatt had relentlessly mocked Vik for having small, delicate hands ever since Tom had informed her it was the proper way to counter one of Vik’s nicknames for her, “Man Hands.” Vik had mostly abandoned that nickname for “Evil Wench,” and Tom suspected it was due to the delicate-hands gibe.
Just then, Vik’s new roommate bustled into the bunk.
He was a tall, slim guy with curly black hair and a pointy look to his face. Tom had seen him around, and he called up his profile from memory:
NAME: Giuseppe Nichols
RANK: USIF, Grade IV Middle, Alexander Division
ORIGIN: New York, NY
ACHIEVEMENTS: Runner-up, Van Cliburn International Piano Competition
IP: 2053:db7:lj71::291:ll3:6e8
SECURITY STATUS: Top Secret LANDLOCK-4
Giuseppe must’ve been able to see the bunk template, too, because he stuttered to a stop, staring up at the statue. “Did you really program a giant statue of yourself into your bunk template? That’s so narcissistic.”
Tom smothered his laughter. “Wow. He already has your number, man.”
Vik shot him a look of death as Tom backed out of the bunk.
”
”
S.J. Kincaid
“
He lifted an eyebrow at his self-indulgence, made a note to himself to spend a little extra time in the Disciplines that evening, and moved to the terminal. Its chiming stopped as he touched it: another second and the terminal had read his EEG through his skin, recognizing the pattern. The screen filled with column on column of blue symbology, a list of calls to the flat since he left. Most of them were unimportant compared to the one name and commcode at the far right-hand side of the list, the most recent, the one message that had caused the “urgent” chime. He had rather been hoping that the embassy would not need him further today: but hope was illogical. Life was about dealing with what was. He touched the screen, and the computer dialed the code. He waited a moment or so before speaking. The link was scrambled, and before communications began, the computer had to agree with the one on the other end as to the eighty-digit “satchel” crypton they would use to keep the link secure. He had the utmost confidence in the ciphering process. Ninety-six standard years before, he had invented it. He
”
”
Diane Duane (Spock's World (Star Trek: The Original Series))
“
home in Pahrump, Nevada, where he played the penny slot machines and lived off his social security check. He later claimed he had no regrets. “I made the best decision for me at the time. Both of them were real whirlwinds, and I knew my stomach and it wasn’t ready for such a ride.” • • • Jobs and Wozniak took the stage together for a presentation to the Homebrew Computer Club shortly after they signed Apple into existence. Wozniak held up one of their newly produced circuit boards and described the microprocessor, the eight kilobytes of memory, and the version of BASIC he had written. He also emphasized what he called the main thing: “a human-typable keyboard instead of a stupid, cryptic front panel with a bunch of lights and switches.” Then it was Jobs’s turn. He pointed out that the Apple, unlike the Altair, had all the essential components built in. Then he challenged them with a question: How much would people be willing to pay for such a wonderful machine? He was trying to get them to see the amazing value of the Apple. It was a rhetorical flourish he would use at product presentations over the ensuing decades. The audience was not very impressed. The Apple had a cut-rate microprocessor, not the Intel 8080. But one important person stayed behind to hear more. His name was Paul Terrell, and in 1975
”
”
Walter Isaacson (Steve Jobs)
“
Despite Imbry's demurrals, Ghyll never missed an opportunity to expound on his creed, and was now again launched upon a lecture. "Life, after all," he said, "is but a succession of greater and lesser probabilities—a melange of maybes, as the Grand Prognosticator so aptly put it. Look at you, here in the supposed security of Bolly's Snug, supping and swilling with nary a care. Yet can you deny that a fragment of some asteroid, shattered in a collision far out in thither space back when humankind was still adrip with the primordial slime, having spent millions of years looming toward us, might now, its moment come, lance down through the atmosphere at immense speed and obliterate you where you stand?" "I do not deny the possibility," said Imbry. "I say that the likelihood is remote." "Yet still it exists! And if we couple that existence to a divine appetite for upsetting mortal plans—" "I can think of other, less far-fetched scenarios that might lead to the obliteration of someone in this room," said the thief. He accompanied the remark with an unwinking stare that ought to have caused Ghyll to stop to consider that, though Imbry was so corpulent as to be almost spherical, he was capable of sudden and conclusive acts of violence. And that consideration would have led, in turn, to a change of subject. But the Computant was too deeply set in his philosophy to take note of how others responded to it, and continued to discourse on abstruse concerns.
”
”
Gordon van Gelder (Fantasy & Science Fiction, November/December 2011)
“
Bush’s description of how basic research provides the seed corn for practical inventions became known as the “linear model of innovation.” Although subsequent waves of science historians sought to debunk the linear model for ignoring the complex interplay between theoretical research and practical applications, it had a popular appeal as well as an underlying truth. The war, Bush wrote, had made it “clear beyond all doubt” that basic science—discovering the fundamentals of nuclear physics, lasers, computer science, radar—“is absolutely essential to national security.” It was also, he added, crucial for America’s economic security. “New products and new processes do not appear full-grown. They are founded on new principles and new conceptions, which in turn are painstakingly developed by research in the purest realms of science. A nation which depends upon others for its new basic scientific knowledge will be slow in its industrial progress and weak in its competitive position in world trade.” By the end of his report, Bush had reached poetic heights in extolling the practical payoffs of basic scientific research: “Advances in science when put to practical use mean more jobs, higher wages, shorter hours, more abundant crops, more leisure for recreation, for study, for learning how to live without the deadening drudgery which has been the burden of the common man for past ages.”9 Based on this report, Congress established the National Science Foundation.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Grabbing my hair and pulling it to the point my skull throbs, I rock back and forth while insanity threatens to destroy my mind completely. Father finally did what Lachlan started. Destroyed my spirit. The angel is gone. The monster has come and killed her. Lachlan Sipping his whiskey, Shon gazes with a bored expression at the one-way mirror as Arson lights the match, grazing the skin of his victim with it as the man convulses in fear. “Show off,” he mutters, and on instinct, I slap the back of his head. He rubs it, spilling the drink. “The fuck? We are wasting time, Lachlan. Tell him to speed up. You know if you let him, he can play for hours.” All in good time, we don’t need just a name. He is saving him for a different kind of information that we write down as Sociopath types furiously on his computer, searching for the location and everything else using FBI databases. “Bingo!” Sociopath mutters, picking up the laptop and showing the screen to me. “It’s seven hours away from New York, in a deserted location in the woods. The land belongs to some guy who is presumed dead and the man accrued the right to build shelters for abused women. They actually live there as a place of new hope or something.” Indeed, the center is advertised as such and has a bunch of stupid reviews about it. Even the approval of a social worker, but then it doesn’t surprise me. Pastor knows how to be convincing. “Kids,” I mutter, fisting my hands. “Most of them probably have kids. He continues to do his fucked-up shit.” And all these years, he has been under my radar. I throw the chair and it bounces off the wall, but no one says anything as they feel the same. “Shon, order a plane. Jaxon—” “Yeah, my brothers will be there with us. But listen, the FBI—” he starts, and I nod. He takes a beat and quickly sends a message to someone on his phone while I bark into the microphone. “Arson, enough with the bullshit. Kill him already.” He is of no use to us anyway. Arson looks at the wall and shrugs. Then pours gas on his victim and lights up the match simultaneously, stepping aside as the man screams and thrashes on the chair, and the smell of burning flesh can be sensed even here. Arson jogs to a hose, splashing water over him. The room is designed security wise for this kind of torture, since fire is one of the first things I taught. After all, I’d learned the hard way how to fight with it. “On the plane, we can adjust the plan. Let’s get moving.” They spring into action as I go to my room to get a specific folder to give to Levi before I go, when Sociopath’s hand stops me, bumping my shoulder. “Is this a suicide mission for you?” he asks, and I smile, although it lacks any humor. My friend knows everything. Instead of answering his question, I grip his shoulder tight, and confide, “Valencia is entrusted to you.” We both know that if I want to destroy Pastor, I have to die with him. This revenge has been twenty-three years in the making, and I never envisioned a different future. This path always leads to death one way or another, and the only reason I valued my life was because I had to kill him. Valencia will be forever free from the evils that destroyed her life. I’ll make sure of it. Once upon a time, there was an angel. Who made the monster’s heart bleed.
”
”
V.F. Mason (Lachlan's Protégé (Dark Protégés #1))
“
Back in 2015, a volunteer group called Bitnation set up something called the Blockchain Emergency ID. There’s not a lot of data on the project now, BE-ID - used public-key cryptography to generate unique IDs for people without their documents. People could verify their relations, that these people belonged to their family, and so on. It was a very modern way of maintaining an ID; secure, fast, and easy to use. Using the Bitcoin blockchain, the group published all these IDs on to a globally distributed public ledger, spread across the computers of every single Bitcoin user online - hundreds of thousands of users, in those times. Once published, no government could undo it; the identities would float around in the recesses of the Internet. As long as the network remained alive, every person's identity would remain intact, forever floating as bits and bytes between the nations: no single country, government or company could ever deny them this. “That was, and I don't say this often, the fucking bomb,” said Common, In one fell swoop, identities were taken outside government control. BE-ID, progressing in stages, became the refugees' gateway to social assistance and financial services. First it became compliant with UN guidelines. Then it was linked to a VISA card. And thus out of the Syrian war was something that looked like it could solve global identification forever. Experts wrote on its potential. No more passports. No more national IDs. Sounds familiar? Yes, that’s the United Nations Identity in a nutshell. Julius Common’s first hit - the global identity revolution that he sold first to the UN, and then to almost every government in the world - was conceived of when he was a teenager.
”
”
Yudhanjaya Wijeratne (Numbercaste)
“
CYBERPOWER is now a fundamental fact of global life. In political, economic, and military affairs, information and information technology provide and support crucial elements of operational activities. U.S. national security efforts have begun to incorporate cyber into strategic calculations. Those efforts, however, are only a beginning. The critical conclusion...is that the United States must create an effective national and international strategic framework for the development and use of cyber as part of an overall national security strategy.
Such a strategic framework will have both structural and geopolitical elements. Structural activities will focus on those parts of cyber that enhance capabilities for use in general. Those categories include heightened security, expanded development of research and human capital, improved governance, and more effective organization. Geopolitical activities will focus on more traditional national security and defense efforts. Included in this group are sophisticated development of network-centric operations; appropriate integrated planning of computer network attack capabilities; establishment of deterrence doctrine that incorporates cyber; expansion of effective cyber influence capabilities; carefully planned incorporation of cyber into military planning (particularly stability operations); establishment of appropriate doctrine, education, and training regarding cyber by the Services and nonmilitary elements so that cyber can be used effectively in a joint and/or multinational context; and generation of all those efforts at an international level, since cyber is inherently international and cannot be most effectively accomplished without international partners.
”
”
Franklin D. Kramer (Cyberpower and National Security)
“
Evan was attracted to technology early on, building his first computer in sixth grade and experimenting with Photoshop in the Crossroads computer lab. He would later describe the computer teacher, Dan, as his best friend. Evan dove into journalism as well, writing for the school newspaper, Crossfire. One journalism class required students to sell a certain amount of advertising for Crossfire as part of their grade. Evan walked around the neighborhood asking local businesses to buy ads; once he had exceeded his sales goals, he helped coach his peers on how to pitch businesses and ask adults for money. By high school, the group of 20 students Evan had started with in kindergarten had grown to around 120. Charming, charismatic, and smart, Evan threw parties at his dad’s house that were “notorious” in his words. Evan’s outsized personality could rub people the wrong way at times, but his energy, organizing skills, and enthusiasm made him an exceptional party thrower. He possessed a bravado that could be frustrating and off-putting but was great for convincing everyone that the night’s party was going to be the greatest of all time. Obsessed with the energy drink Red Bull and the lifestyle the brand cultivated, Evan talked his way into an internship at the company as a senior in high school. The job involved throwing parties and other events sponsored by Red Bull. Clarence Carter, the head of the company’s security team, would give Evan advice that would stand him well in the years to come: pay attention to who helps you clean up after the party. Later recalling the story, Evan said, “When everyone is tired and the night is over, who stays and helps out? Because those are your true friends. Those are the hard workers, the people that believe that working hard is the right thing to do.
”
”
Billy Gallagher (How to Turn Down a Billion Dollars: The Snapchat Story)
“
the absence of an ‘international standard burglar’, the nearest I know to a working classification is one developed by a U.S. Army expert [118]. Derek is a 19-year old addict. He's looking for a low-risk opportunity to steal something he can sell for his next fix. Charlie is a 40-year old inadequate with seven convictions for burglary. He's spent seventeen of the last twenty-five years in prison. Although not very intelligent he is cunning and experienced; he has picked up a lot of ‘lore’ during his spells inside. He steals from small shops and suburban houses, taking whatever he thinks he can sell to local fences. Bruno is a ‘gentleman criminal’. His business is mostly stealing art. As a cover, he runs a small art gallery. He has a (forged) university degree in art history on the wall, and one conviction for robbery eighteen years ago. After two years in jail, he changed his name and moved to a different part of the country. He has done occasional ‘black bag’ jobs for intelligence agencies who know his past. He'd like to get into computer crime, but the most he's done so far is stripping $100,000 worth of memory chips from a university's PCs back in the mid-1990s when there was a memory famine. Abdurrahman heads a cell of a dozen militants, most with military training. They have infantry weapons and explosives, with PhD-grade technical support provided by a disreputable country. Abdurrahman himself came third out of a class of 280 at the military academy of that country but was not promoted because he's from the wrong ethnic group. He thinks of himself as a good man rather than a bad man. His mission is to steal plutonium. So Derek is unskilled, Charlie is skilled, Bruno is highly skilled and may have the help of an unskilled insider such as a cleaner, while Abdurrahman is not only highly skilled but has substantial resources.
”
”
Ross J. Anderson (Security Engineering: A Guide to Building Dependable Distributed Systems)
“
Best hacking books Cell phone hacking books Cell phone hacking sites Certified ethical hacking Computer hacking Computer hacking 101 Computer hacking books Computer hacking device Computer hacking equipment Computer hacking for dummies Computer hacking forensic investigator Computer hacking forensic investigator certification Computer hacking laws Computer hacking programs Computer hacking software Computer hacking tools Ethical hacking Ethical hacking and countermeasures Ethical hacking and countermeasures 2010 Ethical hacking and countermeasures attack phases Ethical hacking and countermeasures Linux Macintosh and mobile systems Ethical hacking and countermeasures secure network infrastructures Ethical hacking and countermeasures threats and defense mechanisms Ethical hacking and countermeasures web applications and data servers Ethical hacking and network defense Ethical hacking and pentesting Ethical hacking and pentesting guide Ethical hacking books Ethical hacking certification Ethical hacking course Ethical hacking kindle Ethical hacking tools Facebook hacking sites Facebook hacking software Facebook hacking tools Free computer hacking software Free Facebook hacking sites Free hacking software Hacking Hacking electronics Hacking electronics stuff Hacking electronics torrent Hacking electronics video Hacking exposed Hacking exposed 7 Hacking exposed 8 Hacking exposed book Hacking exposed computer forensics Hacking exposed Linux Hacking exposed mobile Hacking exposed network security secrets & solutions Hacking exposed PDF Hacking exposed windows Hacking exposed wireless Hacking sites Hacking software Hacking software computer Hacking software for iPhone Hacking tools Hacking tools and techniques Hacking your education torrent How to hacking sites Online Facebook hacking sites Password hacking software What is ethical hacking?
”
”
Matt Robbins (Hacking: Perfect Hacking for Beginners: Essentials You Must Know [Version 2.0] (hacking, how to hack, hacking exposed, hacking system, hacking 101, beg ... to hacking, Hacking, hacking for dummies))
“
MAY 1 His Consistent Character In ages past you laid the foundation of the earth, and the heavens are the work of your hands. Even they will perish, but you remain forever; they will wear out like old clothing. You will change them like a garment, and they will fade away. But you are always the same; your years never end. The children of your people will live in security. Their children’s children will thrive in your presence. Psalm 102:25-28 Our world has seen more change from 1900 to the present than in all history recorded before 1900, and things continue to accelerate rapidly. As time speeds by, measured not just in minutes or seconds but in nanoseconds (billionths of a second), everything changes. Technology changes so fast in our twenty-first-century world that we can barely keep up with the upgrades on our computers. Our bodies undergo the inevitable aging process, and we witness constant upheaval in the nations of the world. Material things change and deteriorate. Even the flowers of the field and the stars in the heavens will fade away. But you, Lord, are always the same, says the psalmist in these verses. The changes in the world do not change God one bit or thwart his plans. He’s the same yesterday, today, and forever, and his love extends to the next generation and the next. This psalm reminds us that our security can’t be found in any of the things in this ever-changing world. Instead, our security is in God and his promises, including the wonderful ones in these verses: that the children and grandchildren of God’s people will live in security and will thrive in the Lord’s presence. UNCHANGING LORD, I praise you and worship you for your love and faithfulness that extend from one generation to the next. Thank you for this reminder that although our circumstances may change and the things around us pass away, you remain the same forever. Help me to find my security in your eternal sameness.
”
”
Cheri Fuller (The One Year Praying through the Bible: Experience the Power of the Bible Through Prayer (One Year Bible))
“
We began the show by asking: Who did more for the world, Michael Milken or Mother Teresa?
This seems like a no-brainer. Milken is the greedy junk-bond king. One year, his firm paid him $550 million. Then he went to jail for breaking securities laws. Mother Teresa is the nun who spent her lifetime helping the poor and died without a penny. Her good deeds live on even after her death; several thousand sisters now continue the charities she began. At first glance, of course Mother Teresa did more for the world.
But it's not so simple. Milken's selfish pursuit of profit helped a lot of people, too. Think about it: By pioneering a new way for companies to raise money, Milken created millions of jobs. The ignorant media sneered at 'junk bonds', but Milken's innovative use of them meant exciting new ideas flourished.
We now make calls on a national cellular network established by a company called McCaw Cellular, which Milken financed. And our calls are cheaper because Milken's junk bonds financed MCI. CEO Bill McGowan simply couldn't get the money anywhere else. Without Milken, MCI wouldn't have grown from 11 to 50,000 employees. CNN's 24-hour news and Ted Turner's other left-wing ventures were made possible by Milken's 'junk'.
The world's biggest toy company, Mattel, the cosmetics company Revlon, and the supermarket giant Safeway were among many rescued from bankruptcy by Milken's junk bonds. He financed more than 3,000 companies, including what are now Barnes & Noble, AOL Time Warner, Comcast, Mellon Bank, Occidental Petroleum, Jeep Eagle, Calvin Klein, Hasbro, Days Inn, 7-Eleven, and Computer Associates. Millions of people have productive employment today because of Michael Milken. (Millions of jobs is hard to believe, and when 'Greed' aired, I just said he created thousands of jobs; but later I met Milken, and he was annoyed with me because he claimed he'd created millions of jobs. I asked him to document that, to name the companies and the jobs, and he did.)
”
”
John Stossel (Give Me a Break: How I Exposed Hucksters, Cheats, and Scam Artists and Became the Scourge of the Liberal Media...)
“
Key Points: ● Transparency - Blockchain offers significant improvements in transparency compared to existing record keeping and ledgers for many industries. ● Removal of Intermediaries – Blockchain-based systems allow for the removal of intermediaries involved in the record keeping and transfer of assets. ● Decentralization – Blockchain-based systems can run on a decentralized network of computers, reducing the risk of hacking, server downtime and loss of data. ● Trust – Blockchain-based systems increase trust between parties involved in a transaction through improved transparency and decentralized networks along with removal of third-party intermediaries in countries where trust in the intermediaries doesn’t exist. ● Security – Data entered on the blockchain is immutable, preventing against fraud through manipulating transactions and the history of data. Transactions entered on the blockchain provide a clear trail to the very start of the blockchain allowing any transaction to be easily investigated and audited. ● Wide range of uses - Almost anything of value can be recorded on the blockchain and there are many companies and industries already developing blockchain-based systems. These examples are covered later in the book. ● Easily accessible technology – Along with the wide range of uses, blockchain technology makes it easy to create applications without significant investment in infrastructure with recent innovations like the Ethereum platform. Decentralized apps, smart contracts and the Ethereum platform are covered later in the book. ● Reduced costs – Blockchain-based ledgers allow for removal of intermediaries and layers of confirmation involved in transactions. Transactions that may take multiple individual ledgers, could be settled on one shared ledger, reducing the costs of validating, confirming and auditing each transaction across multiple organizations. ● Increased transaction speed – The removal of intermediaries and settlement on distributed ledgers, allows for dramatically increased transaction speeds compared to a wide range of existing systems.
”
”
Mark Gates (Blockchain: Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money. (Ultimate Cryptocurrency Book 1))
“
do you think Jesus would do if he came back to earth tonight in Bremerton?” C asked, as he spooned some rice onto his plate. “I don’t know,” I said, savoring a mouthful of Mongolian beef. “Would he come in a white robe and sandals, or the dress of this time?” C pressed on. I shrugged my shoulders, forking in the fried rice. “Would he be white, black, Asian, or maybe look like Saddam Hussein instead of Kevin Costner or Tom Cruise? What if he didn’t fit our image of him? What if he was bald? Or, for God’s sake, what if he was gay? “He wouldn’t have any cash, no MasterCard, Visa, Discover Card, or portfolio of any kind. If he went to a bank and said, ‘Hello. I’m Jesus, the son of God. I need some of those green things that say “In God We Trust” on them to buy some food and get a place to stay,’ the bank manager would say, ‘I’m sorry, but I looked in my computer and without a social security number, local address, and credit history, I can’t do anything for you. Maybe if you show me a miracle or two, I might lend you fifty dollars.’ “Where would he stay? The state park charges sixteen dollars a night. Could he go to a church and ask, ‘May I stay here? I am Jesus’? Would they believe him?” As I took a sip of my drink, I wondered just who this character was sitting across from me. Was he some angel sent to save me? Or was he, as the Rolling Stones warned in their song, Satan himself here to claim me for some sin of this life or a past life of which I had no recollection? Or was he an alien? Or was he Jesus, the Christ himself, just “messing” with me? Was I in the presence of a prophet, or just some hopped-up druggie? “‘Ask, and it will be given you; seek, and you will find; knock, and it will be opened to you.’ That’s what Jesus said. What doors would be opened to him?” he asked. “The Salvation Army—Sally’s?” I guessed. “That’s about all,” C said. “Unless he saw Tony Robbins’ TV formula to become a millionaire and started selling miracles to the rich at twenty-thousand dollars a pop. He could go on Regis, Oprah, maybe get an interview with Bill Moyers, or go on Nightline. Or joust with the nonbelievers on Jerry Springer! Think of the book deals! He
”
”
Richard LeMieux (Breakfast at Sally's)
“
If Jim was back at the imaginary dinner party, trying to explain what he did for a living, he'd have tried to keep it simple: clearing involved everything that took place between the moment someone started at trade — buying or selling a stock, for instance — and the moment that trade was settled — meaning the stock had officially and legally changed hands.
Most people who used online brokerages thought of that transaction as happening instantly; you wanted 10 shares of GME, you hit a button and bought 10 shares of GME, and suddenly 10 shares of GME were in your account. But that's not actually what happened. You hit the Buy button, and Robinhood might find you your shares immediately and put them into your account; but the actual trade took two days to complete, known, for that reason, in financial parlance as 'T+2 clearing.'
By this point in the dinner conversation, Jim would have fully expected the other diners' eyes to glaze over; but he would only be just beginning. Once the trade was initiated — once you hit that Buy button on your phone — it was Jim's job to handle everything that happened in that in-between world. First, he had to facilitate finding the opposite partner for the trade — which was where payment for order flow came in, as Robinhood bundled its trades and 'sold' them to a market maker like Citadel. And next, it was the clearing brokerage's job to make sure that transaction was safe and secure. In practice, the way this worked was by 10:00 a.m. each market day, Robinhood had to insure its trade, by making a cash deposit to a federally regulated clearinghouse — something called the Depository Trust & Clearing Corporation, or DTCC. That deposit was based on the volume, type, risk profile, and value of the equities being traded. The riskier the equities — the more likely something might go wrong between the buy and the sell — the higher that deposit might be.
Of course, most all of this took place via computers — in 2021, and especially at a place like Robinhood, it was an almost entirely automated system; when customers bought and sold stocks, Jim's computers gave him a recommendation of the sort of deposits he could expect to need to make based on the requirements set down by the SEC and the banking regulators — all simple and tidy, and at the push of a button.
”
”
Ben Mezrich (The Antisocial Network: The GameStop Short Squeeze and the Ragtag Group of Amateur Traders That Brought Wall Street to Its Knees)
“
But come on—tell me the proposal story, anyway.”
She raised an eyebrow. “Really?”
“Really. Just keep in mind that I’m a guy, which means I’m genetically predisposed to think that whatever mushy romantic tale you’re about to tell me is highly cheesy.”
Rylann laughed. “I’ll keep it simple, then.” She rested her drink on the table. “Well, you already heard how Kyle picked me up at the courthouse after my trial. He said he wanted to surprise me with a vacation because I’d been working so hard, but that we needed to drive to Champaign first to meet with his former mentor, the head of the U of I Department of Computer Sciences, to discuss some project Kyle was working on for a client.” She held up a sparkly hand, nearly blinding Cade and probably half of the other Starbucks patrons. “In hindsight, yes, that sounds a little fishy, but what do I know about all this network security stuff? He had his laptop out, there was some talk about malicious payloads and Trojan horse attacks—it all sounded legitimate enough at the time.”
“Remind me, while I’m acting U.S. attorney, not to assign you to any cybercrime cases.”
“Anyhow. . . we get to Champaign, which as it so happens, is where Kyle and I first met ten years ago. And the limo turns onto the street where I used to live while in law school, and Kyle asks the driver to pull over because he wants to see the place for old time’s sake. So we get out of the limo, and he’s making this big speech about the night we met and how he walked me home on the very sidewalk we were standing on—I’ll fast-forward here in light of your aversion to the mushy stuff—and I’m laughing to myself because, well, we’re standing on the wrong side of the street. So naturally, I point that out, and he tells me that nope, I’m wrong, because he remembers everything about that night, so to prove my point I walk across the street to show him and”—she paused here— “and I see a jewelry box, sitting on the sidewalk, in the exact spot where we had our first kiss. Then I turn around and see Kyle down on one knee.”
She waved her hand, her eyes a little misty. “So there you go. The whole mushy, cheesy tale. Gag away.”
Cade picked up his coffee cup and took a sip. “That was actually pretty smooth.”
Rylann grinned. “I know. Former cyber-menace to society or not, that man is a keeper
”
”
Julie James (Love Irresistibly (FBI/US Attorney, #4))
“
I WANT TO end this list by talking a little more about the founding of Pixar University and Elyse Klaidman’s mind-expanding drawing classes in particular. Those first classes were such a success—of the 120 people who worked at Pixar then, 100 enrolled—that we gradually began expanding P.U.’s curriculum. Sculpting, painting, acting, meditation, belly dancing, live-action filmmaking, computer programming, design and color theory, ballet—over the years, we have offered free classes in all of them. This meant spending not only the time to find the best outside teachers but also the real cost of freeing people up during their workday to take the classes. So what exactly was Pixar getting out of all of this? It wasn’t that the class material directly enhanced our employees’ job performance. Instead, there was something about an apprentice lighting technician sitting alongside an experienced animator, who in turn was sitting next to someone who worked in legal or accounting or security—that proved immensely valuable. In the classroom setting, people interacted in a way they didn’t in the workplace. They felt free to be goofy, relaxed, open, vulnerable. Hierarchy did not apply, and as a result, communication thrived. Simply by providing an excuse for us all to toil side by side, humbled by the challenge of sketching a self-portrait or writing computer code or taming a lump of clay, P.U. changed the culture for the better. It taught everyone at Pixar, no matter their title, to respect the work that their colleagues did. And it made us all beginners again. Creativity involves missteps and imperfections. I wanted our people to get comfortable with that idea—that both the organization and its members should be willing, at times, to operate on the edge. I can understand that the leaders of many companies might wonder whether or not such classes would truly be useful, worth the expense. And I’ll admit that these social interactions I describe were an unexpected benefit. But the purpose of P.U. was never to turn programmers into artists or artists into belly dancers. Instead, it was to send a signal about how important it is for every one of us to keep learning new things. That, too, is a key part of remaining flexible: keeping our brains nimble by pushing ourselves to try things we haven’t tried before. That’s what P.U. lets our people do, and I believe it makes us stronger.
”
”
Ed Catmull (Creativity, Inc.: an inspiring look at how creativity can - and should - be harnessed for business success by the founder of Pixar)
“
told my people that I wanted only the best, whatever it took, wherever they came from, whatever it cost. We assembled thirty people, the brightest cybersecurity minds we have. A few are on loan, pursuant to strict confidentiality agreements, from the private sector—software companies, telecommunications giants, cybersecurity firms, military contractors. Two are former hackers themselves, one of them currently serving a thirteen-year sentence in a federal penitentiary. Most are from various agencies of the federal government—Homeland Security, CIA, FBI, NSA. Half our team is devoted to threat mitigation—how to limit the damage to our systems and infrastructure after the virus hits. But right now, I’m concerned with the other half, the threat-response team that Devin and Casey are running. They’re devoted to stopping the virus, something they’ve been unable to do for the last two weeks. “Good morning, Mr. President,” says Devin Wittmer. He comes from NSA. After graduating from Berkeley, he started designing cyberdefense software for clients like Apple before the NSA recruited him away. He has developed federal cybersecurity assessment tools to help industries and governments understand their preparedness against cyberattacks. When the major health-care systems in France were hit with a ransomware virus three years ago, we lent them Devin, who was able to locate and disable it. Nobody in America, I’ve been assured, is better at finding holes in cyberdefense systems or at plugging them. “Mr. President,” says Casey Alvarez. Casey is the daughter of Mexican immigrants who settled in Arizona to start a family and built up a fleet of grocery stores in the Southwest along the way. Casey showed no interest in the business, taking quickly to computers and wanting to join law enforcement. When she was a grad student at Penn, she got turned down for a position at the Department of Justice. So Casey got on her computer and managed to do what state and federal authorities had been unable to do for years—she hacked into an underground child-pornography website and disclosed the identities of all the website’s patrons, basically gift-wrapping a federal prosecution for Justice and shutting down an operation that was believed to be the largest purveyor of kiddie porn in the country. DOJ hired her on the spot, and she stayed there until she went to work for the CIA. She’s been most recently deployed in the Middle East with US Central Command, where she intercepts, decodes, and disrupts cybercommunications among terrorist groups. I’ve been assured that these two are, by far, the best we have. And they are about to meet the person who, so far, has been better. There is a hint of reverence in their expressions as I introduce them to Augie. The Sons of Jihad is the all-star team of cyberterrorists, mythical figures in that world. But I sense some competitive fire, too, which will be a good thing.
”
”
Bill Clinton (The President Is Missing)
“
Like Felicity they methodically checked the house office, safe and family bank account details and financial affairs. Angelina then had Inspector Mick bug the boys’ homes, cars and offices and with the information she acquired came knowledge and contacts. She wrote a programme called listen, it saved all conversations digitally and converted it to text into a computer file in a remote location not traceable to her or anybody at 3WW but it recorded all his illicit dealings and it gave her valuable information. She hacked into their individual MIS computer systems and sent spyware via e-mail called virus protection free download and once opened it went through their c drive, all files on their computers, and copied all files to a ip address of a remote computer of Angelina’s request, in a phantom company named Borrow. All data was heavily encrypted and deleted after access and storage was onto an external hard drive storage box, deleting the electronic footpath. The spyware recorded their strokes on the keyboard and Angelina was able to secure even their banking pins and passwords and all their computer passwords. She had a brilliant computer mind, wasted in librarianship
”
”
Annette J. Dunlea
“
Apple’s announcement that it was teaming up with IBM raised a few eyebrows. The pair will create apps for businesses that draw on Apple’s functionality and IBM’s cloud-computing and security expertise. It is Apple’s first significant thrust into corporate services and amounts to a sea change in its philosophy; Steve Jobs once described IBM as representing the “computer Dark Ages”.
”
”
Anonymous
“
That means that a BUMMER company can build a model of you in software— and control what you see in a manipulative feed— by running programs exclusively on their own computers. Those computers are placed in super-secure locations you’ll never visit. Their software is super-hyper secret. Every other kind of file has been breached by hackers, but not the search or feed algorithms of the big BUMMER companies. The secret code to manipulate you is guarded like crown jewels.
Lanier, Jaron. Ten Arguments for Deleting Your Social Media Accounts Right Now (Posición en Kindle1277-1280). Henry Holt and Co.. Edición de Kindle.
”
”
Lanier, Jaron
“
on as you learn more complex hacks and tests, you will need a target machines suited for such hacks. The best way to learn to hack Linux systems is to download and install the Metasploitable Linux distribution. The Metasploitable distro is purposefully made to incorporate vulnerabilities that learners like yourself can use for security testing and hacking purposes. The best part is that you can set it up to boot just like an operating system you use for your everyday computing needs or you can set it up in VirtualBox or VMware Workstation platforms. Using Metasploitable Linux OS for your hacking practice is the best way to understand more about the Linux infrastructure, security setup, and how to discover and exploit its vulnerabilities. You can read the documentation of Metasploitable and download the installation ISO from Rapid 7
”
”
Code Addicts (THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking. Including detailed step-by-step guides and practical demonstrations.)
“
need to download and install Python, get the recent most stable version from python.org and install it on your computer. If you already have Python installed on your Linux computer, do not uninstall the older 2.x as this may break your operating system. Instead, install the latest version alongside it. You may be required to use the command python3 and not python to initialize the interpreter though. All the information you need is provided on the documentation page of the Python.org website. We recommend you take the time to read the ‘Beginners Guide’ if you are still new to Python. Practical hacking: Free online hacking practice servers There is a saying in the world of information security that the best defense is a good offense. This is what has inspired many cyber security companies to make available deliberately vulnerable websites and servers to encourage developers, auditors, pentesters, system admins, and security professionals to practice their hacking skills online.
”
”
Code Addicts (THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking. Including detailed step-by-step guides and practical demonstrations.)
“
In the current business scenario, it is imperative for all the business persons to take efficient Backup Thunderbird Mac so that they don’t have to lose their precious data permanently due to various security hazards. So, if you are also looking for an alternative for doing so, then Inventpure’s Mail Backup X is the best solution for you. This tool has an incremental backup system which means that it is smart enough to skip those files whose backup has been taken in the previous mail backup proceedings. Moreover, there will be no repetition of the data and users can locate them with complete ease. Also, the tool works independently as it is based on high-level automation which can accomplish the entire task automatically by itself. Users don’t have to participate in the software while backup proceedings are going on.
Some Advanced Features Of Mail Backup X Are As Listed Below:
• The Users Do Not Know How To Backup Thunderbird Email Can Also Use Mail Backup X, Effectively:
This tool is designed for everybody to use it. In simple words, users having basic knowledge of computers can also Backup Thunderbird Mac without any hassles. The system generates on-screen wizards at every step to assist the users. Such instructions are written in a simplified and lucid form so that professionals, as well as the novice users, can understand them with ease.
• Download The Free Demo Of Mail Backup X Take Unlimited Thunderbird Backup Without Paying Any Cost:
The company has launched the 15 days free demo trial for those users who have doubts relating to its performance. The company has not locked any of its features so that users can have a bright idea about its performance. During the free trial period, Users can export up to 10 files in one process. Limited exportation of files is the only constraint of free demo version; if you want to break this restriction, you should buy its paid license package for a lifetime.
• Mail Backup X Can Also Play The Role Of Email Conversion Tool With Great Perfection:
This email backup software has advanced data conversion engine that is mostly used by professional conversion tools. Through this, users can convert any mail to any file format that is supported by almost all the major email clients. It will come up with complete, appropriate and 100% accurate results with zero file damages. Thus, users do not need to purchase additional data converter; Mail Backup X can flawlessly restore their email archives in the format of their choice without any compatibility issues.
• Mail Backup X Come Up With Advanced Emailing Services Which Makes Your Thunderbird Email Backup Process A Piece Of Cake:
Inventpure’s Mail Backup X not only takes mail backups from all the major email clients like Outlook, Thunderbird, Apple Mail, etc. but also supports IMAP and POP services by directly operating on your Mac system. More than that, it can save your emails in PDF format for quick conversion from soft copies into hard copies.
”
”
Maddy Roby
“
But if everyone starts using Bitcoin, government’s ability to tax and spend will diminish: healthcare, education, and social security will suffer. The things that hold democracies together, and provide support for the most in need. Societies cannot be broken and fixed like computer code, nor do they follow predictable mathematical rules.
”
”
Jamie Bartlett (The Dark Net: Inside the Digital Underworld)
“
Kali Linux: The hacker’s toolbox Frankly speaking, learning and practicing to become a proficient hacker is not as easy as becoming a software developer. This course takes you through the initial steps of discovering hidden vulnerabilities and beating sophisticated security systems. It demands sophistication and creativity among other skills. It goes without saying that Linux is the most preferred operating system for daily use by programmers, hackers, and other computer professionals. This is because of the incredible control the operating system accords the user. If you are new to Linux and are looking to learn all the basics and how to make it work for you, then Kali Linux may not be the ideal starting point for you. It is recommended that you learn the basics with a Ubuntu or Debian-based operating system instead. Having said that, you will find it practical to follow the instructions on how to use Kali for specific hacking purposes in this book whether this will be your first interaction with the OS or you have experience with Linux.
”
”
Code Addicts (THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking. Including detailed step-by-step guides and practical demonstrations.)
“
contained a designer virus engineered to access NCTC's computer network. The virus would install a backdoor into the system for the waiting cyber-ops team, while covering its own tracks with the latest generation rootkit software. Once the team had access to the system, they would download a more sophisticated and robust kernel-mode rootkit to conceal their direct access to the operating system. Since kernel-mode rootkits operated at the same security level as the operating system itself, they were difficult to detect and nearly impossible to remove without rebooting the entire system.
”
”
Steven Konkoly (The Black Flagged Thriller Series Boxset Books 2-4 (The Black Flagged Series #2-4))
“
Yet “unhackable” is clearly what we need future AI systems to be before we put them in charge of, say, critical infrastructure or weapons systems, so the growing role of AI in society keeps raising the stakes for computer security.
”
”
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
“
Il fattore umano è l'anello più debole della sicurezza
”
”
Kevin D. Mitnick (The Art of Deception: Controlling the Human Element of Security)
“
If you create your “account” e.g. ICO Address with the project, make sure that you are on the right website. Scammers create fake websites which look similar to the original ICO Project page but send the money to the scammers. In rare cases, it also happens that the original Web server of the ICO project is hacked and the receiving address changed to the account of the hackers. So it is best to register with the site and copy the ICO address to your computer (for example in a word file) and compare it to the ICO address on the website a day later to check if it is the same. If it is, it is reasonably safe to send the money. Usually, these hacks are identified fast and the website secured again. No changes in your ICO receiving address are a good sign that you are sending it to the right place.
”
”
Philipp Staiger (Invest smarter in ICOs: Research.Participate.Learn)
“
He did have some small advantage, though. He knew the truth about surveillance. Ever since the dawn of GWOT the nations of the West – apart from the United States, where civil libertarians tended to carry rifles and use them on closed-circuit cameras as an expression of their freedoms – had put their faith in creating a paranoid state, one where every move of every citizen was recorded and logged and filmed and fuck you, if you’ve got nothing to hide you’ve got nothing to worry about.
Whether this had had any great influence in the course of GWOT was a moot point, but there was one thing not generally appreciated about the paranoid state. It was incredibly labour-intensive.
There were simply not enough people to monitor all the cameras. Every shop had one, every bus and train and theatre and public convenience, every street and road and alleyway. Computers with facial recognition and gait recognition and body language recognition could do some of the job, but they were relatively simple to fool, expensive, and times had been hard for decades. It was cheaper to get people to watch the screens. But no nation on Earth had a security service large enough, a police force big enough, to keep an eye on all those live feeds. So it was contracted out. To private security firms all trying to undercut each other. The big stores had their own security men, but they were only interested in people going in and out of the store, not someone just passing by. So instead of a single all-seeing eye London’s seemingly-impregnable surveillance map was actually a patchwork of little territories and jurisdictions, and while they all had, by law, to make their footage available to the forces of law and order, many of the control rooms were actually manned by bored, underpaid, undertrained and badly-motivated immigrants.
”
”
Dave Hutchinson (Europe in Autumn (The Fractured Europe Sequence, #1))
“
People don't understand computers. Computers are magical boxes in things. People believe what computers tell them. People just want to get their jobs done. people don't understand risks. They may, in a general sense, when the risk is immediate. People lock their doors and latch their windows. They check to make sure no one is following them when they down a darkened alley. People don't understand subtle threats, don't think that a package could be a bomb, or that the nice convenience store clerk might be selling credit card numbers to the mob on the side. And why should they? It almost never happens.
”
”
Bruce Schneier (Secrets and Lies: Digital Security in a Networked World)
“
In humanity's relentless drive for convenience and economic growth, we have developed a dangerous level of dependency on networked systems in a very short space of time: in less than two decades, huge parts of the so-called 'critical national infrastructure' (CNI in geekish) in most countries have come under the control of ever more complex computer systems.
”
”
Misha Glenny (DarkMarket: Cyberthieves, Cybercops and You)
“
The imminent arrival of NT had turned the computer industry on its ear. After outsiders took stock of the first beta, expectations for NT grew. While easy to nitpick over flaws, some heralded the program as a grand achievement likely to alter the destinies of scores of computer and software companies. Those rivals most at risk—IBM, Sun Microsystems and Novell, to name the three biggest—girded themselves against the onslaught. First Boston, a securities firm that advised investors on the industry’s outlook, captured the mood on February 15, 1993, calling NT the “most aggressive new piece of software ever.” Eight
”
”
G. Pascal Zachary (Showstopper!: The Breakneck Race to Create Windows NT and the Next Generation at Microsoft)
“
Suddenly I was in business. I didn’t know anything about computers—not about programming, not about security, nothing—but I didn’t have to. I was a salesman, remember? A broker. I had the software; all I had to do now was make it work for me; all I needed were the advertisers and the publishers. If I could get an advertiser to commit to one ad, and if I could get a Web site owner to put up that ad, there’d be no stopping me. The
”
”
Gurbaksh Chahal (The Dream: How I Learned the Risks and Rewards of Entrepreneurship and Made Millions)
“
For a period of several years in the mid-1990s the Chinese talked very openly, for a Communist police state, about what they had learned from the Gulf War. They noted that their strategy had been to defeat the U.S. by overwhelming numbers if a war ever happened. Now they concluded that that strategy would not work. They began to downsize their military and invest in new technologies. One of those technologies was wangluohua, “networkization,” to deal with the “new battlefield of computers.
”
”
Richard A. Clarke (Cyberwar: The Next Threat to National Security & What to Do About It)
“
Fortunately, bitcoin also creates the incentives to improve computer security. Whereas previously the risk of computer compromise was vague and indirect, bitcoin makes these risks clear and obvious. Holding bitcoin on a computer serves to focus the user’s mind on the need for improved computer security.
”
”
Andreas M. Antonopoulos (Mastering Bitcoin: Programming the Open Blockchain)
“
To quote one company that makes beacon systems, “beacons are ushering in the indoor mobile marketing revolution.
”
”
Brian W. Kernighan (Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security)
“
In my work,” Everett says, “in mergers and amalgamations, we’re seeing a real boom. LBOs are still the cornerstone of the business, obviously, but the increase in global capital flows is translating to even more revenue. It’s an exciting time. And there’s real security there. We work hard, and there’s a measurable gain, or, yes, occasionally, a loss, but at the end of the day, win or lose, we can all look at the same numbers and acknowledge we’ve accomplished something. It’s real, you know what I mean?”
I nod vigorously, to show her I agree, but honestly, Everett’s world doesn’t sound like a more measurable one than mine at all, and the closest I can come to picturing what she’s talking about is imagining numbers dancing around gaily on a computer screen while giant piles of cartoon cash rain down from the ceiling at the end of each day. My mind began to wander somewhere around “LBOs.
”
”
Lauren Graham (Someday, Someday, Maybe)
“
Just as the availability of vast computational power drives the implementation of global surveillance, so its logic has come to dictate how we respond to it, and to other existential threats to our cognitive and physical well-being. The demand for some piece of evidence that will allow us to assert some hypothesis with 100 per cent certainty overrides our ability to act in the present. Consensus - such as the broad scientific agreement around the urgency of the climate crisis - is disregarded in the face of the smallest quantum of uncertainty. We find ourselves locked in a kind of stasis, demanding that Zeno's arrow hit the target even as the atmosphere before it warms and thickens. The insistence upon some ever-insufficient confirmation creates the deep strangeness of the present moment: everybody knows what's going on, and nobody can do anything about it.
Reliance on the computational logics of surveillance to derive truth about the world leaves us in a fundamentally precarious and paradoxical position. Computational knowing requires surveillance, because it can only produce its truth from the data available to it directly. In turn, all knowing is reduced to that which is computationally knowable, so all knowing becomes a form of surveillance. Thus computational logic denies our ability to think the situation, and to act rationally in the absence of certainty. It is also purely reactive, permitting action only after sufficient evidence has been gathered and forbidding action in the present when it is most needed.
The operation of surveillance, and our complicity in it, is one of the most fundamental characteristics of the new dark age, because it insists on a kind of blind vision: everything is illuminated, but nothing is seen. We have become convinced that throwing light upon the subject is the same thing as thinking it, and thus having agency over it. But the light of computation just as easily renders us powerless - either through information overload, or a false sense of security. It is a lie we have been sold by the seductive power of computational thinking.
Our vision is increasingly universal, but our agency is ever more reduced. We know more and more about the world, while being less and less able to do anything about it. The resulting sense of helplessness, rather than giving us pause to reconsider our assumptions, seems to be driving us deeper into paranoia and social disintegration: more surveillance, more distrust, an ever-greater insistence on the power of images and computation to rectify a situation that is produced by our unquestioning belief in their authority.
Surveillance does not work, and neither does righteous exposure. There is no final argument to be made on either side, no clinching statement that will ease our conscience and change the minds of our opponents. There is no smoking gun, no total confirmation or clear denial. The Glomar response, rather than the dead words of a heedless bureaucracy, turns out to be the truest description of the world that we can articulate.
”
”
James Bridle (New Dark Age: Technology and the End of the Future)
“
In 1995 GCHQ also found itself investigating cyber attacks on banks in the City of London. Working with the Department of Trade and Industry and the Bank of England, it began to probe crimes which the banks were extremely anxious to hide. Outwardly, they claimed to be secure, but in fact they had paid out millions of pounds to blackmailers who had gained entry to their systems and threatened to wipe their computer databases. GCHQ was hampered by limited cooperation from the banks, which were reluctant to admit the extent to which they had been damaged, for fear of undermining the confidence of investors. Nevertheless, GCHQ was able to identify forty-six attacks that had taken place over a period of two years, including attacks on three British banks and one American investment house.
”
”
Richard J. Aldrich (GCHQ)