Jim Atkins, thedosmann, is a website programmer who started programming in the early 90's. He has worked professionally as a Manager of Technical Services, Website developer, hosting provider, and consultant since 1995.
National Registry Of WI-FI Connections to combat cyber threats that we face in today's ever evolving internet. One of those threats, that has not received a lot of attention, is the growing number of Wi-Fi hotspots that millions of cell phones connect to daily.
Twitter is fighting back against cyber-crime and malicious activity in its recent actions toward Tor users and Isis.
A critical vulnerability in glibc, a core Linux library, can be exploited remotely through PHP applications.
The following is a list of IPs that ignore robot.txt that I have collected over the past year or so.
As the Sony hack investigation unfolds, revelations regarding its possible origin, type of hack used, and the damage it is purported to have caused, are starting to be revealed.
In programming code it is possible to theorize about several aspects of code flow and dependency through coding models. One such model is the Actor Model.
Google is pioneering another innovation which may someday replace the need for passwords. The device they are introducing is a pluggable USB device that acts as the authentication mechanism to login. By inserting the device into a USB port and touching it a process is started that authenticates the user through that physical device.
VR (Virtual Reality) is not a new concept and it has seen its share of failures and even long spans of time in virtual limbo. The idea and reality of VR have, for some time, been separated by a chasm of ergonomics, hardware requirements, and consumer acceptance.
Headlines like "Devastating Heartbleed Flaw Was Used in Hospital Hack" and others tend to make one wonder if anybody is paying attention. The hackers are letting the security firms do the grunt work of finding flaws and then all they have to do is troll for sites don't update.