Funny things

My pet theory is there should be FUN when you are doing anything.

Every time I opened my laptop, its’ Network interface didn’t work. There are two options to use Internet on it. The first is waiting until connected the Internet automatically, but it’s take so long time, So I usually chose the second option. The second option is able to reduce the waiting time by turning off/on Network interface by using a batch script below.

netsh interface set interface Wi-Fi DISABLED
netsh interface set interface Wi-Fi ENABLED
netsh interface ip show interface
ping -n 10 8.8.8.8

However, I didn’t execute the batch script on the offline laptop today. Because I can wait until I use the Internet while playing a quit simple game on Chrome browser as below. I found FUN.

chrome_offline_game

Sometime, I envy what Google do that. I really want to find funny things in Computer Security.

Gartner Identifies the Top 10 Technologies for Information Security in 2014

Gartner, Inc. today highlighted the top 10 technologies for information security and their implications for security organizations in 2014. Analysts presented their findings during the Gartner Security & Risk Management Summit, being held here through June 26.

  1. Cloud Access Security Brokers
  2. Adaptive Access Control
  3. Pervasive Sandboxing (Content Detonation) and IOC Confirmation
  4. Endpoint Detection and Response Solutions
  5. Big Data Security Analytics at the Heart of Next-generation Security Platforms
  6. Machine-readable Threat Intelligence, Including Reputation Services
  7. Containment and Isolation as a Foundational Security Strategy
  8. Software-defined Security
  9. Interactive Application Security Testing
  10. Security Gateways, Brokers and Firewalls to Deal with the Internet of Things

Source: http://www.gartner.com/newsroom/id/2778417?fb_action_ids=10152494306750102&fb_action_types=og.likes

 

Theme #1: Security needs a new architecture
Theme #2: Mobile security
Theme #3: Incident Response is a core discipline
Theme #4: Dealing with advanced attacks

  1. Network traffic analysis
  2. Payload Analysis
  3. Endpoint behavior analysis
  4. Network forensics
  5. Endpoint forensics

http://www.fireeye.com/blog/corporate/2014/07/key-themes-from-the-2014-gartner-security-summit.html

Ads too noisy

Today the advertisement is a great way to get a money, particularly in Internet quite a while. However, it’s too noisy. Here is a sample that is showing the seriousness of media advertisement. Especially, I wanna talk to about Korea News Media. The left side is a web page of Korea News media and the other side is BBC’s.

advertising

But, I am not only aware the problem. A below image depicts the whole changes of digital media quite well.Source: http://kindofnormal.com/img/truth_facts/iphone/2013/10/11.png