Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/themself/wp-includes/functions.php on line 6114
cyber Archives - Themself

Tag archives for cyber

linux

Castles in the Cloud [Poetry]

I referred to the Castles in the Cloud poetry in my post about cyber warfare the other week, and only after I'd published it I realised that the poetry wasn't generally available, unless you'd bought my book Themself. So here are those poems, if you like them you might also like the book. Castles in the Cloud Laying Siege Unsuspecting users are unaware of spam silently suborning their systems. Malware lurks waiting for the one in a million. Click conscripted computers, zombies in the 'bot-net horde, pillaging user credentials and sending more spam. Each zombie sends tens of millions of emails before they too are cleansed. One day the hordes will swell, the tide sweeping away all defences. Then the zombie apocalypse will infect us all. Castles in the Sky Fortresses nestle in their own cloud, keeping out trojans. Patterned…
Continue Reading
linux

Cyber warfare – Just a buzzword or scary reality?

Cyber warfare has been on my mind for a few weeks, even before the WannaCryptor incident. It's been there because I've been looking at the innovation context for a digital service I've been designing as part of my T317 end of module project. That service is for government, and one of the risks is that someone will try to attack or subvert it. The other thing that has brought cyber warfare to my head is the forthcoming general election in the UK. There are signs that both the UK referendum on the EU and the US election night have been affected by cyber warfare. What is Cyber Warfare? A linux laptop running wireshark to illustrate cyber defence in action (photo credit: James Kemp) The popular view is hackers in a basement tracking people, bringing down other computer networks and stealing…
Continue Reading
Follow

Get every new post delivered to your Inbox

Join other followers: