Whether you script your projects or use menu commands, you need to review your ACL log carefully.
Good analysts review their results and the log as they work in ACL, after they think they are done, and have others review their log before the ACL project is relied upon.
(You can’t imagine the dumb mistakes my team and I found that saved us a lot of embarrassment later.)
Continue reading →
Like this:
Like Loading...
Filed under ACL, Data Analytics, How to..., Scripting (ACL), Written by Skyyler
Tagged as acl, bypass, check, computed, conditional, conventions, duplicates, ESCAPE, fail, field, first, found, ignore, invalid, log, pause, review, script, second line, test, unable
A recent Lifehacker article makes life easier (and cheaper) for users and harder for companies and their IT and security pros. Top 10 Ways to Access Blocked Stuff on The Web provides tips (not all ethical) on how to go around, over, under, or through the following fences:
Continue reading →
Like this:
Like Loading...
Filed under Security, Top 10
Tagged as bittorrent, block, bypass, download, flash, lifehacker, proxy, remote, Security, Top 10, video, web, youtube