An intrusion detection system (IDS) system should be an integral part of your home security plan. IDSs are detective security measures that also have a great deal of deterring value. Alarms are far more complicated than most people realize, however. To provide the maximum intended effectiveness, alarms must be carefully installed, tested, and used. These alarm system best practices will help you assess your own system or provide some guidance if having a new one installed.
As I mentioned in my last post, I’m on the hunt for the perfect everyday carry flashlight. My searching led me to run across the ThruNite Archer 1A V3, a light that – at least on paper – met the majority of my needs. It failed in one spectacular way. I am not keeping mine and I don’t recommend you buy one. Let’s get into it.
The Apricorn Aegis family of flash drives, HDDs, and SSDs has been around for quite a while. I’ve generally rejected them based on price alone. Recently a customer requested training that included this drive. Since learning the Aegis and its capability, I’m very impressed. If you have compelling data security needs, this product might be for you.
I am a big advocate of the Every Day Carry (EDC) flashlight. I have carried a flashlight on my person in some form or fashion for over a dozen years. There are a number of reasons to recommend the practice of carrying an EDC flashlight. This post will explore some of these reasons, and open a series of upcoming reviews of popular EDC flashlights.
I recently spent a few days in Seattle on business and ended up with a free day. I hoped to see (among other things) a few interesting locks on Lock Safari: Seattle and I wasn’t disappointed.
I recently had the chance to spend a few days in New York, New York. This was a personal trip, and I covered a lot of ground. This time, I actually managed to focus on the locks I saw, and I saw some good ones on Lock Safari NYC. I noticed some interesting things about New York’s locks.
I recently had the opportunity to explore another city in my search for rare and interesting locks. Lock Safari Salt Lake City took me through quite a few neighborhoods over a long weekend. Over three days a friend and I covered the Marmalade, 9th and 9th, Temple Square/Downtown, and Sugar House areas of SLC. I found quite a few interesting locks, but not as many as I expected from a city of this size.
I have previously written about categorizing attackers based on their levels of skill and focus. I have also written about categorizing security measures to defeat attackers with a given level of skill or focus. Both of these posts tie in closely with (and were early attempts at) a topic that I want to explore more fully in coming months: threat modeling.
On this site I talk about a number of different security measures. Just as in my discussion of attacks and attackers it is important to have a firm understanding of security measures and exactly what type of security each provides. . . and does not provide.
In previous posts I have referenced two different types of attacks: opportunistic and focused. These categories apply to attacks of all kinds, physical and digital, an understanding them is important to fully understanding how to defend against them. This post will attempt to categorize these two types of attack and the attackers that may carry out each.