“’To check out the worm, you have to know the machines,’ said an American expert on nuclear intelligence. ‘The reason the worm has been effective is that the Israelis tried it out.’”
This entry was posted on Monday, January 17th, 2011 at 01:21 and is filed under Communications security, Random bits, Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Numerous thanks for sharing this fine piece. Quite fascinating concepts! (as always, btw
Fill in your details below or click an icon to log in:
You are commenting using your WordPress.com account. ( Log Out / Change )
You are commenting using your Twitter account. ( Log Out / Change )
You are commenting using your Facebook account. ( Log Out / Change )
You are commenting using your Google+ account. ( Log Out / Change )
Connecting to %s
Notify me of follow-up comments via email.
Why Poissonian traffic models matter more now than ever, part 1 2 3 4 5 6
Common data sets and the illusion of scientific security testing
A minimal periodic coloring theorem part 1 2 3
Dynamical bias in the dice roll
The fundamental law of statistical physics
Jaynes and the Gibbs paradox
A graded lexicographic index, part 1 2 3
Solution of second-order matrix difference equations
Birds on a wire and the Ising model
The chimera of cyberdeterrence
Martingales from finite Markov processes, part 1
Initial software release
[All Equilibrium-related posts]
The Contempt Theme.
Blog at WordPress.com.
Get every new post delivered to your Inbox.