Brett Glass

Brett Glass has more than 20 years of experience designing, building,writing about, and crash-testing computer hardware and software. (A born'power user,' he often stresses products beyond their limits simply bytrying to use them.) A consultant, author, and programmer based inLaramie, Wyoming, Brett obtained his Bachelor of Science degree inElectrical Engineering from the Case Institute of Technology and his MSEEfrom Stanford. He plans networks, builds and configures servers, outlinestechnical strategies, designs embedded systems, hacks UNIX, and writeshighly optimized assembly language.During his rather eclectic career, Brett has written portions of the codeand/or documentation for such widely varied products as Borland's Pascal'toolboxes' and compilers, Living Videotext's ThinkTank, Cisco Systemsrouters and terminal servers, Earthstation diskless workstations, andTexas Instruments' TMS380 Token Ring networking chipset. His articleshave appeared in nearly every major computer industry publication.When he's not writing, consulting, speaking, or cruising the Web insearch of adventure, he may be playing the Ashbory bass, teachingInternet courses for LARIAT (Laramie's community network and Internetusers' group), cooking up a storm, or enjoying 'extreme'-ly spicy ethnicfood.To mail Brett, visit his Web form.

Biometric Security – 2

One of the most common causes of network security breaches is easily guessable or insecure passwords. Many users choose common names or words that are in any dictionary; others...

IM Security: Dont Get Fooled

Using an instant messenger (IM) program seems like a harmless way to have a conversation. Unfortunately, IM can be exploited to damage, commandeer, or infect your machine.Attacks on IM...

Batten Down Those Ports

With worms such as Blaster prowling the Net, every user ought to know the ways a computer may be exposing itself to attacks. One of the simplest but most...

Hackers Claim to have Infiltrated AOL

According to Wired News, teenage hackers claim to have used "social engineering" -- i.e. fast talk and subterfuge -- to compromise security at America Online.The Wired article says that...

Windows XP Passwords Rendered Useless

Windows guru Brian Livingston reports that inserting a Windows 2000 CD into an XP system allows one to bypass all password protection and manipulate any part of the machine...

Latest Posts

Prompt Engineering Guide: Unlocking the Potential of AI Models

Getting the desired outputs from AI models starts with carefully crafted inputs. Here’s what you need to know about prompt engineering to successfully train your artificial intelligence tools.

Annual AI Jobs Salary Report (2024): Overviews with Expert Advice

AI is booming, and careers in this dynamic field promise an exciting future for those with the expertise to make a difference. Here’s what you need to know about AI salaries in 2024 to get started or stay ahead in the competitive AI job market.

Aspire’s Aju Mathew on AI and Advanced Application Development

Aju Mathew, Vice President, Software Engineering at Aspire Systems detailed how generative AI will enhance software tasks like frontend development, migration, maintenance and testing.

Aspire’s Aju Mathew on DevOps and Generative AI

Aju Mathew, Vice President, Software Engineering at Aspire Systems discussed the role of generative AI in a wide array of software development processes, from DevOps to Infrastructure as Code to security assessments.

How Observability Leads to Better Cybersecurity

Deep observability offers granular monitoring, advanced analytics and enhanced infrastructure insights, all leading to better cybersecurity.