Brett Glass

Brett Glass has more than 20 years of experience designing, building,writing about, and crash-testing computer hardware and software. (A born'power user,' he often stresses products beyond their limits simply bytrying to use them.) A consultant, author, and programmer based inLaramie, Wyoming, Brett obtained his Bachelor of Science degree inElectrical Engineering from the Case Institute of Technology and his MSEEfrom Stanford. He plans networks, builds and configures servers, outlinestechnical strategies, designs embedded systems, hacks UNIX, and writeshighly optimized assembly language.During his rather eclectic career, Brett has written portions of the codeand/or documentation for such widely varied products as Borland's Pascal'toolboxes' and compilers, Living Videotext's ThinkTank, Cisco Systemsrouters and terminal servers, Earthstation diskless workstations, andTexas Instruments' TMS380 Token Ring networking chipset. His articleshave appeared in nearly every major computer industry publication.When he's not writing, consulting, speaking, or cruising the Web insearch of adventure, he may be playing the Ashbory bass, teachingInternet courses for LARIAT (Laramie's community network and Internetusers' group), cooking up a storm, or enjoying 'extreme'-ly spicy ethnicfood.To mail Brett, visit his Web form.

Biometric Security – 2

One of the most common causes of network security breaches is easily guessable or insecure passwords. Many users choose common names or words that are in any dictionary; others...

IM Security: Dont Get Fooled

Using an instant messenger (IM) program seems like a harmless way to have a conversation. Unfortunately, IM can be exploited to damage, commandeer, or infect your machine.Attacks on IM...

Batten Down Those Ports

With worms such as Blaster prowling the Net, every user ought to know the ways a computer may be exposing itself to attacks. One of the simplest but most...

Hackers Claim to have Infiltrated AOL

According to Wired News, teenage hackers claim to have used "social engineering" -- i.e. fast talk and subterfuge -- to compromise security at America Online.The Wired article says that...

Windows XP Passwords Rendered Useless

Windows guru Brian Livingston reports that inserting a Windows 2000 CD into an XP system allows one to bypass all password protection and manipulate any part of the machine...

Latest Posts

How SASE with Zero Trust Framework Secures Remote Workers

Our lives have been transformed by the COVID pandemic. We have changed the way we work remotely and are unlikely to be back to...

IBM’s LinuxONE III Express: Off the Shelf with Mainframe-Class Features 

The IBM mainframe endures as both a concept and commercial system for several factors, but chief among them is the architecture’s inherent flexibility. That...

Customer Empathy: Four Data Points for Understanding How the Pandemic Has Impacted the Customer Experience (CX)

The pandemic has impacted the customer experience in countless ways. Many everyday experiences that used to be physical (think dining out, buying groceries, or...

IBM Announces 2nm Process Technology And Becomes A Kingmaker

In the world of microprocessors, there is a battle going on: who will be the King of Process Technology? The outcome of that battle...

IBM Sets Another Smallness Record with 2nm Chip Blueprints

Okay, now that IBM has revealed its 2nm chip design and process blueprint, what's next? A virtual chip? Two nanometers is smaller in width...