Brett Glass

Brett Glass has more than 20 years of experience designing, building,writing about, and crash-testing computer hardware and software. (A born'power user,' he often stresses products beyond their limits simply bytrying to use them.) A consultant, author, and programmer based inLaramie, Wyoming, Brett obtained his Bachelor of Science degree inElectrical Engineering from the Case Institute of Technology and his MSEEfrom Stanford. He plans networks, builds and configures servers, outlinestechnical strategies, designs embedded systems, hacks UNIX, and writeshighly optimized assembly language.During his rather eclectic career, Brett has written portions of the codeand/or documentation for such widely varied products as Borland's Pascal'toolboxes' and compilers, Living Videotext's ThinkTank, Cisco Systemsrouters and terminal servers, Earthstation diskless workstations, andTexas Instruments' TMS380 Token Ring networking chipset. His articleshave appeared in nearly every major computer industry publication.When he's not writing, consulting, speaking, or cruising the Web insearch of adventure, he may be playing the Ashbory bass, teachingInternet courses for LARIAT (Laramie's community network and Internetusers' group), cooking up a storm, or enjoying 'extreme'-ly spicy ethnicfood.To mail Brett, visit his Web form.

Biometric Security – 2

One of the most common causes of network security breaches is easily guessable or insecure passwords. Many users choose common names or words that are in any dictionary; others...

IM Security: Dont Get Fooled

Using an instant messenger (IM) program seems like a harmless way to have a conversation. Unfortunately, IM can be exploited to damage, commandeer, or infect your machine.Attacks on IM...

Batten Down Those Ports

With worms such as Blaster prowling the Net, every user ought to know the ways a computer may be exposing itself to attacks. One of the simplest but most...

Hackers Claim to have Infiltrated AOL

According to Wired News, teenage hackers claim to have used "social engineering" -- i.e. fast talk and subterfuge -- to compromise security at America Online.The Wired article says that...

Windows XP Passwords Rendered Useless

Windows guru Brian Livingston reports that inserting a Windows 2000 CD into an XP system allows one to bypass all password protection and manipulate any part of the machine...

Latest Posts

AWS Boosts AI for Connect Contact Center Product

This week the largest cloud computing vendor, AWS, is holding its 11th re:Invent conference. Given its leading position in Infrastructure as a Service (IaaS),...

eWEEK TweetChat, December 13: Enterprise Tech in 2023

On Tuesday, December 13, at 11 AM PT, @eWEEKNews will host its monthly #eWEEKChat. The topic will be Enterprise Tech in 2023, and it...

Top Data Virtualization Tools

Data virtualization is the process of cleansing and integrating data from various sources so it can be more readily accessed and analyzed by business...

Kyndryl at One: A Year of Transformation

Recently, Kyndryl executives, including CEO Martin Schroeter, hosted a briefing with industry analysts to discuss the company’s progress during its first year as an...

Workato CEO Vijay Tella on Automation Trends

I spoke with Workato CEO Vijay Tella about a new report, the State of Business Technology 2022; we also looked at the future of...