Brett Glass

Brett Glass has more than 20 years of experience designing, building,writing about, and crash-testing computer hardware and software. (A born'power user,' he often stresses products beyond their limits simply bytrying to use them.) A consultant, author, and programmer based inLaramie, Wyoming, Brett obtained his Bachelor of Science degree inElectrical Engineering from the Case Institute of Technology and his MSEEfrom Stanford. He plans networks, builds and configures servers, outlinestechnical strategies, designs embedded systems, hacks UNIX, and writeshighly optimized assembly language.During his rather eclectic career, Brett has written portions of the codeand/or documentation for such widely varied products as Borland's Pascal'toolboxes' and compilers, Living Videotext's ThinkTank, Cisco Systemsrouters and terminal servers, Earthstation diskless workstations, andTexas Instruments' TMS380 Token Ring networking chipset. His articleshave appeared in nearly every major computer industry publication.When he's not writing, consulting, speaking, or cruising the Web insearch of adventure, he may be playing the Ashbory bass, teachingInternet courses for LARIAT (Laramie's community network and Internetusers' group), cooking up a storm, or enjoying 'extreme'-ly spicy ethnicfood.To mail Brett, visit his Web form.

Biometric Security – 2

One of the most common causes of network security breaches is easily guessable or insecure passwords. Many users choose common names or words that are in any dictionary; others...

IM Security: Dont Get Fooled

Using an instant messenger (IM) program seems like a harmless way to have a conversation. Unfortunately, IM can be exploited to damage, commandeer, or infect your machine.Attacks on IM...

Batten Down Those Ports

With worms such as Blaster prowling the Net, every user ought to know the ways a computer may be exposing itself to attacks. One of the simplest but most...

Hackers Claim to have Infiltrated AOL

According to Wired News, teenage hackers claim to have used "social engineering" -- i.e. fast talk and subterfuge -- to compromise security at America Online.The Wired article says that...

Windows XP Passwords Rendered Useless

Windows guru Brian Livingston reports that inserting a Windows 2000 CD into an XP system allows one to bypass all password protection and manipulate any part of the machine...

Latest Posts

10 Best AI Social Media Tools 2024

Artificial intelligence (AI) social media tools are software built to enhance and optimize social media marketing efforts in a wide variety of ways. These AI...

AI CRM Use Cases: 10 Top Examples and Platforms Explored

Why are AI CRM use cases crucial for modern CRM? Dive into our guide for examples and insights.

SentinelOne’s Gregor Stewart on AI in Cybersecurity

Certainly there is massive hype about AI and its potential, and this excitement is as prevalent in cybersecurity as in any tech sector. The...

Salesforce and AI: How Salesforce’s Einstein Transforms Sales

Explore how Salesforce uses AI to drive business growth and success in today's competitive landscape.

Simplifying Business Connectivity: The Power of Fixed Wireless Access

In today’s fast-paced digital era, it is astonishing how difficult it can be to establish a dependable internet connection. While internet access is essential...