### Wrapped In Python – Edition 5 – 3rd Grade Math Tutor

I have a daughter in 3rd grade who started the year off with reviews of the addition and subtraction she learned last year.  Fortunately, her school is private and doesn’t do any of the dumb Common Core math that I have seen other parents complaining about.  My daughter understands the concepts of addition and subtraction…

### The Value of Certification

Very early on in high school I remember my father sitting me down and saying, “When you get to college nobody is ever going to ask you what your GPA was in high school.  And after graduating from college nobody is ever going to ask you what your grades were.  All they are going to…

### Wrapped In Python – Edition 4 – Primitive Root Finder

Mostly because of their importance in some types of  asymmetric cryptography (Diffie-Hellman, RSA) I have a fascination with prime numbers.  I enjoy occasionally checking on the latest discovery of ever larger prime numbers.  As I write the largest known prime has more than 17, 425, 170 digits in it.  That’s a big-ass number!   Many…

### Wrapped In Python – Edition 3 – Prime Number Verifier

In my last post I offered two different examples for generating prime numbers using python.  The first script in that post generated every prime (except 2) from 1 to 9,999,999 and the second script generated every prime in a user-supplied range. It’s neat to be able to generate a bunch of prime numbers but what…

### Wrapped In Python – Edition 2 – Prime Number Generator

Perhaps just a step up from writing your first “Hello World” script.  I wrote [yet another] prime number generator.  I’m sure this can be done in a variety of ways but I used what I currently know to figure out how to determine if a number is prime. Here’s the code: #!/usr/bin/env python print “2…

### Wrapped In Python – Edition 1 – The Beginning …Again

I have been teaching myself Python for more than a few years. To be clear, that means that I think about python for about a week, do a lot of reading, stay up late trying some real basic code, get distracted by other shiny things, allow weeks or months to go by, and forget almost…

### Microsoft’s WiFi [non]Sense

You know who has no say-so in how wireless LAN keys are shared in Microsoft’s new WiFi Sense feature? The actual owner of the wireless LAN.  The decision to share credentials is in the power of the connecting user, not the WLAN owner.  Stupid much? I have several thousand “friends” on Facebook and more than…

### Top Ten—Data Breaches that Made the News

By Annette Leonard Many information security incidents are newsworthy, especially when they involve compromise of personal, financial and/or medical information. Here is our “Top Ten” list of data breaches that have made the news over the past few years. While some of these compromises may have resulted from very sophisticated attack methods, others were traceable to basic lapses in good security practices—the very things the…

### Common Controls and Inheritance

By Kathryn M. Farrish, CISSP Common Controls are security controls whose implementation results in a security capability that is inheritable  by multiple information systems (IS). For example, the information systems hosted in a data center will typically inherit numerous security controls from the hosting provider, such as: Physical and environmental security controls Network boundary defense security controls Other inheritance scenarios include agency or departmental-level policies…

### FAQ: How Comprehensive is your RMF for DoD IT Course?

The most common question we get in regards to our RMF for DoD IT training course is this: How comprehensive is your RMF for DOD IT course? The reason I ask is that the Navy is still trying to wrap their head around RMF and how to integrate it both from an acquisitions and operational…