Security Thoughts

Sunday, June 13, 2010

[OT] Cutest Vuvuzela Player Ever?

By Unknown
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Security Thinkers

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Blog Archive

  • ►  2015 (1)
    • ►  January (1)
  • ►  2014 (1)
    • ►  July (1)
  • ►  2013 (4)
    • ►  November (1)
    • ►  June (1)
    • ►  May (2)
  • ►  2012 (8)
    • ►  October (2)
    • ►  September (3)
    • ►  April (1)
    • ►  March (2)
  • ►  2011 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  July (2)
    • ►  May (4)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ▼  2010 (9)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ▼  June (2)
      • Quick Thought: Information Classification Like Cre...
      • [OT] Cutest Vuvuzela Player Ever?
    • ►  May (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  September (1)
    • ►  July (2)
    • ►  June (3)
    • ►  May (5)
    • ►  April (6)
    • ►  March (6)
    • ►  February (5)
    • ►  January (2)
  • ►  2008 (34)
    • ►  December (9)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (3)
    • ►  June (3)
    • ►  May (2)
    • ►  April (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (4)
  • ►  2007 (78)
    • ►  November (4)
    • ►  October (4)
    • ►  September (6)
    • ►  August (10)
    • ►  July (11)
    • ►  June (16)
    • ►  May (3)
    • ►  April (1)
    • ►  March (13)
    • ►  February (8)
    • ►  January (2)

Lijit Search

Lijit Search

Twitter Updates

Twitter Updates

    follow me on Twitter

    Popular Posts

    • Because Hackers Don't Care... (Why Metrics Don't Work)
      Lets start with some statistics: 99% of all workstations with up-to-date antivirus Antivirus blocks over 99% of all malware. That is amazing...
    • Elucidate
      This is not promotion for my business. Maybe if "blogging" (and other cool web 2.0 technologies) had been so popular three years a...
    • Why the GPL sucks as a license...
      The Security Blogger's Network has been debating the GPL recently but this is a debate that has been going for years.. The short version...
    • Prediction 2 for 2008 - Stealth "Hackers"
      Wow.. that sounds like a good name for a movie "Coming to the big screen in 2008 - Stealth Hackers!" This isn't really a new t...
    • CISSP is here to stay! Sorry, Dre.
      Dre wrote an article in which he put the argument down that the CISSP is on its way out . What he really argues is that a "generalist...
    • Intra-company PreCommunication Policy Exchange
      You heard it here first! I'm sure that someone out there is going to try patent this idea so let me put it out on the Internet first. I...
    • A more positive and comprehensive SABSA Strength-in-depth Strategy
      [Extending SABSA's Strength-in-Depth Strategic Controls] SABSA is brilliant. In one short week, I had my head expanded to exploding ...
    • Calif-online-crime Law
      According to CSO merchants in California may end up liable for data breaches. I think this is a good thing but I also think it is a bad thi...
    • I got it right! (My timing was just off)
      I was looking at my old posts and found this prediction from 2009 for 2009: http://securethink.blogspot.com.au/2009/01/prediction-number-1...
    • Information Centric Security is dead!
      Ok,ok, I just want to jump on the bandwagon. It seems you are not regarded as an innovative and forward thinking Information Security Blogge...

    Links to Sites I Like

    • Scrapbook - Affordable, Quality Craft Supplies
    • Fairy Cake - cakes, fairy cakes, edible embellishments
    • Crafty Nook Craft Shop
    Picture Window theme. Powered by Blogger.