Security Thoughts

Sunday, June 13, 2010

[OT] Cutest Vuvuzela Player Ever?

By Unknown
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Security Thinkers

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Blog Archive

  • ►  2015 (1)
    • ►  January (1)
  • ►  2014 (1)
    • ►  July (1)
  • ►  2013 (4)
    • ►  November (1)
    • ►  June (1)
    • ►  May (2)
  • ►  2012 (8)
    • ►  October (2)
    • ►  September (3)
    • ►  April (1)
    • ►  March (2)
  • ►  2011 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  July (2)
    • ►  May (4)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ▼  2010 (9)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ▼  June (2)
      • Quick Thought: Information Classification Like Cre...
      • [OT] Cutest Vuvuzela Player Ever?
    • ►  May (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  September (1)
    • ►  July (2)
    • ►  June (3)
    • ►  May (5)
    • ►  April (6)
    • ►  March (6)
    • ►  February (5)
    • ►  January (2)
  • ►  2008 (34)
    • ►  December (9)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (3)
    • ►  June (3)
    • ►  May (2)
    • ►  April (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (4)
  • ►  2007 (78)
    • ►  November (4)
    • ►  October (4)
    • ►  September (6)
    • ►  August (10)
    • ►  July (11)
    • ►  June (16)
    • ►  May (3)
    • ►  April (1)
    • ►  March (13)
    • ►  February (8)
    • ►  January (2)

Lijit Search

Lijit Search

Twitter Updates

Twitter Updates

    follow me on Twitter

    Popular Posts

    • I got it right! (My timing was just off)
      I was looking at my old posts and found this prediction from 2009 for 2009: http://securethink.blogspot.com.au/2009/01/prediction-number-1...
    • Because Hackers Don't Care... (Why Metrics Don't Work)
      Lets start with some statistics: 99% of all workstations with up-to-date antivirus Antivirus blocks over 99% of all malware. That is amazing...
    • CISSP is here to stay! Sorry, Dre.
      Dre wrote an article in which he put the argument down that the CISSP is on its way out . What he really argues is that a "generalist...
    • How to save millions with desktop software!
      [The South African State IT Agency awarded former provincial top cop Mzwandile Petros's company a R10m deal to recover three stolen lapt...
    • Why #nokia gets a #brandfail from me
      It is with great sadness that I write this post. I love Nokia. Loved. When something that you really like so much disappoints you so badly t...
    • Why the GPL sucks as a license...
      The Security Blogger's Network has been debating the GPL recently but this is a debate that has been going for years.. The short version...
    • Information Security Analyst Available.
      [Hire Me... Please.] I am currently searching for a job so if any of my dedicated readers know of anything...please let me know. I have ...
    • Slideshow: A Practical Example to Using SABSA Extended Security in Depth Strategy
      A Practical Example to Using SABSA Extended Security-in-Depth Strategy from Allen Baranov Following on from my last post, this is ...
    • HD Moore's Law? How can you tell if you are compliant?
      HD Moore's Law is a joke. And not a very funny one either being a pun and having a requirement of being very technical and requiring kno...
    • More on the TJX Stock
      It appears that TJX have taken a bit of a knock but their share capital is $14 Billion. This means that a hack that costs them $118 Million...

    Links to Sites I Like

    • Scrapbook - Affordable, Quality Craft Supplies
    • Fairy Cake - cakes, fairy cakes, edible embellishments
    • Crafty Nook Craft Shop
    Picture Window theme. Powered by Blogger.