article thumbnail

The Ballad of Bull Cook, A Wacky Book

Crafty CTO

A Book Encounter While browsing the lake house bookshelves, John stumbled across Bull Cook and Authentic Historical Recipes and Practices and was immediately hooked. This is the first time the real authentic recipe for corning meat has ever been published. I found that Bull Cook on Amazon was published in 2012 (!!)

article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Those are the two easy to understand checks.

Windows 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

SeanDaniel.com [tech]: How to use your Home Server as an AirPrint.

Sean Daniel

Tuesday, January 03, 2012. Of course I can play around with this for 7 days on trial, then I’ll have to get a license key for FingerPrint. 1/03/2012 9:24 PM. 1/12/2012 7:04 AM. 4/09/2012 3:44 AM. 7/28/2012 11:41 AM. 9/10/2012 6:30 PM. 9/18/2012 5:28 PM. SeanDaniel.com [tech]. hjack said.

How To 64
article thumbnail

Top 10 Data Breaches of All Time

SecureWorld News

What was compromised: b ank account numbers, bank statements, mortgage and tax records, social security numbers, wire transaction receipts, and driver license images. What was compromised: Social Security numbers, birth dates, addresses, and in some cases driver license numbers and credit card information. LinkedIn data breach (2012).

Data 111
article thumbnail

Top 10 Data Breaches of All Time

SecureWorld News

What was compromised: b ank account numbers, bank statements, mortgage and tax records, social security numbers, wire transaction receipts, and drivers license images. What was compromised: Social Security numbers, birth dates, addresses, and in some cases drivers' license numbers and credit card information. Who attacked: no attacker.

Data 96
article thumbnail

Multi-Source Identity

Phil Windley

Online, various, so-called "identity providers" authenticate people using usernames and passwords and provide a fixed, usually limited set of attributes about the subject of the identity transaction. Mutual exchange of keys is a big step up from SSL-mediated transactions on the Web where only one-side is cryptographically authenticated.

article thumbnail

Data mining for B2B churn and loyalty management in India and South Asia

TM Forum

Upon searching for authentic data for churn and reasons contributing to churn, we went to the TRAI website and found TRAI call drop data, which is by operator, but not to the granularity of circle level. . In trying to ascertain the churn rates, the data that we get from clients may be at an aggregate level, not at an individual level.

B2B 130