skip to main
|
skip to sidebar
Lost In The Flood
Computer Security. Incident Response. Intrusion Detection. Computer Forensics.
Tuesday, March 17, 2009
How Undersea Cables are Repaired
I've
mentioned
undersea
data
cables being cut before. Here's an
article
I found on Slashdot that discusses the repairing of those cables. Pretty neat stuff.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
ISC INFOCon
Subscribe Now: Feed Icon
Subscribe in a reader
About Me
View my complete profile
Labels
Advice
(13)
Anti-Virus
(3)
Attack
(12)
Auditing
(9)
Book Review
(6)
Bruce
(2)
Certification
(16)
conference
(12)
DISA STIGs
(42)
DoD
(5)
Exploits
(4)
Facebook
(5)
forensics
(20)
Gadgets
(8)
Hardware
(4)
headaches
(15)
housekeeping
(5)
HowTo
(12)
IAVMs
(1)
Incident Response
(16)
incidents
(10)
Information Assurance
(10)
Information Assurance Engineer
(1)
Information Security Engineer
(3)
Insider Threat
(3)
intro
(1)
Just Business
(6)
Lessons Learned
(13)
Logs
(2)
LOL
(13)
Malware
(6)
Mental Note
(31)
Musings
(6)
Network Security Monitoring
(3)
New Hacking Techniques
(1)
News
(6)
Oddities
(6)
Odds and Ends
(3)
other
(25)
Patch Management
(2)
Policy
(5)
Python
(5)
Rants
(7)
Readings
(7)
SANS
(2)
Scripts
(6)
Security Awareness
(1)
Security Philosophy
(3)
SPAM
(2)
SQLi
(1)
Testing Engagements
(14)
Theory
(1)
To Do
(2)
Tools
(36)
Training
(3)
Updates
(11)
Upgrades
(9)
Verizon
(3)
Web App Testing
(6)
White Paper
(6)
Zone Alarm
(3)
Blog Archive
►
2019
(1)
►
September
(1)
►
2015
(4)
►
October
(1)
►
July
(3)
►
2014
(20)
►
December
(2)
►
August
(1)
►
May
(3)
►
April
(2)
►
March
(6)
►
February
(4)
►
January
(2)
►
2013
(23)
►
December
(3)
►
November
(3)
►
October
(1)
►
September
(2)
►
May
(2)
►
April
(5)
►
March
(3)
►
January
(4)
►
2012
(34)
►
December
(3)
►
November
(3)
►
October
(1)
►
September
(2)
►
August
(2)
►
July
(1)
►
June
(1)
►
May
(3)
►
April
(3)
►
March
(5)
►
February
(6)
►
January
(4)
►
2011
(71)
►
December
(2)
►
November
(5)
►
October
(4)
►
September
(4)
►
August
(8)
►
July
(8)
►
June
(5)
►
May
(5)
►
April
(8)
►
March
(8)
►
February
(4)
►
January
(10)
►
2010
(40)
►
December
(4)
►
November
(2)
►
October
(3)
►
September
(1)
►
August
(3)
►
July
(3)
►
June
(1)
►
May
(3)
►
April
(3)
►
March
(7)
►
February
(4)
►
January
(6)
▼
2009
(61)
►
December
(7)
►
November
(4)
►
October
(2)
►
September
(2)
►
August
(5)
►
July
(4)
►
June
(7)
►
May
(6)
►
April
(7)
▼
March
(6)
SANS Application Security Summit
Information Security Magaznie - What Happened?
Facebook Security/Privacy
Open Source (or free) Web Application Vulnerabilit...
How Undersea Cables are Repaired
Web Application Testing
►
February
(5)
►
January
(6)
►
2008
(122)
►
December
(13)
►
November
(12)
►
October
(9)
►
September
(12)
►
August
(6)
►
July
(10)
►
June
(7)
►
May
(6)
►
April
(13)
►
March
(6)
►
February
(12)
►
January
(16)
►
2007
(22)
►
December
(8)
►
November
(1)
►
October
(2)
►
September
(3)
►
August
(5)
►
July
(3)
No comments:
Post a Comment