Thinking Inside The Box About System Boundaries and Compliance

About 100 years ago, a brain teaser known as the nine-dot puzzle appeared in the Cyclopedia of Puzzles. It is fairly simple in principle, but it can be quite challenging for many people when they see it for the first time. An array of nine dots, equally spaced in a square pattern are presented with the challenge to connect all the dots with four straight lines without lifting the pencil from the page. The solution to the puzzle requires that lines go beyond the boundaries of the imaginary box that is formed by the outer set of dots. Since most people will limit themselves to the invisible borders formed by the dots, the solution can be elusive.

Read more

Top 5 Unfortunately Common Online Attacks

Using the Internet continues to be a risky endeavor as the range of exploits and attacks continues to increase. Even without seeking out questionable content, it is easy to be compromised by a wide range of common online attacks. Here are five unfortunately common online attacks and what you need to do about them.

Read more