Neil MacDonald
![Neil MacDonald](/assets/img/authors/unknown.jpg)
Neil MacDonald
Neil Macdonaldis a Canadian journalist with the Canadian Broadcasting Corporation, currently senior correspondent for CBC News The National...
desire enforce intention less name
We have no intention and even less desire to enforce this name on everything.
base code continue doubt improve malicious microsoft operating security target writers
There is no doubt that, as Microsoft and other vendors continue to improve the security of their base operating systems, malicious code writers will 'move up the stack' and target applications.
ball credit except high intensity needed opening played pleased throughout tonight
We did everything we needed to tonight except put the ball in the back of the net. I thought we played at a high intensity throughout and we competed from the opening whistle. Give credit to Memphis, they did what they needed to do to get the result, but I was very pleased with our play tonight nonetheless.
adjust came clinton looked manager work
They need to get to know each other. AJ looked more comfortable when Clinton came off and we just had two up front. But they have to adjust to what the manager wants, and we will work at it in training.
adjust came clinton looked manager work
They need to get to know each other, ... AJ looked more comfortable when Clinton came off and we just had two up front. But they have to adjust to what the manager wants, and we will work at it in training.
colleagues friends-or-friendship
This is e-mail from your friends and colleagues ... that is worthless.
complacent exploits found macintosh mistake practices security themselves thinking users worst
The worst mistake Macintosh users could make would be to become complacent in their security practices deluding themselves into thinking that the Mac OS has no vulnerabilities. It does. More will be found and more exploits will appear.
brings couple hype necessary problem several together viruses
The hype around mobile-device viruses has been around for several years, but 2006 brings together a couple of necessary prerequisites for the problem to become real.
came caught eliminated format image issue overlooked
This should have been caught and eliminated years ago. They overlooked image format files, and that is where this WMF issue came in.
access difficult people until
Until people get their e-mail under control, it's going to be very difficult to access e-mail from handheld devices.
bulk counting stuff tracking
Tracking this stuff is like counting icebergs: The bulk are underwater.
across believe best hips levels optimal strategy styles
Through 2010, we believe the best HIPS strategy for desktops and servers will use a combination of HIPS styles across all levels for optimal protection,
aspect attacks browser clicking combined continue deployed explorer fact focal internet means point prime users widely
The fact that Internet Explorer is so widely deployed makes it a prime target. This, combined with the 'social engineering' aspect of these attacks -- tricking the users into installing or clicking on something they shouldn't -- means the browser will continue to be a focal point of attack.