tag:blogger.com,1999:blog-4088979.post8992669830123064605..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: On BreakershipRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-4088979.post-76291466770764751402008-10-15T06:10:00.000-04:002008-10-15T06:10:00.000-04:00lol.. For sure a breaker...and not a builder....lol.. For sure a breaker...and not a builder....Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-20045024326664114262008-09-25T04:17:00.000-04:002008-09-25T04:17:00.000-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-86443063451472931082008-09-20T22:18:00.000-04:002008-09-20T22:18:00.000-04:00haha. he's not a builder but a breaker. hehehaha. he's not a builder but a breaker. heheAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-38365827566545113322008-09-16T17:39:00.000-04:002008-09-16T17:39:00.000-04:00I have a better military analogy for you.While rea...I have a better military analogy for you.<BR/><BR/>While reading the SFOD manual, I came across how to build FOBs, or forward operating bases. The construction and layout of these bases was extremely fascinating to me, as it certainly had many physical security implications that did translate at least somewhat well to information security.<BR/><BR/>One of the key pieces to a FOB is the CONEX (Container Express) or "battlebox". A CONEX can withstand the blast from a direct hit of an 81mm mortar round. I was thinking about the security of such devices, and noticed that some of the main problems of these structures is that they typically only have one door, and that the airflow comes in from underneath the structure, through grating.<BR/><BR/>Great post, btw. I am a big fan of "building codes" for Internet infrastructure and web applications. I am a big fan of Mark Curphey, JD Meier, and Jeff Williams especially. If you're into security, especially application security -- you should be following their work.drehttps://www.blogger.com/profile/17414510788948258195noreply@blogger.com