About the author
Several years (around 2001-2002) ago, I thought IT security will become an important focus, and I started a business named "Right Security Consultants", and provided these services:
Around mid 2005, I focused my efforts on providing software development support by joining (then) Borland as a Technical Support Engineer.
Over the years, I have kept my eyes occasionally on the security scene. At some point in the past, I had written a blog entry to remind myself to look at the Metasploit Framework as I was consulted back then on some security issues, and Metasploit Framework was mentioned.
And today... I was reading some PDFs on Enterprise Security Management, and I thought I'll fire a question on Enterprise Security Management, and I learnt that Security Management now includes the following:
Previously, I was only aware of some of those, and not all of them...
So... I learnt something new today. :-)
Learn why the map is cool in Go!
A method to design records so that they're allocated on a specific byte boundary, such as 16 bytes, 512 bytes, 4096 bytes, etc.
Learn the command line used to compile System.pas in Delphi
How to free more space on your home drive by redirecting the location for SDKs in RAD Studio