About the author
Several years (around 2001-2002) ago, I thought IT security will become an important focus, and I started a business named "Right Security Consultants", and provided these services:
Around mid 2005, I focused my efforts on providing software development support by joining (then) Borland as a Technical Support Engineer.
Over the years, I have kept my eyes occasionally on the security scene. At some point in the past, I had written a blog entry to remind myself to look at the Metasploit Framework as I was consulted back then on some security issues, and Metasploit Framework was mentioned.
And today... I was reading some PDFs on Enterprise Security Management, and I thought I'll fire a question on Enterprise Security Management, and I learnt that Security Management now includes the following:
Previously, I was only aware of some of those, and not all of them...
So... I learnt something new today. :-)
A method to design records so that they're allocated on a specific byte boundary, such as 16 bytes, 512 bytes, 4096 bytes, etc.