Leadership across-the-board in government and industry
has little to zero hands-on-the-keyboard operational
experience in cyber defense. Most are but arm chair quarterbacks
in the very challenging cyber domain.
4. Cyberspace is Invisible
Unlike land, air, sea and space ops, cyberspace is
not visible to the naked eye. Cyberspace is very
different that traditional military "battle spaces"
and so traditional defenses are ineffective.
3. Visualizing Cyberspace is Under Funded
Commercial industry and governments have not invested
in the tools and technologies necessary to virtualize,
visualize and operationalize cyberspace so defenders
can "see" inside of cyberspace in near real-time.
2. Debasement of Humans
Commercial industry and governments have convinced
us that computers are soon to become more intelligent
than humans, effectively debasing humans in favor
of machines.
1. AI is a False Promise
Commercial industry and governments have convinced
society that machines and AI will solve the serious
cybersecurity threats we face. This is a false and dangerous.
Stock videos and royalty free music licensed from Motion Array and StoryBlocks
Hi
I am running Lion with latest patches
> uname -a
Darwin wger.local 11.2.0 Darwin Kernel Version 11.2.0: Tue Aug 9 20:54:00 PDT 2011; root:xnu-1699.24.8~1/RELEASE_X86_64 x86_64
Installed mplayer, ffmpeg, gnu-getopt and ImageMagick through brew.
I am unable to generate Video Contact... (0 Replies)
Hi.
I've been very busy this month working on resurrecting my old projects related to "cyberspace situational awareness" (CSA) which began last month by surveying the downstream literature that referenced my papers in this area using Google Scholar and also ResearchGate and posting updates on my... (5 Replies)
Please message me or post in this thread if anyone is interested in contributing some C, C++, or C# code for this project. Right now we have an open source C++ git project (created by someone else a few years ago) that fails when we try to compile on Ubuntu. I need someone to fix the make... (4 Replies)
Richard Zuech annotates his first experience flying in virtualized cyberspace hunting the bad guys!
... and he finds some!
Application for Virtualizing CyberSpace like Outer Space for Cyberspace Situational Awareness (0 Replies)
FYI.
On ResearchGate: Researchers render cyberspace like a 3D video game to make identifying threats easier
24th July 2017 by Katherine Lindemann
Cybersecurity analysts may soon be able to travel through cyberspace like outer space and see attacks with the naked eye.
On ResearchGate:... (3 Replies)
What do you think?
Read this: Virtualized Cyberspace, Cyberspace Consciousness and Simulation Theory
and comment below....
Are we in a computer simulation? Yes or No?
Thanks! (0 Replies)
You are seeing this new video here first!
Top Five Cybersecurity Threats | Earth Year 2019 | You Have Been Warned!
https://youtu.be/dRE4u9QVsSg
PS: That video has two small typos, but nothing serious. Heck it took nearly 1.5 hours to render even on a 12-core Mac Pro with 64GB of... (20 Replies)
Discussion started by: Neo
20 Replies
LEARN ABOUT OSF1
true
true(1) General Commands Manual true(1)NAME
true, false - Returns a standard exit value
SYNOPSIS
true
false
STANDARDS
Interfaces documented on this reference page conform to industry standards as follows:
true: XCU5.0
false: XCU5.0
Refer to the standards(5) reference page for more information about industry standards and associated tags.
DESCRIPTION
The true command returns a 0 (zero) exit value. The false command returns a nonzero exit value. These commands are usually used in input to
shell commands.
NOTES
The special built-in utility : (colon) is sometimes more efficient than the true command.
EXIT STATUS
[Tru64 UNIX] The nonzero value returned by the false command may vary from system to system.
EXAMPLES
To construct a loop in a shell procedure, enter: while true do date sleep 60 done
This procedure displays the date and time once a minute. To stop it, press the Interrupt key sequence.
SEE ALSO
Commands: csh(1), ksh(1), Bourne Shell sh(1b), POSIX shell sh(1p)
Standards: standards(5)true(1)