<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ngo in-a-box Archives - Sky&#039;s Blog</title>
	<atom:link href="https://blog.red7.com/tag/ngo-in-a-box/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.red7.com/tag/ngo-in-a-box/</link>
	<description>Communicating in a networked world</description>
	<lastBuildDate>Mon, 02 Jan 2017 20:14:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.red7.com/wp-content/uploads/2018/01/skyhi-wind-icon-256x256-120x120.png</url>
	<title>ngo in-a-box Archives - Sky&#039;s Blog</title>
	<link>https://blog.red7.com/tag/ngo-in-a-box/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>No chance for true security?</title>
		<link>https://blog.red7.com/no-chance-for-true-security/</link>
					<comments>https://blog.red7.com/no-chance-for-true-security/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Thu, 28 Jan 2010 17:15:13 +0000</pubDate>
				<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software and online tools]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ngo in-a-box]]></category>
		<category><![CDATA[security in-a-box]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2615</guid>

					<description><![CDATA[<p>Is security dead on the Internet? Yeah, it probably is—as long as we rely on software other people have written[1]. Unless you’re capable of writing all of your own software, without any errors, and keeping it isolated from software written by anyone else, you’re never going to have a secure digital life[2]. But there are [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/no-chance-for-true-security/">No chance for true security?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://security.ngoinabox.org/"><img decoding="async" class="size-full wp-image-2618 alignleft" style="border: 0pt none; margin: 2px 12px;" title="security-in-a-box-175" src="/wp-content/uploads/2010/01/security-in-a-box-175.jpg" alt="" width="175" height="63" /></a>Is security dead on the Internet? Yeah, it probably is—as long as we rely on software other people have written<sup>[1]</sup>. Unless you’re capable of writing all of your own software, without any errors, and keeping it isolated from software written by anyone else, you’re never going to have a secure digital life<sup>[2]</sup>.</p>
<p>But there are things you can do to protect yourself. <a href="http://ngoinabox.org/" target="_blank">NGO-in-a-box</a> has developed <a href="http://security.ngoinabox.org/" target="_blank"><em>Security-in-a-box, a set of tools and tactics for your digital security</em></a>. Worth taking a look!</p>
<p>It’s often said that “if we can envision it, we can create it,” but in the world of computer (and network) software this is only partially true. We can attempt to create it, but it will always have bugs in it. And those bugs are the chinks in the armor that allow malware to work and cyberwarfare to succeed.</p>
<hr class="hr_dashed" />[1] That’s because I can write a perfect program with no bugs, but nobody else can. <img decoding="async" class="alignnone size-full wp-image-2622" title="smiley wink 21x21 from skype" src="/wp-content/uploads/2010/01/wink-21x21.jpg" alt="" width="21" height="21" /></p>
<p>[2] See also <em><a href="http://thesocialgraphofmalware.com/" target="_blank">The Social Graph of Malware</a></em>, my site where I explore ways in which social engineering is used by the bad guys to get malware onto your computer.</p>
<p>The post <a href="https://blog.red7.com/no-chance-for-true-security/">No chance for true security?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/no-chance-for-true-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2615</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: blog.red7.com @ 2026-05-01 19:39:46 by W3 Total Cache
-->