Categories
Default

The Utmost Basic Rule of Cyber-security and Information-Security

We must never forget that when dealing in Cyber-security and Information-security, the utmost basic rule is specific aligns with secure, like an invented analogy. We begin by only having specific channels of entry/incoming and exit/outgoing rules for signals or information. If we must be unspecific, then we must have specified rules, or we are automatically insecure, even if secure by all other means or through other means such as system firewall. The program may be immune to attacks or theft or intrusion, etc. or else, but remains insecure unless is specific by all means and in all ways.

Categories
Default

Welcome to my personal blog!

My name is Deshaun or Shaun for short, and I am an aspiring Computer Information Systems and English language student of the University that intends to take up a medical practice one day. The goal within the grand scheme of all things is to design medical technology and a superior CPU that I have experience with from working as Technical Support and Developmental Support at Microsoft Company before.

In any event, this blog is here to feature state-of-the-art software of my own design of Java, C++ or PHP and interesting software outside my design with unique information that should be interesting enough!