Transforming Engineering from the inside out

From clearing the papers on a CEO’s desk to proving a point by becoming a published author, we join Will Beer on his journey to save engineering departments from themselves.  Inspired from a young age by stories of his great grandfather John Francis ‘Frank’ Tunley, who worked in the 1940s as a pattern maker, to … Read more

WINDOWS VS. LINUX DESIGN

It is possible that email and browser-based viruses, Trojans and worms are the source of the myth that Windows is attacked more often than Linux. Clearly there are more desktop installations of Windows than Linux. It is certainly possible, if not probable, that Windows desktop software is attacked more often because Windows dominates the desktop. … Read more

SHADOW FILE

SHADOW FILE In Unix-like operating systems, /etc/shadow is used to increase the security level of passwords by restricting all but highly privileged users’ access to hashed password data. Typically, that data is kept in files owned by and accessible only by the super user. DESIGN Systems administrators can reduce the likelihood of brute force attacks … Read more