Book Review: “North Korea’s Juche Myth”

Source: National Cyber Security – Produced By Gregory Evans North Korea’s Juche Myth By B. R. Myers. Busan: Sthele Press, August 2015. 289 pp. Analysts often invoke North Korea’s Juche ideology of “self-reliance” to explain everything from the country’s personality cult to its military belligerence. Some portray Juche as a…

read more

Debunking the Cloud All-Or-Nothing Myth: An Insider’s Look

The Rackspace Cloud Launch team discusses a common myth in cloud computing, that it is an all-or-nothing proposition. Find out the truth about how you can mo… ________________ Other Sites You May Like: http://gregorydevans.wordpress.com – https://gregorydevans.com – http://hackerforhire.com – http://hackerforhireusa.com – http://parentsecurityonline.com – http://hiphopsecurityonline.com – http://Locatepc.net – http://areyouhackerproof.com – http://amihackerproof.com…

read more

Mac Security: A Myth?

Apple is taking steps to address the Java vulnerabilities behind the Flashback Trojan outbreak. But Java isn’t the only attack vector for OS X — and Apple users can no longer cling to the belief that Macs are virtually immune to malware. View full post on eSecurityPlanet RSS Feed View…

read more