Darren Thomas

Recent articles by Darren Thomas

The Art of War: Part 1

The Art of War: Part 1

"The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:25PM Security
The Art of War: Part 2

The Art of War: Part 2

"If you know the enemy and know yourself, you need not fear the result of a hundred battles." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:13PM Security
The Art of War: Part 3

The Art of War: Part 3

"If you know the enemy and know yourself, you need not fear the result of a hundred battles." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:02PM Security
The Art of War: Part 4

The Art of War: Part 4

"Success in warfare is gained by carefully accommodating ourselves to the enemy's purpose. If the enemy shows an inclination to advance, lure him on to do so; if he is anxious to retreat, delay on purpose that he may carry out his intentions." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:55PM Security
The Art of War: Part 5

The Art of War: Part 5

"Though the enemy be stronger in numbers, we may prevent him from fighting. Scheme so as to discover his plans and the likelihood of their success. Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:50PM Security
The Art of War: Part 6

The Art of War: Part 6

"Though the enemy be stronger in numbers, we may prevent him from fighting. Scheme so as to discover his plans and the likelihood of their success. Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:37PM Security
The Art of War: Part 7

The Art of War: Part 7

Last month, we looked at just how easy it is for a hacker to gain entrance to an unprotected network.
Darren Thomas Jan 9 2004 3:22PM Security

Log In

  |  Forgot your password?