Home opinion-and-analysis The Linux Distillery Top 5 Linux references in pop-culture

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

#2 – George W Bush and the NSA
The NSA – the United States’ National Security Agency – moves in secret circles. Do they exist? Well, that bit is pretty certain. But do they listen to your phone calls? Do they mandate backdoors into your computer? Rumours and fears abound about the powers the NSA may or may not exercise.

In fact, by even mentioning them perhaps this site is now being monitored. Assuming it wasn’t already. Nevertheless, the NSA are often in the legitimate news within North America.

Back in 2006 President George W Bush said he didn’t seek congressional approval for a warrantless domestic eavesdropping program for one simple reason: he didn’t need it, he asserted.

This was just one of several elements in the NSA spying debate that arose when the program was revealed at the beginning of that year.

Possibly interesting stuff, but it’s tangential to what I want to show you. During that controversial period the President took a super-secret tour of the super-secret NSA’s super-secret hideway in not-so-secret Fort Meade.

Actually the tour may not have been all that secret because evidently a horde of media accompanied the Presidential entourage. And what’s exciting is a shot of Bush along with Lt. Gen. Keith B Alexander (director of the NSA) and William Marshall (another NSA top brass.)
This picture appeared on television and in major print publications like the Washington Post, Newsweek and more, along with daily newspapers.

Emblazoned clearly on the wall behind them is a screen listing the latest tool versions of such open source security perennials as Ethereal, Nessus, Nmap, Cain and Abel, Metasploit, Snort and Kismet. The name, date of last release, and current version number of each is prominently displayed.

Ok, maybe the NSA are tapping your phone (or maybe not) but they’re certainly tracking what’s new in the world of open source security tools. And if it’s good enough for the NSA, maybe it’s good enough for you.

George W Bush visits the NSA, who are tracking open source security tools

Coming up, my #1 pop-culture reference. And without a doubt you’ll have seen it.

#5 – Dilbert
#4 – The Mighty Avengers
#3 – The Matrix Reloaded
#2 – George Bush and the NSA
#1 – Jurassic Park





FREE CLOUD BACKUPS MANAGEMENT WEBINAR

Are your technicians spending too much time just managing your clients cloud backups?

Backups are an important part of any IT business but they should not consume more than their fair share of time and money.

Discover how to reduce the amount of time & money spent managing your Cloud Backups during this Free Webinar.

REGISTER FOR FREE WEBINAR!

FREE NETWORKING SERVICES CASE STUDY

As one of the world’s largest social networking services, Facebook handles a lot of user information, and requires input from an astounding range of stakeholders 24 hours a day, 7 days a week — from both inside and outside the business.

Discover how Facebook was helped to connect remote employees, vendors, consultants, and partners to applications and web services quickly and reliably - without risking sensitive data.

GET CASE STUDY!

GET THE IT BUDGET YOU WANT

Explore your Network Treasure Trove to get the IT Budget you want

With Australian businesses projected to spend over $78.7 Billion why does it feel like you can never get the budget you need?.

In most cases your budget will get approved because the proposals are not only technically correct, but also provide good, credible evidence on how the spend aligns with key business objectives.

Did you know that your Network Monitoring tool can help you build a comprehensive business case without an MBA?

HERE ARE 8 TIPS TO GET THE IT BUDGET YOU WANT.

CLICK HERE!

David M Williams

joomla site stats

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. Within two years, he returned to his alma mater, the University of Newcastle, as a UNIX systems manager. This was a crucial time for UNIX at the University with the advent of the World-Wide-Web and the decline of VMS. David moved on to a brief stint in consulting, before returning to the University as IT Manager in 1998. In 2001, he joined an international software company as Asia-Pacific troubleshooter, specialising in AIX, HP/UX, Solaris and database systems. Settling down in Newcastle, David then found niche roles delivering hard-core tech to the recruitment industry and presently is the Chief Information Officer for a national resources company where he particularly specialises in mergers and acquisitions and enterprise applications.

Connect

 

 

 

 

Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities