nickh01uk writes: "Independent security researchers have compiled a list of their most frequently recommended security infrastructure components, drawn out the common threads that each shares, and attempt to answer the question "What makes this software so uncommonly good?". They then use this knowledge to put forward a straw-man for evaluating future tools and software for use in secure environments. Not everyone will agree with their choices, but many will appreciate the conclusions." Link to Original Source
The ideal voice for radio may be defined as showing no substance, no sex,
no owner, and a message of importance for every housewife.
-- Harry V. Wade