Colin Angus Mackay
Authentication Module
This is a close up of my screen. The code is from a user authentication module I am working on. I decided to zoom in on it like this in immitation of movie directors who like this technique to show, in a fit of incredulity, that computer security, or computing in general, is beyond the reach of ordinary humans.
As a subpoint, this photograph is also a depiction the statement that "security through obscurity" is a flawed argument.
This image has also been licensed for use on the website of the Information Technology Association of America
Authentication Module
This is a close up of my screen. The code is from a user authentication module I am working on. I decided to zoom in on it like this in immitation of movie directors who like this technique to show, in a fit of incredulity, that computer security, or computing in general, is beyond the reach of ordinary humans.
As a subpoint, this photograph is also a depiction the statement that "security through obscurity" is a flawed argument.
This image has also been licensed for use on the website of the Information Technology Association of America