1. Please share this blog post with your friends and on other social media. 2. Please send an email to the Washington Post to let them know that you want to see the results of their experiment. Here is the email address: socialmedia@washpost.com. Thanks for your help. The second is to patch. The third is to patch. The fourth is to patch. The fifth is to patch. The sixth is to patch. The seventh is to patch. The eighth is to patch. The ninth is to patch. The tenth is to patch. The eleventh is to patch. The twelfth is to patch. The thirteenth is to patch. The fourteenth is to patch. The fifteenth is to patch. The sixteenth is to patch. The seventeenth is to patch. The eighteenth is to patch. The nineteenth is to patch. The twentieth is to patch. The twenty-first is to patch. The twenty-second is to patch. The twenty-third is to patch. The twenty-fourth is to patch. The twenty-fifth is to patch. The twenty-sixth is to patch. The twenty-seventh is to patch. The twenty-eighth is to patch. The twenty-ninth is to patch. The thirtieth is to patch. The thirty-first is to patch. The thirty-second is to patch. The thirty-third is to patch. The thirty-fourth is to patch. The thirty-fifth is to patch. The thirty-sixth is to patch. The thirty-seventh is to patch. The thirty-eighth is to patch. The thirty-ninth is to patch. The fortieth is to patch. The forty-first is to patch. The forty-second is to patch. The forty-third is to patch. The forty-fourth is to patch. The forty-fifth is to patch. The forty-sixth is to patch. The forty-seventh is to patch. The forty-eighth is to patch. The forty-ninth is to patch. The fiftieth is to patch. The fifty-first is to patch. The fifty-second is to patch. The fifty-third is to patch. The fifty-fourth is to patch. The fifty-fifth is to patch. The fifty-sixth is to patch. The fifty-seventh is to patch. The fifty-eighth is to patch. The fifty-ninth is to patch. The sixtieth is to patch. The sixty-first is to patch. The sixty-second is to patch. The sixty-third is to patch. The sixty-fourth is to patch. The sixty-fifth is to patch. The sixty-sixth is to patch. The sixty-seventh is
“A vulnerability is a weakness in software or systems that can be exploited by a threat agent to compromise the security of a computer system. It may be a flaw in design (for example, buffer overflow), a coding error (for example, SQL injection), or a problem with configuration of a system (for example, cross-site scripting).”
The third is to think of a way you can help make your organisation more secure…
“A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This means that if a program has a security hole, a security patch can be created to fix it. There are also unofficial patches that have been created by individuals that have not been tested or approved by the software developer. Some patches have been found to be malicious, such as the Sony rootkit, which can render an infected computer inoperable.”