Summary: iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and risk management
Summary: iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and risk management