Shaare your links...
2431 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 6 / 10
Newer►
182 results for tags security x
  • /dev/random - Random Thoughts On Programming In Parentheses - Pee - A password manager for the command line
    A simple password manager written in Chicken Scheme.

    Other articles on the blog are interesting as well, e.g. http://pestilenz.org/~ckeen/blog/posts/germany.html has an interesting plot.
    Wed Jan 13 17:05:14 2016 - permalink -
    - http://pestilenz.org/~ckeen/blog/posts/pee.html
    cryptography Scheme security
  • UBERWACH!
    Es werden Zugriffe der Bundes- und Landesministerien, sowie von Regierungs- und Oppositionsparteien auf teilnehmende Blogs, Foren und Webauftritte überwacht.
    Wed Jan 6 19:30:42 2016 - permalink -
    - http://www.uberwach.de/
    german politics security web
  • Pond - forward secure, asynchronous messaging
    So Pond is not email. Pond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they are received. Pond seeks to prevent leaking traffic information against everyone except a global passive attacker.
    Written in go.
    Tue Dec 15 13:07:01 2015 - permalink -
    - https://pond.imperialviolet.org/
    cryptography Go security software
  • Expertized in mobile security, virtualization and cloud services - TrustKernel Home
    Trusted execution environment for ARM-based computers, based on
    https://en.wikipedia.org/wiki/Xv6
    Wed Nov 18 14:39:24 2015 - permalink -
    - https://www.trustkernel.com/
    ARM security software Unix
  • Password Hashing Competition
    The Password Hashing Competition (PHC) is an effort organized to identify new password hashing schemes in order to improve on the state-of-the-art (PBKDF2, scrypt, etc.), and to encourage the use of strong password protection. Applications include for example authentication to web services, PIN authentication on mobile devices, key derivation for full disk encryption, or private keys encryption.
    Fri Oct 30 16:06:31 2015 - permalink -
    - https://password-hashing.net/index.html
    security software
  • The Protection of Information in Computer Systems
    JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND
    MICHAEL D. SCHROEDER, MEMBER, IEEE
    Invited Paper

    Manuscript received October 11, 1974; revised April 17. 1975. Copyright © 1975 by J. H. Saltzer.
    The authors are with Project MAC and the Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology Cambridge, Mass. 02139.

    Abstract - This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer architecture. It examines in depth the principles of modern protection architectures and the relation between capability systems and access control list systems, and ends with a brief analysis of protected subsystems and protected objects. The reader who is dismayed by either the prerequisites or the level of detail in the second section may wish to skip to Section III, which reviews the state of the art and current research projects and provides suggestions for further reading.
    Fri Sep 25 14:37:57 2015 - permalink -
    - http://web.mit.edu/Saltzer/www/publications/protection/
    computer reading security
  • Academic Signature
    An open source program for elliptic curve cryptography
    using a wxWidgets GUI  ( ecc digital signatures, ecc encryption and timestamps)
    Thu Sep 17 22:15:26 2015 - permalink -
    - https://www.fh-wedel.de/~an/crypto/Academic_signature_eng.html
    cryptography FOSS security
  • Detailed Smart Card Cryptographic Token Security Guide | The Changelog
    Just what it says.
    Thu Sep 3 11:50:03 2015 - permalink -
    - http://changelog.complete.org/archives/9381-detailed-smart-card-cryptographic-token-security-guide
    security TODO
  • Pass: The Standard Unix Password Manager
    Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
    On https://hackaday.io/project/9564-rpi-zero-wifi-enabled-hardware-password-manager, a Raspberry π 0 is used to run it.
    Thu Sep 3 11:38:23 2015 - permalink -
    - http://www.passwordstore.org/
    cryptography pi raspberry security tool π
  • GRC's | SQRL Secure Quick Reliable Login  
    A highly secure, comprehensive, easy-to-use replacement
    for usernames, passwords, reminders, one-time-code
    authenticators . . . and everything else.
    The site contains other interesting things such as a TrueCrypt repository, password generators and other tools and information about the PDP-8.
    Thu Aug 27 14:23:18 2015 - permalink -
    - https://www.grc.com/sqrl/sqrl.htm
    security TODO tool
  • SSH Host Certificates with YubiKey NEO | Simon Josefsson's blog
    How to manage SSH Host Certificates with YubiKey NEO.
    Sat Aug 15 21:28:53 2015 - permalink -
    - http://blog.josefsson.org/2015/06/16/ssh-host-certificates-with-yubikey-neo/
    security tool
  • Open WhisperSystems | Is it secure? Can I trust it?
    Secure text messages for Android and iOS.
    Wed Jul 15 16:57:57 2015 - permalink -
    - http://support.whispersystems.org/customer/portal/articles/1473575-is-it-secure-can-i-trust-it-
    Android cryptography iOS security
  • Pluggable Authentication Modules for Linux | Linux Journal
    Description of pluggable authentication modules for Linux, from 1997.
    Sat Jun 6 23:23:06 2015 - permalink -
    - http://www.linuxjournal.com/article/2120?page=0,1
    Linux reading security
  • ProtonMail - Secure email based in Switzerland
    Browser-based end-to-end encryption for e-mail.
    Wed Jun 3 19:29:12 2015 - permalink -
    - https://protonmail.ch/
    cryptography e-mail security
  • Hardware encrypted portable HDD SSD drives iStorage
    USB storage devices with hardware encryption and keypad. Capacities range from 4 GB to 6 TB.
    Fri May 8 22:18:39 2015 - permalink -
    - http://www.istorage-uk.com/index.php
    cryptography hardware security
  • http://ecryptfs.org/about.html
    eCryptfs is a POSIX-compliant enterprise cryptographic stacked filesystem for Linux. eCryptfs stores cryptographic metadata in the header of each file, so that encrypted files can be copied between hosts; the file will be decrypted with the proper key in the Linux kernel keyring. There is no need to keep track of any additional information aside from what is already in the encrypted file itself. You may think of eCryptfs as a sort of "gnupg as a filesystem".
    Tue Apr 28 10:44:30 2015 - permalink -
    - http://ecryptfs.org/about.html
    cryptography FOSS Linux security
  • Avoiding the top 10 security flaws | IEEE Cybersecurity Initiative
    Guideline to avoid common security flaws in software.
    Tue Mar 10 17:34:45 2015 - permalink -
    - http://cybersecurity.ieee.org/center-for-secure-design/avoiding-the-top-10-security-flaws.html
    security software
  • Tomb :: File Encryption on Linux
    Tomb is an 100% free and open source system for file encryption on Linux, facilitating the backup of secret files. Tomb is written in code that is easy to review and links commonly shared components.

    Tomb generates encrypted storage folders to be opened and closed using their associated keyfiles, which are also protected with a password chosen by the user.

    A tomb is like a locked folder that can be safely transported and hidden in a filesystem; its keys can be kept separate, for instance keeping the tomb file on your computer harddisk and the key files on a USB stick.

    Tomb is a simple tool to manage encrypted storage on GNU/Linux, from the hashes of the dyne:bolic nesting mechanism.
    Wed Feb 11 13:56:12 2015 - permalink -
    - https://www.dyne.org/software/tomb/
    cryptography FOSS Linux security
  • OneRNG
    The OneRNG is a project to create a reliable and open hardware random number generator - one that can be verified by the user and can be trusted. See also http://onerng.info/
    Wed Jan 28 23:52:15 2015 - permalink -
    - http://moonbaseotago.com/onerng/
    hardware security
  • Infinite Noise true random number generator from WaywardGeek on Tindie
    Hardware TRNG with USB interface, $25.
    Wed Jan 28 23:50:00 2015 - permalink -
    - https://www.tindie.com/products/WaywardGeek/infinite-noise/
    hardware security
Links per page: 20 50 100
◄Older
page 6 / 10
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.