Shaare your links...
2371 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 6 / 9
Newer►
177 results for tags security x
  • Password Hashing Competition
    The Password Hashing Competition (PHC) is an effort organized to identify new password hashing schemes in order to improve on the state-of-the-art (PBKDF2, scrypt, etc.), and to encourage the use of strong password protection. Applications include for example authentication to web services, PIN authentication on mobile devices, key derivation for full disk encryption, or private keys encryption.
    Fri Oct 30 16:06:31 2015 - permalink -
    - https://password-hashing.net/index.html
    security software
  • The Protection of Information in Computer Systems
    JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND
    MICHAEL D. SCHROEDER, MEMBER, IEEE
    Invited Paper

    Manuscript received October 11, 1974; revised April 17. 1975. Copyright © 1975 by J. H. Saltzer.
    The authors are with Project MAC and the Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology Cambridge, Mass. 02139.

    Abstract - This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer architecture. It examines in depth the principles of modern protection architectures and the relation between capability systems and access control list systems, and ends with a brief analysis of protected subsystems and protected objects. The reader who is dismayed by either the prerequisites or the level of detail in the second section may wish to skip to Section III, which reviews the state of the art and current research projects and provides suggestions for further reading.
    Fri Sep 25 14:37:57 2015 - permalink -
    - http://web.mit.edu/Saltzer/www/publications/protection/
    computer reading security
  • Academic Signature
    An open source program for elliptic curve cryptography
    using a wxWidgets GUI  ( ecc digital signatures, ecc encryption and timestamps)
    Thu Sep 17 22:15:26 2015 - permalink -
    - https://www.fh-wedel.de/~an/crypto/Academic_signature_eng.html
    cryptography FOSS security
  • Detailed Smart Card Cryptographic Token Security Guide | The Changelog
    Just what it says.
    Thu Sep 3 11:50:03 2015 - permalink -
    - http://changelog.complete.org/archives/9381-detailed-smart-card-cryptographic-token-security-guide
    security TODO
  • Pass: The Standard Unix Password Manager
    Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
    On https://hackaday.io/project/9564-rpi-zero-wifi-enabled-hardware-password-manager, a Raspberry π 0 is used to run it.
    Thu Sep 3 11:38:23 2015 - permalink -
    - http://www.passwordstore.org/
    cryptography pi raspberry security tool π
  • GRC's | SQRL Secure Quick Reliable Login  
    A highly secure, comprehensive, easy-to-use replacement
    for usernames, passwords, reminders, one-time-code
    authenticators . . . and everything else.
    The site contains other interesting things such as a TrueCrypt repository, password generators and other tools and information about the PDP-8.
    Thu Aug 27 14:23:18 2015 - permalink -
    - https://www.grc.com/sqrl/sqrl.htm
    security TODO tool
  • SSH Host Certificates with YubiKey NEO | Simon Josefsson's blog
    How to manage SSH Host Certificates with YubiKey NEO.
    Sat Aug 15 21:28:53 2015 - permalink -
    - http://blog.josefsson.org/2015/06/16/ssh-host-certificates-with-yubikey-neo/
    security tool
  • Open WhisperSystems | Is it secure? Can I trust it?
    Secure text messages for Android and iOS.
    Wed Jul 15 16:57:57 2015 - permalink -
    - http://support.whispersystems.org/customer/portal/articles/1473575-is-it-secure-can-i-trust-it-
    Android cryptography iOS security
  • Pluggable Authentication Modules for Linux | Linux Journal
    Description of pluggable authentication modules for Linux, from 1997.
    Sat Jun 6 23:23:06 2015 - permalink -
    - http://www.linuxjournal.com/article/2120?page=0,1
    Linux reading security
  • ProtonMail - Secure email based in Switzerland
    Browser-based end-to-end encryption for e-mail.
    Wed Jun 3 19:29:12 2015 - permalink -
    - https://protonmail.ch/
    cryptography e-mail security
  • Hardware encrypted portable HDD SSD drives iStorage
    USB storage devices with hardware encryption and keypad. Capacities range from 4 GB to 6 TB.
    Fri May 8 22:18:39 2015 - permalink -
    - http://www.istorage-uk.com/index.php
    cryptography hardware security
  • http://ecryptfs.org/about.html
    eCryptfs is a POSIX-compliant enterprise cryptographic stacked filesystem for Linux. eCryptfs stores cryptographic metadata in the header of each file, so that encrypted files can be copied between hosts; the file will be decrypted with the proper key in the Linux kernel keyring. There is no need to keep track of any additional information aside from what is already in the encrypted file itself. You may think of eCryptfs as a sort of "gnupg as a filesystem".
    Tue Apr 28 10:44:30 2015 - permalink -
    - http://ecryptfs.org/about.html
    cryptography FOSS Linux security
  • Avoiding the top 10 security flaws | IEEE Cybersecurity Initiative
    Guideline to avoid common security flaws in software.
    Tue Mar 10 17:34:45 2015 - permalink -
    - http://cybersecurity.ieee.org/center-for-secure-design/avoiding-the-top-10-security-flaws.html
    security software
  • Tomb :: File Encryption on Linux
    Tomb is an 100% free and open source system for file encryption on Linux, facilitating the backup of secret files. Tomb is written in code that is easy to review and links commonly shared components.

    Tomb generates encrypted storage folders to be opened and closed using their associated keyfiles, which are also protected with a password chosen by the user.

    A tomb is like a locked folder that can be safely transported and hidden in a filesystem; its keys can be kept separate, for instance keeping the tomb file on your computer harddisk and the key files on a USB stick.

    Tomb is a simple tool to manage encrypted storage on GNU/Linux, from the hashes of the dyne:bolic nesting mechanism.
    Wed Feb 11 13:56:12 2015 - permalink -
    - https://www.dyne.org/software/tomb/
    cryptography FOSS Linux security
  • OneRNG
    The OneRNG is a project to create a reliable and open hardware random number generator - one that can be verified by the user and can be trusted. See also http://onerng.info/
    Wed Jan 28 23:52:15 2015 - permalink -
    - http://moonbaseotago.com/onerng/
    hardware security
  • Infinite Noise true random number generator from WaywardGeek on Tindie
    Hardware TRNG with USB interface, $25.
    Wed Jan 28 23:50:00 2015 - permalink -
    - https://www.tindie.com/products/WaywardGeek/infinite-noise/
    hardware security
  • Simtec Electronics Entropy Key: USB True Random Number Generator
    The Entropy Key is a small, unobtrusive and easily installed USB stick that generates high-quality random numbers, or entropy.
    The Entropy Key contains two high-quality noise generators, and an ARM Cortex CPU that actively measures, checks and confirms all generated random numbers, before encrypting them and sending them to the server. It also actively detects attempts to corrupt or sway the device. It aims towards FIPS-140-2 Level 3 compliance with some elements of Level 4, including tamper-evidence, tamper-proofing, role-based authentication, and environmental attacks. If it detects that one of its two generators has failed, may be about to fail, or if it detects a physical attack, it will automatically shut down.
    £36, but currently (Jan 2015) out of stock.
    Wed Jan 28 18:07:41 2015 - permalink -
    - http://www.entropykey.co.uk/
    hardware security
  • The Privacy Surgeon » Dissecting the issues that matter to you
    Blog of the privacy activist Simon Davies.
    Sun Jan 25 23:02:51 2015 - permalink -
    - http://www.privacysurgeon.org/blog/
    blog cryptography politics reading security
  • USB armory wiki
    The USB armory from Inverse Path is an open source hardware design, implementing a flash drive sized computer.
    Tue Jan 6 22:32:26 2015 - permalink -
    - https://github.com/inversepath/usbarmory/wiki
    FOSS hardware security
  • simple password manager
    Requires X11, gpg.
    Tue Jan 6 21:33:31 2015 - permalink -
    - https://github.com/stef/pwd.sh
    FOSS security
Links per page: 20 50 100
◄Older
page 6 / 9
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.