Shaare your links...
2486 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 76 / 125
Newer►
  • (lisp (flavoured (erlang)))
    Lisp compiler for the Erlang VM.
    Fri Nov 6 18:07:59 2015 - permalink -
    - http://lfe.io/
    erlang lisp software
  • http://mumble.net/~campbell/scheme/style.txt
    This is a guide to Lisp style, written by Taylor R. Campbell, to
    describe the standard rules of Lisp style as well as a set of more
    stringent rules for his own style.
    The site contains o
    Fri Nov 6 15:10:34 2015 - permalink -
    - http://mumble.net/~campbell/scheme/style.txt
    lisp reading Scheme
  • Password Hashing Competition
    The Password Hashing Competition (PHC) is an effort organized to identify new password hashing schemes in order to improve on the state-of-the-art (PBKDF2, scrypt, etc.), and to encourage the use of strong password protection. Applications include for example authentication to web services, PIN authentication on mobile devices, key derivation for full disk encryption, or private keys encryption.
    Fri Oct 30 16:06:31 2015 - permalink -
    - https://password-hashing.net/index.html
    security software
  • guiqwt - Efficient 2D plotting Python library based on PyQwt - Google Project Hosting
    Read-only project page.
    Wed Oct 7 13:07:31 2015 - permalink -
    - https://code.google.com/p/guiqwt/
    plot Python software
  • The Deep Sweep
    The Deep Sweep is an aerospace probe scanning the otherwise out-of-reach signal space between land and stratosphere, with special interest placed in UAV/drone to satellite communication.
    Fri Sep 25 18:43:43 2015 - permalink -
    - https://criticalengineering.org/projects/deep-sweep/
    hack politics radio software
  • The Protection of Information in Computer Systems
    JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND
    MICHAEL D. SCHROEDER, MEMBER, IEEE
    Invited Paper

    Manuscript received October 11, 1974; revised April 17. 1975. Copyright © 1975 by J. H. Saltzer.
    The authors are with Project MAC and the Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology Cambridge, Mass. 02139.

    Abstract - This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer architecture. It examines in depth the principles of modern protection architectures and the relation between capability systems and access control list systems, and ends with a brief analysis of protected subsystems and protected objects. The reader who is dismayed by either the prerequisites or the level of detail in the second section may wish to skip to Section III, which reviews the state of the art and current research projects and provides suggestions for further reading.
    Fri Sep 25 14:37:57 2015 - permalink -
    - http://web.mit.edu/Saltzer/www/publications/protection/
    computer reading security
  • Ajiu's PDP-11 emulator
    Javascript program emulating a pdp-11 running v6 unix.
    Thu Sep 24 15:35:06 2015 - permalink -
    - http://pdp11.aiju.de/
    computer emulator history JavaScript on-line pdp-11 Unix
  • Academic Signature
    An open source program for elliptic curve cryptography
    using a wxWidgets GUI  ( ecc digital signatures, ecc encryption and timestamps)
    Thu Sep 17 22:15:26 2015 - permalink -
    - https://www.fh-wedel.de/~an/crypto/Academic_signature_eng.html
    cryptography FOSS security
  • Constellation Information | European GNSS Service Centre
    Information about the status of the Galileo satellite navigation system.
    Tue Sep 15 17:36:18 2015 - permalink -
    - http://www.gsc-europa.eu/system-status/Constellation-Information
    Galileo satellite-navigation
  • liquid-dsp
    liquid-dsp is a free and open-source signal processing library for software-defined radios written in C. Its purpose is to provide a set of extensible DSP modules that do no rely on external dependencies or cumbersome frameworks. The project is now hosted on liquid-dsp is a free and open-source signal processing library for software-defined radios written in C. Its purpose is to provide a set of extensible DSP modules that do no rely on external dependencies or cumbersome frameworks. The project is now hosted on http://github.com/jgaeddert/liquid-dsp/
    Mon Sep 14 12:39:47 2015 - permalink -
    - http://liquidsdr.org/
    C FOSS signal-processing software
  • Javascript PDP 11/70 Emulator v1.0
    Another emulator for the pdp11/70 written in Javascript. While it ist far from perfect according to the author, it has a nice front panel.
    Sun Sep 13 20:33:10 2015 - permalink -
    - http://skn.noip.me/pdp11/pdp11.html
    computer emulator for:fossy history JavaScript on-line pdp-11
  • plan9port moved to git
    Plan 9 from User Space moved from http://swtch.com/plan9port here. See also the Google discussion group https://groups.google.com/forum/#!topic/plan9port-dev/OqSvUDfwS-M.
    Thu Sep 10 18:13:49 2015 - permalink -
    - https://github.com/9fans/plan9port
    plan9 software
  • Boot Raspberry PI (2) from a USB Stick - JonathanMH
    Short description with links.
    Mon Sep 7 23:44:14 2015 - permalink -
    - http://jonathanmh.com/boot-raspberry-pi-from-a-usb-stick/
    HOWTO raspberry USB
  • Detailed Smart Card Cryptographic Token Security Guide | The Changelog
    Just what it says.
    Thu Sep 3 11:50:03 2015 - permalink -
    - http://changelog.complete.org/archives/9381-detailed-smart-card-cryptographic-token-security-guide
    security TODO
  • spark - ▁▂▃▅▂▇ in your shell.
    Written in 91 lines of C, license is unclear.
    Thu Sep 3 11:42:03 2015 - permalink -
    - http://git.zx2c4.com/spark/about/
    graphical-programming hack
  • Pass: The Standard Unix Password Manager
    Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
    On https://hackaday.io/project/9564-rpi-zero-wifi-enabled-hardware-password-manager, a Raspberry π 0 is used to run it.
    Thu Sep 3 11:38:23 2015 - permalink -
    - http://www.passwordstore.org/
    cryptography pi raspberry security tool π
  • GRC's | SQRL Secure Quick Reliable Login  
    A highly secure, comprehensive, easy-to-use replacement
    for usernames, passwords, reminders, one-time-code
    authenticators . . . and everything else.
    The site contains other interesting things such as a TrueCrypt repository, password generators and other tools and information about the PDP-8.
    Thu Aug 27 14:23:18 2015 - permalink -
    - https://www.grc.com/sqrl/sqrl.htm
    security TODO tool
  • SSH Host Certificates with YubiKey NEO | Simon Josefsson's blog
    How to manage SSH Host Certificates with YubiKey NEO.
    Sat Aug 15 21:28:53 2015 - permalink -
    - http://blog.josefsson.org/2015/06/16/ssh-host-certificates-with-yubikey-neo/
    security tool
  • jvburnes/node9 · GitHub
    Node9 is a hosted 64-bit operating system based on Bell Lab's Inferno OS, but using the Lua scripting language instead of Limbo and the LuaJIT high performance virtual machine instead of the Dis virtual machine. It also uses the libuv I/O library for maximum portability, efficient event processing and thread management.
    Mon Jul 27 00:12:33 2015 - permalink -
    - https://github.com/jvburnes/node9
    inferno operating-system plan9
  • Open WhisperSystems | Is it secure? Can I trust it?
    Secure text messages for Android and iOS.
    Wed Jul 15 16:57:57 2015 - permalink -
    - http://support.whispersystems.org/customer/portal/articles/1473575-is-it-secure-can-i-trust-it-
    Android cryptography iOS security
Links per page: 20 50 100
◄Older
page 76 / 125
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.