Shaare your links...
2261 links
interesting links
Home
Login
RSS Feed
ATOM Feed
Tag cloud
Picture wall
Daily
Links per page:
20
50
100
page 9 / 9
Newer►
171 results for tags
security
x
qemu does not check memory access permissions
Tue Nov 7 11:35:35 2006 - permalink
-
-
http://www.andrew.cmu.edu/user/crd/qemu_openbsd_note.html
security
Unix
Coyotos Secure Operating System
Another successor to EROS, a capability-based operating system. Attempts to use formal verification.
Thu Oct 19 19:29:36 2006 - permalink
-
-
http://www.coyotos.org/index.html
capability
mathematics
operating-system
security
The CapROS Operating System
A capability-based operating system, one of the successors of EROS (CoyoteOS seems to be another one).
According to
https://sourceforge.net/p/capros/mailman/capros-devel/?viewmonth=202201
the author plans to port it ti the Raspberry pi.
Thu Oct 19 19:21:54 2006 - permalink
-
-
http://www.capros.org/
capability
operating-system
pi
raspberry
security
π
How To Encrypt a Folder in Windows XP
This seems to protect only against other users, because it does not ask for a pass phrase.
Mon Oct 16 17:16:35 2006 - permalink
-
-
http://support.microsoft.com/kb/308989
cryptography
security
software
Windows
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows XP/2000 and Linux
Might be interesting.
Mon Oct 16 17:13:23 2006 - permalink
-
-
http://www.truecrypt.org/
cryptography
FOSS
security
software
TODO
Ephemeral Security - Mosquito Lisp
A lisp dialect for security-related tasks (penetration testing).
Mon Oct 2 15:27:25 2006 - permalink
-
-
http://www.ephemeralsecurity.com/mosquito-lisp/
implementation
language
lisp
network
programming
Scheme
security
Google Groups: sci.crypt
Excellent explanation of IND-CPA security by Mark Wooding.
On 2024-10-29, this page returns a 404 error.
Mon Aug 28 20:05:14 2006 - permalink
-
-
http://groups.google.at/group/sci.crypt/msg/2de8eb0b409a07d9?hl=de
cryptography
security
Wooding
heise Security - News - SHA-1 hash function under pressure
Not very detailed report about attacks on a reduced round (64 of 80) variant of SHA-1. It is claimed
Mon Aug 28 20:02:02 2006 - permalink
-
-
http://www.heise-security.co.uk/news/77244
cryptography
hash
security
Hijacking a Macbook in 60 Seconds or Less - Security Fix
Interesting report (without details) about a security vulnerability of a WLAN driver.
Mon Aug 7 17:11:57 2006 - permalink
-
-
http://blog.washingtonpost.com/securityfix/2006/08/hijacking_a_macbook_in_60_seco_1.html
macosx
security
WLAN
The AVISPA Project
AVISPA stands for Automated Validation of Internet Security Protocols and Applications.
Fri Jun 30 18:37:44 2006 - permalink
-
-
http://avispa-project.org/
protocol
security
validation
quintessenz - Hände weg vom Telebanking!
quintessenz - Verein zur Wiederherstellung der Bürgerrechte im Informationszeitalter. Datenschutz ist Menschenrecht
Tue Jun 27 20:35:17 2006 - permalink
-
-
http://www.quintessenz.at/cgi-bin/index?id=000100003566&/
german
security
telebanking
web
Links per page:
20
50
100
page 9 / 9
Newer►