Shaare your links...
2431 links
interesting links
Home
Login
RSS Feed
ATOM Feed
Tag cloud
Picture wall
Daily
Links per page:
20
50
100
◄Older
page 9 / 10
Newer►
182 results for tags
security
x
OS X Kernel-mode Exploitation in a Weekend
Just what it says, found among L.fittl's links.
Sat Oct 6 20:37:26 2007 - permalink
-
-
http://uninformed.org/index.cgi?v=8&a=4
apple
documentation
mac
macosx
programming
security
TODO
Light Blue Touchpaper Video eavesdropping demo at CeBIT 2006
This is the actual reconstructed image, the New Scientist artice showed the original instead.
Tue May 15 12:59:05 2007 - permalink
-
-
http://www.lightbluetouchpaper.org/2006/03/09/video-eavesdropping-demo-at-cebit-2006/
hack
hardware
security
New Scientist Technology Blog: Seeing through walls
Van Eck radiation from LCD displays.
Tue May 15 12:56:28 2007 - permalink
-
-
http://www.newscientist.com/blog/technology/2007/04/seeing-through-walls.html
hack
hardware
radio
security
Devpit:About - Devpit
A wiki with Information useful to competent Unix administrators and software developers. Includes a Lisp section, interesting tips such as using ssh with keychain, home directory under svn and more.
Wed Mar 7 17:42:19 2007 - permalink
-
-
http://devpit.org/wiki/Devpit:About
common-lisp
lisp
security
tips
TODO
wiki
MIT PGP Key Server
Another PGP key server with web interface.
Tue Feb 27 11:23:33 2007 - permalink
-
-
http://pgp.mit.edu/
cryptography
search
security
tool
web
mkpasswd
Password generator in Javascript. Uses mouse movements to collect entropy.
Wed Jan 24 21:14:13 2007 - permalink
-
-
http://www.certainkey.com/demos/mkpasswd/
hack
hash
JavaScript
security
web
Browsers Browse Happy
Anit-IE site supporting Firefox, Mozilla, Opera and Safari.
Fri Jan 19 13:18:47 2007 - permalink
-
-
http://browsehappy.com/browsers/
politics
security
web
Windows
Valery's blog
Interesting blog about security (biased towards Windows)
Thu Jan 4 15:40:21 2007 - permalink
-
-
http://www.harper.no/valery/
blog
security
Security Technical Implementation Guides
Declassified documents about (computer) security.
Thu Jan 4 14:50:21 2007 - permalink
-
-
http://iase.disa.mil/stigs/stig/index.html#srcstig
documentation
reference
security
Anyterm - Introduction
Anyterm allows secure (HTTPS) shell login to a machine (provided that the anyterm Apache module is installed there) from a Javascript-capable browser.
Thu Jan 4 12:17:08 2007 - permalink
-
-
http://anyterm.org/index.html
JavaScript
remote
security
software
TODO
web
Unpatched Internet Explorer security holes
Just what its says.
Tue Nov 21 20:40:55 2006 - permalink
-
-
http://web.inf.tu-dresden.de/~s9053014/iesec.xhtml
security
web
Windows
qemu does not check memory access permissions
Tue Nov 7 11:35:35 2006 - permalink
-
-
http://www.andrew.cmu.edu/user/crd/qemu_openbsd_note.html
security
Unix
Coyotos Secure Operating System
Another successor to EROS, a capability-based operating system. Attempts to use formal verification.
Thu Oct 19 19:29:36 2006 - permalink
-
-
http://www.coyotos.org/index.html
capability
mathematics
operating-system
security
The CapROS Operating System
A capability-based operating system, one of the successors of EROS (CoyoteOS seems to be another one).
According to
https://sourceforge.net/p/capros/mailman/capros-devel/?viewmonth=202201
the author plans to port it ti the Raspberry pi.
Thu Oct 19 19:21:54 2006 - permalink
-
-
http://www.capros.org/
capability
operating-system
pi
raspberry
security
π
How To Encrypt a Folder in Windows XP
This seems to protect only against other users, because it does not ask for a pass phrase.
Mon Oct 16 17:16:35 2006 - permalink
-
-
http://support.microsoft.com/kb/308989
cryptography
security
software
Windows
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows XP/2000 and Linux
Might be interesting.
Mon Oct 16 17:13:23 2006 - permalink
-
-
http://www.truecrypt.org/
cryptography
FOSS
security
software
TODO
Ephemeral Security - Mosquito Lisp
A lisp dialect for security-related tasks (penetration testing).
Mon Oct 2 15:27:25 2006 - permalink
-
-
http://www.ephemeralsecurity.com/mosquito-lisp/
implementation
language
lisp
network
programming
Scheme
security
Google Groups: sci.crypt
Excellent explanation of IND-CPA security by Mark Wooding.
On 2024-10-29, this page returns a 404 error.
Mon Aug 28 20:05:14 2006 - permalink
-
-
http://groups.google.at/group/sci.crypt/msg/2de8eb0b409a07d9?hl=de
cryptography
security
Wooding
heise Security - News - SHA-1 hash function under pressure
Not very detailed report about attacks on a reduced round (64 of 80) variant of SHA-1. It is claimed
Mon Aug 28 20:02:02 2006 - permalink
-
-
http://www.heise-security.co.uk/news/77244
cryptography
hash
security
Hijacking a Macbook in 60 Seconds or Less - Security Fix
Interesting report (without details) about a security vulnerability of a WLAN driver.
Mon Aug 7 17:11:57 2006 - permalink
-
-
http://blog.washingtonpost.com/securityfix/2006/08/hijacking_a_macbook_in_60_seco_1.html
macosx
security
WLAN
Links per page:
20
50
100
◄Older
page 9 / 10
Newer►