6 Months of Security Links #2011
I'm a regular curator of daily links, and like to give overviews of my collection of curated links and posts. This is partly as there are some good sources and articles in here and as I am working on a research project which I started based on a number of books I read.
I'm sure you'll find something interesting in the items below - there are some gems in the list - and I dare to hazard the guess you might learn something you wanted to know. :)
Hacking the vodafone basestation - THC Wiki
Wed, 13 Jul 2011 23:43:43 +0000
OCSP Troubles #security #x509 #certificate #revoke
A company was having intermittent trouble with their new authenticated SSL, i...
Thu, 23 Jun 2011 07:05:42 +0000
Botnet Checker
Fri, 01 Jul 2011 12:31:22 +0000
Should I Change My Password?
Fri, 24 Jun 2011 12:10:39 +0000
Propergander
Mon, 20 Jun 2011 15:04:57 +0000
Commission eyes Spanish internet policing as model
Thu, 02 Jun 2011 15:45:37 +0000
The 5 Biggest Biases We Fall Victim to
Fri, 27 May 2011 13:37:02 +0000
Fingerprints Go the Distance - Technology Review
Tue, 17 May 2011 15:30:26 +0000
Confessions of a computer repairman | Analysis | Features | PC Pro
Sun, 15 May 2011 15:05:23 +0000
Open source anti-theft solution for Mac, PCs
Sun, 15 May 2011 15:04:41 +0000
New Privacy Laws in India and China Could Make IT Outsourcing Ugly
Sun, 15 May 2011 14:27:14 +0000
Introducing Login Approvals
Fri, 13 May 2011 13:55:52 +0000
CIA FOIA - Top 25 Search Phrases
Fri, 22 Apr 2011 09:25:18 +0000
Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities
Tue, 19 Apr 2011 20:49:53 +0000
Moxie Marlinspike :: Blog
Tue, 12 Apr 2011 07:29:02 +0000
CAINE Live CD
Mon, 11 Apr 2011 22:47:36 +0000
Jasypt: Java simplified encryption - Main
A remote key manager system could simply be added to remove the need to store...
Mon, 11 Apr 2011 21:34:41 +0000
Internet probe can track you down to within 690 metres - tech - 05 April 2011 - New Scientist
Mon, 11 Apr 2011 20:59:12 +0000
Tracking-Learning-Detection - Predator
"[...] an algorithm for tracking of unknown objects in unconstrained video s...
Mon, 11 Apr 2011 00:54:50 +0000
Detecting Certificate Authority compromises and web browser collusion | The Tor Blog
Thu, 24 Mar 2011 11:47:06 +0000
OS registers to DNS #security #risk
Recently on NANOG I saw the item below, I was thinking about what this actual...
Tue, 08 Mar 2011 16:56:15 +0000
Ask Ars: How can I securely erase the data from my SSD drive?
I recently discussed how to erase harddisks quickly, Ars Technica discribes t...
Thu, 03 Mar 2011 20:57:01 +0000
FIPR Regulation of Investigatory Powers Information Centre
About a British act of parlement.
Fri, 18 Feb 2011 22:22:40 +0000
Security Auditing in JBoss Application Server v5.x | Server Zone
Tue, 15 Feb 2011 11:32:56 +0000
Audit Logging - JBoss Community
An explanation on the way to implement an audit trail in JBoss.
Tue, 15 Feb 2011 10:45:25 +0000
On Failing Gracefully #security #risk
Failing gracefully is one of the most important things, whether it is your re...
Tue, 15 Feb 2011 09:25:23 +0000
Facebook Privacy: 10 Settings Every User Needs to Know Mashable | The Social Media Guide
More about Privacy and Security settings in Facebook, personally I think my p...
Wed, 09 Feb 2011 18:41:55 +0000
Proof of Concept: Overloading file operations with LD_PRELOAD
In a discussion on Full Disclosure I added a reply which I would like to expa...
Tue, 08 Feb 2011 12:39:03 +0000
Opt Out From Online Behavioral Advertising By Participating Companies (BETA)
It's possible to opt-out of behavioral advertising cookies for 37 participati...
Sun, 06 Feb 2011 12:47:06 +0000
Forban: Local Opportunistic p2p #security
No, it’s not just another p2p/file sharing program. Forban is a local n...
Tue, 01 Feb 2011 22:28:44 +0000
In Synch: Language Style Matching #security
I was forwarded the link to In Synch, a tool which will calculate the Languag...
Mon, 31 Jan 2011 16:36:19 +0000
OpenID Connect
A OpenID provider which combines OpenID with OAuth 2.0, this has been a long ...
Sun, 30 Jan 2011 12:14:41 +0000
Possible Akamai Troubles #dos #smurf
Usually I probably wouldn’t have mentioned it, and it inspired me. Yest...
Fri, 21 Jan 2011 14:40:00 +0000
Taking advantage of File Descriptor exhaustion bugs « Cipher
I've been in a technical mood today, which the JTA bug I'm trying to avoid in...
Thu, 20 Jan 2011 12:35:59 +0000
Internet in the Train #geoip #transport
On Wednesday I was coming from a client in Rotterdam, and we on my way to a n...
Sat, 15 Jan 2011 17:32:45 +0000
GeoLocation and Data Leakage Prevention #foursquare #gowalla #dlp #security
To make it clear I’m not speaking of the information being broadcast by...
Thu, 13 Jan 2011 20:00:42 +0000
Home Internet with Anonymity Built In - Technology Review
Thanks to Bruce Schneier I discovered this Tor router which can be used for h...
Mon, 10 Jan 2011 01:49:33 +0000
What's wrong with OpenID? - Quora
On Quora there is an interesting discussion of the merits and pitfalls of Ope...
Sun, 09 Jan 2011 19:18:39 +0000
Proof of Concept: Simple Authenticated Internet Access
Sitting in the train at Amsterdam’s “Centraal Station” I wa...
Mon, 03 Jan 2011 08:30:09 +0000
Simplify enterprise Java authentication with single sign-on
Naturally IBM Developer Works is one of the places to start when looking up d...
Thu, 30 Dec 2010 21:57:47 +0000
Single Sign-on Using Kerberos in Java
We were discussing Kerberos implementation for JBoss Seam, and I remembered h...
Thu, 30 Dec 2010 21:53:38 +0000
Kerberos Explained
This was where I touched on the Microsoft earth while searching for Kerberos.
Thu, 30 Dec 2010 21:52:14 +0000
Image source: purpleslog
Labels: botnet, computer, economics, eu, europe, gprs, gsm, hacking, internet, malware, mobile, passwd, password, politics, risk, schneier, security, software, umts, vodafone
<< Home