museum.media.org: Internet Talk Radio

"Internet Talk Radio started broadcasting in 1993 as the first radio station on the Internet. As part of the museum.media.org effort to rescue some of our past work, we're also maintaining archives of early programs in their original state." Includes the "Hell's Bells" documentary that Joybubbles refers to in one of his recordings, and Cliff Stoll doing a presentation on "The Cuckoo's Egg".

to history phreaking podcasts radio retrotech security stoll ... on 23 November 2014

The Final Key - Hardware password manager with encryption

A little USB device that pretends to be a serial port and a keyboard. Select an account using a terminal, push a button, and it types the password for it.

to electronics microcontroller password security usb ... on 24 August 2014

lcamtuf's blog: A bit more about american fuzzy lop

Coverage-directed fuzzing tool, from the author of p0f et al. Easy to set up and play with.

to coverage coverage-directed fuzzing security testing ... on 05 August 2014

The SSL Co-operative

Attempting to establish a CA on the cooperative model.

to ca certificate coop cryptography security ssl tls ... on 26 July 2014

System Hardening - The Chromium Projects

A nice overview of all the application hardening facilities used on ChromiumOS.

to chromium container hardening linux sandbox security ... on 22 July 2014

Rami Rosen

Some good presentations on Linux container facilities. (Horrid Javascript-based site, though.)

to container linux programming sandbox security ... on 11 July 2014

Using simple seccomp filters

A worked example of setting up seccomp system call filters.

to linux seccomp security ... on 01 July 2014

Notes on Intel Microcode Updates

Reverse-engineering Intel's microcode update mechanism.

to cpu intel microcode reverse-engineering security ... on 16 June 2014

How to Prevent the next Heartbleed

An interesting review of some of the approaches that didn't prevent the OpenSSL heartbeat bug (either because they weren't effective or because they weren't applied).

to buffer-overflow checking openssl security static-analysis testing ... on 02 May 2014

Welcome — Botan

C++ crypto library, with yet another TLS implementation.

to c++ cryptography library security software tls ... on 28 April 2014

Tags related to security

- security
 
1 academia
1 access-control
1 acme
1 ag0700
1 ag0803
2 ag0907
6 amusements
2 api
1 architecture
1 arduino
3 arm
1 authentication
1 autoconf
1 avr
1 backdoor
1 bell-labs
1 bitcoin
1 blockchain
1 bounds-checking
1 bounty
1 browser
2 buffer
2 buffer-overflow
2 bug
2 bugs
1 build-systems
2 c
2 c++
4 ca
1 camera
1 capability
1 capsicum
4 ccc
4 certificate
1 certificates
1 cesrg
1 checking
1 chromium
1 chroot
1 clang
1 cloud
1 code
3 compiler
1 conference
2 container
1 coop
1 coverage
1 coverage-directed
1 coverity
2 cpu
1 crime
10 crypto
12 cryptography
1 cs
1 cypherpunks
1 debian
1 debugging
1 dect
1 design
1 dh
2 djb
1 ebooks
1 ecc
1 economics
1 el0805
1 elective
3 electronics
3 encryption
2 ers
1 ethereum
1 ethical-hacking
1 ethics
3 exploit
1 firefox
1 folk-song
4 formal-methods
1 freedom
3 fuzzing
2 gameboy
5 games
1 gcc
1 git
1 goto
2 gpg
1 gsm
2 hardening
5 history
1 homebrew
1 homeplugav
1 http
1 https
1 intel
1 ip
1 ipsec
1 javascript
1 journalism
1 jquery
1 kerberos
3 kernel
1 keyboard
1 keylogger
1 langsec
2 language-design
1 letsencrypt
1 library
1 licensing
12 linux
1 livecd
1 lts
1 luks
1 lvm
1 mac
1 memory-safety
1 metaphors
2 mgo
1 microcode
4 microcontroller
1 mmc
1 mod-ers
1 monitoring
3 nacl
5 network
6 networking
1 noise
1 notary
1 ocaml
1 openssh
2 openssl
1 org
2 os
2 overflow
2 p2p
1 packet
1 pam
2 papers
1 parser
1 password
1 patterns
1 pgp
2 philosophy
2 phone
1 phreaking
1 pki
1 playstation
1 podcasts
2 politics
1 porting
1 prime
2 privacy
1 privilege-separation
4 programming
1 proof
1 ps2
2 python
1 radio
1 ramensky
1 random
1 research
3 retrocomputing
1 retrotech
6 reverse-engineering
1 risc
1 rop
1 safe
2 safety
4 sandbox
1 scanner
1 scm
1 scotland
1 sd
1 search
2 seccomp
108 security
1 shuffle
1 sni
1 snowden
14 software
6 software-engineering
3 ssh
12 ssl
4 static-analysis
1 stoll
1 strategy
1 support
1 syscall
1 systems
1 tandy
1 tcp
1 tea
6 teaching
1 telecom
5 testing
14 tls
2 tor
1 tunnel
4 unix
1 usability
1 usable-security
2 usb
1 validation
1 varan
3 verification
1 video
1 vlc
1 vpn
1 vulnerabilities
1 vulnerability
3 web
1 webcam
1 whistleblowing
2 wireless
1 wpa
1 writing
1 x86
1 xbox