« earlier | later » Page 9 of 11
A selection of... randomly interesting stuff related to licensing, cypherpunkery, etc. I honestly can't remember how I got here. (*checks browser history* -- oh, it was the article on Silk Road.)
to amusements bitcoin cypherpunks licensing philosophy politics security tea ... on 24 March 2013
Pokemon Yellow Total Control Hack edit / delete
Detailed explanation of the previous video (arbitrary code execution via Pokemon Yellow).
to amusements arm buffer gameboy games overflow security ... on 11 February 2013
TASVideos submissions: #3767: bortreb's GBC Pokémon Yellow "Executes Arbitrary Code" in 12:51.87 edit / delete
How to exploit a buffer overflow -- in a Gameboy Color game. (Warning: may be a bit tedious to do by hand!)
to amusements arm buffer gameboy games overflow security ... on 11 February 2013
TLS SNI Test Site: bob.sni.velox.ch edit / delete
Test whether your browser supports SNI.
Jefferson’s Wheel » Blog Archive » Private Editing Using Untrusted Cloud Services edit / delete
One to discuss at the CES group at some point.
UNHOSTED - Freedom from web 2.0's monopoly platforms edit / delete
I like the idea, but I'm not wild about the execution -- it just means you're relying on lots of fragile, poorly-engineered web services, rather than one.
More interesting for the links in their FAQ than for the service itself, although a NetworkManager plugin that uses this would be an obvious application.
to cryptography network security wireless wpa ... on 17 August 2010
Chris's Wiki :: blog/python/IdealDWikiCrypto edit / delete
Using HMAC for web auth. I should fix tasty to do this at some point.
to crypto programming python security web ... on 27 January 2010
isolate - Project Hosting on Google Code edit / delete
Build chroot environments on the fly, so you can run insecure programs reasonably easily.
« earlier | later » Page 9 of 11
tasty by Adam Sampson.