TASVideos submissions: #3767: bortreb's GBC Pokémon Yellow "Executes Arbitrary Code" in 12:51.87 edit / delete

How to exploit a buffer overflow -- in a Gameboy Color game. (Warning: may be a bit tedious to do by hand!)

to amusements arm buffer gameboy games overflow security ... on 11 February 2013

TLS SNI Test Site: bob.sni.velox.ch edit / delete

Test whether your browser supports SNI.

to http https security sni ssl tls ... on 29 June 2011

Jefferson’s Wheel » Blog Archive » Private Editing Using Untrusted Cloud Services edit / delete

One to discuss at the CES group at some point.

to cesrg cloud security ... on 21 May 2011

UNHOSTED - Freedom from web 2.0's monopoly platforms edit / delete

I like the idea, but I'm not wild about the execution -- it just means you're relying on lots of fragile, poorly-engineered web services, rather than one.

to privacy security web ... on 11 January 2011

WPA CRACKER edit / delete

More interesting for the links in their FAQ than for the service itself, although a NetworkManager plugin that uses this would be an obvious application.

to cryptography network security wireless wpa ... on 17 August 2010

Chris's Wiki :: blog/python/IdealDWikiCrypto edit / delete

Using HMAC for web auth. I should fix tasty to do this at some point.

to crypto programming python security web ... on 27 January 2010

isolate - Project Hosting on Google Code edit / delete

Build chroot environments on the fly, so you can run insecure programs reasonably easily.

to security software ... on 09 January 2010

dedected.org edit / delete

Investing DECT security, and various open-source implementations of it.

to dect phone security telecom ... on 29 July 2009

Perspectives : Improving SSH-style Host Authentication with Multi-path Network Probing edit / delete

A neat approach to SSL certificate (etc.) validation: have multiple public databases mapping hostnames to certificates, which can be checked automatically. It's a bit of a pity that their plugins include binary libraries...

to certificates firefox security software ssh ssl ... on 26 August 2008

Browser bookmarks: tasty+ | tasty= Log in | Export | Atom

Tags related to security

- security
 
1 + academia
1 + access-control
1 + acme
1 + ag0700
1 + ag0803
2 + ag0907
6 + amusements
2 + api
1 + architecture
1 + arduino
3 + arm
1 + authentication
1 + autoconf
1 + avr
1 + backdoor
1 + bell-labs
1 + bitcoin
1 + blockchain
1 + bounds-checking
1 + bounty
1 + browser
2 + buffer
2 + buffer-overflow
2 + bug
2 + bugs
1 + build-systems
2 + c
2 + c++
4 + ca
1 + camera
1 + capability
1 + capsicum
4 + ccc
4 + certificate
1 + certificates
1 + cesrg
1 + checking
1 + chromium
1 + chroot
1 + clang
1 + cloud
1 + code
3 + compiler
1 + conference
2 + container
1 + coop
1 + coverage
1 + coverage-directed
1 + coverity
2 + cpu
1 + crime
10 + crypto
12 + cryptography
1 + cs
1 + cypherpunks
1 + debian
1 + debugging
1 + dect
1 + design
1 + dh
2 + djb
1 + ebooks
1 + ecc
1 + economics
1 + el0805
1 + elective
3 + electronics
3 + encryption
2 + ers
1 + ethereum
1 + ethical-hacking
1 + ethics
3 + exploit
1 + firefox
1 + folk-song
4 + formal-methods
1 + freedom
3 + fuzzing
2 + gameboy
5 + games
1 + gcc
1 + git
1 + goto
2 + gpg
1 + gsm
2 + hardening
5 + history
1 + homebrew
1 + homeplugav
1 + http
1 + https
1 + intel
1 + ip
1 + ipsec
1 + javascript
1 + journalism
1 + jquery
1 + kerberos
3 + kernel
1 + keyboard
1 + keylogger
1 + langsec
2 + language-design
1 + letsencrypt
1 + library
1 + licensing
12 + linux
1 + livecd
1 + lts
1 + luks
1 + lvm
1 + mac
1 + memory-safety
1 + metaphors
2 + mgo
1 + microcode
4 + microcontroller
1 + mmc
1 + mod-ers
1 + monitoring
3 + nacl
5 + network
6 + networking
1 + noise
1 + notary
1 + ocaml
1 + openssh
2 + openssl
1 + org
2 + os
2 + overflow
2 + p2p
1 + packet
1 + pam
2 + papers
1 + parser
1 + password
1 + patterns
1 + pgp
2 + philosophy
2 + phone
1 + phreaking
1 + pki
1 + playstation
1 + podcasts
2 + politics
1 + porting
1 + prime
2 + privacy
1 + privilege-separation
4 + programming
1 + proof
1 + ps2
2 + python
1 + radio
1 + ramensky
1 + random
1 + research
3 + retrocomputing
1 + retrotech
6 + reverse-engineering
1 + risc
1 + rop
1 + safe
2 + safety
4 + sandbox
1 + scanner
1 + scm
1 + scotland
1 + sd
1 + search
2 + seccomp
1 + shuffle
1 + sni
1 + snowden
14 + software
6 + software-engineering
3 + ssh
12 + ssl
4 + static-analysis
1 + stoll
1 + strategy
1 + support
1 + syscall
1 + systems
1 + tandy
1 + tcp
1 + tea
6 + teaching
1 + telecom
5 + testing
14 + tls
2 + tor
1 + tunnel
4 + unix
1 + usability
1 + usable-security
2 + usb
1 + validation
1 + varan
3 + verification
1 + video
1 + vlc
1 + vpn
1 + vulnerabilities
1 + vulnerability
3 + web
1 + webcam
1 + whistleblowing
2 + wireless
1 + wpa
1 + writing
1 + x86
1 + xbox