« earlier | later » Page 10 of 11
TASVideos submissions: #3767: bortreb's GBC Pokémon Yellow "Executes Arbitrary Code" in 12:51.87 edit / delete
How to exploit a buffer overflow -- in a Gameboy Color game. (Warning: may be a bit tedious to do by hand!)
to amusements arm buffer gameboy games overflow security ... on 11 February 2013
TLS SNI Test Site: bob.sni.velox.ch edit / delete
Test whether your browser supports SNI.
Jefferson’s Wheel » Blog Archive » Private Editing Using Untrusted Cloud Services edit / delete
One to discuss at the CES group at some point.
UNHOSTED - Freedom from web 2.0's monopoly platforms edit / delete
I like the idea, but I'm not wild about the execution -- it just means you're relying on lots of fragile, poorly-engineered web services, rather than one.
More interesting for the links in their FAQ than for the service itself, although a NetworkManager plugin that uses this would be an obvious application.
to cryptography network security wireless wpa ... on 17 August 2010
Chris's Wiki :: blog/python/IdealDWikiCrypto edit / delete
Using HMAC for web auth. I should fix tasty to do this at some point.
to crypto programming python security web ... on 27 January 2010
isolate - Project Hosting on Google Code edit / delete
Build chroot environments on the fly, so you can run insecure programs reasonably easily.
Investing DECT security, and various open-source implementations of it.
Perspectives : Improving SSH-style Host Authentication with Multi-path Network Probing edit / delete
A neat approach to SSL certificate (etc.) validation: have multiple public databases mapping hostnames to certificates, which can be checked automatically. It's a bit of a pity that their plugins include binary libraries...
to certificates firefox security software ssh ssl ... on 26 August 2008
Security Engineering - A Guide to Building Dependable Distributed Systems edit / delete
Ross Anderson's book.
to cryptography ebooks security ... on 01 September 2006
« earlier | later » Page 10 of 11
tasty by Adam Sampson.