The following list of posts is filtered
Clear Filter
Posts
Middle-earth dictionary attack
From http://abstrusegoose.com/296
August 24, 2010
·
11:18 PM
Full Title: Researchers install PAC-MAN on Sequoia voting machine w/o breaking seals Here’s a new one for the DIY movement. Security researchers J. Alex Haldeman and Ariel Feldman demonstrated...
August 23, 2010
·
1:25 PM
Some online sites let you use any old five-character strong as your password for as long as you like. Others force you to pick a new password every six months and it has to match a complicated...
August 16, 2010
·
11:16 AM
Privacy continues to be an important topic surrounding social media systems. A big part of the problem is that virtually all of us have a difficult time thinking about what information about us...
August 15, 2010
·
2:25 PM
Apple’s Safari browser has a privacy vulnerability allowing web sites you visit to extract your personal information (e.g., name, address, phone number) from your computer’s address book. The fix...
July 22, 2010
·
10:29 PM
The secret message included in the USCYBERCOM logo 9ec4c12949a4f31474f299058ce2b22a is what the md5sum function returns when applied to the string that is USCYBERCOM’s official mission...
July 8, 2010
·
9:11 PM
Cyber Command (USCYBERCOM) is the new unit in the US Department of Defense that is responsible for the “defense of specified Department of Defense information networks” and, when needed, to...
July 7, 2010
·
1:33 PM
TechCrunch is reporting that Twitter is down due to an attack by someone claiming to be part of the ‘Iranian Cyber Army’. Since Twitter is now down, we can’t show a screen shot, but Techrunch...
December 18, 2009
·
1:52 AM
The foaf:mbox property is very useful since it is ‘inverse functional’ and can thus serve as an ID for a foaf individual. This lets us infer that two foaf profiles with the same mbox refer to the...
December 17, 2009
·
11:52 PM