https://manifestsecurity.com/android-application-security/
Tuesday, April 21, 2015
Sunday, April 12, 2015
Rob Pike's 5 Rules of Programming
Extremely important for day job. I see many instances where things are needlessly made complex.
http://users.ece.utexas.edu/~adnan/pike.html
http://users.ece.utexas.edu/~adnan/pike.html
Saturday, January 17, 2015
Discrete Math and Other Computer Science Links
Discrete Math Book:"Concrete Mathematics: A Foundation for Computer Science" by Graham, Knuth, and Patashnik
Combinatorics Book:
Applied Combinatorics" (Roberts & Tessman)
Free Computer Science Courses
http://www.archive.org/details/arsdigita
Combinatorics Book:
Applied Combinatorics" (Roberts & Tessman)
Free Computer Science Courses
http://www.archive.org/details/arsdigita
Friday, December 12, 2014
POODLE killed SSL 3.0
Explanation of attack:
"The most severe problem of CBC encryption in SSL 3.0 is that its block cipher padding is
not deterministic, and not covered by the MAC (Message Authentication Code)"
https://www.openssl.org/~bodo/ssl-poodle.pdf
Another detailed explanation:
https://www.imperialviolet.org/2014/10/14/poodle.html
"The most severe problem of CBC encryption in SSL 3.0 is that its block cipher padding is
not deterministic, and not covered by the MAC (Message Authentication Code)"
https://www.openssl.org/~bodo/ssl-poodle.pdf
Another detailed explanation:
https://www.imperialviolet.org/2014/10/14/poodle.html
Wednesday, December 10, 2014
Thursday, July 31, 2014
Friday, May 18, 2012
Bypassing Malware Defenses
For reading pleasure:
http://www.sans.org/reading_room/whitepapers/malicious/bypassing-malware-defenses_33378
http://www.blackhat.com/presentations/bh-usa-07/Harbour/Presentation/bh-usa-07-harbour.pdf
http://event.idsirtii.or.id/wp-content/uploads/2011/10/The-Danger-of-Malware-in-The-Browser-Its-Countermeasures-Gildas-Deograt-Lumy-CISA-CISSP-ISO-27001-LA-web1.pdf
http://www.sans.org/reading_room/whitepapers/malicious/bypassing-malware-defenses_33378
http://www.blackhat.com/presentations/bh-usa-07/Harbour/Presentation/bh-usa-07-harbour.pdf
http://event.idsirtii.or.id/wp-content/uploads/2011/10/The-Danger-of-Malware-in-The-Browser-Its-Countermeasures-Gildas-Deograt-Lumy-CISA-CISSP-ISO-27001-LA-web1.pdf
Subscribe to:
Posts (Atom)