Quantcast
Channel: General Musing » specialbrands
Viewing all articles
Browse latest Browse all 3

6 Months of Security Links #2011

$
0
0

I’m a regular curator of daily links, and like to give overviews of my collection of curated links and posts. This is partly as there are some good sources and articles in here and as I am working on a research project which I started based on a number of books I read.

I’m sure you’ll find something interesting in the items below – there are some gems in the list – and I dare to hazard the guess you might learn something you wanted to know. :)

Wed, 13 Jul 2011 23:43:43 +0000

A company was having intermittent trouble with their new authenticated SSL, i…

Thu, 23 Jun 2011 07:05:42 +0000

Fri, 01 Jul 2011 12:31:22 +0000

Fri, 24 Jun 2011 12:10:39 +0000

Mon, 20 Jun 2011 15:04:57 +0000

Thu, 02 Jun 2011 15:45:37 +0000

Fri, 27 May 2011 13:37:02 +0000

Tue, 17 May 2011 15:30:26 +0000

Sun, 15 May 2011 15:04:41 +0000

Fri, 13 May 2011 13:55:52 +0000

Fri, 22 Apr 2011 09:25:18 +0000

Tue, 12 Apr 2011 07:29:02 +0000

Mon, 11 Apr 2011 22:47:36 +0000

A remote key manager system could simply be added to remove the need to store…

Mon, 11 Apr 2011 21:34:41 +0000

“[...] an algorithm for tracking of unknown objects in unconstrained video s…

Mon, 11 Apr 2011 00:54:50 +0000

Identify what websites are running.

Mon, 11 Apr 2011 00:36:12 +0000

Recently on NANOG I saw the item below, I was thinking about what this actual…

Tue, 08 Mar 2011 16:56:15 +0000

I recently discussed how to erase harddisks quickly, Ars Technica discribes t…

Thu, 03 Mar 2011 20:57:01 +0000

About a British act of parlement.

Fri, 18 Feb 2011 22:22:40 +0000

An explanation on the way to implement an audit trail in JBoss.

Tue, 15 Feb 2011 10:45:25 +0000

Failing gracefully is one of the most important things, whether it is your re…

Tue, 15 Feb 2011 09:25:23 +0000

More about Privacy and Security settings in Facebook, personally I think my p…

Wed, 09 Feb 2011 18:41:55 +0000

In a discussion on Full Disclosure I added a reply which I would like to expa…

Tue, 08 Feb 2011 12:39:03 +0000

It’s possible to opt-out of behavioral advertising cookies for 37 participati…

Sun, 06 Feb 2011 12:47:06 +0000

No, it’s not just another p2p/file sharing program. Forban is a local n…

Tue, 01 Feb 2011 22:28:44 +0000

I was forwarded the link to In Synch, a tool which will calculate the Languag…

Mon, 31 Jan 2011 16:36:19 +0000

A OpenID provider which combines OpenID with OAuth 2.0, this has been a long …

Sun, 30 Jan 2011 12:14:41 +0000

Usually I probably wouldn’t have mentioned it, and it inspired me. Yest…

Fri, 21 Jan 2011 14:40:00 +0000

I’ve been in a technical mood today, which the JTA bug I’m trying to avoid in…

Thu, 20 Jan 2011 12:35:59 +0000

On Wednesday I was coming from a client in Rotterdam, and we on my way to a n…

Sat, 15 Jan 2011 17:32:45 +0000

To make it clear I’m not speaking of the information being broadcast by…

Thu, 13 Jan 2011 20:00:42 +0000

Thanks to Bruce Schneier I discovered this Tor router which can be used for h…

Mon, 10 Jan 2011 01:49:33 +0000

On Quora there is an interesting discussion of the merits and pitfalls of Ope…

Sun, 09 Jan 2011 19:18:39 +0000

Sitting in the train at Amsterdam’s “Centraal Station” I wa…

Mon, 03 Jan 2011 08:30:09 +0000

Naturally IBM Developer Works is one of the places to start when looking up d…

Thu, 30 Dec 2010 21:57:47 +0000

We were discussing Kerberos implementation for JBoss Seam, and I remembered h…

Thu, 30 Dec 2010 21:53:38 +0000

This was where I touched on the Microsoft earth while searching for Kerberos.

Thu, 30 Dec 2010 21:52:14 +0000

Image source: purpleslog


Filed under: tagging Tagged: 2010, 4chan, 802.11, aclu, advertising, airplane, airport, algorithm, analysis, audio, audit, authentication, authority, authorization, availability, backbone, bandwidth, bias, biases, biometrics, bluetooth, botnet, browser, bruceschneier, ca, camera, certificate, certificates, china, cia, communication, computer, copyright, cpu, crime, cryptography, cybersecurity, data, database, datagathering, datamining, db, dead, death, defcon, descriptor, detection, disk, diy, drive, drm, drone, economics, embedded, encryption, erase, eu, europe, experiment, facebook, fbi, file, filter, fingerprint, fingerprinting, flying, forensics, freedom, gcc, geolocation, google, government, gprs, gsm, hack, hacking, hardware, hdd, health, hibernate, identification, identity, india, insurance, intelligence, internet, isp, java, javascript, jboss, kerberos, latency, law, learning, lifehacks, linux, livecd, mac, malware, marketing, microsoft, mobile, monitoring, music, mythology, nagog, network, networking, ntlm, oauth, openid, osx, outsourcing, paper, passwd, password, peering, penetration, pentest, performance, pki, plane, police, politics, privacy, quora, ra, recovery, refresher, reload, repair, report, risk, robotics, router, routing, scam, schneier, science, security, seo, socialmedia, socialnetworking, software, solidstate, specialbrands, ssd, ssl, sso, surveillance, system:filetype:pdf, system:media:document, technology, terror, terrorism, testing, theft, threats, tls, toblog, tor, toread, tracking, traffic, travel, tsa, uav, uk, umts, usa, video, visualization, vodafone, vulnerability, wasp, watermarking, web, webapp, webpage, windows, wireless, youtube

Viewing all articles
Browse latest Browse all 3

Latest Images

Trending Articles



Latest Images