Date Range
Date Range
Date Range
Security big data machine learning. 6 Short Links on PDNS Graph Analytics for Security. Detecting Malicious Domains via Graph Inference. Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
Bypassing certificate checks in OpenSSL 1. Many lines of code have been changed, but most important is a Security Fix that allowed an attacker to bypass certain checks on certificates. The problem is summarized in the changelog of the new release. How does certificate validation work? How does the attack work? Certificate with .
My RSS aggregator is at news. An archive of documents obtained from the public internet is kept at cyberwar. Because links break all too often, and Lots Of Copies Keep Stuff Safe. Journal of Homeland Security Affairs. Journal of Intelligence and Counterintelligence.
I ramble about a number of things - but travel experiences, movies and music feature prominently. See my label cloud for a better idea. It is a distraction, that really damages an otherwise less reported story.
Information Security Research and Education, University College London. Teaching Privacy Enhancing Technologies at UCL. Professor Sasse featured in BBC article on insecure fingerprint recognition. Professor Angela Sasse has been recently quoted in BBC article on HTC phone storing.
This entry is written mostly for my non-cryptographer friends who wonder why I am always criticizing Estonian e-voting scheme, but it may also be interesting for cryptographers all around the globe. All opinions are my own. First of all, as a cryptographer, it is my job not to support insecure systems. Given the current situation in Estonia, paper-voting is the only thing that I can do, but I hope things will improve rapidly.
Words from a Porn Star. Enter your email address to subscribe to this blog and receive notifications of new posts by email. Sometimes, trimming the pubes around your dick is just like serving the same amount of food in a smaller dish.
What is Conspicuous Consumption? What is Conspicuous Consumption. Is a term introduced by the Norwegian-American economist and sociologist Thorstein Veblen. The term refers to consumers who buy expensive items to display wealth and income rather than to cover the real needs of the consumer. The result, according to Veblen, is a society characterized by wasted time and money. Consumption is used as a way to gain and signal status.
How do you cook Lobster Mushrooms? A quick and fun video recipe for cooking lobster mushrooms from the makers of the movie. Want to watch a whole movie about mushrooms? 8211; screening at the IFC Center in New York and across the United States this fall.
A place for me to share my thoughts, ideas and perspectives. Monday, April 8, 2013. This latest blog post is about eliminating unnecessary dings, buzzes and vibrations that affect your productivity throughout your work day. For those of you who are old enough to, think back to a time before you received email on your smartphone. For many people I know, maybe the din.
Leadership lessons are all around us. Observing and reflecting on leadership - the good and the bad - are fascinating activities. This blog is a place to share and discuss the leadership we see all around us. Monday, November 5, 2007. 10 signs of incompetent managers. Great article here in Fast Company. More than two - sound the alarm! XP seminar coming in February.