cxcv: security* + hacking*

48 bookmark(s) - Sort by: Date ↓ / Title / - Bookmarks from other users for this tag

  1. Hackerspaces are community-operated physical places, where people can meet and work on their projects. This website is for everyone who started or wants to start their own hackerspace.
    Tags: , , , by Benjamin Schweizer and 1 other (2008-07-26)
  2. working title
  3. The experience of the Lawrence Berkeley Laboratory in tracking an intruder suggests that any operating system is insecure when obvious security rules are ignored. How a site should respond to an intrusion, whether it is possible to trace an intruder trying to evade detection, what can be learned from tracking an intruder, what methods the intruder used, and the responsiveness of the law-enforcement community are also discussed.
  4. session papers of the first usenix workshop on large-scale exploits and emergent threats.
  5. Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and straightforward defenses. More complex designs that attack the software are unexplored, as are the countermeasures an attacker may take to bypass proposed defenses. (via fefe)
  6. I dislike PHP. It's because it's users. The lecturer tells about xss among others and guess what his site suffers from? sigh.

Top of the page

First / Previous / Next / Last / Page 2 of 5 Bookmarks: Tags: security + hacking

About - Propulsed by SemanticScuttle