236 links
  • Zertrin's links
  • Home
  • Login
  • RSS Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
page 1 / 1
12 results tagged security x
  • Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.com
    Un article résumant ce qu'on a appris des récentes révélations concernant l'injection de paquets dans les réseaux dans une optique d'espionnage et de surveillance.
    Sun Nov 17 00:20:55 2013 - permalink -
    - http://www.wired.com/opinion/2013/11/this-is-how-the-internet-backbone-has-been-turned-into-a-weapon
    dns https injection internet mitm NSA security surveillance weapon web
  • Resources - rationallyPARANOID.com
    Une liste de liens avec une petite description vers plein d'outils et de ressources utiles en matière de forensics notamment mais pas seulement.
    Thu Nov 7 22:36:08 2013 - permalink -
    - http://www.rationallyparanoid.com/resources/
    debug forensics internet ip liste outil security tcp tool
  • Theoretical definitions for crypto wannabes
    A nice article to get an overview of the things to think about when you begin to consider adding crypto to some project.
    Tue Oct 29 20:52:40 2013 - permalink -
    - http://unhandledexpression.com/2013/08/09/theoretical-definitions-for-crypto-wannabes/
    auth crypto security threat-model
  • DNSCrypt home page
    dnscrypt-proxy provides local service which can be used directly as your local resolver or as a DNS forwarder, encrypting and authenticating requests using the DNSCrypt protocol and passing them to an upstream server.

    The DNSCrypt protocol uses high-speed high-security elliptic-curve cryptography and is very similar to DNSCurve, but focuses on securing communications between a client and its first-level resolver.

    While not providing end-to-end security, it protects the local network, which is often the weakest point of the chain, against man-in-the-middle attacks. It also provides some confidentiality to DNS queries.
    Thu Oct 17 17:45:51 2013 - permalink -
    - http://dnscrypt.org/
    crypto cryptography dns encrypted internet opensource security
  • crypto-js - JavaScript implementations of standard and secure cryptographic algorithms - Google Project Hosting
    CryptoJS is a growing collection of standard and secure cryptographic algorithms implemented in JavaScript using best practices and patterns. They are fast, and they have a consistent and simple interface.
    Mon Aug 26 00:54:11 2013 - permalink -
    - http://code.google.com/p/crypto-js/
    AES crypto cryptography HMAC javascript js lib md5 PBKDF2 security SHA1
  • Implementing Two-Factor Authentication Is Easier Than It Seems
    User and password verification with two-factor authentication isn't as easy to use as plain old user and password, but with smartphones it comes very, very close. At the same time, the security benefits from having another secret stored on a different terminal are massive. Users' accounts aren't necessarily compromised if their passwords are.

    In my mind, two-factor authentication is one of the least tedious things you can add that adds the most security to user accounts.

    "But it's a pain to add to your application, right?"

    No! Just take a look at main() in this example that uses only the Python standard library
    Mon Jul 8 20:48:30 2013 - permalink -
    - http://throwingfire.com/you-can-be-a-twofactor-hero/
    authentification crypto OTP password python security TOTP two-factor
  • Improving the security of your SSH private key files — Martin Kleppmann’s blog
    Explications intéressantes sur le format de stockage des clefs SSH générées par OpenSSL et sur le moyen d'améliorer l'algo de chiffrement utilisé pour chiffrer les clefs privées.
    Wed Jun 19 11:14:23 2013 - permalink -
    - http://martin.kleppmann.com/2013/05/24/improving-security-of-ssh-private-keys.html
    AES crypto cryptography DSA key linux md5 openssl PKCS RSA security SHA1 ssh
  • OpenPGP Best Practices - debian grimoire - Groupes - we.riseup.net
    Some thoughts on best practices for OpenPGP keys
    Sun Apr 21 22:10:28 2013 - permalink -
    - https://we.riseup.net/debian/openpgp-best-practices
    cryptography GPG hash key linux openpgp PGP RSA security SHA1
  • Secure Salted Password Hashing - How to do it Properly
    There are a lot of conflicting ideas and misconceptions on how to do password hashing properly, probably due to the abundance of misinformation on the web. Password hashing is one of those things that's so simple, but yet so many people get wrong. With this page, I hope to explain not only the correct way to do it, but why it should be done that way.
    Sun Mar 24 22:28:33 2013 - permalink -
    - http://crackstation.net/hashing-security.htm
    hashing password salting security
  • thumbnail
    SSL Threat Model
    Tue Nov 13 01:38:01 2012 - permalink -
    - http://blog.ivanristic.com/SSL_Threat_Model.png
    authentification certificate security SSL threat-model
  • http - The definitive guide to forms based website authentication - Stack Overflow
    Tue Nov 13 01:36:57 2012 - permalink -
    - http://stackoverflow.com/questions/549/the-definitive-guide-to-forms-based-website-authentication
    auth best-practice http login password security
  • OWASP Cryptographic Storage Cheat Sheet
    Tue Nov 13 01:35:10 2012 - permalink -
    - https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet
    crypto cryptography data security
Links per page: 20 50 100
page 1 / 1
Shaarli - The personal, minimalist, super-fast, no-database delicious clone by the Shaarli community - Help/documentation