Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
and Privacy" page My "Authentication" page My "Secure Communication" page My "Anti-Malware" page My "Security Engines" page My "Privacy In General" page My "Backups" page My "Comp
Best practices and information about computer and smartphone security and privacy
The Design and Implementation of the Tor Browser [DRAFT]https://2019.www.torproject.org/projects/torbrowser/design/
browser identifiers, authentication tokens, and shared state. The requirement does not apply to linkable information the user manually submits to sites, or due to information subm
Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
Law litmus test, user authentication, Unix password encryption, Hellman's time/memory tradeoff, Rainbow tables, generalising Rainbow tables, LANMAN and NT domain authentication an
NLnet; Current projectshttps://nlnet.nl/project/current.html
and Client/Server Authentication for the Kaidan XMPP client Kaidan MUC + legacy OMEMO Multi-user chat and improved legacy interoperability for Kaidan XMPP client Support for 64-bi
CS255: Introduction to Cryptography; Course Syllabushttp://crypto.stanford.edu/~dabo/courses/cs255_winter20/syllabus.html
challenge response authentication. Reading: AC ch. 18; Lecture 15: Mon 3/2/20 Authenticated key exchange and SSL/TLS session setup [ pdf ] Reading: AC ch. 21; &
A beginner's guide to CGI scriptinghttp://www.anaesthetist.com/mnm/cgi/
in 1.1. "Basic authentication" is jacked up so that now a client first computes a (MD5) checksum of several values including a one-time value provided by the host ("nonce"). Nonce
Your Personal Web Sitehttps://www.billdietrich.me/YourPersonalWebSite.html
"d" # should get authentication failure # copy config and credentials files to /.aws on your web site Give fake Kubernetes Secrets file: echo -n 'admin' | base64 # USERNAME echo -
How to develop and maintain your own personal web site
Digital Freedom across the Worldhttps://eylenburg.github.io/countries.htm
mandatory for access or authentication. Fair Use, but DMCA misuse Broad, flexible exceptions allowing various uses (such as commentary, criticism, news reporting, teaching, schola
{REPLACE THIS}
Ayham's Online Website | A Practical Guide to GnuPGhttps://ayham.xyz/posts/a-practical-guide-to-gpg/
Check if your SSH authentication works (I use dropbear client, it works smoothly with GnuPG): 1 2 [~] $ dbclient [email protected] [~] $ dbclient [email protected] Don&r
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2007/
to debug the apparent authentication federation problem keeping me from my paid-for connectivity; sigh. Salt Lake, car hire, GPS fiddling, driving in the snow, good music on the r
C-Kermit Unix Hints and Tipshttps://www.kermitproject.org/ckubwr.html
of the different authentication methods. (I'm not sure how or whether this will continue now that C-Kermit 9.0 is Open Source and the Kermit Project no longer exists at Columbia U
https://www.rfc-editor.org/rfc/rfc5894.txthttps://www.rfc-editor.org/rfc/rfc5894.txt
identification and authentication protocols. Several elements of IDNA2008 give interpretations to strings prohibited under IDNA2003 or prohibit strings that IDNA2003 permitted. Th
Find more...