wiby  
Settings



Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

and Privacy" page My "Authentication" page My "Secure Communication" page My "Anti-Malware" page My "Security Engines" page My "Privacy In General" page My "Backups" page My "Comp
Best practices and information about computer and smartphone security and privacy

The Design and Implementation of the Tor Browser [DRAFT]

https://2019.www.torproject.org/projects/torbrowser/design/

browser identifiers, authentication tokens, and shared state. The requirement does not apply to linkable information the user manually submits to sites, or due to information subm

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

Law litmus test, user authentication, Unix password encryption, Hellman's time/memory tradeoff, Rainbow tables, generalising Rainbow tables, LANMAN and NT domain authentication an

NLnet; Current projects

https://nlnet.nl/project/current.html

and Client/Server Authentication for the Kaidan XMPP client Kaidan MUC + legacy OMEMO Multi-user chat and improved legacy interoperability for Kaidan XMPP client Support for 64-bi

CS255: Introduction to Cryptography; Course Syllabus

http://crypto.stanford.edu/~dabo/courses/cs255_winter20/syllabus.html

challenge response authentication. Reading: AC ch. 18;   Lecture 15: Mon 3/2/20 Authenticated key exchange and SSL/TLS session setup   [ pdf ] Reading: AC ch. 21; &

A beginner's guide to CGI scripting

http://www.anaesthetist.com/mnm/cgi/

in 1.1. "Basic authentication" is jacked up so that now a client first computes a (MD5) checksum of several values including a one-time value provided by the host ("nonce"). Nonce

Your Personal Web Site

https://www.billdietrich.me/YourPersonalWebSite.html

"d" # should get authentication failure # copy config and credentials files to /.aws on your web site Give fake Kubernetes Secrets file: echo -n 'admin' | base64 # USERNAME echo -
How to develop and maintain your own personal web site

Digital Freedom across the World

https://eylenburg.github.io/countries.htm

mandatory for access or authentication. Fair Use, but DMCA misuse Broad, flexible exceptions allowing various uses (such as commentary, criticism, news reporting, teaching, schola
{REPLACE THIS}

Ayham's Online Website | A Practical Guide to GnuPG

https://ayham.xyz/posts/a-practical-guide-to-gpg/

Check if your SSH authentication works (I use dropbear client, it works smoothly with GnuPG): 1 2 [~] $ dbclient [email protected] [~] $ dbclient [email protected] Don&r

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2007/

to debug the apparent authentication federation problem keeping me from my paid-for connectivity; sigh. Salt Lake, car hire, GPS fiddling, driving in the snow, good music on the r

C-Kermit Unix Hints and Tips

https://www.kermitproject.org/ckubwr.html

of the different authentication methods. (I'm not sure how or whether this will continue now that C-Kermit 9.0 is Open Source and the Kermit Project no longer exists at Columbia U

https://www.rfc-editor.org/rfc/rfc5894.txt

https://www.rfc-editor.org/rfc/rfc5894.txt

identification and authentication protocols. Several elements of IDNA2008 give interpretations to strings prohibited under IDNA2003 or prohibit strings that IDNA2003 permitted. Th


Find more...