Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
"Exploiting Developer Infrastructure Is Ridiculously Easy (The open-source ecosystem is broken)" Cleaning or optimizing the Windows registry . Don't do it. This is a big gamble, y
Best practices and information about computer and smartphone security and privacy
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
are, better critical infrastructure security does not necessarily follow. We have in the news, IDG covered the story and Network World among others picked it up, that malware was
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org frhttps://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html
only >>> one infrastructure. The VC spec with VC schema is sufficiently expressive >>> syntactically to encompass all these semantics we just have to standardize
Tech - Anil Dashhttps://www.anildash.com/tags/tech/
best of The lost infrastructure of social media. 08 Aug 2016 blogs search social media tech twitter New York-Style Tech 15 Jul 2016 nyc tech On the Hunt 24 Feb 2016 tech twitter s
A blog about making culture. Since 1999.
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
in the hardware and infrastructure that users of the Internet rely on. In the West, a small number of companies (such as Intel, Nvidia, Arm and Apple) design and produce the major
Polandhttps://www.hellenicaworld.com/Poland/Poland.html
to cable and fiber infrastructure; the mobile market in recent years has been characterized by the rapid extension of LTE and 5G networks, and the development of mobile data servi
World Library, Michael Lahanas
15 reasons not to start using PGPhttps://secushare.org/PGP
to undermine the PGP infrastructure on a large scale, but it would not go unnoticed whereas a targeted attack most likely would. You can make the attack slightly more difficult by
Internet Census 2012https://census2012.sourceforge.net/paper.html
3.3 C&C less Infrastructure A classic botnet usually requires one or more command and control (C&C) servers the clients can connect to. A C&C server comes with several
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Bank on Open-Source Infrastructure , by Ned Lilly Finding my computer at home from the outside , by Mark Nielsen Learning Perl, part 3 , by Ben Okopnik So You Like Color !!! (The
Ye Olde Blogroll - Because blogs are the soul of the webhttps://blogroll.org/
high performance infrastructure on top of AWS. On the side, I enjoy running, rowing and tinkering with code. Gentle Sunday Written in English and Indonesian, Gentle Sunday is a mi
Find more...