RSS feed [root] /security /weblog




login:

password:

title search:




 


Wed Jul 19 00:22:33 HKT 2017

security



(google search) (amazon search)
second
download zip of files only

Wed Jul 19 00:22:53 HKT 2017 From /weblog/security

tools


The NSA has open-sourced dozens of security tools
- https://medium.freecodecamp.org[..]ced-dozens-of-security-tools-7af99cfe422

(google search) (amazon search)



Fri Mar 24 10:58:39 HKT 2017 From /weblog/security

password


Make sure all your passwords are 12 characters or more, Use bcrypt or PBKDF2 exclusively to hash anything you need to be secure. - http://www.codinghorror.com/blog/2012/04/speed-hashing.html

Password is only worked for one time - http://www.mobileread.com/forums/showthread.php?threadid=6462

crack captcha - http://sam.zoy.org/pwntcha/

Java password mask - http://java.sun.com[..]er/technicalArticles/Security/pwordmask/

OpenID resource - http://openid.net/ http://www.arachna.com[..]ge/spidaman/20070225#the_openid_snowball http://developers.sun.com/identity/ http://www.theserverside.com[..]_id=46569&asrc=EM_NLN_2030603&uid=703565

OpenID explain - http://ravichodavarapu.blogspot.com/2007/06/what-is-openid.html

A technique that crack winxp password at 3 min - http://www.infoq.com/news/2007/09/rainbowtables

Using image as password - http://dsc.discovery.com/news/briefs/20060306/password_tec.html

The other interesting idea, Evolving Password - http://www.docuverse.com[..]uid=79730e53-1d30-47ae-98e8-abb55201429b

Passphrase Evangelism - http://www.codinghorror.com/blog/archives/000360.html

Rainbow Hash Cracking - http://www.codinghorror.com/blog/archives/000949.html , add salt (token) to prevent it - http://blog.cfelde.com/2011/04/hashing-passwords/

How to make password harder to be guessed, but I guess there should be simple way to guess "this is fun", other than take 2537 years? - http://www.baekdal.com/tips/password-security-usability

Discussion about if some old suggested rules about still valid or not - http://queue.acm.org/detail.cfm?id=2422416&ref=fullrss

Using quantum for password? - https://www.inside.com.tw/2017/03/01/quantum-key-distribution

Salted Password Hashing - Doing it Right - https://crackstation.net/hashing-security.htm http://www.infoq.com[..]w-to-encrypt-the-user-password-correctly

(google search) (amazon search)


Tue Mar 21 14:30:43 HKT 2017 From /weblog/security

fundamental


Introduction to Cryptography Basic Principles - http://www.thegeekstuff.com/2012/07/cryptography-basics/

http://www.thegeekstuff.com[..]01/diffie-hellman-key-exchange-algorithm

http://meri-stuff.blogspot.hk[..]tography-theory-1-meaning-of-secure.html

getting-a-list-of-available-cryptographic-algorithms - http://invariantproperties.com[..]t-of-available-cryptographic-algorithms/

Differential privacy - http://www.infoq.com/cn/articles/differential-privacy-intro https://www.infoq.com/articles/differential-privacy-intro

(google search) (amazon search)


Wed Jun 05 11:25:12 HKT 2013 From /weblog/security

crack


How to use basic UNIX tool to steal other facebook identity - http://blog.mostof.it/how-to-steal-a-facebook-identity/

More on BGP Attacks - http://blog.wired.com/27bstroke6/2008/08/how-to-intercep.html

Discussion of crack protection - http://discuss.joelonsoftware.com/default.asp?design.4.579670 http://www.focusoncode.com/exe-packers-crypters-and-compressors/ , introduce tools - http://www.pelock.com/

Ten Immutable Laws of Security
Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore
Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more
Law #5: Weak passwords trump strong security
Law #6: A computer is only as secure as the administrator is trustworthy
Law #7: Encrypted data is only as secure as the decryption key
Law #8: An out of date virus scanner is only marginally better than no virus scanner at all
Law #9: Absolute anonymity isn't practical, in real life or on the Web
Law #10: Technology is not a panacea

http://www.microsoft.com[..]s/security/essays/10imlaws.mspx?mfr=true

An example of buffer overflow attack - http://www.thegeekstuff.com/2013/06/buffer-overflow/

(google search) (amazon search)


Sun Dec 23 17:30:52 HKT 2012 From /weblog/security

firewall


Explanation about the Great Firewall - http://queue.acm.org/detail.cfm?id=2405036&ref=fullrss

(google search) (amazon search)


Sun Jul 01 00:07:02 HKT 2012 From /weblog/security

system


Anatomy of a Stack Smashing Attach and How GCC Prevents It - http://www.drdobbs.com[..]cleId=240001832&siteSectionName=security

(google search) (amazon search)


Sun Apr 01 22:17:08 HKT 2012 From /weblog/security

ssh


http://www.javacodegeeks.com/2012/03/ssh-tunneling-explained.html

(google search) (amazon search)


Thu Mar 01 22:41:18 HKT 2012 From /weblog/security

reference


How to make encrytion really safe - http://www.javacodegeeks.com[..]roduction-to-strong-cryptography-p1.html

Review and summary of "19 Deadly Sins of Software Security" - http://www.codinghorror.com/blog/archives/000841.html

Dumb idea of security and recommend fix - http://www.ranum.com/security/computer_security/editorials/dumb/ ... interesting to read but not much real impact

Top 25 coding issue about security - http://www.sans.org/top25errors/

http://java.sun.com/security/seccodeguide.html

(google search) (amazon search)


Wed Apr 06 00:25:55 HKT 2011 From /weblog/security

phpfog


The story about phpfrog.com getting hacked - http://blog.phpfog.com[..]gers-and-why-it-will-never-happen-again/

(google search) (amazon search)


Wed Jun 17 01:55:55 HKT 2009 From /weblog/security

TLS


A list of diagrams to show how TLS work

Understanding TLS protocol -- handshaking kickoff - http://blogs.sun.com/xuelei/entry/understanding_tls_protocol_1
Understanding TLS protocol -- connection states - http://blogs.sun.com[..]rstanding_tls_protocol_connection_states
Understanding TLS protocol -- handshaking renew - http://blogs.sun.com[..]rstanding_tls_protocol_handshaking_renew
Understanding TLS protocol -- handshaking resume - http://blogs.sun.com[..]standing_tls_protocol_handshaking_resume

Another reading, about the handshaking for HTTP protocol - http://www.moserware.com[..]/06/first-few-milliseconds-of-https.html

(google search) (amazon search)


Thu Dec 06 23:33:35 HKT 2007 From /weblog/security

wifi


TJX lost customer data due to haven't update wifi code - http://www.google.com[..].com/article/07/01/17/HNtjxbreach_1.html

(google search) (amazon search)


Wed Nov 28 13:35:27 HKT 2007 From /weblog/security

config file


Encrypting configuration, probably a good idea - http://www.jasypt.org/encrypting-configuration.html

(google search) (amazon search)



Tue Jun 20 14:44:56 HKT 2006 From /weblog/security

losting notebook


Cases like that happen again and again and again... We really need to educate user about security: http://www.dailytech.com/article.aspx?newsid=2914

(google search) (amazon search)


Sun May 07 19:57:54 HKT 2006 From /weblog/security

HK police information leakage


Look like most Government don't handle data security well. Recently HK police information leakage case is one of great example:

http://www.thestandard.com.hk[..]35&sid=7287851&con_type=1&d_str=20060330
http://www.google.com[..]ge+case&sourceid=opera&ie=utf-8&oe=utf-8

However, this is not only HK problem some other countries facing similar problem also: http://thedailywtf.com/forums/65974/ShowPost.aspx http://thedailywtf.com/forums/71199/ShowPost.aspx

For HK case, look like it just some idiots in Government given out real data for testing, of course the IT service provider should also check the data and keep the data secure even for test data.

But for later case, it is more trick, it turn out Googlebot is too clear to bypass the security trick which call GET HTTP command to delete link everyday. Remember, all client side security is not safe.

(google search) (amazon search)


Wed Apr 05 15:46:05 HKT 2006 From /weblog/security

http


An article show how to test various security bug of website using HTTP header manipulation tool. However, look like using a HTTP client is more easy and scriptable?

http://www.onlamp.com/lpt/a/6268

(google search) (amazon search)