21 Lesezeichen - Sortieren nach: Datum ↓ / Titel /

neueste Lesezeichen / vorherige / weitere / älteste Lesezeichen / Seite 1 von 1 Bookmarks: tagged with "security"

  1. This guide arose out of the need for system administrators to have an updated, solid, well researched and thought-through guide for configuring SSL, PGP, SSH and other crypto graphic tools in the post-Snowden age. Triggered by the NSA leaks in the summer of 2013, many system administrators and IT security officers saw the need to strengthen their encryption settings. This guide is
    specifically written for these system administrators.
    https://bettercrypto.org/static/applied-crypto-hardening.pdf
    Schlagwörter: , von kaffeeringe (19.11.2014)
  2. The smartphone charging kiosk is a welcome addition to many airports and public areas, especially if it means you don’t have to carry around a bulky extended battery case. Some clever hackers have discovered that these kiosks can be easily used to do more harm than good if users are not careful.
    http://www.geek.com/articles/mobile/p...nycombinator+%28HN+-+hnycombinator%29
    Schlagwörter: , von kaffeeringe (26.12.2012)
  3. On the 27th September 2012 Mozilla launched the first beta of Persona. Persona is an authentication system that on the surface is quite similar to OpenID and oAuth, but differs in important technical and functional ways.
    http://labs.newsint.co.uk/blog/2012/1...ht-answer-to-the-question-of-identity
    Schlagwörter: von kaffeeringe (02.10.2012)
  4. Connect with BrowserID, the safest & easiest way to sign in.
    https://browserid.org
    Schlagwörter: , , von kaffeeringe (02.01.2012)
  5. Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones.
    http://www.baekdal.com/tips/password-security-usability
    Schlagwörter: , , von kaffeeringe (12.08.2011)
  6. The button below will generate a random phrase consisting of four common words. According to yesterday’s xkcd strip, such phrases are hard to guess (even by brute force), but easy to remember, making them interesting password choices.
    http://preshing.com/20110811/xkcd-password-generator
    Schlagwörter: , , von kaffeeringe (12.08.2011)
  7. Through 20 years of effort, we've successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess.
    http://xkcd.com/936
    Schlagwörter: , , , von kaffeeringe (10.08.2011)
  8. So the Sony saga continues. As if the whole thing about 77 million breached PlayStation Network accounts wasn’t bad enough, numerous other security breaches in other Sony services have followed in the ensuing weeks, most recently with SonyPictures.com. As bad guys often like to do, the culprits quickly stood up and put their handiwork on show. This time around it was a group going by the name of LulzSec. Here’s the interesting bit: "Sony stored over 1,000,000 passwords of its customers in plaintext"
    http://www.troyhunt.com/2011/06/brief-sony-password-analysis.html
    Schlagwörter: , , , von kaffeeringe (06.06.2011)
  9. Vorratsdatenspeicherung, Bundestrojaner, Anti-Terror-Gesetze. Noch nie in der Geschichte der Bundesrepublik gab es einen solchen Raubbau an Bürgerrechten wie im zurückliegenden Jahrzehnt. Ein Blick in die Statistik beweist: Die sog. „Anti-Terror-Gesetze“ werden für alles Mögliche benutzt, selten aber im Kampf gegen Terroristen.
    http://gutjahr.biz/blog/2011/05/die-anti-terror-luege
    Schlagwörter: , , , , von kaffeeringe (29.05.2011)
  10. BlueProximity is an application that lets you automatically lock / unlock your computer using a bluetooth device such as a mobile phone. You can configure the proximity distance (this is just an approximation because the signal strength is not always the same) and duration and when you move away from your computer, the screensaver is triggered and your computer is locked. When the bluetooth device (phone) is in range, it automatically unlocks the computer, without requiring any input on your side. This is useful for instance if you use Linux at work and want your computer to lock automatically when you leave for a few minutes, etc.
    http://www.webupd8.org/2011/05/blueproximity-use-bluetooth-device-to.html
    Schlagwörter: , , , von kaffeeringe (24.05.2011)
  11. Mehr Kooperation, mehr Informationsaustausch, eine echte "Public Private Partnership" wolle man erreichen. Was wirklich in den im letzten Jahrzehnt entstandenen Netzwerken von staatlichen Sicherheitsbehörden und privaten Unternehmen passiert, ist für die Öffentlichkeit nicht durchschaubar.
    http://www.linksnet.de/de/artikel/26556
    Schlagwörter: , , , , von kaffeeringe (28.04.2011)
  12. I am a fan of Dropbox. It is a great tool, a great product, and clearly they have a passionate team over at Dropbox building the product. Dropbox recently announced an update to its security terms of service in which they announced that they would provide the government with your decrypted files if requested to do so. This is not my problem with Dropbox. My problem is that for as long as I have tried to figure out, Dropbox made some bold claims about how your files were encrypted and how nobody had access to them
    http://tirania.org/blog/archive/2011/Apr-19.html
    Schlagwörter: , , , von kaffeeringe (19.04.2011)
  13. I wrote SHA1_Pass because I sometimes work in highly audited/regulated environments and I needed a way to recall dozens of complex passwords that change frequently and I disagree with the core concepts of most traditional password management software in use today. I believe a few of these programs are OK and I've used several of them and encouraged others to do so, but after trying to make traditional password managers work for several years, I gave up and decided that the current approach is fundamentally wrong.
    http://16s.us/sha1_pass/why
    Schlagwörter: , , von kaffeeringe (11.04.2011)
  14. In the wake of the recent Comodo fraud incident, there has been a great deal of speculation about how to improve the public key infrastructure, on which the security of the Internet rests. Unfortunately, this isn’t a problem that will be fixed overnight. Luckily, however, experts have long known about these issues and have been devising solutions for some time.
    http://googleonlinesecurity.blogspot....proving-ssl-certificate-security.html
    Schlagwörter: , , von kaffeeringe (02.04.2011)
  15. Laut Bundesamt für Sicherheit in der Informationstechnik (BSI) steigt die Zahl der ausgenutzten Sicherheitslücken. Die Folge: Immer mehr Websites werden von Hackangriffen heimgesucht. Wer einige grundlegende Regeln beachtet, minimiert das Risiko von Daten
    http://t3n.de/magazin/hacker-ausbrems...ne-website-schutzt-wichtigsten-223163
    Schlagwörter: , , von kaffeeringe (09.02.2010)
  16. Information technology's next grand challenge will be to secure the cloud--and prove we can trust it.
    http://www.technologyreview.com/web/24166
  17. Von jedem Endgerät und jedem Ort aus sicher ins Internet ohne eigene Unternehmenssicherheitsinfrastruktur und unter Berücksichtigung der Firmenpolicies -- das soll der neue Web Security Cloud Service von Zscaler leisten. Die Dienste eignen sich insbesonde
    http://www.heise.de/newsticker/Websic...it-als-Cloud-Service--/meldung/134122
    Schlagwörter: , , , von kaffeeringe (10.03.2009)
  18. Experts Announce Agreement on the 25 Most Dangerous Programming Errors - And How to Fix Them
    Agreement Will Change How Organizations Buy Software.
    http://www.sans.org/top25errors
    Schlagwörter: , , von kaffeeringe (13.01.2009)
  19. An Enterprise-class Cryptographic Filesystem for Linux
    http://ecryptfs.sourceforge.net
    Schlagwörter: , , , , von kaffeeringe (02.12.2008)
  20. How to Protect Your Wi-Fi Network from the WPA Hack
    http://lifehacker.com/5079721/how-to-...-your-wi+fi-network-from-the-wpa-hack
    Schlagwörter: von kaffeeringe (08.11.2008)
  21. The Open Phishing Database project is an effort to create and maintain and open database of phishing sites, in addition to providing browser extensions which utilise this database in order to provide users with a safer browsing experience.
    http://opdb.berlios.de
    Schlagwörter: , , , , von kaffeeringe (12.09.2008)

Seitenanfang

neueste Lesezeichen / vorherige / weitere / älteste Lesezeichen / Seite 1 von 1 Bookmarks: tagged with "security"

Impressum - Angetrieben von SemanticScuttle