skip to main
|
skip to sidebar
No Tricks
Risk, Security, Math, Crypto
Wednesday, May 26, 2010
iPhone, iPad, iBoard, iMat
This
is just great.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
About Me
Unknown
View my complete profile
Quick Links
Home
Luke O'Connor Bio
Top Posts
Favourite Posts
Scribd Collections
The No Tricks Name
Subscribe
Posts
Atom
Posts
Comments
Atom
Comments
ALL POSTS
on AES and A5/1
on Passwords
on the Birthday Paradox
on Entropy
with FreeMind outlines
Search This Blog
Blog Archive
►
2013
(3)
►
April
(2)
►
February
(1)
►
2012
(2)
►
May
(2)
►
2011
(32)
►
October
(4)
►
September
(13)
►
August
(5)
►
June
(2)
►
May
(1)
►
April
(2)
►
March
(4)
►
January
(1)
▼
2010
(116)
►
December
(7)
►
October
(1)
►
September
(7)
►
August
(14)
►
June
(1)
▼
May
(38)
The half-life of a YouTube video is 6 Days
An advance in Encrypted Search
A look back at posts in May 2009
How To Password Protect Your Pen Drive
iPhone, iPad, iBoard, iMat
Shark Fin Posts
Google could help enforce new German wireless prot...
Whit Diffie does the Can Can
Security Bloggers Network under attack?
Facebook juggernauts towards 500 million users
Password Strength Infographic
Y2Gay: gay marriage from the database perspective
Why have there been so many Natural Catastrophes o...
Conficker, RSA and RC4
Phishing and scamming in the new Top Level Domains
Two universities rethink Gmail migration plans
10 Reasons Why Microsoft's Internet Explorer Domin...
Numerical Palindromes
Great Security white papers and briefs from Damballa
6 Hot And Sought-After IT Security Skills
Privacy degradation at Facebook
1733 default vendor passwords now online
The Swan Song of Mark Curphey
Some quotes from my first 200 posts
The Tab Power Law for Firefox
Elliptic Curves in ASCII
What are the CISO's most useful instruments?
Infographic on Afghan scenarios with Prezi
OpenSAMM Assessment Spreadsheet v0.4 available
Cute Cloud Computing graphic
Projection: Firefox overtakes IE by Christmas 2012
When we understand that slide, we’ll have won the war
The power limit of Cloud Computing
Conficker and your health
A look back at posts from April 2009
Crowdsourcing CAPTCHA cracking
1-in-300 Facebook accounts hacked, and now for sale
What is the LINPACK rating of Conficker?
►
April
(7)
►
March
(15)
►
February
(24)
►
January
(2)
►
2009
(111)
►
December
(9)
►
November
(26)
►
October
(3)
►
September
(6)
►
August
(3)
►
July
(3)
►
June
(13)
►
May
(9)
►
April
(11)
►
March
(9)
►
February
(5)
►
January
(14)
►
2008
(25)
►
December
(7)
►
November
(3)
►
October
(2)
►
August
(3)
►
July
(3)
►
June
(3)
►
May
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2007
(2)
►
October
(1)
►
September
(1)
Lijit Search
Lijit Search
Labels
A5/1
(7)
AES
(9)
Analysis
(3)
Anonymity
(7)
AV
(4)
Awareness
(3)
Biometric
(2)
Birthday Paradox
(5)
Black Swan
(11)
Block Cipher
(1)
Blogging
(15)
Books
(5)
Border Search
(1)
BP
(1)
Browser
(4)
Bruce
(3)
Brute Force
(2)
Buffer Overflow
(1)
Business Insider
(1)
business models
(1)
CAPTCHA
(2)
Certificates
(1)
Charting
(2)
Choice
(1)
Chrome
(1)
CISO
(1)
cloud computing
(11)
coincidences
(2)
Cold Boot
(2)
Conficker
(4)
controls
(1)
Course
(2)
cryptography
(10)
Data
(5)
Data Breach
(4)
Data Center
(1)
Data Centric Security
(4)
DDoS
(1)
DES
(1)
DNS
(3)
DoD
(1)
education
(2)
Elliptic Curves
(1)
Email
(2)
Encrypted search
(4)
Encryption
(14)
ENISA
(3)
Entropy
(7)
Estimation
(1)
Excel
(2)
Facebook
(4)
Factoring
(3)
faraday
(2)
Fault Injection
(2)
Fibonnaci
(1)
FireFox
(1)
framework
(1)
FreeMind
(6)
FSA
(1)
FUD
(2)
Gambling
(1)
games
(1)
Google
(6)
GPS
(3)
GPU
(1)
Green IT
(1)
GSM
(3)
Half Life
(2)
Hashing
(2)
HP
(1)
Humour
(6)
IBM
(6)
ICANN
(2)
IE
(2)
IEEE
(1)
IEP
(2)
Infographic
(3)
Interesting
(4)
iPad
(1)
iPhone
(1)
ISACA
(2)
IT
(1)
IT Risk
(3)
Key Lengths
(3)
Key Management
(1)
Koobface
(1)
Language
(1)
Long Tail
(3)
Lottery
(1)
Malware
(4)
Metrics
(1)
microsoft
(5)
Mind mapping
(6)
Natural Catastrophe
(2)
New School of Information Security
(1)
NIST
(3)
NodeXL
(1)
NSA
(1)
One Way Hash Arguments
(1)
Online transactions
(1)
Open Source
(2)
OWASP
(3)
P2P
(1)
PageRank
(3)
Passwords
(28)
phishing
(1)
PKI
(2)
policy
(1)
Power Laws
(4)
PowerPoint
(2)
Predictions
(2)
Presentation
(6)
Prezi
(1)
Privacy
(5)
Probability
(4)
Project Risk
(1)
Quantitative
(2)
Quantum Computing
(2)
quantum cryptography
(1)
R Programming Language
(1)
Rainbow Tables
(4)
Random Graph Theory
(1)
Randomness
(5)
RC4
(2)
re-keying
(1)
Redundancy
(1)
renegotiation attack
(3)
Reputational Damage
(1)
Research
(1)
Retrospective
(6)
RFID
(2)
Risk Factors
(6)
Risk Management
(20)
roundup
(3)
RSA
(5)
Satellites
(2)
Scenario Driven Risk Analysis
(1)
scribd
(20)
SDL
(2)
Security
(38)
Security Management
(1)
Skype
(1)
Social Engineering
(1)
Social Media
(3)
SOX
(1)
Spam
(2)
Spreadsheet
(1)
SSD
(1)
ssl
(8)
Star Wars
(2)
statistical tests
(1)
Statistics
(2)
SUN
(1)
TED
(1)
Threat Modeling
(4)
Tipping Point
(1)
TLS
(3)
TMTO
(2)
ToR
(2)
Trends
(2)
trojan
(1)
Turing
(1)
Twitter
(7)
uncertainty
(1)
USB
(7)
VaR
(1)
VeriSign
(1)
Video
(1)
Visualization
(21)
Vulnerabilities
(2)
Weapons of Math Instruction
(1)
web 2.0
(9)
Whit Diffie
(2)
Whitelisting
(3)
whitepaper
(2)
Wikileaks
(1)
Windows
(1)
Wireless
(2)
Wisdom of Crowds
(2)
Worm
(1)
WPA
(1)
X509
(1)
YouTube
(1)
Zero Knowledge Proof
(1)
No comments:
Post a Comment