Tags > encryption
November 12, 2013
Over the last week, the analysis of the Adobe breach has gotten more interesting. The actual file itself has been available via BitTorrent. I found a torrent file and looked through it myself. If you’re interested, note that the torrent …
October 2, 2013
Security has to reboot. What has passed for strong security until now is going to be considered only casual security going forward. As I put it last week, the damage that has become visible over the past few months means …
September 11, 2013
I was somewhat surprised, despite my paranoia, by the extent of NSA data collection. I was very surprised, though, to find the New York Times reporting that NSA seems to have eased its data collection challenge by weakening security standards …
July 17, 2013
Ten Rules of the Internet (Anil Dash) — they’re all candidates for becoming “Dash’s Law”. I like this one the most: When a company or industry is facing changes to its business due to technology, it will argue against the …By James Turner
October 24, 2010
But little did any of them know that Eve was secretly listening in on the whole conversation...By Andy Oram
January 13, 2010
A security trick documented by Peter Wayner in the books Beautiful Security and Translucent Databases was also discovered and used by Wesabe.By Nat Torkington
October 8, 2009
Linux Baby Rocker -- inventive use of a CD drive and the eject command ... (via Hacker News) I Like Unicorn Because It's Unix -- forceful rant about the need to rediscover Unix systems programming. Reminds me of the Varnish notes where the author explains that it works better because it uses the operating system instead of recreating it...By Nat Torkington
July 22, 2009
Google Wave Federation Protocol -- the interesting part of Wave for me is the system for keeping databases coherent. There's a reference implementationl. I shouldn't have yelled at that Chinese guy so much -- the post that redeemed Fake Steve Jobs in my eyes. We all know that there's no fucking way in the world we should have microwave...By Timothy M. O'Brien
June 19, 2009
The Tor Project produces an anonymous proxy services which allows users to evade surveillance. In this interview, Andrew Lewman talks about the Tor Project and discusses some statistics that show its increased use from with Iran. This article also includes some questions and answers with the EFF about the legal implications of running an open proxy server.Andrew Westberg
May 22, 2009
I've been consulting for Simplified Logic the creators of Nitro-LM full time for the past two years. Nitro-LM is a licensing and encryption solution for software written in C/C++, Java, Eclipse, Eclipse Plugins, and Adobe...
April 2, 2008
NitroLM (Nitromation License Manager) is a commercial product developed by Simplified Logic, Inc. (SLI) for managing users, products, notifications, and source code protection for applications. It started off as an internal tool to protect SLI’s 3D engineering design and...
April 2, 2008
In this article, we’ll go over an example using Interfaces, Factories, and Encryption to protect code in a SWC library from being easily decompiled.
March 31, 2008
In the RIA world, Flex and AIR applications have really taken off. With that has come increased adoption by Fortune 500 companies and new enterprise-level apps taking advantage of the Adobe Flash platform. Application and data security should always be a concern of the Flex/AIR developer. The level of paranoia the developer should implement must be weighed against the goals of the project.By Todd Ogasawara
March 18, 2008
TrueCrypt 5.1 lets you encrypt and secure files and folders very easily and quickly. The encrypted data can also be used on Linux and Microsoft Windows computers with TrueCrypt on it. Since it only became available for Mac OS X this year, I thought I'd provide a brief introduction to this amazing free Open Source encryption tool.
1 to 14 of 14