skip to main
|
skip to sidebar
Math/Sec 270
For students of Math/Sec 270 at John Jay College
Thursday, November 6, 2008
Disobeying Corporate Rules
Read
this blog post
for the next class. It has some interesting points that fall into our recent discussions.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
Class Websites
Class Website
Class Listserve
Blog Archive
▼
2008
(54)
►
December
(13)
▼
November
(16)
XOR Demos
A Sixty-Eight Year Old Code
Improvised RFID blocking
Cryptography
Hashing Links
Rootkit links
Renderlab
Google
Obama/McCain Hack
Defaults and weaknesses
Doppelganger effect
CBS Early Show
Disobeying Corporate Rules
Passive ID Theft
Data loss in the age of information
Capturing Keyboard Strokes
►
October
(5)
►
September
(18)
►
August
(2)
Labels
various notes
(22)
notes
(13)
news
(11)
internet
(9)
personal security
(9)
data
(4)
hackers
(4)
tools
(4)
crypto
(3)
labwork
(3)
media
(3)
command line
(2)
myspace
(2)
network forensics
(2)
networks
(2)
policies
(2)
privacy
(2)
security breach
(2)
virus
(2)
windows
(2)
basics
(1)
biometrics
(1)
csaw
(1)
cygwin
(1)
fun
(1)
google
(1)
hashing
(1)
homework
(1)
links
(1)
linux
(1)
phishing
(1)
rfid
(1)
social engineering
(1)
software security
(1)
talks
(1)
welcome
(1)
Interesting Blogs
Schneier on Security
ExxonMobil Lobbyist Caught Hacking Climate Activists
8 hours ago
...And You Will Know me by the Trail of Bits
Best practices for key derivation
1 day ago
TaoSecurity
Happy 22nd Birthday TaoSecurity Blog
3 weeks ago
We Break Things
Why Many Filipino Nurses Choose to Work Abroad
5 months ago
Errata Security
C can be memory safe, part 2
11 months ago
Carnal0wnage Blog
Devoops: Nomad with raw_exec enabled
5 years ago
Jeremiah Grossman
An idea to help secure U.S. cybersecurity…
9 years ago
invisiblethings' blog
Migrating my blog out of Blogger...
9 years ago
Devil's Advocate Security
Part 2: On Passwords, Password Policies, and Teaching
13 years ago
McGrew Security Blog
Matasano Chargen
Security Fix
No comments:
Post a Comment