skip to main | skip to sidebar

Math/Sec 270

For students of Math/Sec 270 at John Jay College

Wednesday, September 24, 2008

9/24: lecture videos/links



JPHide/Seek
Invisible Secrets
Steghide
Outguess/Stegdetect
Neil Johnson's list of tools


Articles about steganography:

Steganography: Hiding Data Within Data
Wikipedia Article
Steganography Revealed
History and Steganography
Stegoarchive




Netcat
Posted by Jamie Levy at 5:36 AM
Labels: notes, tools

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Class Websites

  • Class Website
  • Class Listserve

Blog Archive

  • ▼  2008 (54)
    • ►  December (13)
    • ►  November (16)
    • ►  October (5)
    • ▼  September (18)
      • 9/24: lecture videos/links
      • Networks
      • Talk on 9/24: Visual Forensic Analysis
      • Secret messages
      • Palin's Yahoo account compromised
      • Viruses (or virii) - Part 2
      • Viruses (or virii) - Part 1
      • Computer basics
      • Two network tools
      • Software Issues
      • Google Chrome
      • CSAW Competition
      • Death Star Threat Modeling
      • Integrity matters
      • Hackers
      • Myspace Passwords
      • Three Approaches to Security
      • 9/3/08: Notes and Personal Security
    • ►  August (2)

Labels

  • various notes (22)
  • notes (13)
  • news (11)
  • internet (9)
  • personal security (9)
  • data (4)
  • hackers (4)
  • tools (4)
  • crypto (3)
  • labwork (3)
  • media (3)
  • command line (2)
  • myspace (2)
  • network forensics (2)
  • networks (2)
  • policies (2)
  • privacy (2)
  • security breach (2)
  • virus (2)
  • windows (2)
  • basics (1)
  • biometrics (1)
  • csaw (1)
  • cygwin (1)
  • fun (1)
  • google (1)
  • hashing (1)
  • homework (1)
  • links (1)
  • linux (1)
  • phishing (1)
  • rfid (1)
  • social engineering (1)
  • software security (1)
  • talks (1)
  • welcome (1)

Interesting Blogs

  • Schneier on Security
    Malicious-Looking URL Creation Service
    10 hours ago
  • ...And You Will Know me by the Trail of Bits
    Taming 2,500 compiler warnings with CodeQL, an OpenVPN2 case study
    10 hours ago
  • TaoSecurity
    Creating a Large Text File Viewer by Vibe Coding with Visual Studio Code, Cline, OpenRouter, and Claude 3.7
    5 months ago
  • We Break Things
    Why Many Filipino Nurses Choose to Work Abroad
    1 year ago
  • Errata Security
    C can be memory safe, part 2
    1 year ago
  • Carnal0wnage Blog
    Devoops: Nomad with raw_exec enabled
    5 years ago
  • Jeremiah Grossman
    An idea to help secure U.S. cybersecurity…
    9 years ago
  • invisiblethings' blog
    Migrating my blog out of Blogger...
    10 years ago
  • Devil's Advocate Security
    Part 2: On Passwords, Password Policies, and Teaching
    13 years ago
  • Security Fix
  • McGrew Security Blog
  • Matasano Chargen