Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share This URL With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

Links 1 through 10 of 71 by Kris Van den Bergh tagged security

Share It With Others!

Share It With Others!

There was a time when the “high street” bank was a disconnected silo, an island of tranquillity. Except when it came to a busy afternoon and you wanted to withdraw money. Your money. Because the only place you could withdraw it from was the branch with which you held your account. If you weren’t near it, tough. If it was too busy to serve you, tough.

Share It With Others!

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos (στεγανός) meaning "covered or protected", and graphein (γράφειν) meaning "to write". The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext and, classically, the hidden message may be in invisible ink between the visible lines of a private letter.

Share It With Others!

Written by Julian Assange, Ralf P. Weinmann and Suelette Dreyfus, Rubberhose is currently available for Linux 2.2. Userland daemons and tools are highly portable. NetBSD & FreeBSD kernel modules are nearing completion.

Share It With Others!

The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the United States Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the TCP/IP protocols in a 'completely secure' environment".[1] It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD’s classified version of the civilian Internet.

SIPRNet is the SECRET component of the Defense Information Systems Network.[2]

Share It With Others!

James Van Bokkelen is about to be robbed. A wealthy software entrepreneur, Van Bokkelen will be the latest victim of some punk with a laptop. But this won't be an email scam or bank account hack. A skinny 23-year-old named Jonathan Westhues plans to use a cheap, homemade USB device to swipe the office key out of Van Bokkelen's back pocket.

Share It With Others!

My research spans applied computer security and tech-centric public policy. Topics that interest me include software security, data privacy, electronic voting, digital rights management, and cybercrime, as well as technological aspects of intellectual property law and government regulation.

Share It With Others!

Edward William Felten (born March 25, 1963) is a professor of computer science and public affairs at Princeton University. On November 4, 2010 he was named the Chief Technologist for the United States Federal Trade Commission[2], a post he will take in early 2011.

Share It With Others!

I don't have a lot to say about WikiLeaks, but I do want to make a few points.

Share It With Others!