goodenoughsecurity.blogspot.com goodenoughsecurity.blogspot.com

goodenoughsecurity.blogspot.com

Good Enough Security

Product Security Engineering in the Real World and Why Security Systems Fail

http://goodenoughsecurity.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR GOODENOUGHSECURITY.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

December

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.7 out of 5 with 11 reviews
5 star
4
4 star
4
3 star
1
2 star
0
1 star
2

Hey there! Start your review of goodenoughsecurity.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

2.4 seconds

FAVICON PREVIEW

  • goodenoughsecurity.blogspot.com

    16x16

  • goodenoughsecurity.blogspot.com

    32x32

  • goodenoughsecurity.blogspot.com

    64x64

  • goodenoughsecurity.blogspot.com

    128x128

CONTACTS AT GOODENOUGHSECURITY.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Good Enough Security | goodenoughsecurity.blogspot.com Reviews
<META>
DESCRIPTION
Product Security Engineering in the Real World and Why Security Systems Fail
<META>
KEYWORDS
1 good enough security
2 moved to twitter
3 posted by
4 david wachtfogel
5 no comments
6 email this
7 blogthis
8 share to twitter
9 share to facebook
10 share to pinterest
CONTENT
Page content here
KEYWORDS ON
PAGE
good enough security,moved to twitter,posted by,david wachtfogel,no comments,email this,blogthis,share to twitter,share to facebook,share to pinterest,from @marshway,bcrypt,or scrypt,1 comment,labels passwords,qotd,wrong,not even close,not yet,what flaw
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Good Enough Security | goodenoughsecurity.blogspot.com Reviews

https://goodenoughsecurity.blogspot.com

Product Security Engineering in the Real World and Why Security Systems Fail

INTERNAL PAGES

goodenoughsecurity.blogspot.com goodenoughsecurity.blogspot.com
1

Good Enough Security: How the PS3 LV0 key was (probably) hacked

http://goodenoughsecurity.blogspot.com/2012/11/how-ps3-lv0-key-was-probably-hacked.html

Product Security Engineering in the Real World and Why Security Systems Fail. Sunday, November 25, 2012. How the PS3 LV0 key was (probably) hacked. If you follow Schneier. You may have followed his link. To a Hexus.net article entitled "Sony lets slip its PlayStation 3 Master Key". This wouldn't be the first time Sony has leaked important security keys, common to every PlayStation 3 console, however, this is the first time the console's LV0 decryption keys have been let loose in the wild. But Sony still ...

2

Good Enough Security: Stack Exchange posts pt. 2

http://goodenoughsecurity.blogspot.com/2012/11/stack-exchange-posts-pt-2.html

Product Security Engineering in the Real World and Why Security Systems Fail. Wednesday, November 21, 2012. Stack Exchange posts pt. 2. Following my previous post on the subject. Here are a few more links to posts on the Stack Exchange IT Security Q&A site:. Is it safe to use a weak password as long as I have two-factor authentication? Client side password hashing. When using symmetric key encryption, do we need to sign? Reset password - should I prevent abusing it? Encryption in an embeddded system.

3

Good Enough Security: HDCP: Cool New Hack

http://goodenoughsecurity.blogspot.com/2011/09/hdcp-cool-new-hack.html

Product Security Engineering in the Real World and Why Security Systems Fail. Sunday, September 18, 2011. HDCP: Cool New Hack. In the previous post. I mentioned the fact that the HDCP master root key was publicly revealed about a year ago. Last week Nate Lawson, on his root labs rdist blog. Pointed out that the Chumby NeTV is probably the first commercial use of these leaked keys - and it's a very cool hack indeed. Describes the NeTV as follows. Platforms in a non-intrusive and always-on manner. At first...

4

Good Enough Security: June 2012

http://goodenoughsecurity.blogspot.com/2012_06_01_archive.html

Product Security Engineering in the Real World and Why Security Systems Fail. Thursday, June 14, 2012. Readers of this blog know that I can't miss a chance to ridicule hyperbolic headlines. Mocana has a great blog on the "Security news for the Internet of things" but they sometimes overstate the case. The headline of today's Mocana post is "Researcher: Flame’s Crypto Collision Discovery Cost At Least $200K". The source Mocana gives for this assessment is an Ars Technica post. Links to this post. Could be...

5

Good Enough Security: Protecting the weak (passwords)

http://goodenoughsecurity.blogspot.com/2012/12/protecting-weak-qotd-3.html

Product Security Engineering in the Real World and Why Security Systems Fail. Thursday, December 20, 2012. Protecting the weak (passwords). Salting a fast hash function is like issuing life vests to the passengers of the Titanic. This is an apt simile. I guess it requires some explanation for people less knowledgeable in the area of password security. If a server uses passwords to authenticate users the server needs to store some value for each user with which to validate the password entered by the user.

UPGRADE TO PREMIUM TO VIEW 13 MORE

TOTAL PAGES IN THIS WEBSITE

18

LINKS TO THIS WEBSITE

blog.cryptographyengineering.com blog.cryptographyengineering.com

A Few Thoughts on Cryptographic Engineering: Useful Cryptography Resources

http://blog.cryptographyengineering.com/p/useful-cryptography-resources.html

A Few Thoughts on Cryptographic Engineering. Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds. This page is an attempt to compile some of the top technical. Crypto and security blogs, textbooks, and websites. It's very much a work in progress. If you think something is missing, please leave a note in comments or drop me a line. Top Cryptography and Security Blogs. Light Blue Touch Paper (University of Cambridge). Notes from one of the preeminent hardware hackers, ...

UPGRADE TO PREMIUM TO VIEW 0 MORE

TOTAL LINKS TO THIS WEBSITE

1

SOCIAL ENGAGEMENT



OTHER SITES

goodenoughproductions.com goodenoughproductions.com

Goodenoughproductions.com

goodenoughprofessor.blogspot.com goodenoughprofessor.blogspot.com

The Good Enough Professor

The Good Enough Professor. Saving the humanities, one undergraduate at a time. For those keeping score at home, as of today, Steven Salaita's lawsuit against the University of Illinois is going forward, but the University is NOT being simultaneously sued by Phyllis Wise, because she is stepping into a $300K/year faculty position and foregoing her oddly named $400K retention bonus. And we all wait to see what happens next. Think how different the present moment would be if the FOIA'ed emails contained som...

goodenoughsecurity.blogspot.com goodenoughsecurity.blogspot.com

Good Enough Security

Product Security Engineering in the Real World and Why Security Systems Fail. Monday, September 16, 2013. Follow me at @dwfogel for security news, pay TV and some other things that interest me. Links to this post. Thursday, December 20, 2012. Protecting the weak (passwords). Salting a fast hash function is like issuing life vests to the passengers of the Titanic. This is an apt simile. I guess it requires some explanation for people less knowledgeable in the area of password security. The crackers can al...

goodenoughservices.com goodenoughservices.com

Home |

Fitting Out New Hospitals. Since Goodenough Services started fitting washroom and hygiene dispensers in 2004 they have grown organically year upon year and are now the market leading company their chosen field. Goodenough Services attribute their success to understanding their customer’s requirements, careful planning that incorporates realistic and deliverable targets, focussed training of personnel on all necessary aspects of fitting and carefully monitored project management. Goodenough Services recog...

goodenoughsoftware.net goodenoughsoftware.net

Greg Young's Blog

Greg Young's Blog. Good Enough Software is By Definition Good Enough. July 6, 2015 – 2:21 pm. I have been using CLion on and off for about two months now. This is just a quick review of it. I really like it as an editor. It is quick and intuitive to get into. If you have background with intellij/R# the learning curve is quite low. Does a great job picking up subtle little issues in code. Auto add includes :). With sublime as example there are so many more plugins available not so much with clion. I still...

goodenoughspeedshop.com goodenoughspeedshop.com

My Site

This is my site description. A website created by GoDaddy’s Website Builder.

goodenoughsprayfoam.com goodenoughsprayfoam.com

Goodenough Sprayfoam Insulation LLC

goodenoughsprings.org goodenoughsprings.org

Goodenough Springs Exploration Project

Click here to jump to the latest News Release! Goodenough Springs were, until 1968, the third largest group of springs. In Texas, with an average annual flow of 3,900 liters per second (that's 89 million. Gallons of water per day! This web site puts together all the known public information about Goodenough Springs and the current and past explorations of it. Our intention is to explore this underwater cave, take scientific measurements of flow,. And provide this to scientists who study this area. WARNIN...