roamingaroundatrandom.wordpress.com
Natanael L | Roaming around at random
https://roamingaroundatrandom.wordpress.com/author/natanael90
Roaming around at random. A simple method of key verification for multi-device key exchange. There are tons of devices around with practically no user faced interface at all, which need to communicate securely with other devices. This includes devices such as a wireless thermometer communicating with a HVAC unit or a wireless lock on your door communicating with your phone when you tell it what keys to accept. The risks include violation of privacy, physical damage and economic loss. One way to do this i...
perot.me
Etienne Perot — Using PGP for SSH verification/authentication: What is Monkeysphere, and why should you care?
https://perot.me/using-pgp-for-ssh-with-monkeysphere
Raquo; Blog post. Etienne at perot dot me. Using PGP for SSH verification/authentication: What is Monkeysphere, and why should you care? View this article as markdown. By Etienne Perot etienne (at) perot (dot) me. One of the issues with SSH. Is the lack of public-key infrastructure. This causes two kinds of potential problems. Fingerprint verification is the technique SSH uses to check if it is connecting to the correct server, to ensure that the connection being not tampered with and not wiretappable.
riseuplabs.org
Riseup Labs!
http://riseuplabs.org/index.html
Is a software libre web application designed for social networking, group collaboration and network organizing. Our goal is to create communication tools that are tailored specifically to meet the needs of bottom up grassroots organizing. Go to project site. Allows you to coordinate system backup by dropping a few simple files into /etc/backup.d/. Backupninja provides a centralized way to configure and schedule many different backup utilities. Go to project site. N A book of spells and arcane incantations.
oaweek2010.commons.gc.cuny.edu
» OA Models & Activism Open Access Week 2010
http://oaweek2010.commons.gc.cuny.edu/events/open-access-models-activism
Open Access Week 2010. OA Models and Activism. I Open Access: How it Works / Will it Work for You? Join a discussion of the viable models of open access publishing, learn where open access journals are indexed and come to understand the impact of open access publishing. Open Access Publishing –. Stephanie Walker is the Chief Librarian and Executive Director of Academic Information Technology at B. Author-pay (e.g., BioMed Central. Supported by professional associations. To archive one’s work. T...Is a go...
hauke-laging.de
IT-Sicherheit – E-Mail, SSH, Chat, Laufwerksverschlüsselung, Virtualisierung
http://www.hauke-laging.de/sicherheit
IT-Sicherheit E-Mail, SSH, Chat, Laufwerksverschlüsselung, Virtualisierung. Version 1.9, 28.04.2011 ( Signaturdatei dieser Seite. Hoffentlich aktuell., und der CSS-Datei. Der Inhalt dieser Seite. Allgemeines zum Thema IT-Sicherheit. Datensicherheit: Verschlüsselung und Signierung. Motivation Infrastruktur lebt vom Mitmachen. Änderungen gegenüber normalen E-Mails. Für GPG und die E-Mail-Plug-ins. Fernzugriff und Dateitransfer SSH. Sonstige wichtige Meldungen auf dem Themenfeld IT-Sicherheit. Ich möchte je...
berta.hu
Dr. István Zsolt BERTA
http://www.berta.hu/english
My blog via RSS. Dr István Zsolt BERTA. I was born in 1978, Debrecen, Hungary. I received MSc in Technical Informatics (computer science) at the Budapest University of Technology and Economics (BME). I have started working in the field of IT security in 1999 when I joined the CrySyS. Former Ebizlab) laboratory of IT security at BME. I wrote my PhD dissertation in the CrySyS laboratory on the dangers of creating electronic signatures at untrusted terminals. In 2004. I became CISA in 2006, CISSP in 2013.