Thanks to everyone who came to my talk on Tuesday. I put a copy of the slides online here:
http://blogs.law.harvard.edu/dlarochelle/2012/01/15/hash-collision-complexity-attacks-perl-vs-other-languages/ -- David On Tue, Jan 10, 2012 at 8:17 PM, Brad Oaks <[email protected]> wrote: > I was ill today too. Hope to catch you all next month! > > On Tue, Jan 10, 2012 at 9:22 AM, Bill Ricker <[email protected]> wrote: > > Next Tech Meeting Tuesday, January 10, 2012 7 – 10p.m. MIT E51-376 > > > > David Larochelle will explain the "new" multi-language web Denial of > > Service (DoS <http://boston.pm.org/kwiki/index.cgi?DoS>) threat that > > doesn't affect Perl (but affects Python & PHP). > > http://www.nruns.com/_downloads/advisory28122011.pdf CVE-2011-4885 > Phuket > > property <http://www.phuketproperty.com/> Reported 2003 > > http://www.cs.rice.edu/~scrosby/hash/CrosbyWallach_UsenixSec2003.pdfFixed > > in Perl 2005 > > http://perldoc.perl.org/perlsec.html#Algorithmic-Complexity-Attacks > > > > This will be the last time in the "summer" room E51-376. We'll return to > > old traditional E51-372 for Feb - May. (confirmed) > > > > Speaking of security ... if your home (or office) router has WPS simple > > setup feature, TURN WPS OFF. NOW. Wi-Fi Protected Setup (WPS) PIN Brute > > Force Vulnerability > > > https://isc.sans.edu/diary/Wi-Fi+Protected+Setup+WPS+PIN+Brute+Force+Vulnerability/12292 > > > > Sean is acting facilitator for this session, so please RSVP to the main > > list [email protected] > > > > -- > > Bill > > @n1vux [email protected] > > > > _______________________________________________ > > Boston-pm mailing list > > [email protected] > > http://mail.pm.org/mailman/listinfo/boston-pm > > _______________________________________________ > Boston-pm mailing list > [email protected] > http://mail.pm.org/mailman/listinfo/boston-pm > _______________________________________________ Boston-pm mailing list [email protected] http://mail.pm.org/mailman/listinfo/boston-pm

