Thanks to everyone who came to my talk on Tuesday.

I put a copy of the slides online here:

http://blogs.law.harvard.edu/dlarochelle/2012/01/15/hash-collision-complexity-attacks-perl-vs-other-languages/


--

David

On Tue, Jan 10, 2012 at 8:17 PM, Brad Oaks <[email protected]> wrote:

> I was ill today too.  Hope to catch you all next month!
>
> On Tue, Jan 10, 2012 at 9:22 AM, Bill Ricker <[email protected]> wrote:
> > Next Tech Meeting Tuesday, January 10, 2012 7 – 10p.m. MIT E51-376
> >
> > David Larochelle will explain the "new" multi-language web Denial of
> > Service (DoS <http://boston.pm.org/kwiki/index.cgi?DoS>) threat that
> > doesn't affect Perl (but affects Python & PHP).
> > http://www.nruns.com/_downloads/advisory28122011.pdf CVE-2011-4885
> Phuket
> > property <http://www.phuketproperty.com/> Reported 2003
> > http://www.cs.rice.edu/~scrosby/hash/CrosbyWallach_UsenixSec2003.pdfFixed
> > in Perl 2005
> > http://perldoc.perl.org/perlsec.html#Algorithmic-Complexity-Attacks
> >
> > This will be the last time in the "summer" room E51-376. We'll return to
> > old traditional E51-372 for Feb - May. (confirmed)
> >
> > Speaking of security ... if your home (or office) router has WPS simple
> > setup feature, TURN WPS OFF. NOW. Wi-Fi Protected Setup (WPS) PIN Brute
> > Force Vulnerability
> >
> https://isc.sans.edu/diary/Wi-Fi+Protected+Setup+WPS+PIN+Brute+Force+Vulnerability/12292
> >
> > Sean is acting facilitator for this session, so please RSVP to the main
> > list [email protected]
> >
> > --
> > Bill
> > @n1vux [email protected]
> >
> > _______________________________________________
> > Boston-pm mailing list
> > [email protected]
> > http://mail.pm.org/mailman/listinfo/boston-pm
>
> _______________________________________________
> Boston-pm mailing list
> [email protected]
> http://mail.pm.org/mailman/listinfo/boston-pm
>

_______________________________________________
Boston-pm mailing list
[email protected]
http://mail.pm.org/mailman/listinfo/boston-pm

Reply via email to