hi sc-l, I was just the guest on an episode of the Network Security podcast (you can find that here http://www.mckeay.net/2008/06/10/network-security-podcast-episode-107/ ). As part of the podcast we discussed many aspects of software security. We also discussed some recent research spearheaded by Yoshi Kohno at the University of Washington, the first scientific study of some of the monitoring systems used to enforce the DMCA on peer-to-peer networks.
In this month's informIT column, I explore the idea of what happens when flimsy data are used to accuse someone of breaking the law: http://www.informit.com/articles/article.aspx?p=1223765 As always, your feedback is hugely appreciated. gem company www.cigital.com podcast www.cigital.com/silverbullet blog www.cigital.com/justiceleague book www.swsec.com _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________