hi sc-l,

I was just the guest on an episode of the Network Security podcast (you can 
find that here 
http://www.mckeay.net/2008/06/10/network-security-podcast-episode-107/ ).  As 
part of the podcast we discussed many aspects of software security.  We also 
discussed some recent research spearheaded by Yoshi Kohno at the University of 
Washington, the first scientific study of some of the monitoring systems used 
to enforce the DMCA on peer-to-peer networks.

In this month's informIT column, I explore the idea of what happens when flimsy 
data are used to accuse someone of breaking the law: 
http://www.informit.com/articles/article.aspx?p=1223765

As always, your feedback is hugely appreciated.

gem

company www.cigital.com
podcast www.cigital.com/silverbullet
blog www.cigital.com/justiceleague
book www.swsec.com


_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to