part away...
for a pictorial version, see the attachment.
- don davis, boston
-<>
run a firewall or vulnerabiility
> check, or who can cite NIST security standard (although those
> skills woul dcome in handy too!).
i talked to them. the downside is that they want this
security architect to be the security administrator,
once the system is built...
ruhr university (in bochum),
but i don't know whether he's more of a free agent.
- don davis, boston
> To: [EMAIL PROTECTED]
> From: "Arnold G. Reinhold" <[EMAIL PROTECTED]>
> Subject: [Mac_crypto] Apple should use SHA! (or strong
from "the volokh conspiracy" weblog, a law professors' blog:
- don
Eugene Volokh, 3/25/2004 04:02:38 PM
Israeli coders, Arab testers: A reader writes, apropos
checking sensitive source code for sabotage: I spoke to
[someone] from the NSA, about this sub
er version of MSIE ships on
Win2k/XP . MSIE 5 is all i have on my mac, because
i very rarely use MSIE.
but, if you want to complain about MSIE's security
features, you'll have to take a number and wait in
line... B^(
- don davis, boston
-
-
Browser >
Security > Certificate Authorities
(there seems to be no way to tell MSIE 5 to
trust Alice's server cert for SSL connections,
except to tell MSIE 5 to trust Alice's CA.)
in NS 4.75: Communicator > Tools > Security
favor of
small code size & ease of configuration.
arguably, this is as much an opportunity as a wake-up
call.
- don davis
-
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
o literature has fully met
these customers' crypto needs.
- don davis, boston
-
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
"An electrical engineer at Washington University
in St. Louis has devised a theory that sets the
limits for the amount of data that can be hidden
in a system and then provides guidelines for how
to store data and decode it. Contrarily, the
theory also provides guidelines for how an
adversary
multi-million pound systems to see who
> was grassing to informants...?
with similar import, here's cringely's article on
insecure CALEA workstations:
- don davis
http://www.pbs.org/cringely/pulpit/pulpit20030710.html
"Not only can the
does anyone know anything about AP's claim that Google
"encrypts" credit-card numbers? specifically, which
cipher and what kind of key management do they use?
- don davis, boston
-
From: &
11 matches
Mail list logo