Ben Laurie wrote:
>Scott G. Kelly wrote:
>> Here's another approach to password authenticated key exchange with
>> similar security claims. The underlying mechanism is under
>> consideration for inclusion in by the 802.11s group in IEEE:
>>
>> http://www.
[Moderator's note: Please do not top post. --Perry]
Here's another approach to password authenticated key exchange with similar
security claims. The underlying mechanism is under consideration for inclusion
in by the 802.11s group in IEEE:
http://www.ietf.org/internet-drafts/draft-harkins-emu-e
James Muir wrote:
> I was reading a hacking blog today and came across this:
>
> http://www.darknet.org.uk/2007/02/odysseus-win32-proxy-telemachus-http-transaction-analysis/
>
>
>> Odysseus is a proxy server, which acts as a man-in-the-middle during
>> an HTTP session. A typical HTTP proxy will
Hi Jill,
To add to Perry's note, I think Eric's book is very good, and I've also
been reading "Network Security with OpenSSL", an O'Reilly book by Viega,
Messier, and Chandra -it's been exceedingly helpful in understanding and
working with openssl.
Scott
[EMAIL PROTECTED] wrote:
| Hi,
|
| I've be