On 08 September 2006 00:38, Travis H. wrote:
At home I have an excellent page on making fake fingerprints, but I
cannot find it
right now. It used gelatin (like jello) and was successful at fooling a
sensor.
http://search.theregister.co.uk/?q=gummi should be a start.
cheers,
* Travis H. schrieb am 2006-09-08 um 01:37 Uhr:
If anyone can give me any fingerprint-related links, particularly
about spoofing/breaking them, I would be grateful.
http://www.ccc.de/biometrie/fingerabdruck_kopieren?language=en
--
Jens Kubieziel
This is a multi-part message in MIME formatthought this might interest people here.
--
http://www.apache-ssl.org/ben.html http://www.links.org/
There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff
---BeginMessage---
At 7:02 AM +1000 9/8/06, James A. Donald wrote:
I do not seem to be able to use DKIM to for spam
filtering.
Correct. It is for white-listing. It tells the recipient (MTA or MUA)
that the message received was sent from the domain name it says it
was, and that parts of the message were not
Hadmut Danisch wrote:
Hi,
I recently tested an RSA SecurID SID800 Token
http://www.rsasecurity.com/products/securid/datasheets/SID800_DS_0205.pdf
The token is bundled with some windows software designed to make
user's life easier. Interestingly, this software provides a function
which
Hi Lance,
On Fri, Sep 08, 2006 at 10:26:45AM -0700, Lance James wrote:
Another problem from what I see with Malware that steals data is the
formgrabbing and on event logging of data. Malware can detect if
SecureID is being used based on targeted events, example: Say HSBC
(Hypothetical
Hadmut Danisch wrote:
Hi Lance,
On Fri, Sep 08, 2006 at 10:26:45AM -0700, Lance James wrote:
Another problem from what I see with Malware that steals data is the
formgrabbing and on event logging of data. Malware can detect if
SecureID is being used based on targeted events, example: Say
The link to the paper is broken but this one works:
http://www.cs.jhu.edu/~astubble/600.412/s-c-papers/keys2.pdf#search=%22k
eyhide2.pdf%22
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Thomas
Sent: Wednesday, September 06, 2006 1:21 AM
To: Douglas F.
On Thu, 7 Sep 2006, Travis H. wrote:
At home I have an excellent page on making fake fingerprints, but I
cannot find it
right now. It used gelatin (like jello) and was successful at fooling a
sensor.
I did find this, which reports success with gummi bears:
One can have a lot of fun with key-wielding tokens, especially on
Windows. See:
J. Marchesini, S.W. Smith, M. Zhao.
Keyjacking: the Surprising Insecurity of Client-side SSL.
Computers and Security.
4 (2): 109-123. March 2005.
http://www.cs.dartmouth.edu/~sws/pubs/msz05.pdf
--Sean
Sean
10 matches
Mail list logo