X-Nico

3 unusual facts about Computer security


Droid X

Although root access is available on the Droid X, the bootloader is secured and uses PKI to check the signature of the kernel.

Persistent browser-based game

Games relying on client-side technology are rarer due to the security aspects that must be dealt with when reading and writing from a user's local file system - the web browser doesn't want web pages to be able to destroy the user's computer, and the game designer doesn't want the game files stored in an easily-accessed place where the user can edit them.

Secure computing

Computer security, information security as applied to computers and networks.


0x80

0x80 is a hacker interviewed by Brian Krebs of the Washington Post about his lucrative business in running "botnets", or networks of remotely controlled personal computers without the owner's consent.

Bruce Sterling bibliography

The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992) - about the panic of law enforcers in the late 1980s about 'hackers' and the raid on Steve Jackson Games as part of Operation Sun Devil.

Bryan Clough

In 1990, Clough and Paul Mungo, a journalist, wrote Approaching Zero (1992) a book that covered the activities of phreakers, hackers and computer virus writers.

Clough has written several books and articles dealing with phreakers, hackers and computer virus writers; credit card fraud; banking; and the activities of MI5 during World War II, specifically the Tyler Kent - Anna Wolkoff Affair (2005).

Chaos Communication Camp

The Chaos Communication Camp is an international meeting of hackers that takes place every four years, organized by the Chaos Computer Club (CCC).

ClutchFans

The creator of the site hacked into an internet account and learned how to put web pages together and posted on the Internet.

Computer Underground Digest

The newsletter came to prominence when it published legal commentary and updates concerning the "hacker crackdowns" and federal indictments of Leonard Rose and Craig Neidorf of Phrack.

Electronic voting in Ireland

In October 2006, a group of Dutch hackers, including Rop Gonggrijp, showed how similar machines to the ones purchased in Ireland could be modified by replacing the EEPROMs with Nedap -Firmware with EEPROMs with their own firmware.

Etiquette in technology

For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.

Howard Rheingold

Also in 1985, Rheingold coauthored Out of the Inner Circle: A Hacker's Guide to Computer Security with former hacker Bill Landreth.

I Think We're All Bozos on This Bus

Clem is one of the first "computer hackers" mentioned in pop culture, and his dialog with the fair's computer includes messages found in the DEC PDP-10, a popular mainframe computer at the time.

IAsiaWorks

It is believed that Tom Cross and Nick Levay and Randy Bias of the Industrial Memetics Institute are responsible for this, but The Institute is currently not responding to requests for comment on the matter.

John Connor

This version of John is shown to be a highly skilled computer hacker (a nod from Terminator 2), even being able to hack into a Terminator's CPU in order to read the information it contains, as well as easily hacking into the LAPD database.

Martín Abadi

He is well known for his work on computer security and on programming languages, including his paper (with Michael Burrows and Roger Needham) on the Burrows-Abadi-Needham logic for analyzing authentication protocols, and his book (with Luca Cardelli) A Theory of Objects, laying out formal calculi for the semantics of object-oriented programming languages.

Multidisciplinary approach

Most recently the multidisciplinary method of working has been adopted in the specialist field of computer security by practitioners such as Gene Spafford and Sarah Gordon.

Nicolas Jacobsen

Nicolas Jacobsen is a hacker who had illegal access to the private information of T-Mobile customers for at least a year.

Panda Security

Panda Security SL, formerly Panda Software, is a computer security company founded in 1990 by Panda's former CEO, Mikel Urizarbarrena, in the city of Bilbao, Spain.

Password strength

Such means include wiretapping, phishing, keystroke logging, social engineering, dumpster diving, shoulder surfing, side-channel attacks, and software vulnerabilities.

Peter Garza

As a Special Agent with the Naval Criminal Investigative Service, Peter Garza conducted the first court-ordered Internet wiretap in the United States while investigating the Julio Cesar Ardita ("El Griton") hacking case.

Péter Gervai

He has a diverse interest mainly focused on technical areas, computers, mostly internet access and service providing, security, network design and programming, but he also likes reading and writing literature.

Richard Kilmer

Both projects drew on his expertise in computer security gained as a systems security manager while in the U.S. Air Force stationed at The Pentagon.

Securax

Securax (1998–2002) was considered as one of Belgium's strongest hacking movements in the past twenty years and was founded by Filip Maertens and co-founded by Davy Van De Moere as an online community in order to combine skills and experiences in the domain of vulnerability identification, zero-day exploit creation and penetration testing methods.

Silence on the Wire

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks is a book by Michał Zalewski on some network-silent methods of information gathering as they relate to computer security.

Stratford University

Certification Courses including Oracle, MSCE, .Net Framework, Cisco, Linux, and computer security-related topics for students and IT professionals.

The Victorian Internet

Both cultures made or make use of complex text coding and abbreviated language slang, both required network security experts, and both attracted criminals who used the networks to commit fraud, hack private communications, and send unwanted messages.

Vein matching

Computer security expert Bruce Schneier stated that a key advantage of vein patterns for biometric identification is the lack of a known method of forging a usable "dummy", as is possible with fingerprints.


see also

Abene

Mark Abene (born 1972), American computer security expert and entrepreneur

ACLS

Access control list, a list of permissions attached to an object in computer security

Comodo

Comodo Group, a software company specialising in computer security.

Garfinkel

Simson Garfinkel, journalist and writer specializing in the field of computer security

Michał Zalewski

In 2005, Zalewski authored Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, a computer security book published by No Starch Press and subsequently translated to a number of languages.

Michelle Dessler

Michelle obtained her Bachelor of Science in Computer Science at the University of California, Davis, and began her career at the National Institute of Standards and Technology's Computer Security Division, and DARPA's High Confidence Systems Working Group, before being hired by the Counter Terrorist Unit, Los Angeles branch.

MILS

Multiple Independent Levels of Security, a high-assurance computer security architectural concept

Out of the Inner Circle

Out of the Inner Circle: A Hacker's Guide to Computer Security is a book by Bill Landreth and Howard Rheingold, published in 1985 by Microsoft Press and distributed by Simon & Schuster, Inc. (ISBN 0-671-30942-0).

RC6

According to recent allegations made by Jacob Appelbaum, an independent computer security researcher, many NSA compromised systems appear to emit RC6 enciphered UDP traffic.

Ryan Lackey

He also speaks at numerous conferences and trade shows, including DEF CON, RSA Data Security Conference, on various topics in the computer security field, and has appeared on the cover of Wired Magazine, in numerous television, radio, and print articles on HavenCo and Sealand.

S. Brent Morris

Morris has served as Executive of the Cryptologic Mathematician Program at the National Security Agency and as U.S. representative to the International Organization for Standardization (ISO) in the area of computer security.

Schneier

Bruce Schneier, American cryptographer, computer security specialist, and writer

Secure computing

Secure Computing (Company), a public computer security company acquired by McAfee.

Shimomura

Tsutomu Shimomura, Japanese-American scientist and computer security expert

The Coroner's Toolkit

The Coroner's Toolkit (or TCT) is a suite of computer security programs by Dan Farmer and Wietse Venema.

Wietse Venema

He also wrote TCP Wrapper and collaborated with Dan Farmer to produce the computer security tools SATAN and The Coroner's Toolkit.

Winn Schwartau

Another of his books, "Cybershock" (2000, 2001), is a non-technical look at the Defcon conference, hackers in general, Phreaking and the importance of computer security.

XSS

Cross-site scripting, a computer security vulnerability in web applications

Yahoo! Groups

Chester Wisniewski, a senior security advisor at Sophos, a computer security company, stated in 2011 that spam messages posted on Yahoo! Groups bypass spam filters by way of using digital signatures.

Zalewski

Michał Zalewski - Polish "White Hat" Hacker, computer security expert.