Disclaimer: Informationen som läggs upp på denna blogg är inte jobbrelaterad utan endast av mitt eget intresse. Lägger upp eller länkar till intressanta inlägg på nätet.
9 december 2016
19 november 2016
9 november 2016
NDN - nästa steg för Internet?
Fokusering på data och distribuerad leverans, mindre fokus på TCP/IP kanaler.
http://named-data.net/
.
http://named-data.net/
.
25 oktober 2016
17 oktober 2016
13 oktober 2016
26 september 2016
3 september 2016
1 september 2016
30 juni 2016
2 maj 2016
19 april 2016
11 april 2016
How to Prove You’re Bitcoin Creator Satoshi Nakamoto
"....state that Wright’s demonstration is expected to occur this week, not next...."
How to Prove You’re Bitcoin Creator Satoshi Nakamoto | WIRED
How to Prove You’re Bitcoin Creator Satoshi Nakamoto | WIRED
1 april 2016
23 mars 2016
21 mars 2016
15 mars 2016
Bypassing Local Windows Authentication To Defeat Full Disk Encryption
Använda DC (domain controller) för att lura en klient PC som har bitlocker påslagen i "transparent" bitlocker mode dvs utan PIN kod eller liknande vid uppstart.
Genom att lura PCn att användare vid nästa inlogg måste byta lösenord, kan autenticering gås förbi.
Mer info i nedan video från BlackHat.
Bypassing Local Windows Authentication To Defeat Full Disk Encryption - YouTube
Genom att lura PCn att användare vid nästa inlogg måste byta lösenord, kan autenticering gås förbi.
Mer info i nedan video från BlackHat.
Bypassing Local Windows Authentication To Defeat Full Disk Encryption - YouTube
9 mars 2016
23 februari 2016
20 februari 2016
LIGO Detected Gravitational Waves from Black Holes
Som jag väntat på detta! :-)
Detection | LIGO Lab | Caltech
Detection | LIGO Lab | Caltech
NSA TAO Chief on Disrupting Nation State Hackers
Nothing new but still interesting.
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers - YouTube
From his role as the Chief of NSA's Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers - YouTube
From his role as the Chief of NSA's Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.
17 februari 2016
15 februari 2016
7 februari 2016
post-quantum cryptography - PQCHacks [32c3]
Mycket intressant! Universal quantum computer förväntas omkring 2021-22.
PQCHacks [32c3] - YouTube
IETF draft - draft-irtf-cfrg-xmss-hash-based-signatures
PQcrypto.org
PQCHacks [32c3] - YouTube
IETF draft - draft-irtf-cfrg-xmss-hash-based-signatures
PQcrypto.org
6 februari 2016
5 februari 2016
3 februari 2016
Obtaining and Detecting Domain Persistence
Ta över en domain controller. Beskriver flera sätt att bibehålla access till en domain controller. Beskriver även hur en försvarare kan se händelser i loggarna. Mycket bra presentation.
DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence - YouTube
DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence - YouTube
2 februari 2016
28 januari 2016
NSA Hacker Chief Explains How to Keep Him Out of Your System
How to Keep the NSA Out
If you really want to make the NSA’s life hard, he ticked off a list of things to do: limit access privileges for important systems to those who really need them; segment networks and important data to make it harder for hackers to reach your jewels; patch systems and implement application whitelisting; remove hardcoded passwords and legacy protocols that transmit passwords in the clear...
....Another nightmare for the NSA? An “out-of-band network tap”—a device that monitors network activity and produces logs that can record anomalous activity—plus a smart system administrator who actually reads the logs and pays attention to what they say.....
....Another nightmare for the NSA? An “out-of-band network tap”—a device that monitors network activity and produces logs that can record anomalous activity—plus a smart system administrator who actually reads the logs and pays attention to what they say.....
NSA Hacker Chief Explains How to Keep Him Out of Your System | WIRED
US CYBERCOM and the NSA: A Strategic Look with ADM Michael S. Rogers
• How cybersecurity and defense fit into the country's national security strategy;
• The response to cyberattacks, how to deter them, and stability escalation;
• What the future of cyber conflict and cyber power will look like.
US CYBERCOM and the NSA: A Strategic Look with ADM Michael S. Rogers
(intro by John from SAAB Northamerica...)
• The response to cyberattacks, how to deter them, and stability escalation;
• What the future of cyber conflict and cyber power will look like.
US CYBERCOM and the NSA: A Strategic Look with ADM Michael S. Rogers
(intro by John from SAAB Northamerica...)
Prenumerera på:
Inlägg (Atom)