
goodenoughsecurity.blogspot.com
Good Enough SecurityProduct Security Engineering in the Real World and Why Security Systems Fail
http://goodenoughsecurity.blogspot.com/
Product Security Engineering in the Real World and Why Security Systems Fail
http://goodenoughsecurity.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Saturday
LOAD TIME
2.4 seconds
16x16
32x32
64x64
128x128
PAGES IN
THIS WEBSITE
18
SSL
EXTERNAL LINKS
1
SITE IP
172.217.6.65
LOAD TIME
2.406 sec
SCORE
6.2
Good Enough Security | goodenoughsecurity.blogspot.com Reviews
https://goodenoughsecurity.blogspot.com
Product Security Engineering in the Real World and Why Security Systems Fail
Good Enough Security: How the PS3 LV0 key was (probably) hacked
http://goodenoughsecurity.blogspot.com/2012/11/how-ps3-lv0-key-was-probably-hacked.html
Product Security Engineering in the Real World and Why Security Systems Fail. Sunday, November 25, 2012. How the PS3 LV0 key was (probably) hacked. If you follow Schneier. You may have followed his link. To a Hexus.net article entitled "Sony lets slip its PlayStation 3 Master Key". This wouldn't be the first time Sony has leaked important security keys, common to every PlayStation 3 console, however, this is the first time the console's LV0 decryption keys have been let loose in the wild. But Sony still ...
Good Enough Security: Stack Exchange posts pt. 2
http://goodenoughsecurity.blogspot.com/2012/11/stack-exchange-posts-pt-2.html
Product Security Engineering in the Real World and Why Security Systems Fail. Wednesday, November 21, 2012. Stack Exchange posts pt. 2. Following my previous post on the subject. Here are a few more links to posts on the Stack Exchange IT Security Q&A site:. Is it safe to use a weak password as long as I have two-factor authentication? Client side password hashing. When using symmetric key encryption, do we need to sign? Reset password - should I prevent abusing it? Encryption in an embeddded system.
Good Enough Security: HDCP: Cool New Hack
http://goodenoughsecurity.blogspot.com/2011/09/hdcp-cool-new-hack.html
Product Security Engineering in the Real World and Why Security Systems Fail. Sunday, September 18, 2011. HDCP: Cool New Hack. In the previous post. I mentioned the fact that the HDCP master root key was publicly revealed about a year ago. Last week Nate Lawson, on his root labs rdist blog. Pointed out that the Chumby NeTV is probably the first commercial use of these leaked keys - and it's a very cool hack indeed. Describes the NeTV as follows. Platforms in a non-intrusive and always-on manner. At first...
Good Enough Security: June 2012
http://goodenoughsecurity.blogspot.com/2012_06_01_archive.html
Product Security Engineering in the Real World and Why Security Systems Fail. Thursday, June 14, 2012. Readers of this blog know that I can't miss a chance to ridicule hyperbolic headlines. Mocana has a great blog on the "Security news for the Internet of things" but they sometimes overstate the case. The headline of today's Mocana post is "Researcher: Flame’s Crypto Collision Discovery Cost At Least $200K". The source Mocana gives for this assessment is an Ars Technica post. Links to this post. Could be...
Good Enough Security: Protecting the weak (passwords)
http://goodenoughsecurity.blogspot.com/2012/12/protecting-weak-qotd-3.html
Product Security Engineering in the Real World and Why Security Systems Fail. Thursday, December 20, 2012. Protecting the weak (passwords). Salting a fast hash function is like issuing life vests to the passengers of the Titanic. This is an apt simile. I guess it requires some explanation for people less knowledgeable in the area of password security. If a server uses passwords to authenticate users the server needs to store some value for each user with which to validate the password entered by the user.
TOTAL PAGES IN THIS WEBSITE
18
blog.cryptographyengineering.com
A Few Thoughts on Cryptographic Engineering: Useful Cryptography Resources
http://blog.cryptographyengineering.com/p/useful-cryptography-resources.html
A Few Thoughts on Cryptographic Engineering. Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds. This page is an attempt to compile some of the top technical. Crypto and security blogs, textbooks, and websites. It's very much a work in progress. If you think something is missing, please leave a note in comments or drop me a line. Top Cryptography and Security Blogs. Light Blue Touch Paper (University of Cambridge). Notes from one of the preeminent hardware hackers, ...
TOTAL LINKS TO THIS WEBSITE
1
Goodenoughproductions.com
goodenoughprofessor.blogspot.com
The Good Enough Professor
The Good Enough Professor. Saving the humanities, one undergraduate at a time. For those keeping score at home, as of today, Steven Salaita's lawsuit against the University of Illinois is going forward, but the University is NOT being simultaneously sued by Phyllis Wise, because she is stepping into a $300K/year faculty position and foregoing her oddly named $400K retention bonus. And we all wait to see what happens next. Think how different the present moment would be if the FOIA'ed emails contained som...
goodenoughsecurity.blogspot.com
Good Enough Security
Product Security Engineering in the Real World and Why Security Systems Fail. Monday, September 16, 2013. Follow me at @dwfogel for security news, pay TV and some other things that interest me. Links to this post. Thursday, December 20, 2012. Protecting the weak (passwords). Salting a fast hash function is like issuing life vests to the passengers of the Titanic. This is an apt simile. I guess it requires some explanation for people less knowledgeable in the area of password security. The crackers can al...
Home |
Fitting Out New Hospitals. Since Goodenough Services started fitting washroom and hygiene dispensers in 2004 they have grown organically year upon year and are now the market leading company their chosen field. Goodenough Services attribute their success to understanding their customer’s requirements, careful planning that incorporates realistic and deliverable targets, focussed training of personnel on all necessary aspects of fitting and carefully monitored project management. Goodenough Services recog...
Greg Young's Blog
Greg Young's Blog. Good Enough Software is By Definition Good Enough. July 6, 2015 – 2:21 pm. I have been using CLion on and off for about two months now. This is just a quick review of it. I really like it as an editor. It is quick and intuitive to get into. If you have background with intellij/R# the learning curve is quite low. Does a great job picking up subtle little issues in code. Auto add includes :). With sublime as example there are so many more plugins available not so much with clion. I still...
My Site
This is my site description. A website created by GoDaddy’s Website Builder.
Goodenough Sprayfoam Insulation LLC
Goodenough Springs Exploration Project
Click here to jump to the latest News Release! Goodenough Springs were, until 1968, the third largest group of springs. In Texas, with an average annual flow of 3,900 liters per second (that's 89 million. Gallons of water per day! This web site puts together all the known public information about Goodenough Springs and the current and past explorations of it. Our intention is to explore this underwater cave, take scientific measurements of flow,. And provide this to scientists who study this area. WARNIN...
SOCIAL ENGAGEMENT