miradadeulises.com
La Mirada de Ulises » Blog Archive » “Cloe”: El lobo y su presa
http://miradadeulises.com/2011/05/cleo-el-lobo-y-su-presa
La mirada de Ulises. Julio R. Chico. Un viaje a través del cine, con el hombre. Y la sociedad como protagonistas. 8220;Cloe”: El lobo y su presa. Quiero recomendaros este cortometraje de Manuela Moreno. En su esfuerzo por mantener la cuerda tensa y esperar a que se rompa por sí sola… porque la mentira siempre sale a flote, y el mentiroso merece su castigo. En eso, me ha recordado mucho a una película que vi hace varios años, “Hard candy”. Con una joven Ellen Page. Porque, en cierto modo, en Cloe. Gracias...
schneier.com
"Evil Maid" Attacks on Encrypted Hard Drives - Schneier on Security
https://www.schneier.com/blog/archives/2009/10/evil_maid_attac.html
Evil Maid" Attacks on Encrypted Hard Drives. Earlier this month, Joanna Rutkowska implemented. The "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. Basically, the attack works like this:. Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down. Attack from last year, and the " Stoned Boot. Similar h...
homocybersapiens.com
Commandliners – Homo Cybersapiens
http://homocybersapiens.com/2008/10/commandliners.html
We think that we think. October 29, 2008. Después de mucho tiempo sin publicar, voy a contaros una de las razones por las que he tardado tanto (sí, las otras razones -o más bien, la otra razón- tiene que ver con la ya tan manida palabra. Llevo bastantes años usando GNU/Linux como sistema operativo principal y, a pesar de tener instaladas las X, uso con mucha frecuencia la línea de comandos. Siempre tengo un par de terminales abiertos y me resulta más cómodo usar los comandos. La costumbre, supongo).
thesibyl.net
The Sibyl
http://thesibyl.net/about
Another layer of security for authentication. What is The Sibyl? We present a different approach for storing shadow files: using a separate server for checking the correctness of the password introduced by the user, taking advantage of symmetric key encryption. In summary: instead of keeping the hash (as. Of the password in the shadow file, store an. However, the security issue does not. Lie on the hashing functions, but on the fact that despite any security measures, end users find always a way to use s...
thesibyl.net
The Sibyl
http://thesibyl.net/docs
Another layer of security for authentication. How the Sibyl works [step by step]. This is a detailed (including the necessary commands) description of the installation and functioning of the Sibyl. We assume you already have a working authentication server (the computer you want to log in to) and a different machine (the Sibyl) which acts as the oracle. First we need a 'Sibyl', which is a different machine from the server we want to log in to. We are using a Bifferboard. As a proof of concept. Root@sibyl...