patitdude1234.wordpress.com
May | 2010 | Pat IT Dude Blog
https://patitdude1234.wordpress.com/2010/05
Pat IT Dude Blog. 124; Comments RSS. Flex – Phone applications. FireFox – Mobile. Combo with Type Ahead. Adobe Blogs – feeds. Adobe Blogs – fullasagoog. Adobe CFMX – DevNet. Adobe Flex – DevNet. BING – Flex Videos. Site of the Day 5/27/2010. Posted on May 28, 2010. I’m glad I found this link when I was sitting down.🙂. Http:/ www.jsmag.com/. 124; Tagged: JavaScript. 124; Leave a comment. Site of the Day 5/26/2010. Posted on May 26, 2010. Here is a site concerning PaperVision3D. Filed under: Flash Platform.
jonathanmayer.org
Jonathan Mayer » About
https://www.jonathanmayer.org/about
I’m a computer scientist and a lawyer at Stanford. I don’t live in the ivory tower, though. My research homes are the Security Lab. Advised by John Mitchell. Wherever information technology, public policy, and law intersect, I’m interested. Jonathan Mayer is a Ph.D. candidate in computer science and a lawyer at Stanford University. Where he received his J.D. in 2013. He was named one of the Forbes 30 Under 30. Jonathan is a Cybersecurity Fellow at the Center for International Security and Cooperation.
feross.org
HOW TO: Spy on the Webcams of Your Website Visitors » Feross.org
http://feross.org/webcam-spy
HOW TO: Spy on the Webcams of Your Website Visitors. October 18, 2011. I discovered a vulnerability in Adobe Flash that allows any website to turn on your webcam and microphone without your knowledge or consent. To spy on you. It works in all versions of Adobe Flash that I tested. I’ve confirmed that it works in the Firefox and Safari for Mac. Browsers. Use one of those if you check out the live demo. Video demo of the attack. Updates about the vulnerabilty. Whoa, this story is everywhere! Technique that...
marcoalamanni.it
Marco Alamanni - Web site
http://www.marcoalamanni.it/links.html
Sans Infosec Reading Room. Featuring over 1959 original computer security white papers in 77 different categories.". Sito del "Computer Security Resource Center" del National Institute of Standards and Technology. La sezione "Publications" raccoglie molte pubblicazioni che costituiscono un riferimento autorevole per vari argomenti di sicurezza informatica. Il sito del "Computer Emergency Response Team" della Carnegie Mellon University. Ha una sezione molto interessante dedicata alla programmazione sicura.
securitylunch.stanford.edu
Stanford Security Lunch: Winter 2013
https://securitylunch.stanford.edu/2013/winter
No talk (Real World Crypto Workshop). Succinct Functional Encryption and Applications. Raluca Ada Popa (MIT). Shafi Goldwasser, Yael Kalai, Vinod Vaikuntanathan, and Nickolai Zeldovich. Sign up to give a talk! EyeQ — Protecting your Network Performance. Today, a datacentre infrastructure provider (e.g. Amazon AWS, Windows Azure) hosts diverse applications and not all of them can be trusted. While "virtualisation" has made significant advances in isolating CPU performance, there's little to no...This talk...
securitylunch.stanford.edu
Stanford Security Lunch: Fall 2014
https://securitylunch.stanford.edu/2014/fall
Food selections are now posted here. September 24, 2014. Sign up to give a talk! October 1, 2014. Protecting Users by Confining JavaScript with COWL. October 8, 2014. David leads the Security Data Science team at LinkedIn, where he works on creating automated methods for detecting and preventing fraud and abuse. Before joining LinkedIn, David was a post-doc in Dan's group here at Stanford. David's research interests related to cryptographic applications of number theory and arithmetic geometry. The Unive...
securitylunch.stanford.edu
Stanford Security Lunch: Spring 2011
https://securitylunch.stanford.edu/2011/spring
Sign up to give a talk! Secure Computer Systems Group.
securitylunch.stanford.edu
Stanford Security Lunch: Spring 2008
https://securitylunch.stanford.edu/2008/spring
Sign up to give a talk! ForceHTTPS: protecting high-security sites from network attacks. Emerging fraud trends at internet speeds. Ori Eisen (41st Parameter). In the rapidly expanding and ever-changing world of Card-Not-Present fraud, five key emerging trends pose the greatest risk to Internet retailers today. Join Ori Eisen, as he takes you step-by-step through the tactics behind these devastating schemes and how to identify and react to minimize impact to your bottom line. We specify high-level behavio...
securitylunch.stanford.edu
Stanford Security Lunch: Winter 2008
https://securitylunch.stanford.edu/2008/winter
Fengmin Gong (FireEye, Inc.). Stuart Staniford (FireEye, Inc.). Overshadow: retrofitting protection in commodity OS's. Xiaoxin Chen, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin and Dan R.K. Ports. Securing frame communication in browsers. Adam Barth and John Mitchell. BotHunter: detecting malware infection through IDS-driven dialog correlation. Guofei Gu, Vinod Yegneswaran, Martin Fong and Wenke Lee. Discussion: trends in malware and online advertising fraud.
securitylunch.stanford.edu
Stanford Security Lunch: Fall 2009
https://securitylunch.stanford.edu/2009/fall
Sign up to give a talk! Zero-knowledge sets and related constructions. We begin with an abstraction of a secure DNS system. A dealer has a finite map M from strings to strings. He wishes to set up an agent (a secure DNS server) which can sign statements of the form "M(x) = y" or "M(z) is undefined". We would like two security properties:. The agent cannot lie. An adversary who interacts with the agent cannot learn anything about M except at the points he queries. Party at John's house. Hristo will talk a...