Category Archives: Technology

System Development Lifecycle > Security Development Lifecycle

I was asked to list things I consider when creating/designing a world-class application. Whew. That’s  a complex question, and worthy of a PhD thesis, book, etc. Still, several things jumped out at me. And I thought it would be worth … Continue reading

Posted in Security, System Administration, System Engineering, Technology | Tagged , , , , , , , , , , , , , | Leave a comment

The Top Eleven Reasons why Security Experts get no Respect

Let’s face it – being a security expert is difficult. While security technology is very difficult, dealing with people, especially with people who don’t work in the security field, is far more difficult. Why is that, you say?  I have … Continue reading

Posted in Hacking, Humor, Security, Technology | Tagged , , , | 1 Comment

The need for Public Password Policies

After reading the Dashlane report on “The Illusion of Personal Data Security in E-Commerce”, I kept thinking about how developers replicate common security mistakes and that real progress in security rarely occurs. The industry’s current password policies are a disaster. … Continue reading

Posted in Security, Technology | Tagged , , , , , , , , , , , , | 2 Comments

Generating website navigation using perl, sed, and make

The problem – Site navigation without frames I wanted to add an easy way to navigate to any of my web pages, but I didn’t want to use frames, or break any of the current links. I also have a … Continue reading

Posted in Shell Scripting, Technology | Tagged , , , , , , | 1 Comment

The problem with SQRL

I just listened to Steve Gibson’s SQRL (Secure QR Login) authentication scheme. I’m not a cryptographer, but I see some minor issues. I’d appreciate people correcting me and educating me. Here are a few issues I have with the authentication … Continue reading

Posted in Hacking, Security, Technology | Tagged | 19 Comments

Security News May 2011

Advanced Persistent Tweets: Zero-Day in 140 Characters http://krebsonsecurity.com/2011/05/advanced-persistent-tweets-zero-day-in-140-characters/ Interesting report on “a Chinese hacker”  bragging about zero-day attacks. Sony Online loses 12,700 credit card account numbers, 24.6 million accounts compromised [update] http://www.joystiq.com/2011/05/02/sony-hit-with-second-attack-loses-12-700-credit-card-nu/ A second hack has occurred. Bruce Schneier’s TED … Continue reading

Posted in Hacking, Politics, Security, Technology | Leave a comment

Complete list of Alchemy for iPhone

Looking for the solution to Alchemy? Here’s the complete list of 226 (now 230) recipes  for the  iPhone’s version of Alchemy. 1Up = Mushroom + Life AI = computer + life Acid = fire + sulfur Acid rain = acid … Continue reading

Posted in Hacking, Technology | Tagged , , , , | Leave a comment