Uncle Sam Should Learn to Hack
With the specter of the World Trade Center and Pentagon disasters looming large in the minds of lawmakers, the cry to ban U.S. exports of sophisticated encryption software has risen anew. Encryption, or cryptography [crypto for short], is the science of devising codes that cloak messages in secret language. It involves using complex algorithms to mix characters of a message with other characters or values in a seemingly nonsensical way. The result is gibberish that even the biggest supercomputers struggle to decode.
In 1998, the U.S. government removed a ban on the production and export for sale of advanced cryptographic software and equipment. That raised the ire of law-enforcement officials and national-security hawks. But the hubbub quickly died down thanks to the glowing aura of the boom economy. Now, it appears that encryption exports may be in jeopardy again as the U.S. scours the globe for Osama bin Laden and his Al Qaeda cohorts.
Wednesday, October 03, 2001
Tuesday, October 02, 2001
Basic Steps in Forensic Analysis of Unix Systems
One especially important element to crime solving is the effective use of science and technology. Science and technology applied to the solution of criminal acts, or forensic science, solves crimes by assisting police investigators to identify suspects and victims, clearing innocent persons of suspicion and ultimately bringing the wrongdoer to justice.
One especially important element to crime solving is the effective use of science and technology. Science and technology applied to the solution of criminal acts, or forensic science, solves crimes by assisting police investigators to identify suspects and victims, clearing innocent persons of suspicion and ultimately bringing the wrongdoer to justice.
Monday, October 01, 2001
Common Criteria Mutual Recognition Arrangement
The Arrangement on the Mutual Recognition of Common Criteria Certificates in the field of Information Technology Security is now available to view.
The Arrangement on the Mutual Recognition of Common Criteria Certificates in the field of Information Technology Security is now available to view.
Cisco presentations
- Introduction and Motivation by Tames van der Does
- Threat analysis by Michael Behringer
- Step 1: Securing Network Elements by Luc Billot
- Step 2: Securing Routing and Switching by Tames van der Does
- Step 3: Prevention of Address Spoofing by Michael Behringer
- Value-add Security Services by Tames van der Does
- Tracing Attacks by Michael Behringer
- Creating Emergency Response Teams and co-operation with other teams by Tames van der Does
- MPLS security by Michael Behringer
Security-Enhanced Linux Version II
The second public release of the LSM-based SELinux prototype was made. This release contains many bug fixes and improvements to both LSM and SELinux and is based on the lsm-2001_09_23 patch against kernel 2.4.10.
The second public release of the LSM-based SELinux prototype was made. This release contains many bug fixes and improvements to both LSM and SELinux and is based on the lsm-2001_09_23 patch against kernel 2.4.10.
Subscribe to:
Posts (Atom)