Learning Notebook - David Rostcheck

Public View

All learning_events

Learning Event ID Subject [F] Topic Program [F] Length Institution [F] Presenter [F] Format Recorded Date Completed Date Actions
5910 Security GrapheneOS - the greatest mobile OS of all time. Common usability misconceptions debunked! Independent Studies in Security 15:23:00 YouTube Louis Rossman Video Lecture 2022-09-22 2024-04-28 details
5888 Security Understanding the Linux Backdoor: Implications for Open Source [When Penguins Cry] Independent Studies in Security 00:10:06 YouTube Dave's Garage Video Lecture 2024-04-04 2024-04-13 details
5885 Security Dave explains the new backdoor in SSH. Independent Studies in Security 00:10:06 YouTube Low Level Learning Video Lecture 2024-04-04 2024-04-13 details
5861 Security new linux exploit is absolutely insane Independent Studies in Security 00:08:28 YouTube Low Level Learning Video Lecture 2024-03-28 2024-03-31 details
5857 Security OWASP top 10 for LLLs Security for LLMs 00:05:00 OWASP.org OWASP.org Article 2024-02-10 2024-03-29 details
5856 Security A Security Primer for Generative AI: The Generative AI Security Scoping Matrix Security for LLMs 00:25:00 Amazon Web Services Jason Garman Article 2024-01-28 2024-03-29 details
5172 Security Gray Hat C# Independent Studies in Security 02:00:00 No Starch Press Brandon Perry Book 2017-07-01 2022-06-29 details
5133 Security Amazon accuses customer of racism & shuts down their smart home - enough cloud junk!! Independent Studies in Security 00:09:16 YouTube Louis Rossman Video Lecture 2022-06-12 2022-06-12 details
4970 Security This Makes Hacking Too Easy - Flipper Zero Independent Studies in Security 00:12:11 YouTube Linus Tech Tips Video Lecture 2022-04-09 2022-04-19 details
4663 Security Encrypting File Data with Amazon Elastic File System: AWS Whitepaper AWS Certified Solutions Architect - Professional 00:20:00 Amazon Web Services Darryl S. Osborne, Joseph Travaglini, Peter Buonora, Siva Rajamani Article 2022-04-06 2022-12-14 details
4662 Security Security best practices for AWS Key Management Service AWS Certified Solutions Architect - Professional 00:20:00 Amazon Web Services Amazon Web Services Article 2022-11-22 2022-12-14 details
4153 Security Test restoring from a seed phrase Independent Studies in Blockchain Security 00:45:00 David Rostcheck David Rostcheck Lab 2022-03-06 2022-03-06 details
4152 Security Metamask wallet security tips – How to protect your Metamask accounts? Independent Studies in Blockchain Security 00:15:00 CoinGuides.org coinguides Article 2022-01-19 2022-03-03 details
4145 Security Lab: Create and store secrets w/ AWS Secrets Manager Independent Studies in Blockchain Security 00:40:00 David Rostcheck David Rostcheck Lab 2022-03-03 2022-03-03 details
4144 Security Crypto wallets security as seen by security engineers Independent Studies in Blockchain Security 00:20:00 Cossack Labs Julia Potapenko, Artur Hil, Anastasiia Voitova Article 2021-12-14 2022-03-05 details
4143 Security "Schneier's Law" Independent Studies in Blockchain Security 00:08:00 Schneier on Security Bruce Schneier Article 2011-04-15 2022-03-05 details
4142 Security Why Keystone implemented Shamir Backups Independent Studies in Blockchain Security 00:06:00 Keystone Patrick Kim Article 2021-06-30 2022-03-05 details
4141 Security Self-Destruct Mechanism’s Unique Defense Against Side-Channel Attacks Independent Studies in Blockchain Security 00:04:00 Keystone Patrick Kim Article 2021-06-22 2022-03-05 details
4139 Security Recovery Phrase Horror Stories Independent Studies in Blockchain Security 00:08:00 Keystone Patrick Kim Article 2021-07-21 2022-03-05 details
4138 Security OWASP Secure Coding Practices Quick Reference Guide Independent Studies in Security 00:12:00 OWASP OWASP Article 2010-01-01 2022-03-05 details
4101 Security The Woes of Distributed Consensus Blockchain Basics 00:10:00 Medium Gala Games Article 2021-12-23 2022-02-16 details
4053 Security SHA: Secure Hashing Algorithm - Computerphile Blockchain Basics 00:10:20 YouTube Computerphile Video Lecture 2018-04-11 2022-01-29 details
3999 Security Using AWS security services to protect against, detect, and respond to the Log4j vulnerability Independent Studies in Security 00:15:00 AWS Security Blog Marshall Jones, Syed Shareef Article 2021-12-21 2021-12-23 details
3997 Security Log4J & JNDI Exploit: Why So Bad? - Computerphile Independent Studies in Security 00:26:30 YouTube FreakyVidsDaily Video Lecture 2021-12-22 2021-12-22 details
3932 Security 1.8 Gigapixed Argus-IS: World's highest resolution video surveillance platform by DARPA AWS Certified Solutions Architect - Professional 00:04:40 YouTube FreakyVidsDaily Video Lecture 2013-01-27 2021-11-14 details
3856 Security Deploying defense in depth using AWS Managed Rules for AWS WAF (part 2) AWS Certified Solutions Architect - Professional 00:05:00 AWS Security Blog Daniel Stuart Article 2020-09-02 2021-10-01 details
3855 Security Defense in depth using AWS Managed Rules for AWS WAF (part 1) AWS Certified Solutions Architect - Professional 00:20:00 AWS Security Blog Daniel Stuart Article 2020-09-02 2021-10-01 details
3844 Security AWS Key Management Service Best Practices AWS Certified Solutions Architect - Professional 01:00:00 Amazon Web Services Matthew Bretan, Sree Pisharody, Ken Beer, Brian Wagner, Eugene Yu, Michael St.Onge, Balaji Palanisamy, Jonathan Rault, Reef Dsouza, Paco Hope Article 2017-04-01 2021-10-02 details
3825 Security "Secret" Agent Exposes Azure Customers To Unauthorized Code Execution (OMIGOD exploit) Independent Studies in Security 00:10:00 Wiz.io Nir Ohfeld Article 2021-09-14 2021-09-17 details
3795 Security Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer Independent Studies in Security 00:10:00 Ars Technica Dan Goodin Article 2019-09-28 2021-09-06 details
3780 Security Hidden Radios in Home Devices (IOT)! The next Cyberthreat Independent Studies in Security 00:24:48 YouTube Rob Braxman Tech Video Lecture 2021-07-01 2021-08-21 details
3778 Security Section 12: Wrap Up The Complete Cyber Security Course : Network Security! 00:30:00 Station X Nathan House Video Lecture 2021-05-19 2021-08-21 details
3777 Security Section 11: Passwords and Authentication Methods The Complete Cyber Security Course : Network Security! 01:43:00 Station X Nathan House Video Lecture 2021-05-19 2021-08-21 details
3775 Security Section 10: Browser Security and Tracking Prevention The Complete Cyber Security Course : Network Security! 02:48:00 Station X Nathan House Video Lecture 2021-05-19 2021-08-01 details
3764 Security Section 9: Search Engines and Privacy The Complete Cyber Security Course : Network Security! 00:41:00 Station X Nathan House Video Lecture 2021-05-19 2021-08-01 details
3763 Security Section 8: How We Are Tracked Online The Complete Cyber Security Course : Network Security! 00:45:00 Station X Nathan House Video Lecture 2021-05-19 2021-07-25 details
3762 Security Section 7: Network Monitoring for Threats The Complete Cyber Security Course : Network Security! 01:05:00 Station X Nathan House Video Lecture 2021-05-19 2021-06-15 details
3761 Security Section 6: Wireless and Wi-Fi Security The Complete Cyber Security Course : Network Security! 00:48:00 Station X Nathan House Video Lecture 2021-05-19 2021-06-02 details
3760 Security Section 5: Network Attacks, Architecture and Isolation The Complete Cyber Security Course : Network Security! 00:33:00 Station X Nathan House Video Lecture 2021-05-19 2021-05-27 details
3759 Security Section 4: Firewalls The Complete Cyber Security Course : Network Security! 02:03:00 Station X Nathan House Video Lecture 2021-05-19 2021-05-24 details
3689 Security Breaking Into a Smart Home With A Laser Independent Studies in Security 00:18:56 YouTube Smarter Every Day Article 2019-12-26 2021-06-11 details
3685 Security Verifying Signatures Independent Studies in Security 00:25:00 qubes-os.org qubes-os.org Article 2021-06-11 2021-06-11 details
3684 Security Installation security - Qubes OS Independent Studies in Security 00:10:00 qubes-os.org qubes-os.org Article 2021-06-11 2021-06-11 details
3677 Security Lab: Explore exploit databases The Complete Cyber Security Course : Network Security! 01:00:00 Station X David Rostcheck Lab 2021-06-11 2021-06-11 details
3676 Security Lab: Explore home router configuration The Complete Cyber Security Course : Network Security! 02:00:00 Station X David Rostcheck Lab 2021-06-11 2021-06-11 details
3675 Security Lab: Explore Macbook network interfaces The Complete Cyber Security Course : Network Security! 01:30:00 Station X David Rostcheck Lab 2021-06-11 2021-06-11 details
3670 Security The Next Chapter: From the Endpoint to the Cloud Independent Studies in Security 00:02:00 qubes-os.org Joanna Rutkowska Video Lecture 2018-10-25 2021-06-11 details
3626 Security Section 3: Routers - Port and Vulnerability scanning The Complete Cyber Security Course : Network Security! 01:02:00 Station X Nathan House Video Lecture 2021-05-19 2021-05-19 details
3625 Security Section 2: Goals and Learning Objectives - Volume 2 The Complete Cyber Security Course : Network Security! 00:03:00 Station X Nathan House Video Lecture 2021-05-19 2021-05-19 details
3624 Security Section 1: Introduction The Complete Cyber Security Course : Network Security! 00:25:00 Station X Nathan House Video Lecture 2021-05-19 2021-05-19 details
3604 Security Ethical Hacking Tutorial For Beginners | Cybersecurity Training | Edureka | Cybersecurity Rewind - 3 Edureka Cyber Security Course 00:39:25 YouTube edureka! Article 2021-01-06 2021-05-11 details
3506 Security ZeroNet Independent Studies in Security 00:10:00 ZeroNet ZeroNet Article 2021-02-08 2021-02-08 details
3428 Security Antrim Michigan Forensics Report 2020 U.S. Election Fraud Investigations 00:15:00 Allied Security Operations Group Russell James Ramsland Jr. Article 2020-12-13 2020-12-04 details
3418 Security Hardware Root of Trust Rambus Blogs 00:10:00 Rambus Rambus Press Article 2019-09-10 2020-12-09 details
3248 Security Enterprise Survival Guide forRansomware Attacks SANS Reading Room 00:10:00 SANS Shafqat Mehmoon Article 2016-04-30 2020-02-13 details
3237 Security Security Benefits of the EC2 Nitro Architecture re:Inforce 2019 00:19:39 Amazon Web Services Mark Ryland, Brandon West Video Lecture 2019-07-01 2020-04-09 details
3236 Security Malicious Component Found On Server Motherboards Supplied To Numerous Companies Hackaday 00:03:00 Hackaday Inderpreet Singh, Mike Szczys Article 2018-10-08 2020-04-08 details
3235 Security What happened with SuperMicro Hackaday 00:05:00 Hackaday Bob Baddeley Article 2018-12-30 2020-04-08 details
3234 Security Modchips of the State Chaos Communications Congress 00:36:52 2 Sigma Trammell Hudson Video Lecture 2018-12-30 2020-04-08 details
3233 Security Setting the Record Straight on Bloomberg BusinessWeek’s Erroneous Article AWS Security Blog 00:05:00 Amazon Web Services Stephen Schmidt Article 2018-10-04 2020-04-08 details
3232 Security The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies Bloomberg Businessweek 00:10:00 Bloomberg Businessweek Jordan Robertson, Michael Riley Article 2018-10-04 2020-04-08 details
3144 Security How to Automatically Tag Amazon EC2 Resources in Response to API Events AWS Security Blog 00:10:00 Amazon Web Services Alessandro Martini Article 2016-05-16 2020-02-07 details
3143 Security How to Create a Policy That Whitelists Access to Sensitive Amazon S3 Buckets AWS Security Blog 00:05:00 Amazon Web Services Matt Breton Article 2015-09-14 2020-02-07 details
3138 Security Amazon Detective AWS Training Talks 00:45:00 Amazon Web Services Kim Zetter Article 2020-02-05 2020-02-05 details
2956 Security DARPA Is Building a $10 Million, Open Source, Secure Voting System Motherboard 00:10:00 VICE Kim Zetter Article 2019-05-14 2019-08-04 details
2848 Security Digital IDs offer security, simplicity in a post-Equifax world SecureID News 00:05:00 SecureID News SecureID News Article 2018-01-26 2018-01-29 details
2803 Security Cybersecurity Awareness Training Toyota Onboarding 01:40:00 SANS SANS Video Lecture 2017-10-10 2017-10-10 details
2763 Security BouncyCastle .NET Crypto Library Project Mercurio 00:10:00 The Legion of the Bouncy Castle The Legion of the Bouncy Castle Article 2017-08-23 2017-08-23 details
2759 Security Sailfish OS Independent Studies in Security 00:07:00 Jolia Wikipedia Article 2017-08-23 2017-08-23 details
2549 Security Key management best practices Independent Studies in Security 00:15:00 Qubes Wikipedia Article 2016-12-23 2016-12-23 details
2543 Security High Orbit Ion Cannon Independent Studies in Security 00:05:00 Wikipedia Wikipedia Article 2016-11-05 2016-11-05 details
2542 Security Low Orbit Ion Cannon Independent Studies in Security 00:05:00 Wikipedia Wikipedia Article 2016-11-05 2016-11-05 details
2528 Security Even a single computer can take down large servers using BlackNurse attack Independent Studies in Security 00:06:00 TheHackerNews.com Swati Khandelwal Article 2016-11-13 2016-11-27 details
2527 Security Linux root shell by pressing enter for 70 seconds Independent Studies in Security 00:02:00 TheHackerNews.com Swati Khandelwal Article 2016-11-27 2016-11-27 details
2526 Security Your headphones can spy on you - even if you have disabled microphone Independent Studies in Security 00:02:00 TheHackerNews.com Swati Khandelwal Article 2016-11-27 2016-11-27 details
2525 Security Malicious JPG images on Facebook Messenger sending Locky ransomware Independent Studies in Security 00:02:00 TheHackerNews.com Swati Khandelwal Article 2016-11-27 2016-11-27 details
2488 Security Breaking Down Mirai: An IoT DDoS Botnet Analysis Independent Studies in Security 00:15:00 Incapsula Igal Zeifman, Dima Bekerman, Ben Herzberg Article 2016-10-27 2016-10-30 details
2481 Security AtomBombing: Brand New Code Injection for Windows Independent Studies in Security 00:10:00 BreakingMalware.com Tal Liberman Article 2016-10-27 2016-10-27 details
2356 Security The Missing Piece – Sophisticated OS X Backdoor Discovered Independent Studies in Security 00:03:00 SecureList Stefan Ortloff Article 2016-09-07 2016-09-08 details
2226 Security New AI security system cleverly combines machine learning and human intuition Independent Studies in Security 00:01:00 TechRadar Darren Allan Article 2016-04-19 2016-04-19 details
2183 Security The NSA's back door has given every US secret to our enemies Independent Studies in Security 00:10:00 Business Insider John McAfee Article 2016-02-26 2016-03-03 details
2181 Security HackingTeam Reborn: A Brief Analysis of an RCS Implant Installer Independent Studies in Security 00:15:00 Objective-See Patrick Wardle Article 2016-02-26 2016-03-01 details
2179 Security Exploiting SMM callout vulnerabilities in Lenovo firmware Independent Studies in Security 00:15:00 My aimful life Dmytro Oleksiuk aka Cr4sh Article 2016-02-24 2016-02-25 details
2155 Security How Artificial Immune Systems May Be the Future of Cybersecurity Independent Studies in Security 00:06:00 SingularityHub Shelly Fan Article 2015-12-27 2016-02-04 details
2066 Security How is NSA breaking so much crypto? Independent Studies in Security 00:02:00 Freedom to Tinker Alex Halderman and Nadia Heninger Article 2015-10-14 2015-10-15 details
2042 Security Pentagon takes an analog approach to securing the Internet of Things Independent Studies in Security 00:03:00 Defense Systems Kevin McCaney Article 2015-09-29 2015-09-29 details
1949 Security Highway to hack: why we’re just at the beginning of the auto-hacking era Independent Studies in Security 00:05:00 arstechnica Sean Gallagher Article 2015-08-23 2015-08-23 details
1915 Security A Trojan Seal Independent Studies in Security 00:06:00 arstechnica Ken Stanley Article 2010-04-01 2015-08-12 details
1914 Security How "omnipotent" hackers tied to NSA hid for 14 years - and were found at last Independent Studies in Security 00:12:00 arstechnica Dan Goodin Article 2015-02-16 2015-08-12 details
1883 Security DefCon Hackers Tell How They Cracked Brink's Safe in 60 Seconds Independent Studies in Security 00:05:00 eWeek Sean Michael Kerner Article 2015-07-27 2015-07-28 details
1799 Security How To Make A Secret Phone Call Independent Studies in Security 00:15:00 FastCompany DJ Pangburn Article 2015-04-03 2015-05-22 details
1747 Security Claims-Based Identity Learning Machine Development 00:05:00 Wikipedia Wikipedia Article 2015-04-01 2015-04-01 details
1739 Security Physical Attacks and Tamper Resistance Independent Studies in Security 00:20:00 University of Connecticut ECE Department Mohammad Tehranipoor Article 2012-12-25 2015-03-11 details
1717 Security Initialization Vector Independent Studies in Security 00:20:00 Wikipedia Wikipedia Article 2015-01-03 2015-01-03 details
1716 Security Block Cypher Independent Studies in Security 00:00:00 Wikipedia Wikipedia Article 2015-01-03 2015-01-03 details
1715 Security Block Cypher Modes of Operation Independent Studies in Security 00:40:00 Wikipedia Wikipedia Article 2015-01-03 2015-01-03 details
1692 Security Researchers make BitTorrent anonymous and impossible to shut down Independent Studies in Security 00:10:00 TorrentFreak TorrentFreak Article 2014-12-18 2014-12-18 details
1667 Security DomainKeys Identified Mail (DKIM) Learning Machine Development 00:30:00 Wikipedia Wikipedia Article 2014-11-05 2014-11-05 details
1666 Security DNS-based Blackhole List (DNSBL) Learning Machine Development 00:30:00 Wikipedia Wikipedia Article 2014-11-05 2014-11-05 details
1665 Security Sender Policy Framework Learning Machine Development 00:30:00 Wikipedia Wikipedia Article 2014-11-05 2014-11-05 details
1653 Security The 1s and 0s behind cyber warfare Independent Studies in Security 00:16:45 TED Chris Domas Video Lecture 2013-10-01 2014-06-30 details
1643 Security Public key certificate Independent Studies in Security 00:10:00 Wikipedia Wikipedia Article 2014-05-27 2014-05-27 details
1640 Security The Future of Email Privacy Independent Studies in Security 00:21:00 DarkMail Ladar Levinson Video Lecture 2014-05-12 2014-05-27 details
1638 Security Zooko's Triangle Independent Studies in Security 00:15:00 Wikipedia Wikipedia Article 2014-03-04 2014-04-15 details
1632 Security New Frontiers in Cryptography Independent Studies in Security 00:21:00 TrustyCon New Frontiers in Cryptography Video Lecture 2014-02-27 2014-04-28 details
1566 Security Trusted Computing Tech and Government Implants Independent Studies in Security 00:27:58 TrustyCon Steve Weiss Video Lecture 2014-02-27 2014-03-28 details
1565 Security The strangeness of scale at Twitter Independent Studies in Security 00:09:19 TED Del Harvey Video Lecture 2014-03-21 2014-03-27 details
1564 Security Community Immunity Independent Studies in Security 00:18:45 TrustyCon Video Lecture 2014-02-27 2014-03-23 details
1563 Security The laws and ethics of trustworthy technology Independent Studies in Security 00:42:50 TrustyCon Christoper Segoia, Marsha Hoffman Video Lecture 2014-02-27 2014-03-23 details
1553 Security Joseph Menn Interviews Bruce Schneier Independent Studies in Security 00:40:40 TrustyCon Joseph Menn, Bruce Schneier Video Lecture 2014-02-27 2014-03-14 details
1552 Security Securing SecureDrop Independent Studies in Security 00:39:37 TrustyCon Garrett Robinson, Yong Zu Video Lecture 2014-02-27 2014-03-14 details
1550 Security The talk I was going to give at RSA 2014 Independent Studies in Security 00:48:39 TrustyCon Mikko Hypponen Video Lecture 2014-02-27 2014-03-09 details
1549 Security Opening Remarks - TrustyCon 2014 Independent Studies in Security 00:10:59 TrustyCon Alex, Raney Whiteman, Yong Zu Video Lecture 2014-02-27 2014-03-09 details
1548 Security Cross-Site Request Forgery Independent Studies in Security 00:10:00 Wikipedia Wikipedia Article 2014-02-20 2014-03-09 details
1542 Security VOIP: Skype architecture & complete call setup, Seminar 2 Independent Studies in Security 00:25:00 Prateek Arora Prateek Arora Article 2010-05-05 2014-02-06 details
1532 Security Personal banking apps leak info through phone Independent Studies in Security 00:10:00 IOActive Ariel Sanchez Article 2014-01-08 2014-01-11 details
1531 Security Flaws plague leading mobile banking apps Independent Studies in Security 00:00:05 ThreatPost.com Michael Mimoso Article 2014-01-10 2014-01-11 details
1530 Security Do you know who’s writing your software? If you’re using open-source, probably not Independent Studies in Security 00:10:00 VentureBeat Meghan Kelly Article 2014-01-09 2014-01-10 details
1529 Security Stuxnet's Secret Twin Foreign Policy 00:15:00 Foreign Policy Ralph Langner Article 2012-11-21 2014-01-05 details
1528 Security Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU Independent Studies in Security 00:10:00 ExtremeTech Sebastian Anthony Article 2013-12-18 2014-01-01 details
1527 Security RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis Independent Studies in Security 00:10:00 Tel Aviv University Daniel Genkin, Adi Shamir, Eran Tromer Article 2013-12-30 2014-01-01 details
1526 Security Complete Guide to How NSA Hacked Everything Independent Studies in Security 01:00:00 ZeroHedge Jacob Applebaum (@ioerror) Article 2013-12-30 2014-01-01 details
1525 Security iOS Application Insecurity Independent Studies in Security 00:45:00 MDSec Wikipedia Article 2012-05-02 2014-01-01 details
1524 Security Return-oriented programming Independent Studies in Security 00:15:00 Wikipedia Wikipedia Article 2013-08-17 2014-01-01 details
1520 Security Exploration and Exploitation of an SD Card Independent Studies in Security 01:00:10 30c3 Team Kosagi Video Lecture 2013-12-29 2013-12-31 details
1519 Security On Hacking MicroSD Cards Independent Studies in Security 00:15:00 Bunnie Studios Team Kosagi Article 2013-12-29 2013-12-30 details
1517 Security To protect and infect: The militarization of the internet (part 2) Independent Studies in Security 01:02:15 30c3 Jacob Applebaum (@ioerror) Video Lecture 2013-12-30 2013-12-31 details
1516 Security Ultrasound data transmission via a laptop Independent Studies in Security 00:03:09 Anfractuosity Anonymous Video Lecture 2013-12-10 2013-12-18 details
1515 Security Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks USENIX Security '12 00:20:00 USENIX Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln Article 2012-08-10 2013-12-22 details
1511 Security Why privacy matters TED Talks 00:15:00 TED Alessandro Acquisti Video Lecture 2013-06-01 2013-10-22 details
1457 Security Position-Independent Code Independent Studies in Security 00:15:00 Wikipedia Wikipedia Article 2013-06-02 2013-07-22 details
1456 Security Buffer Overflow Protection Independent Studies in Security 00:15:00 Wikipedia Wikipedia Article 2013-05-20 2013-07-22 details
1350 Security The Athens Affair 2012 Tech Refresh 00:12:00 IEEE Vassilis Prevelakis, Diomidis Spinellis Article 2007-07-01 2012-11-26 details
1309 Security The drunken bishop: An analysis of the OpenSSH fingerprint visualization algorithm 2012 Tech Refresh 00:10:00 OpenBSD.org Dirk Loss, Tobias Limmer, Alexander von Gernler Article 2009-09-20 2012-09-11 details
1308 Security Fuzzy Fingerprinting: Attacking Vulnerabilities in the Human Brain 2012 Tech Refresh 00:10:00 The Hacker Choice Plasmoid Article 2003-10-25 2012-09-11 details
1307 Security Interlock Protocol 2012 Tech Refresh 00:10:00 Wikipedia.org Article 2012-04-26 2012-09-11 details
Records: 136 Total time: 67:50:28

Return to main screen