Cryptosmith

Cryptosmith

Cybersecurity education and service

Menu Skip to content
  • Home
  • About
    • Contact Rick
    • Articles and Papers
    • Consulting
  • Books
    • Elementary Information Security – Textbook
    • Authentication
    • Internet Cryptography
  • Training
    • Online Course in Cloud Security Basics
    • Cybersecurity in the Cloud Specialization
    • Assignments
      • Investigating Domain Names
      • Public-key crypto email
      • Working with nmap
      • Password Hashing and Cracking
      • SQL and Injection Attacks
  • Videos

Author: Rick

Writer, educator, and consultant in cybersecurity; author of three books.
May 13, 2020July 8, 2020 Rick

“Eyes Only” Revisited

May 3, 2020May 3, 2020 Rick

Self-teaching a little security thinking

Cryptosmith name with key
April 28, 2020August 31, 2021 Rick

About …

April 14, 2020April 14, 2020 Rick

Detecting a Phish on an iPhone

December 30, 2019 Rick

Online Course in Cloud Security Basics

November 9, 2019December 19, 2019 Rick

Life Cycle of a Security Bug

October 29, 2019July 8, 2020 Rick

“Eyes Only” Security Marking

October 3, 2019October 3, 2019 Rick

WPA2 Packet Frame Format

September 23, 2019September 23, 2019 Rick

Ethics and Chatbots

September 9, 2019September 9, 2019 Rick

Authentication Chapters Online

June 10, 2019 Rick

Political campaign security

June 2, 2019June 2, 2019 Rick

The practical digital library updated

May 19, 2019 Rick

Ross Anderson and another edition of Security Engineering

January 6, 2019April 14, 2020 Rick

A Forged “From” Address

November 13, 2018January 6, 2019 Rick

This photo should not exist

September 21, 2018September 21, 2018 Rick

Rule #1 for Detecting a Phish

September 10, 2018September 12, 2018 Rick

A Mac Hack

September 7, 2018September 7, 2018 Rick

Invoice Phishing Campaign

September 6, 2018September 6, 2018 Rick

State of the Art Password Cracking

Sen. John McCain and Rick Smith, 1999
August 26, 2018 Rick

Sen. John McCain, 1936-2018

July 15, 2018January 6, 2019 Rick

Interesting Email Scam I Received

June 25, 2018July 4, 2018 Rick

Organizing Video Clips for an Online Course

May 3, 2018March 21, 2022 Rick

How to Trace an Email Message

April 26, 2018April 26, 2018 Rick

HR and Phishing

Posts navigation

Older posts
Newer posts

Search Cryptosmith

Top Posts & Pages

  • Memory Sizes: kilo mega giga tera peta exa
  • Password Expiration Considered Harmful
  • Stream Cipher Reuse: A Graphic Example
  • Security Design Principles
  • Famous Passwords
  • One-Time Pads

Tags

Android Apple attacks authentication classified Clinton cloud computing Coursera crypto design principles domain names Drupal ebooks elections email evaluations file systems flaws library memory sizes Microsoft MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing Quizlet RAM secrecy spam stream cipher TCSEC Top Secret training Trump UMN video Wordpress

Categories

Topics

  • Password Sanity
    • Replacing a Hacked Password
    • Picking Passwords
    • Famous Passwords
    • Password Expiration Considered Harmful
    • The Strong Password Dilemma
  • Resources
    • CPU Simulation in a Spreadsheet
    • Notes on File Systems
    • Computer Security Product Evaluations
    • A Memoir of Secure Computing Corporation
  • Multilevel Security
    • MLS Introduction
    • Observations on Multi-Level Security
    • Multilevel Security and Internet Servers
    • LOCK – A Trusted Computing System
  • Cryptography
  • Glossary
  • Videos
  • Working with nmap

Feeds

Site Feed

Comments Feed

Cryptosmith on Facebook

Follow Rick Smith on Mastodon

Follow Cryptosmith postings on Mastodon
Create a website or blog at WordPress.com
  • Follow Following
    • Cryptosmith
    • Join 1,931 other followers
    • Already have a WordPress.com account? Log in now.
    • Cryptosmith
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
 

Loading Comments...
 

You must be logged in to post a comment.