Cryptosmith

Cryptosmith

Cybersecurity education and service

Menu Skip to content
  • Home
  • About
    • Contact Rick
    • Articles and Papers
    • Consulting
  • Books
    • Elementary Information Security – Textbook
    • Authentication
    • Internet Cryptography
  • Training
    • Online Course in Cloud Security Basics
    • Cybersecurity in the Cloud Specialization
    • Assignments
      • Investigating Domain Names
      • Public-key crypto email
      • Working with nmap
      • Password Hashing and Cracking
      • SQL and Injection Attacks
  • Videos

Category: Tech History

March 1, 2021 cryptosmith

PDP 1s and Model Trains

November 11, 2017November 11, 2017 cryptosmith

Two Longs and a Short

July 20, 2016August 29, 2017 cryptosmith

A Yank at Bletchley Park

May 17, 2016 cryptosmith

Which cables to keep, which to discard?

November 10, 2009January 12, 2015 cryptosmith

Pragmatic Security: the history of the Visa card

December 12, 2007January 12, 2015 cryptosmith

Files using Classic FORTH

Search Cryptosmith

Top Posts & Pages

  • Memory Sizes: kilo mega giga tera peta exa
  • Memory Sizes: Now with zetta and yotta!
  • Password Expiration Considered Harmful
  • Password Hashing and Cracking
  • Security Design Principles
  • MLS Introduction

Tags

ACSAC Android Apple attacks authentication classified Clinton cloud computing Coursera crypto design principles Drupal ebooks elections email evaluations file systems flaws library memory sizes Microsoft MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing Quizlet RAM secrecy spam stream cipher TCSEC Top Secret training Trump UMN video Wordpress

Categories

Topics

  • Password Sanity
    • Replacing a Hacked Password
    • Picking Passwords
    • Famous Passwords
    • Password Expiration Considered Harmful
    • The Strong Password Dilemma
  • Resources
    • CPU Simulation in a Spreadsheet
    • Notes on File Systems
    • Computer Security Product Evaluations
    • A Memoir of Secure Computing Corporation
  • Multilevel Security
    • MLS Introduction
    • Observations on Multi-Level Security
    • Multilevel Security and Internet Servers
    • LOCK – A Trusted Computing System
  • Cryptography
  • Glossary
  • Videos
  • Working with nmap

Feeds

Site Feed

Comments Feed

Cryptosmith on Facebook

Create a website or blog at WordPress.com
  • Follow Following
    • Cryptosmith
    • Join 2,109 other followers
    • Already have a WordPress.com account? Log in now.
    • Cryptosmith
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy