Cryptosmith

Cryptosmith

Cybersecurity education and service

Menu Skip to content
  • Home
  • About
    • Contact Rick
    • Articles and Papers
    • Consulting
  • Books
    • Elementary Information Security – Textbook
    • Authentication
    • Internet Cryptography
  • Training
    • Online Course in Cloud Security Basics
    • Cybersecurity in the Cloud Specialization
    • Assignments
      • Investigating Domain Names
      • Public-key crypto email
      • Working with nmap
      • Password Hashing and Cracking
      • SQL and Injection Attacks
  • Videos

Category: Tech Teaching

Example from lecture video
April 12, 2022April 12, 2022 Rick

Cybersecurity for MSSE 2023

Cloud Top Ten Risks
April 5, 2021August 31, 2021 Rick

Online Course: Cloud Top Ten Risks

Video image from Cloud Security course
March 14, 2021August 31, 2021 Rick

Cybersecurity for MSSE 2022

December 30, 2020 Rick

Cloud Security Specialization Launched

December 19, 2020 Rick

Memory Sizes: Now with zetta and yotta!

October 9, 2020October 25, 2020 Rick

2021 MSSE Cloud Security Elective

May 15, 2020November 5, 2020 Rick

Solo Studio for Video Lectures

May 15, 2020July 8, 2020 Rick

FCPX and the Solo Studio

December 30, 2019 Rick

Online Course in Cloud Security Basics

October 3, 2019October 3, 2019 Rick

WPA2 Packet Frame Format

June 25, 2018July 4, 2018 Rick

Organizing Video Clips for an Online Course

April 5, 2017April 5, 2017 Rick

Cryptosmith Video Series #1 through #15

May 6, 2016October 9, 2020 Rick

MSSE Cybersecurity Course 2017

September 29, 2015 Rick

Adieu, Online School

August 31, 2015July 4, 2018 Rick

Reviewer Links for Cloud Computing

August 25, 2015August 31, 2015 Rick

Streamlined NSTISSI 4011 Training Certificate

April 25, 2015October 23, 2017 Rick

MSSE Cybersecurity Elective 2016

October 19, 2013August 31, 2015 Rick

Digital’s RT-11 File System

October 19, 2013February 19, 2021 Rick

Kilo mega giga tera

October 18, 2013December 19, 2020 Rick

Memory Sizes: kilo mega giga tera peta exa

January 12, 2012January 13, 2015 Rick

Boston University’s RAX Library

August 9, 2008May 9, 2016 Rick

A Simple CPU Demonstration

one-time pad hidden in a walnut
June 9, 2007September 19, 2018 Rick

One-Time Pads

June 7, 2007August 31, 2015 Rick

Stream ciphers

Search Cryptosmith

Top Posts & Pages

  • Memory Sizes: kilo mega giga tera peta exa
  • Password Expiration Considered Harmful
  • Stream Cipher Reuse: A Graphic Example
  • Security Design Principles
  • Famous Passwords
  • One-Time Pads

Tags

Android Apple attacks authentication classified Clinton cloud computing Coursera crypto design principles domain names Drupal ebooks elections email evaluations file systems flaws library memory sizes Microsoft MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing Quizlet RAM secrecy spam stream cipher TCSEC Top Secret training Trump UMN video Wordpress

Categories

Topics

  • Password Sanity
    • Replacing a Hacked Password
    • Picking Passwords
    • Famous Passwords
    • Password Expiration Considered Harmful
    • The Strong Password Dilemma
  • Resources
    • CPU Simulation in a Spreadsheet
    • Notes on File Systems
    • Computer Security Product Evaluations
    • A Memoir of Secure Computing Corporation
  • Multilevel Security
    • MLS Introduction
    • Observations on Multi-Level Security
    • Multilevel Security and Internet Servers
    • LOCK – A Trusted Computing System
  • Cryptography
  • Glossary
  • Videos
  • Working with nmap

Feeds

Site Feed

Comments Feed

Cryptosmith on Facebook

Follow Rick Smith on Mastodon

Follow Cryptosmith postings on Mastodon
Create a website or blog at WordPress.com
  • Follow Following
    • Cryptosmith
    • Join 1,931 other followers
    • Already have a WordPress.com account? Log in now.
    • Cryptosmith
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy