Cryptosmith

Cybersecurity education and service

Menu Skip to content
  • Home
  • About
    • Contact Rick
    • Articles and Papers
    • Consulting
  • Books
    • Elementary Information Security – Textbook
    • Authentication
    • Internet Cryptography
  • Training
    • Online Course in Cloud Security Basics
    • Cybersecurity in the Cloud Specialization
    • Assignments
      • Investigating Domain Names
      • Password Hashing and Cracking
  • Videos

Tag: flaws

February 19, 2021February 19, 2021 cryptosmith

Cities, Disneyland, and Software Security

February 16, 2021February 16, 2021 cryptosmith

libhairshirt vs libfootgun

October 26, 2020October 26, 2020 cryptosmith

Old Story: Leaked Voter Records

November 9, 2019December 19, 2019 cryptosmith

Life Cycle of a Security Bug

March 15, 2018March 19, 2018 cryptosmith

The Six Types of Cyber-Risks

October 17, 2017October 17, 2017 cryptosmith

The Big Bug in the News: the WPA2 flaw

May 4, 2017May 4, 2017 cryptosmith

Tiptoeing Through Vulnerabilities

May 29, 2016May 29, 2016 cryptosmith

Symantec Breaks Trust with the Internet?

February 22, 2016February 22, 2016 cryptosmith

The Apple case isn’t “privacy” versus “safety”

December 26, 2013February 21, 2021 cryptosmith

The “Bug-Free Software” fallacy

December 19, 2013December 28, 2016 cryptosmith

Multics was flawless?

May 31, 2008March 1, 2021 cryptosmith

Stream Cipher Reuse: A Graphic Example

Search Cryptosmith

Top Posts & Pages

  • This photo should not exist
  • Memory Sizes: kilo mega giga tera peta exa
  • Security Design Principles
  • Kilo mega giga tera
  • CPU Simulation in a Spreadsheet
  • Encrypting with XOR: A Graphic Example

Tags

ACSAC Android Apple attacks authentication classified Clinton cloud computing Coursera crypto design principles Drupal ebooks elections email evaluations file systems flaws library memory sizes Microsoft MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing Quizlet RAM secrecy spam stream cipher TCSEC Top Secret training Trump UMN video Wordpress

Categories

Topics

  • Password Sanity
    • Replacing a Hacked Password
    • Picking Passwords
    • Famous Passwords
    • Password Expiration Considered Harmful
    • The Strong Password Dilemma
  • Resources
    • CPU Simulation in a Spreadsheet
    • Notes on File Systems
    • Computer Security Product Evaluations
    • A Memoir of Secure Computing Corporation
  • Multilevel Security
    • MLS Introduction
    • Observations on Multi-Level Security
    • Multilevel Security and Internet Servers
    • LOCK – A Trusted Computing System
  • Cryptography
  • Glossary
  • Videos

Feeds

Site Feed

Comments Feed

Cryptosmith on Facebook

Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy