deusx + security   148

The Facebook Hack Is an Internet-Wide Failure | WIRED
On Friday, Facebook announced that hackers had leveraged three separate bugs to collect 50 million users’ so-called access tokens, which are the equivalent of digital keys to a Facebook account. With those tokens, hackers can take full control of users’ Facebook accounts, but because of Single Sign-On, they can also access any other website that those 50 million users log into with Facebook.
facebook  security  oops 
october 2018 by deusx
Fun With Teensy - Security SiftSecurity Sift
I’ve been wanting to write about the Teensy and its application in security testing or some time now. It’s extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction. It can be used to bypass auto-run, AV
teensy  security  usb  hacks 
february 2016 by deusx
Pass: The Standard Unix Password Manager
With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password.
passwords  security  unix  gpg 
november 2015 by deusx
Thunderstrike - Trammell Hudson's Projects
Thunderstrike is the name for the Apple EFI firmware security vulnerability that allows a malicious Thunderbolt device to flash untrusted code to the boot ROM
apple  mac  security  thunderbolt 
december 2014 by deusx
TechnoSophos: Run Node.js apps on low ports without running as root
$ sudo apt-get install libcap2-bin $ sudo setcap cap_net_bind_service=+ep /usr/bin/node $ node foo.js
node  linux  net  security 
november 2014 by deusx
Passwordless - A node.js/express module for token-based logins
Passwords are broken. Inspired by Justin Balthrop's article Passwords are Obsolete token-based one-time password (OTPW) authentication is faster to deploy, better for your users, and more secure.
auth  authentication  nodejs  security 
october 2014 by deusx
On Hacking MicroSD Cards « bunnie's blog
An Arduino, with its 8-bit 16 MHz microcontroller, will set you back around $20. A microSD card with several gigabytes of memory and a microcontroller with several times the performance could be purchased for a fraction of the price.
hacking  hardware  diy  to:fb  memory  security  hacks 
december 2013 by deusx
A Few Thoughts on Cryptographic Engineering: On the NSA
All of this is a long way of saying that I was totally unprepared for today's bombshell revelations describing the NSA's efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be true, but it's true on a scale I couldn't even imagine. I'm no longer the crank. I wasn't even close to cranky enough.
crypto  nsa  security  privacy 
september 2013 by deusx
Crypto prof asked to remove NSA-related blog post | Ars Technica
Today, Green's academic dean contacted him to ask that "all copies" of the blog post be removed from university servers. Green said that the move was not "my Dean's fault," but he did not elaborate. Were cryptology professors at Johns Hopkins not allowed to say, as Green had, things like:
nsa  tech  crypto  fairuse  academia  security 
september 2013 by deusx
A Few Thoughts on Cryptographic Engineering: A note on the NSA, the future, and fixing mistakes
The question to me -- as an American and as someone who cares about the integrity of speech -- is how we restore faith in our technology. I don't have the answers to this question right now. Unfortunately this is a long-term problem that will consume the output of researchers and technologists much more talented than I am. I only hope to be involved in the process.
to:fb  crypto  tech  nsa  academia  security 
september 2013 by deusx
Hard-Coded Bluetooth PIN Vulnerability in LIXIL Satis Toilet
Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user.
hacks  security  toilets  to:fb 
august 2013 by deusx
Persona and Surveillance - Identity at Mozilla
It’s also worth pointing out that we do take certain technical measures to limit the data we collect. We’ve designed Persona so that the identity provider – including the fallback Identity Provider that we run – does not learn your browsing history. We consider that a good security practice, not specifically because of surveillance, but generally because collecting data without a user benefit just creates risk.
persona  to:fb  security  privacy  web  webdev  mozilla 
june 2013 by deusx
[liberationtech] Why didn't tech company leaders blow the whistle?
Dave asks some great questions about why the people who had power over these networks didn't blow the whistle instead of some anonymous insider having to do it. Here's one possible answer.
to:fb  nsa  privacy  spying  intelligence  security 
june 2013 by deusx
ongoing by Tim Bray · On ID Tokens
ID To­kens are lit­tle chunks of text which claim that some par­tic­u­lar per­son wants to tell some par­tic­u­lar party out there that they’re signed in and au­then­ti­cated by the Iden­tity Provider that is­sued the token.
gluecon  identity  security  webdev  oauth 
may 2013 by deusx
Secure Your REST API... The Right Way | Stormpath
We already showed you how to build a Beautiful REST+JSON API, but how do you secure your API? At Stormpath we spent 18 months researching best practices, implementing them in the Stormpath API, and figuring out what works. Here’s our playbook on how to secure a REST API.
services  gluecon  apis  rest  auth  security 
may 2013 by deusx
Proposal: LDAP password resets as a unit of measure - Will's blog
The 3 month LDAP password reset is such a large part of our lives that I propose it become a standard unit of measure for elapsed time.
mozilla  ldap  passwords  security  to:fb 
may 2013 by deusx
Print out all your saved passwords – OSX | Song Zheng
Here’s a reason why you shouldn’t let anyone use your computer.

In your terminal, type:

security dump-keychain -d ~/Library/Keychains/login.keychain
passwords  security  osx 
may 2013 by deusx
Meet the men who spy on women through their webcams | Ars Technica
If you are unlucky enough to have your computer infected with a RAT, prepare to be sold or traded to the kind of person who enters forums to ask, "Can I get some slaves for my rat please? I got 2 bucks lol I will give it to you :b" At that point, the indignities you will suffer—and the horrific website images you may see—will be limited only by the imagination of that most terrifying person: a 14-year-old boy with an unsupervised Internet connection.
to:fb  rat  ratters  security  privacy 
march 2013 by deusx
A simple Google Authenticator app written in HTML
webdev  google  security  auth  html5  authentication 
october 2012 by deusx
IBM Outlaws Siri, Worried She Has Loose Lips | Wired Enterprise |
The reason? Siri ships everything you say to her to a big data center in Maiden, North Carolina. And the story of what really happens to all of your Siri-launched searches, e-mail messages and inappropriate jokes is a bit of a black box.
apple  siri  to:fb  security  privacy 
july 2012 by deusx
google-authenticator - Two-step verification - Google Project Hosting
The Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms, as well as a pluggable authentication module (PAM). One-time passcodes are generated using open standards developed by the Initiative for Open Authentication (OATH) (which is unrelated to OAuth).
security  authentication  google  crypto 
february 2012 by deusx
Does Airport Security Really Make Us Safer? | Culture | Vanity Fair
The best memorial to the victims of 9/11, in Schneier’s view, would be to forget most of the “lessons” of 9/11. “It’s infuriating,” he said, waving my fraudulent boarding pass to indicate the mass of waiting passengers, the humming X-ray machines, the piles of unloaded computers and cell phones on the conveyor belts, the uniformed T.S.A. officers instructing people to remove their shoes and take loose change from their pockets. “We’re spending billions upon billions of dollars doing this—and it is almost entirely pointless. Not only is it not done right, but even if it was done right it would be the wrong thing to do.”
security  911  flight  travel  terror  terrorism 
december 2011 by deusx
Hackers hit supermarket self-checkout lanes, steal money from shoppers
Lucky Supermarkets has removed the tampered card readers, which were made by VeriFone, in the stores known to be affected and says it is enhancing security of every credit and debit card reader in all 234 of its stores. Joseph Steinberg, CEO of the security company Green Armor Solutions, released a statement saying "Everyone should always check any device in which they insert/swipe a credit/debit/ATM card, or to which they touch their card, to see if it looks like it may have been modified/covered."
holyshit  selfcheckout  skimmers  identity  security  theft 
december 2011 by deusx
Full disk encryption is too good, says US intelligence agency | ExtremeTech
It’s a tough situation: On the one hand, being able to crack full disk encryption is vital for the prosecution of white-collar criminals, child porn ringleaders, pharmaceutical spam barons, and the curtailment of terrorism — but on the other, it’s quite satisfying to know that, perhaps at long last, we have a way of escaping the ireful eye of Big Brother. Where do you stand on FDE?
encryption  security  law 
november 2011 by deusx
Stop Sharing Your Files When You Travel
I have been on the road a lot in the past several months, and one thing I keep seeing is that folks are over-sharing. I am not talking about putting up those ribald pictures on your Facebook account, or forwarding those questionable email "jokes." But literally sharing your computer's data files across the hotel (and some airports too). Here is what my Mac Finder looks like at a Hilton that I was at earlier in the week (you can see that I am connected to several of my fellow travelers' PCs):
security  mac  networking  tech 
november 2011 by deusx
Ksplice » Hijacking HTTP traffic on your home subnet using ARP and iptables - System administration and software blog
"Let’s talk about how to hijack HTTP traffic on your home subnet using ARP and iptables. It’s an easy and fun way to harass your friends, family, or flatmates while exploring the networking protocols."
iptables  arp  networking  http  hijack  security  hacks  from delicious
october 2010 by deusx
Cross-domain Ajax with Cross-Origin Resource Sharing | NCZOnline
"A couple of years ago, web developers were banging their head against the first wall in Ajax: the same-origin policy. While we marveled at the giant step forward enabled by cross-browser support for the XMLHttpRequest object, we quickly bemoaned the fact that there was no way to make a request to a different domain from JavaScript. Everyone setup proxies on their web sites, which was the onset of a new host of open redirect problems, as a way to get around the restriction. Although developers were working around this limitation using server-side proxies as well as other techniques, the community outcry was around allowing native cross-domain Ajax requests. A lot of people are unaware that almost all browsers (Internet Explorer 8+, Firefox 3.5+, Safari 4+, and Chrome) presently support cross-domain Ajax via a protocol called Cross-Origin Resource Sharing."
cors  ajax  webdev  crossdomain  security  from delicious
july 2010 by deusx
support : SAML toolkit for Ruby on Rails
"Security Assertion Markup Language (SAML) is a standard for logging users into applications based on their session in another context. This has significant advantages over logging in using a username/password: no need to type in credentials, no need to remember and renew password, no weak passwords etc."
saml  security  webdev  from delicious
may 2010 by deusx
"Lets say you want to use POP from your local machine to a remote machine, but don't have an SSL aware email client. What you can do is to have your machine talk to stunnel on the local machine, who then encrypts the packets and sends them another stunnel running on the remote machine, which forwards them in clear text to the POP server on that machine. "
stunnel  security  encryption  networking  ssl  from delicious
april 2010 by deusx
RANDOM.ORG - True Random Number Service
"Perhaps you have wondered how predictable machines like computers can generate randomness. In reality, most random numbers used in computer programs are pseudo-random, which means they are a generated in a predictable fashion using a mathematical formula. This is fine for many purposes, but it may not be random in the way you expect if you're used to dice rolls and lottery drawings."
random  nifty  entropy  math  numbers  statistics  science  mathematics  security  from delicious
february 2010 by deusx
Undressing the Terror Threat -
"No amount of statistical evidence, however, will make any difference to those who give themselves over to almost completely irrational fears. Such people, and there are apparently a lot of them in America right now, are in fact real victims of terrorism. They also make possible the current ascendancy of the politics of cowardice—the cynical exploitation of fear for political gain. ... It's a remarkable fact that a nation founded, fought for, built by, and transformed through the extraordinary courage of figures such as George Washington, Susan B. Anthony and Martin Luther King Jr. now often seems reduced to a pitiful whimpering giant by a handful of mostly incompetent criminals, whose main weapons consist of scary-sounding Web sites and shoe- and underwear-concealed bombs that fail to detonate."
terror  cowardice  terrorism  america  politics  risk  security  fear  from delicious
january 2010 by deusx
Benlog » Don’t Hash Secrets
"So the next time you’re using a hash function on anything, ask yourself: is any of the stuff I’m hashing supposed to stay secret? If so, don’t hash. Instead, use HMAC."
hashing  security  crypto  hmac  from delicious
january 2010 by deusx
What Airline Passengers Can Learn - TIME
"This now familiar ritual distracts us from the real lesson, which is that we are not helpless. And since regular people will always be first on the scene of terrorist attacks, we should perhaps prioritize the public's antiterrorism capability — above and beyond the fancy technology that will never be foolproof. By definition, terrorism succeeds by making us feel powerless. It is more often a psychological threat than an existential one"
terror  terrorism  helplessness  travel  security  homelandsecurity  from delicious
january 2010 by deusx iPhone : The 'Israelification' of airports: High security, little bother
""Do you know why Israelis are so calm? We have brutal terror attacks on our civilians and still, life in Israel is pretty good. The reason is that people trust their defence forces, their police, their response teams and the security agencies. They know they're doing a good job. You can't say the same thing about Americans and Canadians. They don't trust anybody," Sela said. "But they say, 'So far, so good'. Then if something happens, all hell breaks loose and you've spent eight hours in an airport. Which is ridiculous. Not justifiable"
israel  air  travel  security  terrorism  from delicious
december 2009 by deusx
Ralph Schindler - Dynamic Assertions for Zend_Acl in ZF
"In plain English, what developers want to be able to do is be able to design assertions that can accept application models that implement the Resource or Role interface, and be able to apply some dynamic or custom logic to assess whether or not the given role has access to the given resource. ... For the purposes of this example, we’ll take a simple concept: a user needs to be able to only edit their own blog post. The user in this case, would be our applications model for users. The actual class will implement the Zend_Acl_Role_Interface. We will also have a BlogPost model which will serve as the resource in question, thus implementing the Zend_Acl_Resource_Interface"
zend  webdev  php  acls  tutorial  security  zendframework  from delicious
november 2009 by deusx
OSX.Loosemaque: It’s Not Just a Game Anymore | Symantec Connect
Must be a slow day on the OS X malware front. This is really reaching... "What’s interesting is that the author of this “game” flat-out says what it does on his Web site. Reading through the author’s description, it seems that he has created this game/threat as some sort of artistic project. The aliens are your files and there are consequences for “killing” them."
symantec  osx  games  gaming  indie  security  from delicious
november 2009 by deusx » Dear Adblock Plus and NoScript Users, Dear Mozilla Community
"I abused the power and wasted the enormous trust capital gained by the NoScript add-on through the years to prevent Adblock Plus from blocking stuff on four internet domains of mine, without asking an explicit preemptive user consent." The rest of the blog entry is basically sorry-but-not-really.
security  addons  mozilla  firefox  noscript 
may 2009 by deusx
Think Progress » Security for the Bush family costing Dallas more than $1 million annually.
"The Star-Telegram has a report on the tight security surrounding George W. and Laura Bush’s move into their Dallas home. Police officers have been turning away vehicles trying to enter the Preston Hollow neighborhood, “explaining that it is closed to the general public.”"
bush  expresidents  privacy  security 
february 2009 by deusx
Adblock Plus and (a little) more: Displaying web content in an extension - without security issues
"Over the last few years I reported a bunch of security vulnerabilities in various extensions and by far the most common issue was: “Extension Foo allows execution of remote code in privileged context”. Typically, an RSS reader extension would take the content of the RSS feed (HTML code), format it nicely and insert into the extension window. The issue that is overlooked here is that the RSS feed could contain some JavaScript code and it would then execute with the privileges of the extension — meaning for example that it would get full access to the browser (cookies, history etc) and to user’s files. pdp discovered a similar issue in the Firebug extension that uses an HTML-based templating system and forgot to sanitize some input received from the webpage."
mozilla  firefox  extensions  security 
january 2009 by deusx
"This page should show you your twitter info if you're logged in."
twitter  json  webdev  security  apis  jsonp 
january 2009 by deusx
Microsoft Internet Explorer users told to switch browsers over 'zero-day' flaw | Technology |
"Microsoft is trying to put together a patch, but in the meantime computer users have been advised to update their security settings or switch to unaffected browsers such as Firefox or Opera. ... The flaw in IE allows criminals to gain control of computers that have visited a website infected with malicious code designed to exploit it. While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website. Users do not have to click or download anything to become infected, merely visiting an infected website is sufficient."
microsoft  msft  msie  diaf  zeroday  security  exploits  browsers 
december 2008 by deusx Playmobil Security Check Point: Toys & Games
"The woman traveler stops by the security checkpoint. After placing her luggage on the screening machine, the airport employee checks her baggage. The traveler hands her spare change and watch to the security guard and proceeds through the metal detector. With no time to spare, she picks up her luggage and hurries to board her flight! "
wtf  toys  playmobil  security  checkpoint 
december 2008 by deusx
Secret Geek A-Team Hacks Back, Defends Worldwide Web
"Or, for the sheer geeky joy of it, he could reroute all of .com into his laptop, the digital equivalent of channeling the Mississippi into a bathtub. It was a moment hackers around the world dream of—a tool that could give them unimaginable power. But maybe it was best simply to close his laptop and forget it. He could pretend he hadn't just stumbled over a skeleton key to the Net. Life would certainly be less complicated. If he stole money, he'd risk prison. If he told the world, he'd be the messenger of doom, potentially triggering a collapse of Web-based commerce."
internet  dns  security  bind  flaw  networking 
december 2008 by deusx
Why Obama Should Keep His BlackBerry - BusinessWeek
"Obama comes into office as the first President both knowledgeable about and comfortable with the technology that runs today's world. This is actually an important and promising development and the worst thing we can do is try to force him into a technology-free cocoon in the name of security or whatever. Mr President-elect, if you want to keep that BlackBerry, please do so. Besides, we don't want a new President going through his difficult first weeks in office suffering from BlackBerry withdrawal."
obama  blackberry  security  email  internet  technology  president  mobile  politics 
november 2008 by deusx
"This class adds CSRF protection to existing PHP applications that make use of PHP's session support for authentication. If you are writing an application from scratch you shouldn't use this; it's designed to protect legacy apps that were not built with CSRF in mind."
php  webdev  csrf  security 
september 2008 by deusx
Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops
"Adeona is the first Open Source system for tracking the location of your lost or stolen laptop that does not rely on a proprietary, central service."
security  theft  laptops 
july 2008 by deusx
Internet-connected coffee maker has security holes | Tech news blog - CNET
"An Australian man has discovered security vulnerabilities in his Internet-connected coffee maker that could allow a remote attacker to not only take over his Windows XP-based PC but also make his coffee too weak."
devices  hardware  net  security  coffee 
june 2008 by deusx
"Since the thing is a security nightmare, it might as well be a complete and total nightmare, like the ones where you wake up and then find out you haven't actually woken up"
facebook  messaging  communicating  security  oops 
june 2008 by deusx
Meerkat | Code Sorcery Workshop
"Using an innovative Tunnel Setup Assistant, key components of Mac OS X you've grown to love and expect from applications, and community features like Growl and Sparkle, Meerkat is a must-have for the systems administrator or web developer working on the
ssh  tunnels  security  utilities  osx 
june 2008 by deusx
bunnyhero dev » Scaring people with fullScreen
"When Flash Player 9 goes into full screen mode, it pops up a little security message that tells the user how to exit full screen mode."
security  hacks  flash  pwnage 
june 2008 by deusx
Use your MacBook camera to see who's using your laptop | FlatulentFish
"Dylan O'Donnel published a simple method to capture a user's picture using the MacBook's built-in camera when a user logs in."
macbook  isight  scripts  security  theft 
april 2008 by deusx
"We have used a Sony Playstation 3 to correctly predict the outcome of the 2008 US presidential elections. In order not to influence the voters we keep our prediction secret, but commit to it by publishing its cryptographic hash on this website."
cryptography  hashes  md5  security 
april 2008 by deusx
Hash Collisions (The Poisoned Message Attack)
"Collision resistance means that it is infeasible to find two different inputs M and M' with the same hash H(M)=H(M'). Note that many collisions exist, but it has to be infeasible to actually find even a single collision!"
cryptography  hashes  md5  security 
april 2008 by deusx - reverse engineer md5 hashes - powered by
"Search in 48,083,359 md5/sha1 hashes. 6,104,212 searches answered since feb 2005. "
md5  security 
november 2007 by deusx
Apple - Support - Discussions - How to get Leopard ssh agent to work if ...
Make sure that ~/.MacOSX/environment.plist does not have a setting for SSH_AUTH_SOCK
leopard  osx  security  ssh 
november 2007 by deusx
Tool opens iPhone, iPod Touch via web | Reg Hardware
"The code uses a known vulnerability with firmware 1.1.1, which it subsequently patches. Before doing so, it activates iPhones, jalbreaks both types of device to allow third-party apps to run, installs Installer, and allows the YouTube app to connect on n
funny  iphone  jailbreak  exploits  security 
october 2007 by deusx
Filtering & Escaping Cheat Sheet - Pixelated Dreams
Nice cheat sheet, but looking at the semi-random names of all these functions it's no wonder that this stuff isn't just natural.
php  security  xss 
august 2007 by deusx
Chris Shiflett: My Top Two PHP Security Practices
"I have decided to promote my Top Two PHP Security Practices, expressed in four words: Filter input Escape output"
php  security  xss  webdev 
august 2007 by deusx
PHP: Filter Functions - Manual
"This extension serves to validate and filter data coming from some insecure source, such as user input."
php  xss  security 
august 2007 by deusx
XEP-0070: Verifying HTTP Requests via XMPP
"This document defines an XMPP protocol extension that enables verification of an HTTP request via XMPP."
jabber  xmpp  webdev  authentication  security 
july 2007 by deusx
The NetIP Security Resource - Diffie-Helman Article
"Each party raises the common number, which is 2 in this example ... to a random power and sends the result to the other. The received number is raised to the same random power. Note that both parties come up with the same secret key, which was never tran
crypto  math  diffiehelman  security 
july 2007 by deusx
dtm: Most HTML templating languages are written incorrectly
"the problem with virtually every HTML templating language out there is that they make it easier for the person writing HTML templates to add an XSS hole than to avoid it."
webdev  html  templating  xss  security 
april 2007 by deusx
JSON is not as safe as people think it is - Joe Walker's Blog
I thought everyone knew this! Ugh! "I believe that JSON is unsafe for anything but public data unless you are using unpredictable URLs."
json  webdev  security  webservices 
march 2007 by deusx
WordPress › Blog - WordPress 2.1.1 dangerous, Upgrade to 2.1.2
"It was determined that a cracker had gained user-level access to one of the servers that powers, and had used that access to modify the download file."
security  wordpress  ohgod 
march 2007 by deusx
MAKE: Blog: Homemade key opens up every voting machine
"Interesting, it seems when you make a master key for voting machines it's not a good idea to put a photo of the key that's good enough to make a physical copy of..."
funny  doh  diebold  keys  security  voting 
january 2007 by deusx
WordPress 2.0.3: Nonces « Mark on WordPress
"A nonce is a number used once, and it is used for intention verification purposes in WordPress. Think of it as a password that changes each time it is used."
wordpress  security  webdev  metablogging  nonce 
january 2007 by deusx
AquaticPrime: Secure Your Shareware Applications
"The AquaticPrime framework is a secure registration method for your shareware applications, released as free open-source software."
cocoa  shareware  software  rsa  security 
january 2007 by deusx
Why blurring sensitive information is a bad idea - Dheera Venkatraman's web site
"Remember, you want to leave your visitors with NO information, not blurred information. "
january 2007 by deusx
« earlier      
per page:    204080120160

related tags

academia  acls  addons  air  airtravel  ajax  america  anonymity  api  apis  apple  arp  auth  authentication  automotive  bind  blackberry  browsers  browsing  bush  checkpoint  clipboard  cocoa  coffee  communicating  copyfight  copyright  cors  cowardice  crazy  crossdomain  crypto  cryptography  csrf  css  devices  diaf  diebold  diffiehelman  diy  dns  doh  drm  email  encryption  entropy  exploits  expresidents  extensions  facebook  fairuse  fear  firefox  flash  flaw  flight  freedom  funny  games  gaming  gluecon  google  gpg  greasemonkey  gtalk  hacking  hackingfeeds  hacks  hardware  hashes  hashing  helplessness  hijack  hmac  holyshit  homeland  homelandsecurity  html  html5  http  id  identity  ie  indie  indiekarma  intelligence  internet  iphone  ipod  iptables  isight  israel  jabber  jailbreak  java  json  jsonp  keys  laptops  law  ldap  leopard  linux  mac  macbook  malware  math  mathematics  md5  memory  messaging  metablogging  microsoft  mobile  morons  mozilla  msft  msie  music  myspace  nationalsecurity  net  networking  nifty  ninjas  node  nodejs  nonce  noscript  nsa  numbers  oauth  obama  odd  office  ohgod  ominous  oops  openid  orwell  osx  p2p  passwords  pc  persona  php  ping  pirates  playmobil  plugcomputers  politics  president  privacy  programming  pwnage  python  random  rat  ratters  rest  rfid  rights  risk  rove  rsa  rss  saml  scary  science  scripts  security  selfcheckout  services  shareware  siri  skimmers  socialsoftware  software  sony  sploits  spying  ssh  ssl  statistics  stunnel  symantec  syndication  tech  technology  teensy  templating  terror  terrorism  theft  thunderbolt  tips  to:fb  toilets  tor  toys  travel  tunnels  tutorial  twitter  unix  us  usb  utilities  virii  viruses  voting  vpn  vulnerability  war  web  webdev  webservices  windows  wiretaps  wordpress  worms  wtf  www  xbox  xmpp  xss  zend  zendframework  zeroday 

Copy this bookmark: