Collected Postings
2023- Collected Postings,
2016-2022 Collected Postings,
2013-2015 Collected Postings,
2011-2012 Collected Postings,
2009-2010 Collected Postings,
2007-2008 Collected Postings,
2005-2006 Collected Postings,
2003-2004 Collected Postings,
2001-2002 Collected Postings,
1993-2000 Collected Postings,
Internet History Postings,
Old EMAIL Index
Payment Gateway moved to: subnetwork.html#gateway
Client and Radius Authentication
SSL Domain Name Server Certificates
X9.59, Identity, Authentication, and Privacy
Misc. Relying Party Certificates
Kerberos and/or pk-init
certificate-less operation
Coining the term certificate manufacturing to differentiate from PKI
Electronic Signature legislation, human signature, intent
Discussion of real-time public key distribution with DNS
Digital Certificate Payload Bloat
--
Old Public Key email from 1981
Client and Radius Authentication
- 2019c.html#24 Microsoft says mandatory password changing is “ancient and obsolete”
- 2018c.html#37 Software Delivery on Tape to be Discontinued
- 2017g.html#80 Running unsupported is dangerous was Re: AW: Re: LE strikes again
- 2017e.html#100 [CM] What was your first home computer?
- 2015f.html#14 Credit card fraud solution coming to America...finally
- 2015c.html#81 On a lighter note, even the Holograms are demonstrating
- 2014g.html#37 Special characters for Passwords
- 2012j.html#62 The Myth of Password Complexity & Frequent Change Rules
- 2012j.html#61 The Myth of Password Complexity & Frequent Change Rules
- 2012j.html#54 Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
- 2012b.html#71 Password shortcomings
- 2012b.html#36 RFC6507 Ellipitc Curve-Based Certificateless Signatures
- 2010l.html#63 A mighty fortress is our PKI, Part II
- 2010f.html#3 Why is Kerberos ever used, rather than modern public key cryptography?
- 2009m.html#51 Chip with PIN or Chip with signature
- 2009m.html#49 Hacker charges also an indictment on PCI, expert says
- 2009m.html#22 PCI SSC Seeks standard for End to End Encryption?
- 2009l.html#6 Cyber attackers empty business accounts in minutes
- 2009k.html#72 Client Certificate UI for Chrome?
- 2009g.html#75 Radius Server Or AAA Server
- 2009g.html#62 Solving password problems one at a time, Re: The password-reset paradox
- 2009b.html#65 What can agencies such as the SEC do to insure us that something like Madoff's Ponzi scheme will never happen again?
- 2008r.html#48 Dilbert is non-fiction
- 2008p.html#55 Can Smart Cards Reduce Payments Fraud and Identity Theft?
- 2008p.html#23 Your views on the increase in phishing crimes such as the recent problem French president Sarkozy faces
- 2008n.html#70 Could you please tell me about RADIUS authentication and how it works?
- 2008l.html#31 Authentication in the e-tailer / payment gateway / customer triangle
- 2008k.html#51 The PKC-only application security model
- 2008k.html#48 The PKC-only application security model
- 2008k.html#40 Calling Out
- 2008j.html#45 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
- 2007u.html#76 folklore indeed
- 2007u.html#51 folklore indeed
- 2007t.html#8 Translation of IBM Basic Assembler to C?
- 2007s.html#62 Translation of IBM Basic Assembler to C?
- 2007n.html#17 What if phone company had developed Internet?
- 2007m.html#27 nouns and adjectives
- 2007i.html#63 public key password authentication
- 2007f.html#60 Certificates
- 2007.html#15 SSL info
- 2006v.html#49 Patent buster for a method that increases password security
- 2006u.html#4 ssh - password control or key control?
- 2006t.html#8 Root CA CRLs
- 2006i.html#25 Benefits of PKI - 5,000 nodes organization
- 2006i.html#13 Multi-layered PKI implementation
- 2006c.html#35 X.509 and ssh
- 2006c.html#16 X.509 and ssh
- 2005t.html#32 RSA SecurID product
- 2005s.html#24 What ever happened to Tandem and NonStop OS ?
- 2005r.html#54 NEW USA FFIES Guidance
- 2005q.html#29 IPSEC wireless router ?
- 2005q.html#23 Logon with Digital Siganture (PKI/OCES - or what else they're called)
- 2005q.html#13 IPSEC with non-domain Server
- 2005q.html#1 Effective micropayments
- 2005p.html#40 how password is stored and check the authentication??
- 2005p.html#36 PKI
- 2005p.html#35 PKI
- 2005p.html#33 Digital Singatures question
- 2005o.html#42 Catch22. If you cannot legally be forced to sign a document etc - Tax Declaration etc etc etc
- 2005o.html#40 Certificate Authority of a secured P2P network
- 2005o.html#17 Smart Cards?
- 2005o.html#9 Need a HOW TO create a client certificate for partner access
- 2005n.html#51 IPSEC and user vs machine authentication
- 2005n.html#43 X509 digital certificate for offline solution
- 2005m.html#37 public key authentication
- 2005m.html#18 S/MIME Certificates from External CA
- 2005m.html#15 Course 2821; how this will help for CISSP exam ?
- 2005m.html#5 Globus/GSI versus Kerberos
- 2005j.html#18 Repository for digital certificates
- 2005i.html#36 Improving Authentication on the Internet
- 2005i.html#27 REPOST: Authentication, Authorization TO Firewall
- 2005i.html#23 The Worth of Verisign's Brand
- 2005i.html#4 Authentication - Server Challenge
- 2005i.html#3 General PKI Question
- 2005i.html#2 Certificate Services
- 2005g.html#49 "Best practices" or "Best implementations"?
- 2005g.html#48 "Best practices" or "Best implementations"?
- 2005d.html#18 Digital signature with Javascript
- 2005.html#31 Do I need a certificat?
- 2004h.html#21 Basics of key authentication
- 2004e.html#20 Soft signatures
- 2004e.html#9 Authentification classifications
- 2003o.html#57 Pub/priv key security
- 2003m.html#50 public key vs passwd authentication?
- 2003m.html#49 public key vs passwd authentication?
- 2003m.html#1 Password / access rights check
- 2003j.html#25 Idea for secure login
- 2003h.html#18 Authentication protocol
- 2003h.html#13 Authentication protocol
- 2003g.html#70 Simple resource protection with public keys
- 2003e.html#59 Security in RADIUS (RFC2865)
- 2003e.html#57 Security in RADIUS (RFC2865)
- 2003e.html#47 Public key and the authority problem
- 2003d.html#42 Authentification vs Encryption in a system to system interface
- 2003.html#50 Origin of Kerberos
- 2002q.html#17 Difference between AAA and Radius?
- 2002p.html#22 Cirtificate Authorities 'CAs', how curruptable are they to
- 2002o.html#42 use of RADIUS
- 2002m.html#16 A new e-commerce security proposal
- 2002l.html#4 why is Kerberos better than this simpler replacement
- 2002l.html#3 why is Kerberos better than this simpler replacement
- 2002h.html#68 Are you really who you say you are?
- 2002e.html#56 PKI and Relying Parties
- 2002e.html#52 PKI and Relying Parties
- 2002e.html#49 PKI and Relying Parties
- 2002d.html#35 PKI Implementation
- 2001m.html#21 misc. SSL
- 2001k.html#63 how to start write a Firewall authentication client software
- 2001k.html#59 intranet security and user authentication questions
- 2001k.html#34 A thought on passwords
- 2001j.html#49 Are client certificates really secure?
- 2001j.html#8 PKI (Public Key Infrastructure)
- 2001i.html#25 Net banking, is it safe???
- 2001i.html#16 Net banking, is it safe???
- 2001i.html#16 Net banking, is it safe???
- 2001i.html#9 Net banking, is it safe???
- 2001h.html#75 Net banking, is it safe???
- 2001g.html#26 distributed authentication
- 2001g.html#25 Root certificates
- 2001g.html#12 FREE X.509 Certificates
- 2001g.html#12 FREE X.509 Certificates
- 2001g.html#11 FREE X.509 Certificates
- 2001g.html#3 distributed authentication
- 2001g.html#1 distributed authentication
- 2001f.html#79 FREE X.509 Certificates
- 2001f.html#77 FREE X.509 Certificates
- 2001e.html#81 Passwords
- 2001e.html#34 Blame it all on Microsoft
- 2001d.html#46 anyone have digital certificates sample code
- 2001d.html#21 What is PKI?
- 2001d.html#20 What is PKI?
- 2001c.html#34 PKI and Non-repudiation practicalities
- 2001c.html#9 Server authentication
- 2001c.html#8 Server authentication
- 2000c.html#2 Financial Stnadards Work group?
- 2000b.html#92 Question regarding authentication implementation
- 2000b.html#90 Question regarding authentication implementation
- 2000.html#57 RealNames hacked. Firewall issues
- 2000.html#47 TLS: What is the purpose of the client certificate request?
- aadsm28.htm#31 Fixing SSL (was Re: Dutch Transport Card Broken)
- aadsm28.htm#20 Fixing SSL (was Re: Dutch Transport Card Broken)
- aadsm24.htm#8 Microsoft - will they bungle the security game?
- aadsm23.htm#56 UK Detects Chip-And-PIN Security Flaw
- aadsm23.htm#52 Status of opportunistic encryption
- aadsm21.htm#8 simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
- aadsm21.htm#7 simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
- aadsm21.htm#4 Another entry in the internet security hall of shame
- aadsm20.htm#38 Another entry in the internet security hall of shame
- aadsm20.htm#37 Another entry in the internet security hall of shame
- aadsm19.htm#43 massive data theft at MasterCard processor
- aadsm14.htm#27 Maybe It's Snake Oil All the Way Down
- aadsm13.htm#30 How effective is open source crypto? (aads addenda)
- aepay11.htm#70 Confusing Authentication and Identiification? (addenda)
- aepay7.htm#ssexploit Shared-Secret exploit
- aepay6.htm#userauth MS masters NC mind-set (authentication is the key)
- aadsm9.htm#cfppki5 CFP: PKI research workshop
- aadsm7.htm#idcard2 AGAINST ID CARDS
- aadsm7.htm#idcard AGAINST ID CARDS
- aadsm7.htm#auth2 Who or what to authenticate?
- aadsm7.htm#auth Who or what to authenticate?
- aadsm6.htm#nonreput2 Sender and receiver non-repudiation
- aadsm6.htm#nonreput Sender and receiver non-repudiation
- 99.html#235 Attacks on a PKI
- 99.html#230 Radius Help help!!!
- 99.html#229 Digital Signature on SmartCards
- 99.html#224 X9.59/AADS announcement at BAI this week
- 99.html#217 AADS/X9.59 demo & standards at BAI (world-wide retail banking) show
- 99.html#216 Ask about Certification-less Public Key
- ansiepay.htm#x959demo X9.59/AADS demos operational
- aepay4.htm#rfc2807c RFC 2807 published today XML Signature Requirements
- aepay4.htm#rfc2807b RFC 2807 published today XML Signature Requirements
- aepay4.htm#comcert7 Merchant Comfort Certificates
- aepay4.htm#comcert6 Merchant Comfort Certificates
- aepay2.htm#privrule3 U.S. firms gird for privacy rules
- aadsm2.htm#pkikrb PKI/KRB
- aadsm2.htm#keyl4 On leaving the 56-bit key length limitation
- aadsm2.htm#straw AADS Strawman
- aadsm2.htm#account A different architecture? (was Re: certificate path
- aadsm2.htm#inetpki A PKI for the Internet (was RE: Scale (and the SRV
top,
by subject:
technology,
networking,
public key,
integrity,
Boyd
- home
SSL Domain Name Server Certificates
- 2022f.html#33 IBM "nine-net"
- 2019b.html#100 mainframe hacking "success stories"?
- 2018e.html#8 Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
- 2018d.html#47 This 1966 Article About 'Computer Danger' Predicted a Bleak Future of Bank Crimes and Info Leaks
- 2018d.html#45 This 1966 Article About 'Computer Danger' Predicted a Bleak Future of Bank Crimes and Info Leaks
- 2018b.html#76 23,000 HTTPS certificates axed after CEO emails private keys
- 2018.html#102 Web Authentication: A Broken Trust with No Easy Fix
- 2017g.html#80 Running unsupported is dangerous was Re: AW: Re: LE strikes again
- 2017e.html#75 11May1992 (25 years ago) press on cluster scale-up
- 2017e.html#70 Domain Name System
- 2017d.html#92 Old hardware
- 2017d.html#74 Trump delay of the 'fiduciary rule' will cost retirement savers $3.7 billion
- 2017d.html#16 When the 'S' in HTTPS also stands for shady
- 2017b.html#75 The ICL 2900
- 2016f.html#107 How to Win the Cyberwar Against Russia
- 2016d.html#79 Is it a lost cause?
- 2015f.html#14 Credit card fraud solution coming to America...finally
- 2015f.html#3 Credit card fraud solution coming to America...finally
- 2015d.html#18 Can we design machines to automate ethics?
- 2015d.html#11 "Trust in digital certificate ecosystem eroding"
- 2015d.html#4 "Trust in digital certificate ecosystem eroding"
- 2015c.html#81 On a lighter note, even the Holograms are demonstrating
- 2014m.html#86 Economic Failures of HTTPS Encryption
- 2014m.html#85 Economic Failures of HTTPS Encryption
- 2014m.html#56 The Road Not Taken: Knowing When to Keep Your Mouth Shut
- 2014l.html#55 LA Times commentary: roll out "smart" credit cards to deter fraud
- 2014j.html#98 Cybersecurity
- 2014j.html#78 Firefox 32 supports Public Key Pinning
- 2014g.html#7 [Cryptography] Is it time for a revolution to replace TLS?
- 2014f.html#8 Is cybersecurity the next banking crisis in the making?
- 2014e.html#78 How the Internet wasn't Commercial Dataprocessing
- 2014e.html#56 "NSA foils much internet encryption"
- 2014e.html#31 U.S. States Investigating Breach at Experian
- 2014e.html#30 Zeus malware found with valid digital certificate
- 2014e.html#7 Last Gasp for Hard Disk Drives
- 2014d.html#13 Royal Pardon For Turing
- 2014b.html#23 Quixotically on-topic post, still on topic
- 2013o.html#79 Would Target cybersecurity breach occur with a digital ID system?
- 2013j.html#33 8080 BASIC
- 2013i.html#46 OT: "Highway Patrol" back on TV
- 2013g.html#40 The Vindication of Barb
- 2013f.html#70 How internet can evolve
- 2013f.html#47 Pirate Bay co-founder charged with hacking IBM mainframes, stealing money
- 2013f.html#45 Reports: IBM may sell x86 server business to Lenovo
- 2013c.html#34 The United States is leaking 1TB of data daily to foreign countries
- 2013c.html#2 Legal Lessons from PATCO Fraud Case
- 2012n.html#71 history of Programming language and CPU in relation to each other
- 2012l.html#67 Strings (hijacked from: The IBM zEnterprise EC12 announcment)
- 2012j.html#61 The Myth of Password Complexity & Frequent Change Rules
- 2012j.html#53 Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
- 2012i.html#35 US Senate proposes national data breach notification act
- 2012d.html#26 Can SSL Certificate Checking System Be Saved?
- 2012d.html#20 Writing article on telework/telecommuting
- 2012c.html#7 The Convergence of PKI
- 2012b.html#94 public key, encryption and trust
- 2012b.html#69 PKI and SSL - the jaws of trust snap shut
- 2012b.html#17 Time To Scrap SSL?
- 2012.html#97 Is SSL Cert Holder ID Verification A Joke?
- 2012.html#91 Has anyone successfully migrated off mainframes?
- 2012.html#65 Reject gmail
- 2011p.html#2 What the heck is cloud computer and why does it matter
- 2011o.html#54 Speed: Re: Soups
- 2011n.html#6 Founders of SSL Call Game Over?
- 2011n.html#0 Before Netscape: the forgotten Web browsers of the early 1990s
- 2011m.html#54 Any candidates for best acronyms?
- 2011m.html#48 ISBNs
- 2011m.html#23 Benefits of Online Banking
- 2011m.html#11 PKI "fixes" that don't fix PKI
- 2011l.html#72 Selectric Typewriter--50th Anniversary
- 2011l.html#48 Does outsourcing cause data loss?
- 2011k.html#65 Somewhat off-topic: comp-arch.net cloned, possibly hacked
- 2011k.html#64 Fraudulent Google credential found in the wild
- 2011j.html#63 Why do defenders keep losing to smaller cyberwarriors?
- 2011h.html#59 SSL digital certificates
- 2011g.html#60 Is the magic and romance killed by Windows (and Linux)?
- 2011g.html#24 Fight Fraud with Device ID
- 2011g.html#18 Fight Fraud with Device ID
- 2011g.html#11 Is the magic and romance killed by Windows (and Linux)?
- 2011f.html#25 Fear the Internet, was Cool Things You Can Do in z/OS
- 2011f.html#14 How is SSL hopelessly broken? Let us count the ways
- 2011e.html#71 Fraudulent certificates issued for major websites
- 2010o.html#45 A Wolf In Sheep's Clothing - New Threat
- 2010o.html#44 A Wolf In Sheep's Clothing - New Threat
- 2010o.html#42 Facebook and Twitter fail basic security test
- 2010o.html#36 Cookies Are Dead in the Fight Against Fraud
- 2010o.html#31 Survey Outlines Compliance Challenge Among Small Merchants
- 2010o.html#23 Spooky Myths that Trick Merchants When It Comes to Secure Payments Processes
- 2010o.html#9 On Scope Scrinkage in PCI DSS
- 2010n.html#37 Do we really need to care about DNS Security?
- 2010n.html#24 A question about HTTPS
- 2010n.html#4 zSecurity blog post - "READ is not benign"
- 2010n.html#2 UAE Man-in-the-Middle Attack Against SSL
- 2010n.html#0 UAE Man-in-the-Middle Attack Against SSL
- 2010m.html#89 UAE Man-in-the-Middle Attack Against SSL
- 2010m.html#77 towards https everywhere and strict transport security (was: Has there been a change in US banking regulations recently?)
- 2010m.html#76 towards https everywhere and strict transport security (was: Has there been a change in US banking regulations recently?)
- 2010m.html#75 towards https everywhere and strict transport security (was: Has there been a change in US banking regulations recently?)
- 2010m.html#70 towards https everywhere and strict transport security (was: Has there been a change in US banking regulations recently?)
- 2010m.html#60 towards https everywhere and strict transport security
- 2010m.html#51 Has there been a change in US banking regulations recently?
- 2010m.html#50 Has there been a change in US banking regulations recently?
- 2010m.html#3 Five Theses on Security Protocols
- 2010l.html#82 Five Theses on Security Protocols
- 2010l.html#79 Five Theses on Security Protocols
- 2010l.html#71 A slight modification of my comments on PKI
- 2010l.html#62 A mighty fortress is our PKI
- 2010l.html#58 A mighty fortress is our PKI
- 2010l.html#57 A mighty fortress is our PKI
- 2010i.html#51 Visa fraud alert puts banks, payment processors on guard
- 2010h.html#69 Idiotic programming style edicts
- 2010h.html#54 Trust Facade
- 2010h.html#25 In SSL We Trust? Not Lately
- 2010g.html#84 In SSL We Trust? Not Lately
- 2010g.html#79 In SSL We Trust? Not Lately
- 2010g.html#74 Unknown SSL credential could imperil Firefox, Mac users
- 2010g.html#65 Fraudsters Can Easily Buy SSL Certificates, Researcher Finds
- 2010g.html#58 Gov't coerced Certs thwart SSL/TLS
- 2010g.html#14 Gov't coerced Certs thwart SSL/TLS
- 2010g.html#10 Gov't coerced Certs thwart SSL/TLS
- 2010f.html#92 Why do most websites use HTTPS only while logging you in...and not for the entire session?
- 2010f.html#80 Law Enforcement Appliance Subverts SSL
- 2010f.html#71 Law Enforcement Appliance Subverts SSL
- 2010f.html#3 Why is Kerberos ever used, rather than modern public key cryptography?
- 2010e.html#19 What's with IBMLINK now??
- 2010b.html#70 Happy DEC-10 Day
- 2010b.html#69 Happy DEC-10 Day
- 2010b.html#62 Happy DEC-10 Day
- 2009r.html#36 SSL certificates and keys
- 2009r.html#32 SSL certificates and keys
- 2009p.html#88 Kaminsky Bug Options Include "Do Nothing," Says IETF
- 2009p.html#29 Computer Experts Deconstruct FDIC Email Scam
- 2009o.html#54 Should SSL be enabled on every website?
- 2009o.html#22 Rogue PayPal SSL Certificate Available in the Wild - IE, Safari and Chrome users beware
- 2009o.html#3 Sophisticated cybercrooks cracking bank security efforts
- 2009n.html#18 OSS's Simple Sabotage Field Manual
- 2009n.html#6 OSS's Simple Sabotage Field Manual
- 2009m.html#47 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
- 2009m.html#7 Need new 3270 emulator: SSH, inexpensive, reliable
- 2009l.html#56 Linkedin digital certificate today
- 2009k.html#60 The satate of software
- 2009k.html#53 A Complete History Of Mainframe Computing
- 2009k.html#46 More holes found in Web's SSL security protocol
- 2009k.html#38 More holes found in Web's SSL security protocol
- 2009k.html#33 Trouble in PKI land
- 2009k.html#23 Security certificate warnings don't work, researchers say
- 2009k.html#21 Security certificate warnings don't work, researchers say
- 2009j.html#57 How can we stop Credit card FRAUD?
- 2009j.html#25 Database Servers: Candy For Hackers
- 2009j.html#20 Kaminsky interview: DNSSEC addresses cross-organizational trust and security
- 2009g.html#57 LexisNexis says its data was used by fraudsters
- 2009g.html#48 Inventor: SSL security woes are really the fault of browser design
- 2009f.html#14 SSL: Broken Even More
- 2009d.html#38 Internet threat: Hackers swarm bank accounts
- 2009c.html#63 SSLstrip hacking tool bypasses SSL to trick users, steal passwords
- 2009c.html#60 SSLstrip hacking tool bypasses SSL to trick users, steal passwords
- 2009c.html#58 Has anyone seen a lift from using an Extended Validation SSL Certificate?
- 2009c.html#50 SSLstrip hacking tool bypasses SSL to trick users, steal passwords
- 2009b.html#70 Amazon Launches Flexible Payments As a Commercial Service
- 2009b.html#33 Phish-Pharming: Using social engineering to hijack domains at the source
- 2009.html#56 Data losses set to soar
- 2009.html#7 Swedish police warn of tampered credit card terminals
- 2008s.html#78 Boffins bust web authentication with game consoles
- 2008s.html#76 Boffins bust web authentication with game consoles
- 2008s.html#72 CA issues no-questions asked Mozilla cert
- 2008s.html#50 Perfect MITM Attacks With No-Check SSL
- 2008r.html#42 Online Bill Payment Website Hijacked - Users were redirected to a page serving malware
- 2008q.html#72 https question
- 2008q.html#3 GPG
- 2008o.html#11 Browser Security UI: the horns of the dilemma
- 2008o.html#4 Wachovia Bank web site
- 2008n.html#100 Wachovia Bank web site
- 2008n.html#96 Wachovia Bank web site
- 2008n.html#93 How did http get a port number as low as 80?
- 2008n.html#92 How did http get a port number as low as 80?
- 2008n.html#55 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
- 2008l.html#69 Verifying Verified By Visa - Registration breaks chain of trust
- 2008l.html#53 Quality of IBM school clock systems?
- 2008l.html#50 IBM manual web pages
- 2008l.html#46 z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?
- 2008l.html#34 Authentication in the e-tailer / payment gateway / customer triangle
- 2008l.html#28 Verifying Verified By Visa - Registration breaks chain of trust
- 2008k.html#74 Top 10 vulnerabilities for service orientated architecture?
- 2008k.html#49 The PKC-only application security model
- 2008k.html#29 dollar coins
- 2008j.html#63 CLIs and GUIs
- 2008i.html#70 Next Generation Security
- 2008i.html#42 Security Breaches
- 2008h.html#72 SSL certificates - from a customer's point of view (trust)
- 2008d.html#8 Govt demands password to personal computer
- 2008.html#61 1975 movie "Three Days of the Condor" tech stuff
- 2007u.html#76 folklore indeed
- 2007u.html#45 Folklore references to CP67 at Lincoln Labs
- 2007t.html#61 Crypto Related Posts
- 2007s.html#23 The new urgency to fix online privacy
- 2007r.html#66 The new urgency to fix online privacy
- 2007r.html#24 How to tell a fake SSL certificate from a real one
- 2007r.html#19 How to tell a fake SSL certificate from a real one
- 2007r.html#18 How to tell a fake SSL certificate from a real one
- 2007r.html#17 How to tell a fake SSL certificate from a real one
- 2007r.html#12 How to tell a fake SSL certificate from a real one
- 2007q.html#72 Value of SSL client certificates?
- 2007q.html#30 what does xp do when system is copying
- 2007q.html#11 what does xp do when system is copying
- 2007q.html#1 what does xp do when system is copying
- 2007p.html#60 what does xp do when system is copying
- 2007o.html#52 Virtual Storage implementation
- 2007o.html#28 EZPass: Yes, Big Brother IS Watching You!
- 2007n.html#9 John W. Backus, 82, Fortran developer, dies
- 2007n.html#5 John W. Backus, 82, Fortran developer, dies
- 2007m.html#41 X.509 weakness?
- 2007m.html#27 nouns and adjectives
- 2007l.html#41 My Dream PC -- Chip-Based
- 2007l.html#6 John W. Backus, 82, Fortran developer, dies
- 2007l.html#0 John W. Backus, 82, Fortran developer, dies
- 2007k.html#79 John W. Backus, 82, Fortran developer, dies
- 2007k.html#32 SSL Security
- 2007h.html#67 SSL vs. SSL over tcp/ip
- 2007h.html#26 sizeof() was: The Perfect Computer - 36 bits?
- 2007h.html#22 sizeof() was': The Perfect Computer - 36 bits?
- 2007h.html#21 asymmetric cryptography + digital signature
- 2007h.html#20 sizeof() was: The Perfect Computer - 36 bits?
- 2007g.html#63 The Perfect Computer - 36 bits?
- 2007g.html#60 Can SSL sessions be compromised?
- 2007g.html#50 DNSSEC to be strangled at birth
- 2007g.html#38 Can SSL sessions be compromised?
- 2007g.html#32 Can SSL sessions be compromised?
- 2007f.html#75 Securing financial transactions a high priority for 2007
- 2007f.html#31 Is that secure : <form action="https" from a local HTML page ?
- 2007d.html#67 SLL Certificate
- 2007d.html#60 SLL Certificate
- 2007d.html#36 MAC and SSL
- 2007d.html#35 MAC and SSL
- 2007d.html#26 Securing financial transactions a high priority for 2007
- 2007c.html#51 Securing financial transactions a high priority for 2007
- 2007c.html#30 Securing financial transactions a high priority for 2007
- 2007b.html#53 Forbidding Special characters in passwords
- 2007.html#17 SSL info
- 2007.html#15 SSL info
- 2007.html#7 SSL info
- 2006y.html#7 Securing financial transactions a high priority for 2007
- 2006x.html#36 SSL security with server certificate compromised
- 2006w.html#15 more secure communication over the network
- 2006v.html#49 Patent buster for a method that increases password security
- 2006t.html#8 Root CA CRLs
- 2006t.html#2 Is the teaching of non-reentrant HLASM coding practices ever defensible?
- 2006s.html#11 Why not 2048 or 4096 bit RSA key issuance?
- 2006p.html#7 SSL, Apache 2 and RSA key sizes
- 2006k.html#19 Hey! Keep Your Hands Out Of My Abstraction Layer!
- 2006k.html#17 Hey! Keep Your Hands Out Of My Abstraction Layer!
- 2006k.html#2 Hey! Keep Your Hands Out Of My Abstraction Layer!
- 2006j.html#48 where do I buy a SSL certificate?
- 2006j.html#47 where do I buy a SSL certificate?