jose: seguridad*

Bookmarks on this page are managed by an admin user.

58 bookmark(s) - Por: Fecha ↓ / Título / - Bookmarks from other users for this tag

  1. Twitter, Facebook, Google, Dropbox, Amazon, ... no se libra nadie.
    http://mashable.com/2014/04/09/heartbleed-bug-websites-affected
    Tags: , , , por jose (2014-04-10)
  2. -
    http://security.stackexchange.com/que...959/why-are-salted-hashes-more-secure
    Tags: , , por jose (2014-02-26)
  3. We have no evidence that any of this surveillance makes us safer.


    the loss of privacy, freedom, and liberty is much more damaging to our society than the occasional act of random violence.


    We need to work toward security, even if other countries like China continue to use the Internet as a giant surveillance platform. We need to build a coalition of free-world nations dedicated to a secure global Internet, and we need to continually push back against bad actors -- both state and non-state -- that work against that goal.
    https://www.schneier.com/blog/archives/2014/01/how_the_nsa_thr.html
    Tags: , , , , , por jose (2014-02-25)
  4. The "problem" with the NetworkManager application is that it stores the details of any connection (Wired, Wi-Fi, VPN, Proxy, etc.) created by the user in some text files, called profiles, under the /etc/NetworkManager/system-connections/ or /etc directory. Many users have reported this functionality as a bug, in the past few years.
    http://news.softpedia.com/news/All-Li...You-Don-t-Use-Encryption-412387.shtml
    Tags: , , por jose (2014-02-03)
  5. …growing inequality menaces vigorous societies. It is a proxy for how effectively an elite has constructed institutions that extract value from the rest of society. Professor Sam Bowles, also part of the INET network, goes further. He argues that inequality pulls production away from value creation to protecting and securing the wealthy's assets: one in five of the British workforce, for example, works as "guard labour" -- in security, policing, law, surveillance and forms of IT that control and monitor. The higher inequality, the greater the proportion of a workforce deployed as guard workers, who generate little value and lower overall productivity."
    https://www.schneier.com/blog/archives/2014/01/income_inequali.html
    Tags: , , por jose (2014-01-30)
  6. El ataque: ingeniería social a cuenta de la ausencia de estándard en la gestión que las compañías hacen de tu información de tarjeta de crédito (Schneier tiene un gran post sobre esto de hace un par de años, como poco).
    http://thenextweb.com/socialmedia/2014/01/29/lost-50000-twitter-username
    Tags: , , por jose (2014-01-29)
  7. TeamPass is a Passwords Manager dedicated for managing passwords in a collaborative way on any server Apache, MySQL and PHP. It is especially designed to provide passwords access security for allowed people. This makes TeamPass really usefull in a Buisiness/Enterprise environment and will provide to IT or Team Manager a powerfull and easy tool for customizing passwords access depending on the user’s role.
    Using TeamPass will …

    permit you to stop searching for passwords,
    permit to get ride of all small txt files containing passwords,
    enhance the passwords follow-up,
    offers you the possibility to grant access to passwords,
    assure you that only allowed users will access to passwords,
    guarantee full security of all passwords,
    permit to share passwords and store them.
    http://www.teampass.net
    Tags: , , por jose (2014-01-27)
  8. Una vuelta de tuerca a GPG, interesante para información sensible: hacen falta 2 claves privadas de 2 personas para acceder a información sensible: métodos de seguridad nuclear aplicados al cifrado y descifrado de datos
    http://arstechnica.com/security/2013/...pts-two-man-rule-used-to-launch-nukes
    Tags: , , , , por jose (2013-11-26)
  9. On top of the usual confidentiality and integrity properties of HTTPS, forward secrecy adds a new property. If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys to decrypt the recorded traffic. As the Electronic Frontier Foundation points out, this type of protection is increasingly important on today’s Internet.
    https://blog.twitter.com/2013/forward-secrecy-at-twitter-0
    Tags: , , por jose (2013-11-26)

Top of the page

Primera / Anterior / Siguiente / Última / Página 1 de 6 Marcadores de Cartograf: Tags: seguridad

Acerca de - Propulsed by SemanticScuttle