Confused about SSL/TLS certificates? Here is a quick and dirty introduction to SSL/TLS encryption.
IBM’s China connection and the betrayal of America: how Chinese government hackers manage to remain undetectable
“You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I’ll tell you what: No computer is safe (…) I don’t care what they say.”
President-Elect Donald Trump
In the waning days of the fading Obama presidency, plenty of questions surfaced about Russia’s involvement with the hacks of the DNC and election systems. Electronic evidence can be easily manipulated.
There is more to it than just electronic evidence.
How to create OpenSSH keys on a Windows desktop for remote access to a Linux server with PuTTY Key Generator
When using authentication based on keys (as opposed to a password), you have to create the key pair—a private key and a public key—on your local machine, then transfer the public key to the server and install it there. Here is how to do this on a Windows desktop for remote access to a Linux server.
The crypto revolution: an interview with Professor Emin Gün Sirer and Dr. Ittay Eyal about Bitcoin, the blockchain, and FinTech innovation
In a research paper titled “Majority is not Enough: Bitcoin Mining is Vulnerable“, Professor Emin Gün Sirer and Dr. Ittay Eyal of the Department of Computer Science at Cornell University, revealed the Selfish Mining attack on Bitcoin’s blockchain back in 2014.
In this interview, Professor Sirer and Dr. Ittay Eyal demystify Bitcoin and other crypto currencies and provide a first glimpse into the blockchain revolution.
The interview was conducted by Anna E Kobylinska with contribution by Filipe Martins.
Create a Content Security Policy to Protect Your Web Application against XSRF/CSRF/XFS, Clickjacking and Other Code Injection Attacks
[Updated 2019-03-17] Are you wondering why some JavaScript code from external domains simply won’t execute on your website? The reason could be as simple as an overly restrictive Content Security Policy (CSP for short). This article explains how you can create a Content Security Policy that’s both protective and functional. It will help you to secure your web server from some types of cross-site request forgery (XSRF/CSRF/XFS), clickjacking and other code injection attacks.