Security Source Code
Published source code accompanying the article by Dejan Ristanovic and Jelica Protic in which they examine the Book Cipher algorithm which uses letters of subsequent words in some text or book as a key to encode messages. - Security
Published source code accompanying the article by Gwyn Fisher in which he examines several types of coding vulnerabilities and examines how you can mitigate the risk of exploit within your Java, C, and C++ code. - Security
Associated article: Inside the Windows Vista Disk Encryption Algorithm
Published and unpublished source code accompanying the article by Daniel Stoleru in which he examines Bit-Plane Complexity Segmentation which lets you embed large amounts of data in images. - Security
Associated article: Visual Cryptography and Bit-Plane Complexity Segmentation
Published source code accompanying the article by Per Harald Myrvang in which he presents Obol, a Lisp-like, domain-specific language for testing and experimenting with when constructing and using security protocols in real systems. Also see OBOL2.ZIP and OOBOL.ZIP. - Security
Published source code accompanying the article by Ziv Gutterman and Avner Rosenan in which they examine how modern hardware devices contain information that assists the operating system in finding appropriate drivers--and intruders in finding out who was doing what when. - Security
Published source code accompanying the article by Robert Seacord in which he ports C++ programs to C++/CLI to see if they're still susceptible to buffer overflow vulnerabilities. 2 - Security
Published source code accompanying the article by Daniel Stoleru in which he examines Extended Visual Cryptography Schemes--graphical forms of information concealing. - Security
Published source code accompanying the article by David B. Scofield and Eric Bergman-Terrell in which they examine the .NET Cryptography API. Also see NETCRYPT.ZIP. - Security
Published data accompanying the article by Michael Larson in which he presents the ScoutSecure framework lets you monitor attacks on Wi-Fi (802.11) wireless networks. Also see SCOUT.ZIP. - Security
Associated article: The SecureScout Wi-Fi Security & Monitoring Framework
Best of the Web
The earliest known C compiler by the legendary Dennis Ritchie has been published on the repository.
HTML5 Mobile Development: Seven Good Ideas (and Three Bad Ones)
All you need to know to get up and running... and programming on ARM
Amazon Web Services CTO says promised land of cloud computing requires a new generation of applications that follow different principles.
Eventually, the vast majority of Web applications will run on a platform-as-a-service, or PaaS, vendor's infrastructure. To help sort out the options, we sent out a matrix with more than 70 decision points to a variety of PaaS providers.