Channels ▼

Blogs

November 18, 2014

In Command

Simple tools can be combined in many ways to do things

November 14, 2014

Bluetooth Phone Home

Using mbed on the embedded side to quickly create a BLE device and with the Android API doing most of the heavy lifting on the phone side, it can be pretty painless to create a complete BLE application.

November 13, 2014

Abstractions For Binary Search, Part 5: Getting Down to Details

It's hard to imagine how this code could be much simpler. However, we don't actually know whether it works.




Security Source Code

ciphter.txt

September 24, 2008

Published source code accompanying the article by Dejan Ristanovic and Jelica Protic in which they examine the Book Cipher algorithm which uses letters of subsequent words in some text or book as a key to encode messages. - Security

Associated article: The Book Cipher Algorithm

Tags: Global Developer     Web Development     .NET     Security     C/C++     Tools     Open Source     Parallel     JVM Languages     Design    



safecode.txt

September 18, 2008

Published source code accompanying the article by Gwyn Fisher in which he examines several types of coding vulnerabilities and examines how you can mitigate the risk of exploit within your Java, C, and C++ code. - Security

Associated article: Safe Coding Practices

Tags: Global Developer     Database     Web Development     Security     C/C++     Open Source     JVM Languages     Design    



vista.zip

September 05, 2007

- Security

Associated article: Inside the Windows Vista Disk Encryption Algorithm

Tags: .NET     Security    



vcrypt.txt

September 05, 2007

Published and unpublished source code accompanying the article by Daniel Stoleru in which he examines Bit-Plane Complexity Segmentation which lets you embed large amounts of data in images. - Security



obol1.txt

September 06, 2006

Published source code accompanying the article by Per Harald Myrvang in which he presents Obol, a Lisp-like, domain-specific language for testing and experimenting with when constructing and using security protocols in real systems. Also see OBOL2.ZIP and OOBOL.ZIP. - Security

Associated article: Parameterized Communication

Tags: Web Development     .NET     Security     C/C++     Open Source     Embedded Systems     JVM Languages     Design    



device.txt

June 30, 2006

Published source code accompanying the article by Ziv Gutterman and Avner Rosenan in which they examine how modern hardware devices contain information that assists the operating system in finding appropriate drivers--and intruders in finding out who was doing what when. - Security

Associated article: Device Trails

Tags: .NET     Security     Embedded Systems    



secure.txt

May 16, 2006

Published source code accompanying the article by Robert Seacord in which he ports C++ programs to C++/CLI to see if they're still susceptible to buffer overflow vulnerabilities. 2 - Security

Associated article: Secure Coding in C++/CLI

Tags: .NET     Security     C/C++    



viscrypt.txt

October 01, 2005

Published source code accompanying the article by Daniel Stoleru in which he examines Extended Visual Cryptography Schemes--graphical forms of information concealing. - Security

Associated article: Extended Visual Cryptography Schemes

Tags: Security          Design    



netcrypt.txt

December 01, 2004

Published source code accompanying the article by David B. Scofield and Eric Bergman-Terrell in which they examine the .NET Cryptography API. Also see NETCRYPT.ZIP. - Security

Associated article: Sensitive Data & the .NET Crypto API

Tags: .NET     Security    



scout.txt

November 01, 2004

Published data accompanying the article by Michael Larson in which he presents the ScoutSecure framework lets you monitor attacks on Wi-Fi (802.11) wireless networks. Also see SCOUT.ZIP. - Security

Associated article: The SecureScout Wi-Fi Security & Monitoring Framework

Tags: Security          Mobile    





Video