Channels ▼

Blogs

April 16, 2014

Social Processes and Heartbleed, Part 1

Why is gets still with us?

April 15, 2014

Inside an Automated State Machine

I was pleased to see that the generated code was reasonably easy to understand

April 11, 2014

How Overloading Interacts With C Compatibility

The social properties of a programming language's user community affect the technical details of the language itself.




Security Source Code

ciphter.txt

September 24, 2008

Published source code accompanying the article by Dejan Ristanovic and Jelica Protic in which they examine the Book Cipher algorithm which uses letters of subsequent words in some text or book as a key to encode messages. - Security

Associated article: The Book Cipher Algorithm

Tags: Global Developer     Web Development     .NET     Security     C/C++     Tools     Open Source     Parallel     JVM Languages     Design    



safecode.txt

September 18, 2008

Published source code accompanying the article by Gwyn Fisher in which he examines several types of coding vulnerabilities and examines how you can mitigate the risk of exploit within your Java, C, and C++ code. - Security

Associated article: Safe Coding Practices

Tags: Global Developer     Database     Web Development     Security     C/C++     Open Source     JVM Languages     Design    



vista.zip

September 05, 2007

- Security

Associated article: Inside the Windows Vista Disk Encryption Algorithm

Tags: .NET     Security    



vcrypt.txt

September 05, 2007

Published and unpublished source code accompanying the article by Daniel Stoleru in which he examines Bit-Plane Complexity Segmentation which lets you embed large amounts of data in images. - Security



obol1.txt

September 06, 2006

Published source code accompanying the article by Per Harald Myrvang in which he presents Obol, a Lisp-like, domain-specific language for testing and experimenting with when constructing and using security protocols in real systems. Also see OBOL2.ZIP and OOBOL.ZIP. - Security

Associated article: Parameterized Communication

Tags: Web Development     .NET     Security     C/C++     Open Source     Embedded Systems     JVM Languages     Design    



device.txt

June 30, 2006

Published source code accompanying the article by Ziv Gutterman and Avner Rosenan in which they examine how modern hardware devices contain information that assists the operating system in finding appropriate drivers--and intruders in finding out who was doing what when. - Security

Associated article: Device Trails

Tags: .NET     Security     Embedded Systems    



secure.txt

May 16, 2006

Published source code accompanying the article by Robert Seacord in which he ports C++ programs to C++/CLI to see if they're still susceptible to buffer overflow vulnerabilities. 2 - Security

Associated article: Secure Coding in C++/CLI

Tags: .NET     Security     C/C++    



viscrypt.txt

October 01, 2005

Published source code accompanying the article by Daniel Stoleru in which he examines Extended Visual Cryptography Schemes--graphical forms of information concealing. - Security

Associated article: Extended Visual Cryptography Schemes

Tags: Security          Design    



netcrypt.txt

December 01, 2004

Published source code accompanying the article by David B. Scofield and Eric Bergman-Terrell in which they examine the .NET Cryptography API. Also see NETCRYPT.ZIP. - Security

Associated article: Sensitive Data & the .NET Crypto API

Tags: .NET     Security    



scout.txt

November 01, 2004

Published data accompanying the article by Michael Larson in which he presents the ScoutSecure framework lets you monitor attacks on Wi-Fi (802.11) wireless networks. Also see SCOUT.ZIP. - Security

Associated article: The SecureScout Wi-Fi Security & Monitoring Framework

Tags: Security          Mobile    





Video