It's easy to be cheesy, when writing a long piece or just writing for a long period of time, the tendency to get lazy appears. Resist the temptation.
Gal
If you flatter and fawn upon your potential audience, I might add, you are patronizing them and insulting them. By the same token, if I write an article and I quote somebody and for space reasons put in an ellipsis like this (…), I swear on my children that I am not leaving out anything that, if quoted in full, would alter the original meaning or its significance. Those who violate this pact with readers or viewers are to be despised.
Christopher Hitchens, a controversial commentator and writer, in a scathing piece on yet another, even more controversial filmmaker.
October 23, 2008
August 02, 2008
History of Computer Security project
Here are some of the classic papers in computer security from the 1970s and early 1980s.
http://seclab.cs.ucdavis.edu/projects/history/seminal.html
Is there much new under the sun or are we just repeating old mistakes we learned about 20-30 years ago?
Hmmm...
Gal
http://seclab.cs.ucdavis.edu/projects/history/seminal.html
Is there much new under the sun or are we just repeating old mistakes we learned about 20-30 years ago?
Hmmm...
Gal
July 08, 2008
Great Research on P2P takedown notices
http://dmca.cs.washington.edu/ is the site for the research into the credibility of some takedown notices for alleged copyright violations enabled by P2P such as BitTorrent.
The alarming, yet sadly unsurprising highlights, from the overview page:
The alarming, yet sadly unsurprising highlights, from the overview page:
- Practically any Internet user can be framed for copyright infringement today.
By profiling copyright enforcement in the popular BitTorrent file sharing system, we were able to generate hundreds of real DMCA takedown notices for computers at the University of Washington that never downloaded nor shared any content whatsoever.Further, we were able to remotely generate complaints for nonsense devices including several printers and a (non-NAT) wireless access point. Our results demonstrate several simple techniques that a malicious user could use to frame arbitrary network endpoints.
Subscribe to:
Posts (Atom)