Tag Archive: Secure Communication

Alpine Linux

Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/17/alpine-linux/

nogotofail

Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in a flexible, scalable, powerful way. It includes testing for common SSL certificate verification issues, HTTPS and TLS/SSL library bugs, SSL and STARTTLS stripping issues, cleartext issues, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/07/nogotofail/

Link

SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme.
It is charged up with penetration testing tools and other useful applications for general purposes.

http://seanux.sea.sy/#download

Permanent link to this article: http://www.darknessgate.com/2014/11/02/seanux/

Cryptography

This class teaches the theory, foundations and applications of modern cryptography. In particular, we treat cryptography from a complexity-theoretic viewpoint. In recent years, researchers have found many practical applications for these theoretical results, and so we will also discuss their impact along the way and how one may use the theory to design secure systems. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/30/cryptography/

Cryptography from Fachbereich Informatik

This lecture deals with the following cryptographic topics: Cryptographic Foundations (security goals, historical ciphers, AES, a sketch of RSA) Foundations of information theory (terms, probability theory, Shannon’s theorem) Entropy Design principles of cryptographic hash functions Pseudo random number generators and stream ciphers A sketch of elliptic curve cryptography Quantum cryptography Implementation issues (efficiency, obfuscation) https://www.fbi.h-da.de/organisation/personen/baier-harald/teaching/lectures-summer-term-2012/cryptography.html  

Permanent link to this article: http://www.darknessgate.com/2014/09/25/cryptography-fachbereich-informatik/

Link

http://www.cs.sfu.ca/CourseCentral/404/abulatov/

Permanent link to this article: http://www.darknessgate.com/2014/09/20/cryptography-protocols-spring-2014/

Introduction to Computer Networking

This course provides an introduction to fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics to be covered include: overview of  network architectures, applications (HTTP, FTP), network programming interfaces (e.g., sockets), transport (TCP, UDP), flow control, congestion control, IP, routing , IPv6, multicast, data link protocols, error-detection/correction, multiple …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/introduction-computer-networking/

Networks and Protocols

The course discusses computer network and network protocols in some depth in order to enable students to understand the core issues involved in network protocol design. The fundamental algorithms and principles are explained in the context of existing IEEE / Internet protocols in order to demonstrate how fundamental principles are applied in real-world protocols. This …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/networks-protocols/

Audio/Video Recordings about Wireless and Mobile Networking

CSE574:Wireless and Mobile Networks (2010) – Podcasts available: (2008, 2006 also available) Course Overview | Wireless Networking: Issues and Trends | Wireless Physical Layer Concepts: Part I, Part II, Part III | Wireless Local Area Networks: Part I, Part II | Wireless Personal Area Networks: Part I, Part II | Wireless Metropolitan Area Networks: Part …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/audiovideo-recordings-wireless-mobile-networking/

Security Protocols (Advanced Topics in Cryptology)

This course will cover some of the latest cryptographic techniques for security protocols. This course intends to stimulate students in their own research – improve their ability of extracting, presenting, and discussing results from recent papers on a certain topic and try to extend/improve them. Course Outline Basics in cryptology – cryptosystems, digital signatures, (keyed) …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/10/security-protocols-advanced-topics-cryptology/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

Page 3 of 41234