ware.zintegra.com
algorithm – Ware
http://ware.zintegra.com/tag/algoritmo
DVDFab Passkey 8.2.1.7. DVDFab Passkey 8.2.1.7. This is why DVDFab.com is down the actual injunction. Posted at 12 March 2014 15:44 CET by Jan Willem Aldershoff. That the DVDFab.com. As DVDFab is in China the company is currently coping well, their website is still available. Through other domain names and orders are processed as usual. DVDFab sees Facebook page removed, launchesIlikeDVDFab.com. Posted at 12 March 2014 17:41 CET by Jan Willem Aldershoff. Http:/ en.dvdfab.cn/download.htm. Of a rectangular...
jessekornblum.livejournal.com
A Geek Raised by Wolves
http://jessekornblum.livejournal.com/tag/hashing
A Geek Raised by Wolves. Aug 7th, 2013 10:01 am. NIST will eventually make a decision about these trade offs and declare one (or more) standard versions of SHA-3 in a Federal Information Processing Standard (FIPS). When that document is released, I can get to work making a sha3deep [2]. The NIST standardization process is not opaque! 1] http:/ csrc.nist.gov/groups/ST/hash/s. 2] There is some experimental SHA-3 code in the Hashdeep git repo now, but you don't want to use it. Beta version of ssdeep 2.10.
math270.blogspot.com
Math/Sec 270: November 2008
http://math270.blogspot.com/2008_11_01_archive.html
For students of Math/Sec 270 at John Jay College. Sunday, November 30, 2008. Sorry for the late post. Here is the code we were playing around with in class:. Posted by Jamie Levy. A Sixty-Eight Year Old Code. Since we were talking about cyphers and such, I thought you might like this blogpost about WWII German espionage code. Posted by Jamie Levy. Monday, November 24, 2008. I thought you guys might like this blogpost. Posted by Jamie Levy. Monday, November 17, 2008. An Overview of Cryptography. Unfortuna...
jessekornblum.com
Jesse Kornblum - Presentations
http://www.jessekornblum.com/presentations
Social Computing: Enterprise Initiatives and Security Challenges. Panel Discussion, Cyber Summit USA, 2014, with James C. Foster, Chris Coleman, Paul Moreno, Dr. Parag Pruthi, Dr. Richard White. Approximate Matching of Digital Artifacts. Panel Discussion, Digital Forensic Research Workshop 2013, with Frank Breitinger, Simson Garfinkel, Clay Shields, and Candice Quates. Is Digital Forensics an Art or a Science. The NSRLquery Project and Making the NSRL Practical. San Francisco Bay Area DFIR, March 2013.
owasp.org
OWASP File Hash Repository - OWASP
https://www.owasp.org/index.php/OWASP_File_Hash_Repository
OWASP File Hash Repository. Simply put, FHR is a repository of hashes of files. But the idea is to go beyond just keeping a list of hashes: I want the repository to indicate when the file in question is (part of) a malware or when a file is recognized as benign. Thus, anyone could see the hash of a file to see if it corresponds to a malware file or an already known good file. Aren't there already other sources for this information? SANS Institute's hash database. We intend to develop clients to the FHR d...
rundt.com
Rundt.com - Links
http://www.rundt.com/en/info/links
Australien / Singapur (10/2008). Washington D.C. (02/2008). Mexiko, Guatemala and Belize (09/2007). Dallas, USA (06/2007). Vietnam and Kambodscha (03/2006). Südliches Afrika (09/2003). Photo of the Month. Compliance / Forensische Dienstleistungen. Travel links / Reiselinks. Compliance / Forensische Dienstleistungen. IT Compliance Systeme GmbH. Links zur Programmierung mit Delphi. Viele Komponenten, oftmals mit Sourcecodes. Viele Komponenten und Tipps. Links to computer forensic resources.
usacfits.org
Digital Forensics
http://www.usacfits.org/index.php/it-security-links/digital-forensics-websites
NIST's National Software Reference Library. Systematic Approaches to Digital Forensic Engineering (SADFE). Monday the 5th. QualityJoomlaTemplates. USA School of Computing. Shelby Hall, Suite 2101. Mobile, Alabama 36688-0002.
anjackson.net
Let Them Emulate!
http://anjackson.net/2015/05/08/let-them-emulate
On the first day of the IIPC GA 2015. The morning keynote was Digital Vellum: Interacting with Digital Objects Over Centuries. Presented by Vint Cerf. This included some more details and demonstrations of the proposed preservation solution I blogged about before. So I thought it was worth returning to the subject now that I know a little more about it. Certainly, the Olive Executable Archive. Specifically, in terms of overall architecture, Olive is very similar to the KEEP Emulation Framework. That can r...
nist.gov
Best Practices in Cyber Supply Chain Risk Management, October 1-2, 2015
http://www.nist.gov/itl/csd/best-practices-in-cyber-supply-chain-risk-management-october-1-2-2015.cfm
Take a sneak peek at the new NIST.gov and let us know what you think! Please note: some content may not be complete on the beta site.). View the beta site. Skip to main content. Please enter your search term(s). Digital Library of Math Functions. Guide to Available Math Software. ANSI Accredited Standards Dev. Anthropometric Data of Children. Dictionary of Algorithms and Data. Fortran Interface to Open GL. National Software Reference Library. Best Practices in Cyber Supply Chain Risk Management. Roadmap ...