Psk

pliki, linki

probabilistic programming languages

algorithm resistance to hardware failures
- some esoteric programming languages enoforcing such features on programmer:
(Nondeterministic programming languages)
http://p-nand-q.com/humor/programming_languages/java2k.html

nonrelational bases, alternative programming languages approaches etc.

even: *Redundancy control"
Failiers in Data storage -> Data integrity risk -> many frameworks not able to hold it -> example: RDB
http://www.readwriteweb.com/enterprise/2009/02/is-the-relational-database-doomed.php
Non relational:
http://hypertable.org/
http://labs.google.com/papers/bigtable.html
http://couchdb.apache.org/ ( programming languages ! Erlang : http://erlang.org/ , http://pl.wikipedia.org/wiki/Erlang_(język_programowania) )

Hash

http://en.wikipedia.org/wiki/Cryptographic_hash_function

Cracking hashes and not only

http://project-rainbowcrack.com/

Data safety during processing

http://keepass.info/features.html (" In-Memory Passwords Protection " )

Cloud computing threats

"Researchers find a new way to attack the cloud"
http://www.computerworld.com/s/article/9137507/Researchers_find_a_new_way_to_attack_the_cloud

SSL

SSL hijack

hijack SSL connection
http://www.komodia.com/index.php?page=ssl.html

SSH / SSL MITM

SSH MITM (Man in the middle) and Injection attack as example of vulnerabilities of not well designed systems using crypto:
3.10. Threats SSH Can Counter -> 3.10.5. The Insertion Attack
2009-11-ssh-injection
SSH opens computers to attack
SSH glitch gives 'skeleton key' to networks
Chink in encryption armour discovered
Researcher discovers OpenSSH flaw
How to hijack an already running X11 application via ssh -X?
ssh: unprivileged users may hijack forwarded X connections by listening on port 6010
OpenSSH sshd session hijacking (41438)

O ile nie zaznaczono inaczej, treść tej strony objęta jest licencją Creative Commons Attribution-ShareAlike 3.0 License