pliki, linki
probabilistic programming languages
algorithm resistance to hardware failures
- some esoteric programming languages enoforcing such features on programmer:
(Nondeterministic programming languages)
http://p-nand-q.com/humor/programming_languages/java2k.html
nonrelational bases, alternative programming languages approaches etc.
even: *Redundancy control"
Failiers in Data storage -> Data integrity risk -> many frameworks not able to hold it -> example: RDB
http://www.readwriteweb.com/enterprise/2009/02/is-the-relational-database-doomed.php
Non relational:
http://hypertable.org/
http://labs.google.com/papers/bigtable.html
http://couchdb.apache.org/ ( programming languages ! Erlang : http://erlang.org/ , http://pl.wikipedia.org/wiki/Erlang_(język_programowania) )
Hash
http://en.wikipedia.org/wiki/Cryptographic_hash_function
Cracking hashes and not only
http://project-rainbowcrack.com/
Data safety during processing
http://keepass.info/features.html (" In-Memory Passwords Protection " )
Cloud computing threats
"Researchers find a new way to attack the cloud"
http://www.computerworld.com/s/article/9137507/Researchers_find_a_new_way_to_attack_the_cloud
SSL
SSL hijack
hijack SSL connection
http://www.komodia.com/index.php?page=ssl.html
SSH / SSL MITM
SSH MITM (Man in the middle) and Injection attack as example of vulnerabilities of not well designed systems using crypto:
3.10. Threats SSH Can Counter -> 3.10.5. The Insertion Attack
2009-11-ssh-injection
SSH opens computers to attack
SSH glitch gives 'skeleton key' to networks
Chink in encryption armour discovered
Researcher discovers OpenSSH flaw
How to hijack an already running X11 application via ssh -X?
ssh: unprivileged users may hijack forwarded X connections by listening on port 6010
OpenSSH sshd session hijacking (41438)