UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
Meta
Daily Archives: February 10, 2008
MySpace Bug Leaks Private Teen Photos
Despite assurances from MySpace that photos in private profiles can only be seen by people on a user’s friends list, its web architecture has failed to enforce this. Info about a backdoor has been disclosed and made publicly available on … Continue reading
Posted in Miscellaneous
Comments Off on MySpace Bug Leaks Private Teen Photos
Security Review: CAPTCHA Systems
Summary A CAPTCHA System is a Completely Automatic Public Turing Test to Tell Computers and Humans Apart. Initially developed by Carnegie Mellon researchers, this system was mean to differentiate between actual people and automated robots when it comes to opening … Continue reading
Posted in Security Reviews
4 Comments
Security Review: Quiet Care
Home monitoring systems like Quiet Care exist to allow independent living for elderly people. The system works by monitoring the person’s daily movements with wireless activity sensors in each room. The information collected from these sensors is gathered at a … Continue reading
Posted in Availability, Privacy, Security Reviews
5 Comments
Security Review: Wireless Classroom Question / Answer Systems
Summary In many of today’s college classrooms, especially introductory science classes, the large majority of students often makes it difficult to gauge classroom participation. A solution used in many of the lab science introductory sequences at the University of Washington … Continue reading
Posted in Security Reviews
2 Comments
Security Review: CyberLocks
At its essence CyberLocks are like mechanical locks++, enabling you to bring intelligent electronic access control to even the padlock level. CyberLock cylinders, which cannot be picked and maintain an audit trail of usage, can replace virtually any traditional lock … Continue reading
Posted in Physical Security, Security Reviews
2 Comments
OpenBSD Refuses to Fix Pseudo-Random Number Generator Weakness
According to an article from Slashdot, a serious weakness in the random number generator provided by OpenBDS has been found. It is apparently also used in several other BSD operating systems. Some of them has released a fix or are … Continue reading
Posted in Current Events
Comments Off on OpenBSD Refuses to Fix Pseudo-Random Number Generator Weakness
User-agent-enhanced Websites
Gradually over the year of 2007, I’ve been turning to Google to help me get through sticky problems with open-ended programming projects. As I’ve moved from Java to actual implementable languages such as Python and C#, I’ve found that more … Continue reading
Posted in Miscellaneous, Security Reviews
Tagged , experts exchange, googlebot, user-agent
2 Comments
Windows 3.1-XP Password Hashing Review
Windows systems like many other operating systems hash passwords instead of keeping them clear text in the event an attacker ever gets a hold of authentication data. Microsoft first developed the Lanman (LM) password hashing scheme in Windows for Workgroups … Continue reading
Posted in Security Reviews
Comments Off on Windows 3.1-XP Password Hashing Review
Security Review: Deep Siren
According to Scientific American, the US Navy is considering to deploy a new technology, Deep Siren, to improve communication to and from submerged submarines. As of now, submarines have to be no deeper than 60 feet and towing a floating … Continue reading
Posted in Integrity, Physical Security, Privacy, Security Reviews
Tagged , Deep Siren, Navy, NSA, reverse engineering, submarines
Comments Off on Security Review: Deep Siren
Security Review: GM Onstar
GM’s OnStar service has been a sucess for several years now. It gives many services to people with GM vehicles. It provides some very powerful features such as GPS tracking, stolen vehicle slowdown, remote unlock and emergency services. However the … Continue reading