UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
March 2026 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Meta
Author Archives: nekret
DVD Jon’s DoubleTwist
Jon Johansen (known for his work in defeating CSS in DVDs) has recently released an application known as DoubleTwist. DoubleTwist is designed to defeat Apple’s FairPlay DRM by playing the track’s in fast forward and capturing the analog signal as … Continue reading
Posted in Current Events
3 Comments
Windows 3.1-XP Password Hashing Review
Windows systems like many other operating systems hash passwords instead of keeping them clear text in the event an attacker ever gets a hold of authentication data. Microsoft first developed the Lanman (LM) password hashing scheme in Windows for Workgroups … Continue reading
Posted in Security Reviews
Comments Off on Windows 3.1-XP Password Hashing Review
Obtaining HFS Master Keys
Despite the huge cost of “missing” master keys, HFS (Housing and Food Services) continues to use easily produced staff ID cards to prove the identity of their employees. This vulnerability in the key checkout procedure could allow anyone with access to a card printer or even a lamination machine to obtain not just one master key for an individual residence hall but all master keys for every hall. Continue reading
Posted in Physical Security, Security Reviews
1 Comment