background preloader

Software Protection Initiative - Lightweight Portable Security

Software Protection Initiative - Lightweight Portable Security
15 June 2011: LPS-Remote Access was certified by AFNIC to connect to the GIG for general telecommuting use Lightweight Portable Security (LPS) creates a secure end node from trusted media on almost any Intel-based computer (PC or Mac). LPS boots a thin Linux operating system from a CD or USB flash stick without mounting a local hard drive. Administrator privileges are not required; nothing is installed. The LPS family was created to address particular use cases: LPS-Public is a safer, general-purpose solution for using web-based applications. LPS-Public allows general web browsing and connecting to remote networks. LPS differs from traditional operating systems in that it isn't continually patched. To get started, download an LPS-Public ISO image or LPS-Public Deluxe ISO image and burn it to a CD. Download the LPS-Public ISO image, version 1.5.6 (5 December 2014). Download the LPS-Public Deluxe ISO image, version 1.5.6 (5 December 2014). Read the LPS-Public Datasheet.

Password Safe Medical Coding News – Medical Coding and Billing News Updates @ Confidentialité et anonymat, pour tous et partout Tails est un système d'exploitation live, que vous pouvez démarrer, sur quasiment n'importe quel ordinateur, depuis une clé USB ou un DVD. Son but est de préserver votre vie privée et votre anonymat, et de vous aider à : utiliser Internet de manière anonyme et contourner la censure ; toutes les connexions sortantes vers Internet sont obligées de passer par le réseau Tor ; ne pas laisser de traces sur l'ordinateur que vous utilisez sauf si vous le demandez explicitement ; utiliser des outils de cryptographie reconnus pour chiffrer vos fichiers, emails et messagerie instantanée. En savoir plus sur Tails. Tails fait passer son trafic par le réseau Tor. Tails a reçu le prix Mozilla Open Source Support (2016), le prix Access Innovation (2014), le prix APC FLOSS (2014) et le prix OpenITP (2013).

research - The ASP.NET Vulnerability - POET attack - BEAST SSL/TLS attack Practical Padding Oracle Attacks This paper discusses how cryptography is misused in the security design of a large part of the Web. Our focus is on ASP.NET, the web application framework developed by Microsoft that powers 25% of all Internet web sites. We show that attackers can abuse multiple cryptographic design flaws to compromise ASP.NET web applications. We describe practical and highly efficient attacks that allow attackers to steal cryptographic secret keys and forge authentication tokens to access sensitive information. 2011 IEEE Symposium on Security and Privacy - Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET ekoparty 2010 slides - The ASP.NET Vulnerability At Eurocrypt 2002, Vaudenay introduced a powerful side-channel attack, which is called padding oracle attack, against CBC-mode encryption. WOOT'10 4th USENIX Workshop on Offensive Technologies Blackhat Europe 2010 slides Flickr's API Signature Forgery Vulnerability - Portable software for USB drives - Flock Subgraph OS and Mail Subgraph believes that the best way to empower people to communicate and live freely is to develop technology that is secure, free, open-source, and verifiably trustworthy. Subgraph OS is an important part of that vision. The Internet is a hostile environment, and recent revelations have made it more apparent than ever before that risk to every day users extends beyond the need to secure the network transport - the endpoint is also at risk. Subgraph OS was designed from the ground-up to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks. Subgraph OS is designed to be difficult to attack. Hardened Subgraph OS is based on a foundation designed to be resistant to attacks against operating systems and the applications they run. More Anonymized More Secure Communication More

Ultra High Security Password Generator If some device was not following the WiFi Alliance WPA specification by not hashing the entire printable ASCII character set correctly, it would end up with a different 256-bit hash result than devices that correctly obeyed the specification. It would then be unable to connect to any network that uses the full range of printable ASCII characters. Since we have heard unconfirmed anecdotal reports of such non-compliant WPA devices (and since you might have one), this page also offers "junior" WPA password strings using only the "easy" ASCII characters which even any non-fully-specification-compliant device would have to be able to properly handle. If you find that using the full random ASCII character set within your WPA-PSK protected WiFi network causes one of your devices to be unable to connect to your WPA protected access point, you can downgrade your WPA network to "easy ASCII" by using one of these easy keys. And don't worry for a moment about using an easy ASCII key.

ActivePrint Lite for iPhone, iPod touch, and iPad on the iTunes App Store - Flock Whonix - Anonymous Operating System pmcma OpenBox Service: GoodReader - Access, store, and share files with - Flock Description GoodReader is a high quality file viewing app for the iPhone. It supports viewing of PDF and txt files and offers PDF reflow and in-text search, among other features. To use GoodReader, download it from iTunes or the App Store on your iPhone. To upload files from GoodReader to Box, go to "My Documents" and click the "Actions" button. Screenshots

Software Protection Initiative - Lightweight Portable Security by sirchamallow Jul 26