Topic: Computing/Computer Security

You are looking at all articles with the topic "Computing/Computer Security". We found 21 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Port Knocking

πŸ”— Computing πŸ”— Computing/Computer Security πŸ”— Computing/Networking

In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s). A variant called single packet authorization (SPA) exists, where only a single "knock" is needed, consisting of an encrypted packet.

The primary purpose of port knocking is to prevent an attacker from scanning a system for potentially exploitable services by doing a port scan, because unless the attacker sends the correct knock sequence, the protected ports will appear closed.

Discussed on

πŸ”— Zooko's Triangle

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Computing/Software πŸ”— Computing/Computer science πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Computing/Computer Security

Zooko's triangle is a trilemma of three properties that are generally considered desirable for names of participants in a network protocol:

  • Human-meaningful: Meaningful and memorable (low-entropy) names are provided to the users.
  • Secure: The amount of damage a malicious entity can inflict on the system should be as low as possible.
  • Decentralized: Names correctly resolve to their respective entities without the use of a central authority or service.

Discussed on

πŸ”— Scunthorpe Problem

πŸ”— Internet πŸ”— Computing πŸ”— Internet culture πŸ”— Freedom of speech πŸ”— Computing/Software πŸ”— Computing/Computer Security πŸ”— Popular Culture πŸ”— Lincolnshire

The Scunthorpe problem is the unintentional blocking of websites, e-mails, forum posts or search results by a spam filter or search engine because their text contains a string of letters that appear to have an obscene or otherwise unacceptable meaning. Names, abbreviations, and technical terms are most often cited as being affected by the issue.

The problem arises since computers can easily identify strings of text within a document, but interpreting words of this kind requires considerable ability to interpret a wide range of contexts, possibly across many cultures, which is an extremely difficult task. As a result, broad blocking rules may result in false positives affecting innocent phrases.

Discussed on

πŸ”— Fork Bomb

πŸ”— Computing πŸ”— Computing/Computer Security

In computing, a fork bomb (also called rabbit virus or wabbit) is a denial-of-service attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation.

Discussed on

πŸ”— Y Combinator cofounder was convicted under CFAA in 1990

πŸ”— Biography πŸ”— Computing πŸ”— Business πŸ”— Biography/science and academia πŸ”— New York (state) πŸ”— Criminal Biography πŸ”— Computing/Computer Security πŸ”— New Jersey πŸ”— New York (state)/Cornell University πŸ”— Computing/Networking

Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet.

Morris was prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act. He went on to co-found the online store Viaweb, one of the first web-based applications, and later the funding firm Y Combinatorβ€”both with Paul Graham.

He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006. He was elected to the National Academy of Engineering in 2019.


Discussed on

πŸ”— NOBUS (Nobody but Us)

πŸ”— Computing πŸ”— Computing/Computer hardware πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Computing/Software πŸ”— Military history/Intelligence πŸ”— Computing/Computer Security πŸ”— Computing/Networking

NOBUS ("nobody but us") are security vulnerabilities which the United States National Security Agency (NSA) believes that only it can exploit. As such, NSA sometimes chooses to leave such vulnerabilities open if NSA finds them, in order to exploit them against NSA's targets. More broadly, it refers to the notion that some signals intelligence capabilities are so powerful or otherwise inaccessible that only the NSA will be able to deploy them, though recent analyses suggest that this advantage may be under stress.

Discussed on

πŸ”— Namecoin

πŸ”— Computing πŸ”— Computing/Software πŸ”— Numismatics πŸ”— Software πŸ”— Software/Computing πŸ”— Numismatics/Cryptocurrency πŸ”— Cryptocurrency πŸ”— Computing/Computer Security

Namecoin (Symbol: β„• or NMC) is a cryptocurrency originally forked from bitcoin software. It is based on the code of bitcoin and uses the same proof-of-work algorithm. Like bitcoin, it is limited to 21 million coins.

Namecoin can store data within its own blockchain transaction database. The original proposal for Namecoin called for Namecoin to insert data into bitcoin's blockchain directly. Anticipating scaling difficulties with this approach, a shared proof-of-work (POW) system was proposed to secure new cryptocurrencies with different use cases.

Namecoin's flagship use case is the censorship-resistant top level domain .bit, which is functionally similar to .com or .net domains but is independent of ICANN, the main governing body for domain names.

Discussed on

πŸ”— BonziBuddy

πŸ”— Internet πŸ”— Computing πŸ”— Marketing & Advertising πŸ”— Computing/Software πŸ”— Computing/Computer Security

BonziBuddy, stylized as BonziBUDDY, (pronounced BON-zee-bud-ee) was a freeware desktop virtual assistant made by Joe and Jay Bonzi. Upon a user's choice, it would share jokes and facts, manage downloading using its download manager, sing songs, and talk, among other functions.

The software used Microsoft Agent technology similar to Office Assistant, and originally sported Peedy, a green parrot and one of the characters available with Microsoft Agent. Later versions of BonziBuddy in May 2000 featured its own character: Bonzi, the purple gorilla. The program also used a text to speech voice to interact with the user. The voice was called Sydney and taken from an old Lernout & Hauspie Microsoft Speech API 4.0 package. It is often referred to in some software as Adult Male #2.

Some versions of the software were described as spyware and adware. BonziBuddy was discontinued in 2004 after the company behind it faced lawsuits regarding the software and was ordered to pay fines. Bonzi's website remained open after the discontinuation of BonziBuddy and was said to be a virus, but was shut down at the end of 2008.

Discussed on

πŸ”— Homomorphic encryption

πŸ”— Computing πŸ”— Mathematics πŸ”— Computing/Software πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Computing/Computer Security

Homomorphic encryption is a form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext.

Homomorphic encryption can be used for privacy-preserving outsourced storage and computation. This allows data to be encrypted and out-sourced to commercial cloud environments for processing, all while encrypted. In highly regulated industries, such as health care, homomorphic encryption can be used to enable new services by removing privacy barriers inhibiting data sharing. For example, predictive analytics in health care can be hard to apply due to medical data privacy concerns, but if the predictive analytics service provider can operate on encrypted data instead, these privacy concerns are diminished.

Discussed on

πŸ”— Crypto-Anarchism

πŸ”— Mass surveillance πŸ”— Computing πŸ”— Internet culture πŸ”— Philosophy πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Numismatics πŸ”— Sociology πŸ”— Numismatics/Cryptocurrency πŸ”— Computing/Computer Security πŸ”— Philosophy/Anarchism πŸ”— Anarchism

Crypto-anarchism (or crypto-anarchy) is a political ideology focusing on protection of privacy, political freedom and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks.

By using cryptographic software, the association between the identity of a certain user or organization and the pseudonym they use is made difficult to find, unless the user reveals the association. It is difficult to say which country's laws will be ignored, as even the location of a certain participant is unknown. However, participants may in theory voluntarily create new laws using smart contracts or, if the user is pseudonymous, depend on online reputation.

Discussed on