| |
|
FileSystemWatcher Class (System.IO) .NET |
|
|
Topic: Technology |
12:31 am EDT, Apr 10, 2006 |
FileSystemWatcher Class Listens to the file system change notifications and raises events when a directory, or file in a directory, changes.
FileSystemWatcher Class (System.IO) .NET |
|
Keying Hash Functions for Message Authentication |
|
|
Topic: Technology |
12:25 am EDT, Apr 10, 2006 |
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many Internet applications and protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the un- derlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. In addition our schemes are efficient and practical. Their performance is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported.
Keying Hash Functions for Message Authentication |
|
How To: Hash Data with Salt (C#/VB.NET) |
|
|
Topic: Technology |
11:41 pm EDT, Apr 9, 2006 |
How To: Hash Data with Salt (C#/VB.NET) The code below demonstrates how to hash data and verify hashes. It supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashing algorithms. To help reduce the risk of dictionary attacks, the code appends random bytes (so-called "salt") to the original plain text before generating hashes. Please keep in mind that salt can only help against prebuilt dictionaries. If an intruder gets access to your system and uses a brute force attack, salt will not provide much value. Code samples are provided in C# and Visual Basic.NET. IMPORTANT: DATA HASHES CANNOT BE "DECRYPTED" BACK TO PLAIN TEXT.
How To: Hash Data with Salt (C#/VB.NET) |
|
Zimbra - Blog - A Pint of ALE - Ajax Linking and Embedding |
|
|
Topic: Technology |
7:23 pm EDT, Apr 9, 2006 |
A Pint of ALE - Ajax Linking and Embedding Recently I had to write a document which required the inclusion of some images, a chart, and a few drawings in the text - something that modern word processors allow you to simply and readily do. In fact, the ability to embed and edit rich content directly in a document is actually a pretty handy and powerful feature; arguably one of the more important and enabling features of modern day office suites, such as OpenOffice and Microsoft Office.What is really nice is that the embedded content is saved along with the enclosing document. So for example, if I email a document to a colleague, then the embedded objects I have included into the document follow it to their destination. This embedding capability has traditionally been enabled by leveraging component object models such as Microsoft’s COM/DCOM or IBM’s DSOM and has been the domain of fat desktop applications and office suites.
Zimbra - Blog - A Pint of ALE - Ajax Linking and Embedding |
|
THE IRAN PLANS: Would President Bush go to war to stop Tehran from getting the bomb? |
|
|
Topic: Current Events |
12:01 pm EDT, Apr 9, 2006 |
There is a Cold War precedent for targeting deep underground bunkers with nuclear weapons. In the early nineteen-eighties, the American intelligence community watched as the Soviet government began digging a huge underground complex outside Moscow. Analysts concluded that the underground facility was designed for “continuity of government”—for the political and military leadership to survive a nuclear war. (There are similar facilities, in Virginia and Pennsylvania, for the American leadership.) The Soviet facility still exists, and much of what the U.S. knows about it remains classified. “The ‘tell’ ”—the giveaway—“was the ventilator shafts, some of which were disguised,” the former senior intelligence official told me. At the time, he said, it was determined that “only nukes” could destroy the bunker. He added that some American intelligence analysts believe that the Russians helped the Iranians design their underground facility. “We see a similarity of design,” specifically in the ventilator shafts, he said.
Its a little off topic but wow, this is under Ramenki, the neighborhood where I lived in southwest Moscow. There are air ducts popping up everywhere, entrances into sides of hills (now converted into a private auto repair shop), and supposedly you could fit 50,000 people down there for a long time, and deliver them there from Moscow's 'Metro 2', the government system that runs in parallel to the main metro. There's very little english press coverage of this. THE IRAN PLANS: Would President Bush go to war to stop Tehran from getting the bomb? |
|
In Ancient Document, Judas, Minus the Betrayal - New York Times |
|
|
Topic: Miscellaneous |
12:36 pm EDT, Apr 7, 2006 |
An early Christian manuscript, including the only known text of the Gospel of Judas, has surfaced after 1,700 years, and it portrays Judas Iscariot not as a betrayer of Jesus but as his favored disciple and willing collaborator.
This is some Davinci Code shit here. Crazy. In Ancient Document, Judas, Minus the Betrayal - New York Times |
|
Me and Bo Jackson, Eatin Chicken! |
|
|
Topic: Recreation |
11:53 pm EDT, Apr 6, 2006 |
ME: Where did you get that water? I'm thirsty. COLLEEN: I got it from Bo Jackson. ME: There ain't no Bo Jackson here. COLLEEN: Follow me. ME: Bo Jackson was my hero. (follows) COLLEEN: Bo, this guy is thirsty and you're his hero. ME: (wide eyes, open mouth) BO: Boy, are you too scared to ask Bo Jackson for some water? ME: Can I have some water? BO: Yeah, get you a water. ME: (gets water) Bo, you were my biggest hero, I had the Nike posted with the bat and the baseball pads (motions as though bat is behind head) and your baseball cards and your football cards and... BO: (nodding) Try some of Bo Jackson's chicken. ME: Oh, uhhh... I just ate. No thanks. BO: Boy, you gonna drink Bo Jackson's water but you won't try Bo Jackson's chicken!? ME: Oh, yes sir. (tries chicken) EXEC DUDE: How is it? ME: Really good! (and it was) COLLEEN: Picture time! BO: Right answer. You just earned yourself a picture with Bo! BO AND ME: (smile) Me and Bo Jackson, Eatin Chicken! |
|
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition - Day Three |
|
|
Topic: Technology |
6:24 pm EST, Mar 31, 2006 |
To keep the games interesting, and provide a bit of a educational anomaly, the Red Team had done what any criminal hacker would consider — they broke into the teams’ pods and installed backdoors. Using only the light from a glow stick (the hotel they were staying at didn't have any flashlights), they found a ladder, climbed up the outside of the room (12 foot ceilings), pulled back a drop ceiling tile, and climbed down a wooden rod they collected from nearby. With physical access granted, the Red Team went to town.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition - Day Three |
|
NATIONAL JOURNAL: Insulating Bush (03/30/2006) |
|
|
Topic: Society |
6:08 am EST, Mar 31, 2006 |
Karl Rove, President Bush's chief political adviser, cautioned other White House aides in the summer of 2003 that Bush's 2004 re-election prospects would be severely damaged if it was publicly disclosed that he had been personally warned that a key rationale for going to war had been challenged within the administration. Rove expressed his concerns shortly after an informal review of classified government records by then-Deputy National Security Adviser Stephen J. Hadley determined that Bush had been specifically advised that claims he later made in his 2003 State of the Union address -- that Iraq was procuring high-strength aluminum tubes to build a nuclear weapon -- might not be true, according to government records and interviews.
NATIONAL JOURNAL: Insulating Bush (03/30/2006) |
|
Georgia Civil Procedure Flowchart |
|
|
Topic: Technology |
5:41 am EST, Mar 31, 2006 |
This is a more detailed flowchart for Georgia civil procedure that I was working on. Would be a good starting point for anyone who intended to work on Hammurabi. Georgia Civil Procedure Flowchart |
|