Create an Account
username: password:
 
  MemeStreams Logo

Lost's MemeStream

search

Lost
Picture of Lost
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Lost's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

HMAC Class (System.Security.Cryptography) for .NET
Topic: Technology 3:01 am EDT, Apr 10, 2006

Note: This class is new in the .NET Framework version 2.0.

Represents the abstract class from which all implementations of Hash-based Message Authentication Code (HMAC) must derive.

HMAC Class (System.Security.Cryptography) for .NET


HMac (GNU cryptographic primitives and tools, version 2.0.0)
Topic: Technology 3:00 am EDT, Apr 10, 2006

public class HMac
extends BaseMac

The implementation of the HMAC (Keyed-Hash Message Authentication Code).

HMAC can be used in combination with any iterated cryptographic hash function. HMAC also uses a secret key for calculation and verification of the message authentication values. The main goals behind this construction are

* To use, without modifications, available hash functions. In particular, hash functions that perform well in software, and for which code is freely and widely available.
* To preserve the original performance of the hash function without incurring a significant degradation.
* To use and handle keys in a simple way.
* To have a well understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assumptions on the underlying hash function.
* To allow for easy replaceability of the underlying hash function in case that faster or more secure hash functions are found or required.

HMac (GNU cryptographic primitives and tools, version 2.0.0)


How to: Monitor File System Changes in .NET
Topic: Technology 12:31 am EDT, Apr 10, 2006

How to: Monitor File System Changes

The following code example uses FileSystemWatcher to register for events corresponding to files being created, changed, deleted, or renamed. Instead of periodically polling a directory for changes to files, you can use the FileSystemWatcher class to fire events when a change is detected.

How to: Monitor File System Changes in .NET


FileSystemWatcher Class (System.IO) .NET
Topic: Technology 12:31 am EDT, Apr 10, 2006

FileSystemWatcher Class

Listens to the file system change notifications and raises events when a directory, or file in a directory, changes.

FileSystemWatcher Class (System.IO) .NET


Keying Hash Functions for Message Authentication
Topic: Technology 12:25 am EDT, Apr 10, 2006

The use of cryptographic hash functions like MD5 or SHA for message authentication has
become a standard approach in many Internet applications and protocols. Though very easy to
implement, these mechanisms are usually based on ad hoc techniques that lack a sound security
analysis.
We present new constructions of message authentication schemes based on a cryptographic
hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the un-
derlying hash function has some reasonable cryptographic strengths. Moreover we show, in a
quantitative way, that the schemes retain almost all the security of the underlying hash function.
In addition our schemes are efficient and practical. Their performance is essentially that of the
underlying hash function. Moreover they use the hash function (or its compression function) as
a black box, so that widely available library code or hardware can be used to implement them
in a simple way, and replaceability of the underlying hash function is easily supported.

Keying Hash Functions for Message Authentication


How To: Hash Data with Salt (C#/VB.NET)
Topic: Technology 11:41 pm EDT, Apr  9, 2006

How To: Hash Data with Salt (C#/VB.NET)

The code below demonstrates how to hash data and verify hashes. It supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashing algorithms. To help reduce the risk of dictionary attacks, the code appends random bytes (so-called "salt") to the original plain text before generating hashes. Please keep in mind that salt can only help against prebuilt dictionaries. If an intruder gets access to your system and uses a brute force attack, salt will not provide much value. Code samples are provided in C# and Visual Basic.NET. IMPORTANT: DATA HASHES CANNOT BE "DECRYPTED" BACK TO PLAIN TEXT.

How To: Hash Data with Salt (C#/VB.NET)


Zimbra - Blog - A Pint of ALE - Ajax Linking and Embedding
Topic: Technology 7:23 pm EDT, Apr  9, 2006

A Pint of ALE - Ajax Linking and Embedding

Recently I had to write a document which required the inclusion of some images, a chart, and a few drawings in the text - something that modern word processors allow you to simply and readily do. In fact, the ability to embed and edit rich content directly in a document is actually a pretty handy and powerful feature; arguably one of the more important and enabling features of modern day office suites, such as OpenOffice and Microsoft Office.What is really nice is that the embedded content is saved along with the enclosing document. So for example, if I email a document to a colleague, then the embedded objects I have included into the document follow it to their destination. This embedding capability has traditionally been enabled by leveraging component object models such as Microsoft’s COM/DCOM or IBM’s DSOM and has been the domain of fat desktop applications and office suites.

Zimbra - Blog - A Pint of ALE - Ajax Linking and Embedding


A Student-Hacker Showdown at the Collegiate Cyber Defense Competition - Day Three
Topic: Technology 6:24 pm EST, Mar 31, 2006

To keep the games interesting, and provide a bit of a educational anomaly, the Red Team had done what any criminal hacker would consider — they broke into the teams’ pods and installed backdoors. Using only the light from a glow stick (the hotel they were staying at didn't have any flashlights), they found a ladder, climbed up the outside of the room (12 foot ceilings), pulled back a drop ceiling tile, and climbed down a wooden rod they collected from nearby. With physical access granted, the Red Team went to town.

A Student-Hacker Showdown at the Collegiate Cyber Defense Competition - Day Three


Georgia Civil Procedure Flowchart
Topic: Technology 5:41 am EST, Mar 31, 2006

This is a more detailed flowchart for Georgia civil procedure that I was working on. Would be a good starting point for anyone who intended to work on Hammurabi.

Georgia Civil Procedure Flowchart


Russian Software Developer Beats Pirate in Boxing Ring - NEWS - MOSNEWS.COM
Topic: Technology 4:47 am EST, Mar 25, 2006

An employee of Cognitive Technologies computer company has beaten a man who was selling the company’s software illegally.Manager of the company’s software department, Andrei Smirnov, offered to fight the dealer in a fitness center. He defeated the computer pirate 24-16 in three rounds, lasting three minutes each. The dealer’s name was not revealed, News.Ru web edition on high technologies reported on Thursday.In February, Smirnov saw the dealer selling CDs with his company’s software at a computer market without a license. Smirnov demanded that the dealer stop the illegal sale. A scuffle broke out, but they were stopped by the guard. After that, the pirate expressed a wish to continue the fight in the street, but Smirnov suggested a fitness center.

The Garbuska LIVES!

Russian Software Developer Beats Pirate in Boxing Ring - NEWS - MOSNEWS.COM


(Last) Newer << 64 ++ 74 - 75 - 76 - 77 - 78 - 79 - 80 - 81 - 82 ++ 92 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0