由买买提看人间百态

topics

全部话题 - 话题: encryption
首页 上页 1 2 3 4 5 6 7 8 9 10 下页 末页 (共10页)
m********3
发帖数: 3280
1
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five
By Timothy B. Lee, Updated: June 10, 2013
If recent reports are to be believed, the National Security Agency has broad
powers to capture private information about Americans. They know who we’re
calling, they have access to our Gmail messages and AOL Instant Messenger
chats, and it’s a safe bet that they have other interception capabilities
that haven’t been publicly disclosed. Indeed, most mainstream
communications technologies are ... 阅读全帖
b********n
发帖数: 38600
2
http://www.forbes.com/sites/jameslyne/2014/05/29/open-source-cr
Encryption is a silent, unsung hero of our modern connected society . From
protecting your sensitive details when you log on to Internet banking to
protecting data on your laptop or mobile phone if it is lost or stolen, ‘
crypto’ (the oft used shortened version of encryption) is a supporting
pillar of the global economy and most of the digital world we all touch day
to day. Establishing trust in crypto (and thus in technology as a w... 阅读全帖
m*t
发帖数: 7490
3
来自主题: Military版 - 坑爹的GFW,无法用google
转:
谷歌打不开 google打不开,与中国大陆封杀有关,但是主要是因为最近google服务器
在全球范围内重新进行了布局调整。
解决办法是只要修改用户本地计算机hosts文件就可以了。
一、Windows系统修改hosts文件的方法
windows系统hosts文件在本地电脑C盘,路径是:C:WindowsSystem32driversetc
用记事本txt文件打开hosts文件。
(如果提示没有管理权限的话,可把hosts文件复制,粘贴到电脑的桌面。在电脑桌面
上双击hosts文件,用记事本打开,添加代码修改,保存,再把桌面上这个hosts文件复
制,粘贴到C:WindowsSystem32Driversetc 文件夹里,电脑提示“是否替换”,点击“
是”,替换原来的hosts文件。)
(如果没找到hosts文件,可在本帖末尾下载一个新hosts,复制到C:
WindowsSystem32Driversetc 文件夹里。)
在hosts文件中把鼠标光标移到最下面那行代码末尾,回车换行,再添加进如下代码(
代码前面不加 # ):
203.208.46.176 0-focus-open... 阅读全帖
w*********g
发帖数: 30882
4
预防网络珍珠港事件。
===========================================
战争临近?中国加紧对关键技术的控制
来源: 笨狼 于 2015-03-02 22:03:22 [档案] [博客] [旧帖] [给我悄悄话] 本文已被
阅读:377 次 (28513 bytes)
字体:调大/重置/调小 | 加入书签 | 打印 | 所有跟帖 | 加跟贴 | 当前最热讨论主题
近日流传美国对中国加紧对关键技术的控制反应强烈,这是一份总结:
2015.02.28观察者
奥巴马内阁要求中国取消银行业信息安全新规
我把纽约时报的原文附录在下。这报道是针对中国就银行技术设备的要求而言的,其中
引用的参考消息的报道在此:
2015.02.28参考消息
外媒:美施压中国银行业技术新规 却严审中国投资
英媒:欧美企业上书政府 吁阻止中国网络安全新规
港媒:中国投资者并购美国企业 受审查最多
外媒关注中国启动网络安全审查 美国早有先例
中国人占美投资移民申请近九成 投资超百亿美元
参考消息相关资料较齐全,一并附上,但不确定华尔街日报原文出处。
然而这只是中国政府的第一步。目前中国... 阅读全帖
g********2
发帖数: 6571
5
September 4, 2016
Analysis of FBI Reports: China more likely to have Hillary’s emails, not
Russia
By Richard Henry Lee
From an analysis of the FBI document dump (Part 1, Part 2) concerning
Hillary’s email use and her foreign travel schedule, it is apparent that
the Chinese are more likely to have gained access to Hillary’s emails than
Russia. Other countries would have had opportunities as well.
Hillary’s email server was most vulnerable from mid to late January to late
March 2009, when the emai... 阅读全帖
a**********t
发帖数: 631
6
来自主题: JobHunting版 - Security 面試問題
Let me try it one more time.
Both schemes have their pros and cons.
In the real word Signing is usually implemented with asymmetric key and
encryption (of large data) usually uses symmetric key.
The reason is that signing is usually performed on the hash of the message
only thus it can afford the low efficiency of asymmetric algorithm, while
encryption is performed on the entire message and symmetric algorithm is
much faster.
Signing after encryption
pro: the receiver of the message doesn't ha... 阅读全帖
w********2
发帖数: 632
7
Alert (TA13-207A)
Risks of Using the Intelligent Platform Management Interface (IPMI)
Original release date: July 26, 2013 | Last revised: October 07, 2016
Print Document
Tweet
Like Me
Share
Systems Affected
Any system connected to the internet running the Intelligent Platform
Management Interface (IPMI) may be affected. IPMI is resident on many server
platforms, and provides low-level access to a system that can override
operating system controls.
Overview
Attackers can easily identify and acce... 阅读全帖
c******a
发帖数: 4400
8
来自主题: Stock版 - 量子计算机是BitCoin的克星
早球的很,而且可以防范性更新
https://futurism.com/bitcoins-security-quantum-computers/
The researchers found that the application-specific integrated circuits (
ASICs) currently used by most cryptocurrency miners should be able to
maintain a speed advantage over quantum computers for the next 10 years, so
miners likely won’t be able to use quantum systems for nefarious purposes
in this manner for at least a decade.
While conventional computers don’t possess the necessary computational
power to derive a privat... 阅读全帖
M****e
发帖数: 3715
9
来自主题: Apple版 - Apple Q&A on Location Data
http://www.apple.com/pr/library/2011/04/27location_qa.html
Apple would like to respond to the questions we have recently received
about the gathering and use of location information by our devices.
1. Why is Apple tracking the location of my iPhone?
Apple is not tracking the location of your iPhone. Apple has never done
so and has no plans to ever do so.
2. Then why is everyone so concerned about this?
Providing mobile users with fast and accurate location information while
preserving their secu... 阅读全帖
r*****l
发帖数: 2859
10
来自主题: Java版 - how do u store secrets?
My JavaOne topic is about security :)
DBAs have to know the password to perform DB operations. This is no easy way
to go around DB passwords. If you really need security, you can split the
password to two or more parts and give each part to one or more person. No
one knows the complete password.
The general rule is: never store the encryption key/password with the
application and DB. The key should be stored in an isolated environment. You
only need to expose it when you start the application an... 阅读全帖
r*****l
发帖数: 2859
11
来自主题: Java版 - how do u store secrets?
My JavaOne topic is about security :)
DBAs have to know the password to perform DB operations. This is no easy way
to go around DB passwords. If you really need security, you can split the
password to two or more parts and give each part to one or more person. No
one knows the complete password.
The general rule is: never store the encryption key/password with the
application and DB. The key should be stored in an isolated environment. You
only need to expose it when you start the application an... 阅读全帖
L**********8
发帖数: 1349
12
https://encrypted-tbn3.gstatic.com/images?q=tbn:
ANd9GcQAO2El6NfDa4SNTvf6Qt96cgnbZKELUNagNddbxjcraE_nU2ZxxA
https://encrypted-tbn3.gstatic.com/images?q=tbn:
ANd9GcQrMLf0nTSmGKKZVeqzK3DxAiZIjOHG51s3hZnN5sKKpYrKaGVA
https://encrypted-tbn3.gstatic.com/images?q=tbn:
ANd9GcR73liQgcIiNkUcRTRvlKZEJ7C2eQa6I-3c04aHHR62VC4Ff39OAw
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcR092jzlnM-
0P4B1hln41ewIciELPOpjb-oqBfUsHgbzvC4_ieqcg
l*******g
发帖数: 28502
13
☆─────────────────────────────────────☆
lxinzh (头发5毫米) 于 (Sat Mar 10 23:14:21 2012, 美东) 提到:
这个好看不,据说每100楼奔一次,前2次没赶上。
☆─────────────────────────────────────☆
EIIiottJr (Froglet) 于 (Sat Mar 10 23:15:02 2012, 美东) 提到:
性格开朗大条
讲义气外人总比家人重要
不照顾LD面子
生长于北方寒冷之地,如东北内蒙
恋爱中主动,喜欢小白脸
☆─────────────────────────────────────☆
EIIiottJr (Froglet) 于 (Sat Mar 10 23:16:13 2012, 美东) 提到:
强势,男士小一两岁融洽

☆─────────────────────────────────────☆
lxinzh (头发5毫米) 于 (Sat Mar 10 23:16:49 2012, 美东) 提到:
你相面的结果?
☆... 阅读全帖
A****r
发帖数: 41
14
The debate over iPhone encryption started in September 2014, when Apple
released iOS 8. That was the first operating system to encrypt iPhones by
default, giving customers the only means of decrypting their phones. That
means the only way for police to retrieve a suspect's photos, messages,
email, contacts, call history, iTunes content, notes and reminders is with a
passcode.
The FBI has been up in arms about Apple's encryption tactics, arguing that
it will impede its investigations. It has been... 阅读全帖
p*******m
发帖数: 20761
15
Access control bypass in Hikvision IP Cameras
From: Monte Crypto
Date: Tue, 12 Sep 2017 04:19:00 +0200 (CEST)
Access control bypass in Hikvision IP Cameras
Full disclosure
Sep 12, 2017
Synopsis:
---------------
Many Hikvision IP cameras contain a backdoor that allows unauthenticated
impersonation of any configured user account.
The vulnerability has been present in Hikvision products since at least 2014
. In addition to Hikvision-branded devices,
it affects many whi... 阅读全帖
a******n
发帖数: 206
16
先声明:我没有站边, either pump or dump btc. 只是读到了自己觉得不错的文章,
分享过来,想听听大牛怎么说。
链接在此:https://blog.chain.com/a-letter-to-jamie-dimon-de89d417cb80?from=
singlemessage&isappinstalled=0
原文很长。总结如下。
Cryptocurrencies (which I prefer to call crypto assets) are a new asset
class that enable decentralized applications
Decentralized applications enable services we already have today, like
payments, storage, or computing, but without a central operator of those
services
This software model is useful to people who need c... 阅读全帖
r******y
发帖数: 21907
17
来自主题: TVChinese版 - 有想讨论08书剑的吗?
贴谁的?香香竟然是那个千山暮雪里头那个女主 恨死我了。。。意外发现乔还演过 浣
花洗剑录。。。这个有看过的咩,要不要看。
http://i2.sinaimg.cn/ent/v/m/2009-04-08/U2599P28T3D2462046F329D
33.jpg
http://i2.sinaimg.cn/ent/v/m/2009-07-03/U1343P28T3D2594545F329D
50.jpg
https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcRmxJvVVnJlmqvivq41dEmd
RarcSU8E4aC0N4Ah_eSF1hEsFWGS
https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcSyns8RVg3MPM_7cfYgPiwz
fsw-CS_eLFDZlUSzb1BptTuHz7gZZQ
https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcRxlVfM2xYWcHj0021rDJRs
X8z_33... 阅读全帖
O**n
发帖数: 649
18
来自主题: THU版 - 清华夜话之纽约醉酒篇
Sensitive Military Encryption Technology to China – On Sept. 13, 2010, Chi
Tong Kuok, a
resident of Macau, China, was sentenced in the Southern District of
California to serve 96 months
in prison for his efforts to obtain sensitive defense technology used in
encrypted U.S. military or
government communications and to cause them to be illegally exported to
Macau and Hong
Kong. On May 11, 2010, Kuok was convicted at trial of conspiracy to export
defense articles
without a license and to smuggle go... 阅读全帖
w********1
发帖数: 3492
19
Thu, 05 Jul 2012 06:31:17 PDT
Instapaper developer Marco Arment notes that Apple's App Store is apparently
pushing out corrupted app binaries of a number of different applications to
users. The issue, which renders the apps unusable, has apparently been
triggered on app updates approved over the past few days.
Characterizations of this issue:
- The app crashes immediately on launch, every time, even after a delete and
reinstall as long as the corrupt file is being served by the App Store.
- It ... 阅读全帖

发帖数: 1
20
来自主题: Database版 - decrypt data,求大神提示
对于一个严肃的密码系统是不会采用对称加密算法的,sys.symmetric_keys里没东西正
常。这也是为什么你不能去银行问到自己的旧密码,而只能重置新密码的原因。
加密的方法组合起来不下千万种,无头绪就解密基本不可能,而且正常也不会有这需求
吧。
以我做过的项目而言,都是HSM, 硬件级别的加密。你可以试试查下以下返回,碰碰运
气。
SELECT [provider_id], [guid], [provider_version], [sqlcrypt_version], [
friendly_name], [authentication_type], [symmetric_key_support], [symmetric_
key_persistance], [symmetric_key_export], [symmetric_key_import], [
asymmetric_key_support], [asymmetric_key_persistance], [asymmetric_key_
export], [asymmetric_key_import]
FROM [mas... 阅读全帖
y********o
发帖数: 2565
21
来自主题: DotNet版 - ASPNET 访问SQL Server 2005 被拒
I have never encrypted the connection string. Would you please give more de
tails?
1. Do we encrypt the connection string with an encryption algorithm of our
choice?
2. And then put the encrypted connection string, presumably something like
"AE0139FADDE2AD009EADFEEAA23EAE61F329882E3F", in web.config?
3. Suppose it is the case that 2 is true, then don't we have to decrypt it
in the code behind like below?
SqlConnection conn =
new SqlConnection(DecryptMyConnectionString(myEncryptedConnection
L***s
发帖数: 1148
22
来自主题: Hardware版 - DSM 6.1 released
https://www.synology.com/en-us/dsm/6.1
https://www.synology.com/en-us/releaseNote/DS1812+
Welcomed changes:
* Enabling Btrfs file system on old machines
* Fast files clone within the same Btrfs volume
* Shared Folder Encryption: you can now encrypt an ordinary shared folder,
and/or decrypt an encrypted folder. This is useful when you want to move an
encrypted folder across volumes.
* More flexible RAID migration paths
j**z
发帖数: 109
23
SHA is hashing, and lots of people like to call it one-way encryption.
However, calling it "encryption" actually causes a lot of misunderstanding,
and personally I always hate to call it encryption, because when you think "
encryption", you will naturally think about "decryption". SHA is design to
do one-way hashing, basically you can't "decrypt" a SHA value, otherwise, it
is a algorithm or implementation flaw.
goodbug's suggestion is a good one to make your application look with better
security... 阅读全帖
m********3
发帖数: 3280
24
http://blog.seattlepi.com/techchron/2013/06/07/technically-spea
In the wake of revelations around the extent of the NSA surveillance
programs it’s worth asking how such a program would operate, from a
technical standpoint. The feds have been collecting cell phone, Internet and
credit card data and to detect — and ostensibly stop — crimes.
Recently leaked document and previous court cases indicate much of that data
comes from Internet companies and telecom providers we use every day like
Google, ... 阅读全帖
t***h
发帖数: 5601
25
来自主题: Military版 - Snowden 在twitter上回答网友问题
12.43pm ET
Final question from Glenn Greenwald:
Anything else you'd like to add?
Answer:
Thanks to everyone for their support, and remember that just because you
are not the target of a surveillance program does not make it okay. The US
Person / foreigner distinction is not a reasonable substitute for
individualized suspicion, and is only applied to improve support for the
program. This is the precise reason that NSA provides Congress with a
special immunity to its surveillance.
12.41pm ET
Q... 阅读全帖
t*******y
发帖数: 21396
26
来自主题: Military版 - Flash-based SSD nearly impossible to erase
Researchers from the University of California at San Diego delivered a paper
at the FAST-11 Conference in San Jose, Calif., last week that shows it's
almost impossible to reliably erase data from a solid state drive.
The tome, "Reliably Erasing Data from Flash-Based Solid State Drives" (PDF),
goes through all of the known techniques for erasing data and comes up
short in every case. The study's method is straightforward: They put
repeating data on an SSD or USB drive, tried using various erasing... 阅读全帖
m********5
发帖数: 17667
27
审计估计过不了,于是干脆停了
大家安了吧,在NSA面前没有秘密
http://it.slashdot.org/story/14/05/28/2126249/truecrypt-website
Several readers sent word that the website for TrueCrypt, the popular disk
encryption system, says that development has ended, and Windows users should
switch to BitLocker. A notice on the site reads, "WARNING: Using TrueCrypt
is not secure as it may contain unfixed security issues. ... You should
migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk
images supported on your platf... 阅读全帖
r***y
发帖数: 248
28
【 以下文字转载自 Security 讨论区 】
发信人: reedy (怒放的神明), 信区: Security
标 题: 如何格式化一个安装了mcafee endpoint 加密的电脑
发信站: BBS 未名空间站 (Sun Oct 18 23:32:33 2015, 美东)
我从auction买了一个工作站,看机型指标不错,拿回来一看,安装了mcafee endpoint
encryption软件,里面的用户名和密码我一无所知,我打算重装系统把硬盘重新格式
化就可以让这个工作站为我所用。结果发现WINDOW安装盘根本无法启动,还是原来的XP
系统,我估计就是mcafee endpoint encryption软件加密了整个硬盘不让我重装系统,
这样可以起到保护数据也不丢失数据的目的,这样一来,问题的重点就是如何格式化一
个安装了mcafee endpoint encryption的电脑,只有彻底格式化硬盘,我才可以重装系
统,我试着用dban这样的软件,ISO光盘塞进去启动也不管用,请教大人有什么高见?
谢谢!
a***m
发帖数: 5037
29
来自主题: Military版 - 这位女程序员该逮捕吧
Shadowsocks is a user-written package developed by a female Chinese
programmer in her spare time with the purpose of helping Chinese, especially
those who are educated, to overcome the barrier that is induced by GFW for
achieving full access to Internet Freedom
Unlike conventional ways of crossing, e.g. proxy or VPN, this way of
crossing comes with no or very limited unique characteristic in the way of
transmission as well as ports that are used for communications. This is
because both encryptio... 阅读全帖
g****y
发帖数: 2810
30
来自主题: Military版 - 这位女程序员该逮捕吧
用的人多了就可以封了
[在 arcam (arcam) 的大作中提到:]
:Shadowsocks is a user-written package developed by a female Chinese
:programmer in her spare time with the purpose of helping Chinese,
especially those who are educated, to overcome the barrier that is induced
by GFW for achieving full access to Internet Freedom
:Unlike conventional ways of crossing, e.g. proxy or VPN, this way of
:crossing comes with no or very limited unique characteristic in the way of
:transmission as well as ports that are used for com... 阅读全帖
p*******m
发帖数: 20761
31

What You Should Know About the ‘KRACK’ WiFi Security Weakness
Researchers this week published information about a newfound, serious
weakness in WPA2 — the security standard that protects all modern Wi-Fi
networks. What follows is a short rundown on what exactly is at stake here,
who’s most at-risk from this vulnerability, and what organizations and
individuals can do about it.
wifi
Short for Wi-Fi Protected Access II, WPA2 is the security protocol used by
most wireless networks today. Researche... 阅读全帖
g**1
发帖数: 10330
32
来自主题: Military版 - Re: GE工程师学艺不精 被抓ZT
Authorities said that Zheng allegedly circumvented that restriction by
encrypting GE data files on his computer and then hiding those files in the
data code of a digital photograph that he sent to his private Hotmail
account.
The company finally took steps to begin monitoring Zheng's activities last
year, after they discovered another 400 digital files on his company-issued
laptop that had been encrypted with a software program not used by GE.
"GE installed monitoring software on Zheng's compute... 阅读全帖

发帖数: 1
33
西方国家纷纷效法。 谁还敢批评土鳖没有隐私权?
Big Brother Australia cracks open encrypted messaging
A new law will require tech firms to give security agencies access to their
encrypted data, a provision experts expect other Western nations to soon
replicate
http://www.atimes.com/article/big-brother-australia-cracks-open-encrypted-messaging/
m********5
发帖数: 17667
34
它区别与其他conference tools的最大特点就是p2p encryption. 其实最早确实是有
audio和video的p2p encryption, 但是后来某个时期好像因为bug很多,悄悄取消了,
只有chat有p2p encryption. 尼玛上市那么久,难道都不多请点安全专家重新弄起来吗?
看来这公司目标就是上市,上市以后完事大吉,啥都不弄了
最扯的是用facebook的libs, 但根本不看文档,结果导致把自己的用户信息全部上传
给facebook, 尼玛facebook做梦都笑醒了。
https://edition.cnn.com/2020/04/02/tech/zoom-ceo-apology-privacy/index.html
p*********g
发帖数: 22025
35
这几个可爱吧 呵呵
https://encrypted-tbn3.google.com/images?q=tbn:
ANd9GcSuR5ZpfW7VWDPZh5RH43GB1uUdyPJiDk223DAjRaSiAyyHCHlL
https://encrypted-tbn2.google.com/images?q=tbn:
ANd9GcTzj4DHaU0Ixr8ux7jzC71qxl1ohlihxO_ZOz9-K6Hj6clpm0ix5g
https://encrypted-tbn3.google.com/images?q=tbn:
ANd9GcSeiN7ND8qcduMOCEofic9FrXJnMbrfgk92qCjKnAT9cV5lzHDt-Q
h*********g
发帖数: 5713
36
有谁敢说这些不是别样风情?!
https://encrypted-tbn0.google.com/images?q=tbn:ANd9GcSfnHRei1-
GzkMLkhUxMttDb7zYqBxB7EiSYge2-Okt9j2c18w5
https://encrypted-tbn2.google.com/images?
q=tbn:ANd9GcS8SvXCq0G5VPbKjstDm0t2MHLfn2TXQ3qXgN35MMdDTdXPr533VQ
https://encrypted-tbn1.google.com/images?
q=tbn:ANd9GcSiLXuPKrBeR3AbUeMahoTWlHZmixiKzCWLgITrav_cAabw9g2Gyg
l****z
发帖数: 29846
37
One of the most popular password security companies just admitted it was
hacked
Cale Guthrie Weissman
Jun. 15, 2015, 3:27 PM
LastPass, a popular password manager program, just admitted it's been hacked.
In a blog post published today, LastPass’s Joe Siegrist writes, "The
investigation has shown ... that LastPass account email addresses, password
reminders, server per user salts, and authentication hashes were compromised
."
LastPass works by having users choose one strong master pass... 阅读全帖
l****z
发帖数: 29846
38
Trump is at it again… kicking butt and taking names. The Donald is knocking
yet another giant to their knees with his unfiltered soapbox…
GOP presidential front-runner Donald Trump is insisting that Apple
unlock the iPhone of one of the shooters in the San Bernardino, Calif.,
terrorist attack.
“To think that Apple won’t allow us to get into her cellphone,” Trump
said on “Fox and Friends” Wednesday morning. “Who do they think they are
? No, we have to open it up.”
The FBI has been una... 阅读全帖
p*******m
发帖数: 20761
39
Jealous of PRISM? Use "Amazon 1 Button" Chrome extension to sniff all HTTPS
websites!
tldr: Insecure browser addons may leak all your encrypted SSL traffic,
exploits included
So, Snowden let the cat out of the bag. They're listening - the news are so
big, that feds are no longer welcome at DEFCON. But let's all be honest -
who doesn't like to snoop into other person's secrets? We all know how to
set up rogue AP and use ettercap. Setting up your own wall of sheep is
trivial. I think we can safely... 阅读全帖
p****u
发帖数: 2422
40
来自主题: ebiz版 - 神医们,快去改ebay密码
Dear eBay Member,
To help ensure customers' trust and security on eBay, I am asking all eBay
users to change their passwords.
Here's why: Recently, our company discovered a cyberattack on our corporate
information network. This attack compromised a database containing eBay user
passwords.
What's important for you to know: We have no evidence that your financial
information was accessed or compromised. And your password was encrypted.
What I ask of you:
Go to eBay and change your password. Changi... 阅读全帖
y*****0
发帖数: 402
41
帮朋友发个简历这里, 欢迎指正,拍砖, 甚至推荐,
Personal Information:
Last Name: First Name:
Gender: Date of Birth:
Place of Birth: Nationality:
E-mail: Telephone:
Mailing Address:
Research Interests:
Network Security, Network Performance, Wireless Networks.
Educational Background:
 M.S. in Software Engineering
December 2006
Huazhong University of Science & Technology (China) (Overall GPA
 B.S. in Electronic Science and Technology... 阅读全帖
r*****e
发帖数: 30
42
来自主题: JobHunting版 - Security 面試問題
Not quite understand what is going on here.. please help --
你說
con: if there are 2 legitimate users on the same network and user B can
intercept user A's encrypted message and replace user A's signature with
user B's then send it out to impersonate user A.
但如果
Let say the 2 legitimate users in communication are A and C. A is sending
MAC(encrypted package) and the encrypted package to C. B received it and
took off A's signature. Replacing by B's own signature.
How can B impersonate user A ? B o... 阅读全帖
C*******n
发帖数: 193
43
来自主题: JobHunting版 - 做个题吧。decoder.
Let's say you have a binary string such as the following:
011100011
One way to encrypt this string is to add to each digit the sum of its
adjacent digits. For example, the above string would become:
123210122
In particular, if P is the original string, and Q is the encrypted string,
then Q[i] = P[i-1] + P[i] + P[i+1] for all digit positions i. Characters off
the left and right edges of the string are treated as zeroes.
An encrypted string given to you in this format can be decoded as follows (
u... 阅读全帖
k*********5
发帖数: 1417
44
来自主题: Money版 - bluebird收到两个warning
新手上周刚申请了BLUEBIRD
收到卡在网上激活之后就尝试把在staples买的MASTERCARD load到账户里去
不过在网上加了卡之后转了两次都不成功
显示bluebird的卡没有激活
还没来得急打电话激活就收到了两封warning的邮件
请问这该怎么处理?
打电话告诉他看到买的卡上有debit的标志就觉得可以冲了么
还是??
第二封要是不把ID给他们会怎么样?
第一封:
During a recent review of your account we noticed you have linked a prepaid
card that is not a permitted funding source. The acceptable card funding
sources is a bank debit card.
Please contact us immediately at 1-800-660-2454 so we can discuss further
details on this matter.
第二封:
During a recent review, ... 阅读全帖
l****z
发帖数: 29846
45
【 以下文字转载自 USANews 讨论区 】
发信人: lczlcz (lcz), 信区: USANews
标 题: lastpass被黑了,用的人赶紧去改密码吧
发信站: BBS 未名空间站 (Mon Jun 15 19:09:40 2015, 美东)
One of the most popular password security companies just admitted it was
hacked
Cale Guthrie Weissman
Jun. 15, 2015, 3:27 PM
LastPass, a popular password manager program, just admitted it's been hacked.
In a blog post published today, LastPass’s Joe Siegrist writes, "The
investigation has shown ... that LastPass account email addresses, password
reminders,... 阅读全帖
H*******d
发帖数: 2394
46
来自主题: WashingtonDC版 - 看纪念6.4活动的回帖
另外你看看最近的消息,好不容易有个不受政府控制加密的软件,你的主子马上不高兴
了,强制让别人的公司办不下去了。要不你评价评价你主子吧
http://www.mitbbs.com/article_t/WashingtonDC/31975071.html
My company, Lavabit, provided email services to 410,000 people, and thrived
by offering features specifically designed to protect the privacy and
security of its customers. I had no choice but to consent to the
installation of their device, which would have provided the government with
access to all of the messages, for all of my customers, as they travelled to
and from o... 阅读全帖
l****z
发帖数: 29846
47
来自主题: GunsAndGears版 - 请教Sig Sp2022 holster的一个问题
Amazon上面买了一个Sig Sauer Sp2022的holster,是IMI的, 从以色列寄过来的.昨天才
收到.
然后发现好像这个枪套没有什么锁定的装置.好像就是枪可以直接插进去, 然后也可以
直接拔出来.当然枪套fit的很好.
这个枪套中间又一个象button的东东可以往里面按,但不象是锁定的装置.
想问一下这个算正常的嘛? 还是我不会用?
网上找到的类似的图:
https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSmDAm2FEbaaVIpS_
UJXNw5pSlMj5KpcpP6IeGlQrPFr7ngALzC
https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcTW-
On7foyS2G2mtLccAa1YbDIDoJzhLGEn2HW_Rh0SqQROGQmv
https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcQCQv_
p5HoXSn6Jm6hhP2H8KiGPp1m-Pr8Ucqrkr_iclD... 阅读全帖
t******g
发帖数: 17520
48
来自主题: TVGame版 - Destiny上手简介
gold loot chest 地点是固定的
解释一下
Engram
From Destinypedia, the Destiny wiki
Example of an Engram. In this case, the golden color indicates it is Exotic.
Engrams are crystals;[1] that are encoded with the patterns of armor,
weaponry and other as-yet-undisclosed items. There are two known types of
Engrams: Encoded and Encrypted.[2]
Encoded Engrams are sold by the Cryptarch, and are coded with the patterns
of known items, such as a particular section of armor or class of weaponry.
Once purchased by the ... 阅读全帖
首页 上页 1 2 3 4 5 6 7 8 9 10 下页 末页 (共10页)