November, 2012 - syn_schneier

Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Month View
Here are the subjects of all posts in the [info]syn_schneier journal in November, 2012.


1st
6:34a[info]syn_schneierPeter Neumann Profile
2nd
6:30a[info]syn_schneierFriday Squid Blogging: Squid Costume
6:37a[info]syn_schneierLoopholes
5th
6:19a[info]syn_schneierOn the Ineffectiveness of Airport Security Pat-Downs
1:26p[info]syn_schneierNew WWII Cryptanalysis
2:54p[info]syn_schneierNew Jersey Allows Voting by E-Mail
6th
6:40a[info]syn_schneierNew Vulnerability Against Industrial Control Systems
10:13a[info]syn_schneierWanted: RSA Exhibitor for Book Signing
12:17p[info]syn_schneierThree-Rotor Enigma Machine Up for Auction
7th
6:16a[info]syn_schneierRegulation as a Prisoner's Dilemma
1:39p[info]syn_schneierNew SSL Vulnerability
8th
6:57a[info]syn_schneierMicromorts
1:24p[info]syn_schneierGary McGraw on National Cybersecurity
9th
6:41a[info]syn_schneierHow Terrorist Groups Disband
1:32p[info]syn_schneierHow To Tell if Your Hotel Guest Is a Terrorist
4:16p[info]syn_schneierFriday Squid Blogging: Squid Ink as a Condiment
12th
5:47a[info]syn_schneierEncryption in Cloud Computing
1:03p[info]syn_schneierFairy Wren Passwords
13th
6:15a[info]syn_schneierFree Online Cryptography Course
14th
5:57a[info]syn_schneierKeys to the Crown Jewels Stolen?
12:28p[info]syn_schneierWebmail as Dead Drop
15th
6:45a[info]syn_schneierThe Terrorist Risk of Food Trucks
16th
6:13a[info]syn_schneierStealing VM Keys from the Hardware Cache
12:11p[info]syn_schneierJamming 4G Cell Networks
4:30p[info]syn_schneierFriday Squid Blogging: Vampire Squid
19th
5:41a[info]syn_schneierSecurity Theater in American Diplomatic Missions
12:40p[info]syn_schneierE-Mail Security in the Wake of Petraeus
20th
12:53p[info]syn_schneierAnonymous Claims it Sabotaged Rove Election Hacking
21st
6:34a[info]syn_schneierDecrypting a Secret Society's Documents from the 1740s
2:06p[info]syn_schneierCell Phone Surveillance
23rd
6:18a[info]syn_schneierPreventing Catastrophic Threats
4:50p[info]syn_schneierFriday Squid Blogging: Another Squid Comic
26th
9:35a[info]syn_schneierHomeland Security Essay Contest
9:48a[info]syn_schneierLiars and Outliers Ebook 50% Off and DRM-Free
27th
6:39a[info]syn_schneierHackback
12:12p[info]syn_schneierClassified Information Confetti
28th
5:55a[info]syn_schneierThe Psychology of IT Security Trade-offs
1:30p[info]syn_schneierJames Bond Movie-Plot Threats
29th
4:36p[info]syn_schneierAdvances in Attacking ATMs
30th
5:23a[info]syn_schneierIT for Oppression
2:18p[info]syn_schneierFriday Squid Blogging: Possible Squid Eyeball Found in Florida