Open letter to Authentec (c/o of Apple)

Hi! I was thrilled to see that I’ve got the possibility to download and use Authentec’s solutions with my new HP laptop. The laptop has got a fingerprint module and I googled around the net to find the Downloads section for your software! One question, which actually consists of a couple of sub-points: according toContinue reading “Open letter to Authentec (c/o of Apple)”

[2k blog in Computer Science] VLAM authentication method

Human authentication to computer systems is problematic in many ways. There are aspects conserning the user’s ability to memorize arbitrary character-number -combinations as well as extraneous equipment which should be added to the system if other than password-based authentication methods were to be used (biometrics). The method proposed in this paper is based on theContinue reading “[2k blog in Computer Science] VLAM authentication method”

Security Cyclone

Security. Let’s open the discussion. I used to write long preaching texts about subject X, whatever it was. Now, it would be interesting to see what kinds of results we can get by anonymously co-writing a piece of blog. So, jump in. Comment here. ūüôā Subjects (not exhaustive list) – round up of security threatsContinue reading “Security Cyclone”

WOT – konnat kuriin? (Web of Trust)

Kukaan yksittäinen käyttäjä ei pysty kovin luotettavasti etukäteen arvioimaan minkään palvelun luotettavuutta. Internetissä syntyy uusia sivustoja Рsekä kaupallisia että ilmaispohjalta toimivia Рtodennäköisesti nopeammin kuin 1 saitti sekunnissa.

Matokuurille. Virukset ja madot tietokoneissa

Tietokonemaailmassa madot ja virukset ovat per√§isin suurinpiirtein 1980-luvulta. T√§ss√§ artikkelissa on hieman taustaa, historian siipien havinaa, ja ohjeita mit√§ tehd√§ jos ep√§ilet ett√§ olet saanut koneellesi tunkeutujia. Madot ja virukset (yhteisnimell√§ haittaohjelmat – malware) ovat olleet alunperin ohjelmoijien tekemi√§ pieni√§ piloja, ja kuriositeettej√§ kaiken kaikkiaan. Ohjelmoijia kiehtoi usein ajatus “itsen√§isest√§ agentista”, joka kykenee selvi√§m√§√§n tietokoneidenContinue reading “Matokuurille. Virukset ja madot tietokoneissa”

HiHat SSO shield

HiHat is a draft of a mechanism for increasing strength of existing single-sign on systems (SSO). It employs a queue algorithm to choose which servers it relies on. Each of the servers get equally mirrored with the salted password ciphertexts, that the user has. Web browser module that is running in protected memory space getsContinue reading “HiHat SSO shield”