Berkeley CSUA MOTD:Entry 35855
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/09 [General] UID:1000 Activity:popular
7/9     

2005/1/21-25 [Computer/SW/Security] UID:35855 Activity:nil
1/21    Diffie is giving a lecture about the history of information
        security this wednesday from 7-8:30 PM at the Computer Hist.
        Museum in Mt. View (best part is that its free):
        http://www.computerhistory.org/events/index.php?id=1105901815
        \_ I _highly_ recommend going to see this guy talk.  He's one of the
           most fascinating speakers I've seen--he'll ramble for hours about
           things that may only peripherally relate to the nominal topic of
           the talks, and it's all incredibly interesting, even if you have
           no clue what he's on about from time to time.  -John
2025/07/09 [General] UID:1000 Activity:popular
7/9     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/11/11-30 [Computer/SW/Security] UID:54224 Activity:nil
11/11   MacOSX's Sandbox security hole:
        http://preview.tinyurl.com/7ph2wtg [arstechnica]
	...
2011/2/10-19 [Computer/SW/Security] UID:54034 Activity:nil
2/9     http://www.net-security.org/secworld.php?id=10570
        Summary: iPhone passwd storage is unsafe after all
	...
Cache (1668 bytes)
www.computerhistory.org/events/index.php?id=1105901815
Whitfield Diffie VP, Sun Fellow, Chief Security Officer, Sun Microsystems DATE & TIME Wednesday, January 26, 2005 Member Reception - 6:00 PM - 7:00 PM Lecture - 7:00 PM - 8:30 PM LOCATION Computer History Museum 1401 N Shoreline Boulevard Mountain View, CA 94043 REGISTRATION Free. ABSTRACT OF TALK In the 1970s, the world of information security was transformed by public -key cryptography, the radical revision of cryptographic thinking that a llowed people with no prior contact to communicate securely. Public key solved security problems born of the revolution in information technolog y that characterized the 20th century and made Internet commerce possibl e Security problems rarely stay solved, however. Continuing growth in c omputing, networking, and wireless--including applications made possible by improvements in securityhave given rise to new security problems. Diffie, a key figure in the discovery public-key cryp tography, will trace the growth of information security through the 20th Century and into the 21st. BACKGROUND Odysseys in Technology, A Computer History Museum Speaker Series Sponsore d by Sun Microsystems Laboratories, presents people and perspectives beh ind extraordinary innovations and advancements in the computer technolog y-related world. Each event in the Series provides stimulating interacti on with authentic experts whose achievements have transformed how things are done or viewed, and to examine how their personal stories might inf orm the present and future. These programs occasionally feature technolo gies or point events, with the objective to apply lessons of history to present day understanding and inspiration.