{"id":1099,"date":"2012-10-01T23:01:15","date_gmt":"2012-10-01T21:01:15","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1099"},"modified":"2024-10-14T13:55:05","modified_gmt":"2024-10-14T11:55:05","slug":"assorted-links-computer-security","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2012\/10\/01\/assorted-links-computer-security\/","title":{"rendered":"Assorted Links (Computer Security)"},"content":{"rendered":"<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"text-align: justify;\">On the provable security of <span class=\"caps\">TLS<\/span> (<a href=\"http:\/\/blog.cryptographyengineering.com\/2012\/09\/on-provable-security-of-tls-part-1.html\" target=\"_blank\" rel=\"noopener\">Part 1<\/a> and <a href=\"http:\/\/blog.cryptographyengineering.com\/2012\/09\/on-provable-security-of-tls-part-2.html\" target=\"_blank\" rel=\"noopener\">Part 2<\/a>)<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.armytimes.com\/news\/2012\/09\/dn-laws-of-war-apply-cyber-attacks-091812\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">US<\/span>: laws of war apply to cyber attacks<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.networkcomputing.com\/security\/calculating-the-cost-of-full-disk-encryp\/240006508\" target=\"_blank\" rel=\"noopener\">Calculating the cost of full disk encryption<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.cs.bris.ac.uk\/%7Enigel\/Cloud-Keys\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">On the true economic cost of key retrieval by using the&nbsp;cloud<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/blogs.msdn.com\/b\/sdl\/archive\/2012\/08\/02\/attack-surface-analyzer-1-0-released.aspx\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Microsoft Attack Surface Analyzer<\/a> and <a href=\"http:\/\/blog.appharbor.com\/2012\/08\/13\/the-asp-net-forms-authentication-replacement-microsoft-doesn-t-want-you-to-see\" target=\"_blank\" rel=\"noopener\">replacing <span class=\"caps\">ASP<\/span>.<span class=\"caps\">NET<\/span> Forms Authentication<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>On the provable security of <span class=\"caps\">TLS<\/span> (Part 1 and Part 2) <span class=\"caps\">US<\/span>: laws of war apply to cyber attacks Calculating the cost of full disk encryption On the true economic cost of key retrieval by using the&nbsp;cloud Microsoft Attack Surface Analyzer and replacing <span class=\"caps\">ASP<\/span>.<span class=\"caps\">NET<\/span> Forms Authentication<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,18],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1099"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1099"}],"version-history":[{"count":3,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1099\/revisions"}],"predecessor-version":[{"id":1585,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1099\/revisions\/1585"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1099"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}