Isakmp The Standard For IncompatibilityPeter Gutman wrote a great summary of the lengths that many have to go to in order to get ISAKMP implementations to interoperate.30 Nov 2005 • 2 min read
Quot Cybercrime Quot Treaty Is CriminalFuzzy logic behind Bush’s cybercrime treaty | Perspectives | CNET News.com30 Nov 2005 • 1 min read
More Geeky Sex Related ContentJust to continue the geeky sex-related Internet content update, you can now get daily doses of customized porn via your RSS reader. Enter Sex By RSS23 Nov 2005 • 1 min read
Common Writing MistakesThis post about Grammar Nerds reminded me that I’ve long wanted to write about some common mistakes I see over and over on the Internet and in emails.23 Nov 2005 • 2 min read
Internet Security Tipshttps://www.eweek.com/article2/0,1759,1883072,00.asp?kc=EWRSS03129TX1K000061420 Nov 2005 • 1 min read
Md4 And Md5 Collision GeneratorsThere are still not known attacks against encryption schemes that make use of these, but certainly anything relying on these hashes for integrity protection should switch to alternate mechanisms.20 Nov 2005 • 1 min read