Secure Coding: by date

163 messages starting Apr 04 05 and ending Jun 30 05
Date index | Thread index | Author index


Monday, 04 April

SV: Java -> .NET RSA Encryption Fredrik Hesse

Wednesday, 06 April

Mobile phone OS security changing? Kenneth R. van Wyk
Application Insecurity --- Who is at Fault? Kenneth R. van Wyk
Re: Mobile phone OS security changing? Michael Silk
Re: Application Insecurity --- Who is at Fault? Michael Silk
SOS: Service Oriented Security Gunnar Peterson
Re: Application Insecurity --- Who is at Fault? Dave Paris
RE: Application Insecurity --- Who is at Fault? Goertzel Karen
RE: Application Insecurity --- Who is at Fault? Michael S Hines
Re: Application Insecurity --- Who is at Fault? Jeff Williams
Re: Mobile phone OS security changing? Kenneth R. van Wyk
Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Mobile phone OS security changing? Michael Silk
Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Application Insecurity - Who is at Fault? Greenarrow 1
Re: Application Insecurity --- Who is at Fault? Jeff Williams
Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Mobile phone OS security changing? Crispin Cowan

Thursday, 07 April

Re: Mobile phone OS security changing? Blue Boar
Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Application Insecurity --- Who is at Fault? Blue Boar
Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Application Insecurity --- Who is at Fault? secureCoding2dave
Re: Application Insecurity --- Who is at Fault? Margus Freudenthal
Re: Application Insecurity --- Who is at Fault? Dave Paris
Re: Application Insecurity --- Who is at Fault? ljknews
(fwd) New mailing list announced -- MobileBugtraq Kenneth R. van Wyk

Friday, 08 April

Re: Application Insecurity --- Who is at Fault? Julie JCH Ryan, D.Sc.
Re: Application Insecurity --- Who is at Fault? Crispin Cowan

Sunday, 10 April

Re: Application Insecurity --- Who is at Fault? dtalk-ml
RE: Application Insecurity --- Who is at Fault? Yousef Syed
Re: [ot] Application Insecurity --- Who is at Fault? Pete Shanahan
Theoretical question about vulnerabilities Pascal Meunier
Re: Application Insecurity --- Who is at Fault? ljknews
RE: Re: Application Insecurity --- Who is at Fault? Edward Rohwer
Re: Theoretical question about vulnerabilities Crispin Cowan

Monday, 11 April

Re: Re: Application Insecurity --- Who is at Fault? Crispin Cowan
Re: Re: Application Insecurity --- Who is at Fault? Michael Silk
RE: Re: Application Insecurity --- Who is at Fault? Yousef Syed
Re: Re: Application Insecurity --- Who is at Fault? Kenneth R. van Wyk
Re: Re: Application Insecurity --- Who is at Fault? Dave Paris
RE: Re: Application Insecurity --- Who is at Fault? Chris Matthews
RE: Re: Application Insecurity --- Who is at Fault? Joel Kamentz
Re: Re: Application Insecurity --- Who is at Fault? Damir Rajnovic
Re: Re: Application Insecurity --- Who is at Fault? Dave Paris
Re: Re: Application Insecurity --- Who is at Fault? Michael Silk
RE: Re: Application Insecurity --- Who is at Fault? ljknews
Re: Re: Application Insecurity --- Who is at Fault? Carl G. Alphonce
RE: Theoretical question about vulnerabilities David Crocker
Re: Theoretical question about vulnerabilities Nash
Re: Re: Application Insecurity --- Who is at Fault? Michael Silk

Tuesday, 12 April

Re: Theoretical question about vulnerabilities Crispin Cowan
Re: Theoretical question about vulnerabilities Crispin Cowan
RE: Theoretical question about vulnerabilities Peter Amey
Re: Theoretical question about vulnerabilities der Mouse
Re: Re: Application Insecurity --- Who is at Fault? der Mouse
Re: Re: Application Insecurity --- Who is at Fault? ljknews
Re: Theoretical question about vulnerabilities karger
Re: Re: Application Insecurity --- Who is at Fault? Michael Silk
RE: Theoretical question about vulnerabilities David Crocker
Re: Re: Application Insecurity --- Who is at Fault? der Mouse
Re: Theoretical question about vulnerabilities der Mouse

Wednesday, 13 April

Adding some unexpected reliability expectations ljknews
RE: Theoretical question about vulnerabilities Peter Amey
Re: Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Re: Application Insecurity --- Who is at Fault? Dave Paris
Re: Theoretical question about vulnerabilities der Mouse
Re: Theoretical question about vulnerabilities Nash
Re: Adding some unexpected reliability expectations Rob, grandpa of Ryan, Trevor, Devon & Hannah
RE: Theoretical question about vulnerabilities David Crocker
RE: Theoretical question about vulnerabilities David Crocker
Re: Theoretical question about vulnerabilities Crispin Cowan
Re: Theoretical question about vulnerabilities Crispin Cowan

Thursday, 14 April

Re: Re: Application Insecurity --- Who is at Fault? Michael Silk
Re: Re: Application Insecurity --- Who is at Fault? Dave Paris
RE: Theoretical question about vulnerabilities David Crocker
RE: Theoretical question about vulnerabilities David Crocker

Friday, 15 April

Re: Theoretical question about vulnerabilities Crispin Cowan

Sunday, 17 April

RE: Theoretical question about vulnerabilities Peter Amey
RE: Theoretical question about vulnerabilities David Crocker

Tuesday, 19 April

Doing something about software security Gunnar Peterson
RE: Doing something about software security jasonw
RE: Doing something about software security Gunnar Peterson
Re: Application Insecurity --- Who is at Fault? George Capehart

Monday, 25 April

Java keystore password storage john bart
Re: Java keystore password storage Blue Boar
RE: Java keystore password storage Goertzel Karen
Re: Java keystore password storage Nash
Re: Java keystore password storage Fredrik Hesse
RE: Java keystore password storage Michael Howard
RE: Java keystore password storage Chris Matthews
RE: Java keystore password storage David Crocker

Tuesday, 26 April

Re: Java keystore password storage Edgar Danielyan
Re: Java keystore password storage Blue Boar
RE: Java keystore password storage Michael Howard
Re: Java keystore password storage ljknews
Re: Java keystore password storage Edgar Danielyan
RE: Java keystore password storage Chris Matthews
RE: Java keystore password storage john bart
Re: Java keystore password storage Michael Silk

Wednesday, 27 April

Re: Java keystore password storage Nash

Thursday, 28 April

Bad Code doesn't always fail... Michael S Hines

Saturday, 30 April

Why Software Will Continue to Be Vulnerable Crispin Cowan

Sunday, 01 May

Re: Why Software Will Continue to Be Vulnerable Crispin Cowan
RE: Why Software Will Continue to Be Vulnerable Arian J. Evans
Re: Why Software Will Continue to Be Vulnerable Greenarrow 1
Re: Why Software Will Continue to Be Vulnerable Dave Aronson
Re: Why Software Will Continue to Be Vulnerable Jeff Williams

Monday, 02 May

Re: Why Software Will Continue to Be Vulnerable Michael Silk
Re: Why Software Will Continue to Be Vulnerable Kenneth R. van Wyk
Re: Why Software Will Continue to Be Vulnerable ljknews
re: Why Software Will Continue to Be Vulnerable Bill Cheswick
Re: re: Why Software Will Continue to Be Vulnerable Gunnar Peterson

Tuesday, 03 May

Re: Why Software Will Continue to Be Vulnerable Michael Silk
Re: re: Why Software Will Continue to Be Vulnerable Blue Boar
Re: Why Software Will Continue to Be Vulnerable Crispin Cowan
Re: Java keystore password storage Mark

Sunday, 08 May

Announcement: The Web Security Mailing List contact

Tuesday, 10 May

"Tech News on ZDNet" -- OS makers: Security is job No. 1 Kenneth R. van Wyk
Fwd: Novell Adds Security Company to Its Linux Mix Kenneth R. van Wyk

Wednesday, 11 May

Credentials for Application use Mikey
Secure programming with the OpenSSL API, Part 2: Secure handshake Kenneth R. van Wyk
RE: Credentials for Application use Gizmo
RE: "Tech News on ZDNet" -- OS makers: Security is job No. 1 Gizmo
RE: Credentials for Application use Gizmo
RE: Credentials for Application use Goertzel Karen
RE: Credentials for Application use Gizmo
RE: Credentials for Application use Gunnar Peterson
Re: "Tech News on ZDNet" -- OS makers: Security is job No. 1 Dana Epp
RE: "Tech News on ZDNet" -- OS makers: Security is job No. 1 Gizmo
RE: Credentials for Application use ljknews
RE: Credentials for Application use ljknews

Thursday, 12 May

Re: "Tech News on ZDNet" -- OS makers: Security is job No. 1 der Mouse
Re: Credentials for Application use Dave Aronson
RE: Credentials for Application use Mikey
RE: Credentials for Application use Mikey
Re: Credentials for Application use Michael Silk
RE: Credentials for Application use Goertzel Karen
RE: Credentials for Application use Gizmo
RE: Credentials for Application use ljknews

Friday, 13 May

Re: Credentials for Application use Dave Aronson
New Free Tool - Foundstone .NET Mon Curphey, Mark

Saturday, 14 May

Webcast on Effective Data Validation Rudolph Araujo

Wednesday, 18 May

RE: Java keystore password storage Scott, Richard

Thursday, 19 May

Community Site Launch - www.threatsandcountermeasures.com Nick Murison

Wednesday, 25 May

Two for one Gary McGraw

Tuesday, 07 June

Academic conferences Gary McGraw

Wednesday, 08 June

TechWeb - Firefox Bug Wriggles Back Into Code Kenneth R. van Wyk

Monday, 13 June

NDSS '06 -- Call for Papers Karen Seo

Friday, 17 June

ANNOUNCING: 2nd US OWASP AppSec Conference - Oct 11-12 - Near DC Kenneth R. van Wyk

Tuesday, 21 June

WASC-Articles: 'Common Security Problems in the Code of Dynamic Web Applications' By Sverre H. Huseby contact

Friday, 24 June

RE: Java keystore password storage Scott, Richard
Information Security Considerations for Use Case Modeling Gunnar Peterson

Monday, 27 June

Re: Information Security Considerations for Use Case Modeling Johan Peeters
Re: Information Security Considerations for Use Case Modeling Gunnar Peterson
Re: Information Security Considerations for Use Case Modeling John Steven

Wednesday, 29 June

The biggest thing affecting software security? People, apparently. Nick Murison
RE: The biggest thing affecting software security? People, apparently. Lyal Collins
Re: The biggest thing affecting software security? People, apparently. Steve Milner

Thursday, 30 June

Re: The biggest thing affecting software security? People, apparently. Irene Abezgauz
RE: The biggest thing affecting software security? People, apparently. PPowenski
Re: The biggest thing affecting software security? People, apparently. Pascal Steichen