Secure Coding: by date
125 messages
starting Jun 30 04 and
ending Sep 30 04
Date index |
Thread index |
Author index
Wednesday, 30 June
Re: ACM Queue article and security education George Capehart
Thursday, 01 July
RE: ACM Queue article and security education Michael Canty
RE: ACM Queue article and security education Peter Amey
Re: ACM Queue article and security education Blue Boar
RE: ACM Queue article and security education Michael S Hines
Re: ACM Queue article and security education ljknews
Re: ACM Queue article and security education Blue Boar
Friday, 02 July
RE: ACM Queue article and security education Peter Amey
RE: ACM Queue article and security education Peter Amey
Re: ACM Queue article and security education ljknews
Education and security -- another perspective (was "ACM Queue - Content") Wall, Kevin
Best practices training Gary McGraw
Re: ACM Queue article and security education Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") der Mouse
Re: ACM Queue article and security education David A. Wheeler
Risk Analysis: Building Security In #3 Gary McGraw
Monday, 05 July
Re: Education and security -- another perspective (was "ACM Queue - Content") Fernando Schapachnik
Re: Education and security -- another perspective (was "ACM Queue - Content") der Mouse
Tuesday, 06 July
Re: Education and security -- another perspective (was "ACM Queue - Content") Fernando Schapachnik
Protecting users from their own actions Kenneth R. van Wyk
Re: Education and security -- another perspective (was "ACM Queue - Content") Dana Epp
Re: Education and security -- another perspective (was "ACM Queue - Content") Dana Epp
RE: Protecting users from their own actions Wall, Kevin
Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
Re: Education and security -- another perspective (was "ACM Queue - Content") Mark Rockman
Wednesday, 07 July
Re: Protecting users from their own actions Kenneth R. van Wyk
Re: Education and security -- another perspective (was "ACM Queue - Content") James Walden
Re: Education and security -- another perspective (was "ACM Queue - Content") James Walden
Re: Education and security -- another perspective (was "ACM Queue - Content") ljknews
RE: Education and security -- another perspective (was "ACM Queue - Content") Wall, Kevin
Thursday, 08 July
Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
Re: Education and security -- another perspective (was "ACM Queue - Content") der Mouse
Re: Education and security -- another perspective (was "ACM Queue - Content") ljknews
Re: Education and security -- another perspective (was "ACM Queue - Content") James Walden
Re: Education and security -- another perspective (was "ACM Queue - Content") Julie JCH Ryan, D.Sc.
Re: Education and security -- plus safety, reliability and availability Jim & Mary Ronback
Re: Education and security -- another perspective (was "ACM Queue - Content") Dana Epp
Re: Education and security -- another perspective (was "ACM Queue - Content") Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") Jose Nazario
Re: Education and security -- another perspective (was "ACM Queue - Content") Fernando Schapachnik
Re: Education and security -- plus safety, reliability and availability Dana Epp
RE: Education and security -- another perspective (was "ACM Queue - Content") Peter Amey
RE: Education and security -- another perspective (was "ACM Queue - Content") Peter Amey
Re: Education and security -- plus safety, reliability and availability Gary McGraw
Re: Education and security -- another perspective (was "ACM Queue - Content") Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") Jose Nazario
Friday, 09 July
Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
RE: Education and security -- another perspective (was "ACM Queue - Content") Peter Amey
Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
Secure Coding & Wikipedia Fabien
RE: Education and security -- another perspective (was "ACM Queue - Content") David Crocker
Programming languages used for security Wall, Kevin
Re: Programming languages used for security Fabien
RE: Education and security -- another perspective (was "ACM Queue - Content") ljknews
RE: Education and security -- another perspective (was "ACM Queue - Content") Wall, Kevin
Re: Programming languages used for security ljknews
Re: Programming languages used for security Crispin Cowan
RE: Programming languages used for security David Crocker
Re: Programming languages used for security Crispin Cowan
Saturday, 10 July
Re: Programming languages used for security der Mouse
Re: Programming languages used for security Crispin Cowan
Re: Programming languages used for security Dana Epp
RE: Programming languages used for security Wall, Kevin
RE: Programming languages used for security David Crocker
Re: Programming languages used for security James Walden
Re: Programming languages used for security der Mouse
RE: Programming languages used for security Wall, Kevin
Monday, 19 July
Programming languages -- the "third rail" of secure coding Kenneth R. van Wyk
Tuesday, 20 July
RE: Programming languages -- the "third rail" of secure coding Michael S Hines
Re: Programming languages -- the "third rail" of secure coding Dave Aronson
RE: Programming languages -- the "third rail" of secure coding ljknews
Re: Programming languages -- the "third rail" of secure coding der Mouse
Wednesday, 21 July
Re: Programming languages -- the "third rail" of secure coding Mark Rockman
RE: Programming languages -- the "third rail" of secure coding Peter Amey
RE: Programming languages -- the "third rail" of secure coding Wall, Kevin
RE: Programming languages -- the "third rail" of secure coding Nick Lothian
Re: Programming languages -- the "third rail" of secure coding Crispin Cowan
Re: Programming languages -- the "third rail" of secure coding Erik van Konijnenburg
Re: Programming languages -- the "third rail" of secure coding James Walden
Programming languages -- PHP David A. Wheeler
Thursday, 22 July
Developers Blame Users for security problems Greenarrow 1
Re: Programming languages -- the "third rail" of secure coding Craig E. Ward
RE: Programming languages -- the "third rail" of secure coding Michael S Hines
Friday, 23 July
Re: Programming languages -- the "third rail" of secure coding Mark Rockman
Friday, 30 July
RE: Programming languages -- the "third rail" of secure co ding Jeremy Epstein
Sunday, 01 August
RE: Programming languages -- the "third rail" of secure Nick Lothian
Re: Programming languages -- the "third rail" of secure coding Glenn and Mary Everhart
RE: Programming languages -- the "third rail" of secure coding ljknews
Monday, 02 August
RE: Programming languages -- the "third rail" of secure co ding Peter Amey
Buffer Overrun Mark Rockman
RE: Programming languages -- the "third rail" of secure coding Nick Lothian
RE: Programming languages -- the "third rail" of secure coding ljknews
Tuesday, 03 August
Book review - Threat Modeling Kenneth R. van Wyk
Friday, 06 August
Re: Programming languages -- the "third rail" of secure Crispin Cowan
Sunday, 08 August
Top security papers Matt Setzer
Monday, 09 August
Re: Top security papers Peter G. Neumann
RE: Top security papers Wall, Kevin
Re: Top security papers Julie JCH Ryan, D.Sc.
RE: Top security papers Jeremy Epstein
Re: Top security papers Crispin Cowan
Tuesday, 10 August
Re: Top security papers Nash
Re: Top security papers George Capehart
Wednesday, 11 August
OT re Cliff Stoll (was Re: Top security papers) Dave Aronson
Tuesday, 17 August
Collaboration in a Secure Development Process Gunnar Peterson
Thursday, 19 August
Re: Book review - Threat Modeling Jared W. Robinson
BOUNCE sc-l () securecoding org: Approval required: ken
Friday, 20 August
[paper] Model Checking One Million Lines of C Code Jose Nazario
Monday, 23 August
Grass roots secure coding efforts Kenneth R. van Wyk
RE: Grass roots secure coding efforts Hans Westphal
Re: Grass roots secure coding efforts Kenneth R. van Wyk
Wednesday, 01 September
Opinions on strcpy_s, strcat_s, etc.? Jared W. Robinson
Tuesday, 07 September
eSecurityPlanet column on Software Security Kenneth R. van Wyk
Government Computer News (GCN) -- Contract addendum could enforce software security Kenneth R. van Wyk
Wednesday, 08 September
Re: Government Computer News (GCN) -- Contract addendum could enforce software security Jeff Williams
Re: eSecurityPlanet column on Software Security Jari Pirhonen
Friday, 10 September
ComputerWorld interview with Theo de Raadt on Software Security Kenneth R. van Wyk
Re: ComputerWorld interview with Theo de Raadt on Software Security James Walden
Re: ComputerWorld interview with Theo de Raadt on Software Security ljknews
Sunday, 12 September
Security and Usability Article Gunnar Peterson
Tuesday, 28 September
Design flaw in Lexar JumpDrive Kenneth R. van Wyk
Re: Design flaw in Lexar JumpDrive Greenarrow 1
Wednesday, 29 September
Fw: Join us for today's live webcast, "5 Hidden Tactics for Secure Programming" Greenarrow 1
Thursday, 30 September
RE: Design flaw in Lexar JumpDrive Joel Kamentz
eWeek: App Developers Need to Redouble Security Efforts Kenneth R. van Wyk