Secure Coding: by date

125 messages starting Jun 30 04 and ending Sep 30 04
Date index | Thread index | Author index


Wednesday, 30 June

Re: ACM Queue article and security education George Capehart

Thursday, 01 July

RE: ACM Queue article and security education Michael Canty
RE: ACM Queue article and security education Peter Amey
Re: ACM Queue article and security education Blue Boar
RE: ACM Queue article and security education Michael S Hines
Re: ACM Queue article and security education ljknews
Re: ACM Queue article and security education Blue Boar

Friday, 02 July

RE: ACM Queue article and security education Peter Amey
RE: ACM Queue article and security education Peter Amey
Re: ACM Queue article and security education ljknews
Education and security -- another perspective (was "ACM Queue - Content") Wall, Kevin
Best practices training Gary McGraw
Re: ACM Queue article and security education Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") der Mouse
Re: ACM Queue article and security education David A. Wheeler
Risk Analysis: Building Security In #3 Gary McGraw

Monday, 05 July

Re: Education and security -- another perspective (was "ACM Queue - Content") Fernando Schapachnik
Re: Education and security -- another perspective (was "ACM Queue - Content") der Mouse

Tuesday, 06 July

Re: Education and security -- another perspective (was "ACM Queue - Content") Fernando Schapachnik
Protecting users from their own actions Kenneth R. van Wyk
Re: Education and security -- another perspective (was "ACM Queue - Content") Dana Epp
Re: Education and security -- another perspective (was "ACM Queue - Content") Dana Epp
RE: Protecting users from their own actions Wall, Kevin
Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
Re: Education and security -- another perspective (was "ACM Queue - Content") Mark Rockman

Wednesday, 07 July

Re: Protecting users from their own actions Kenneth R. van Wyk
Re: Education and security -- another perspective (was "ACM Queue - Content") James Walden
Re: Education and security -- another perspective (was "ACM Queue - Content") James Walden
Re: Education and security -- another perspective (was "ACM Queue - Content") ljknews
RE: Education and security -- another perspective (was "ACM Queue - Content") Wall, Kevin

Thursday, 08 July

Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
Re: Education and security -- another perspective (was "ACM Queue - Content") der Mouse
Re: Education and security -- another perspective (was "ACM Queue - Content") ljknews
Re: Education and security -- another perspective (was "ACM Queue - Content") James Walden
Re: Education and security -- another perspective (was "ACM Queue - Content") Julie JCH Ryan, D.Sc.
Re: Education and security -- plus safety, reliability and availability Jim & Mary Ronback
Re: Education and security -- another perspective (was "ACM Queue - Content") Dana Epp
Re: Education and security -- another perspective (was "ACM Queue - Content") Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") Jose Nazario
Re: Education and security -- another perspective (was "ACM Queue - Content") Fernando Schapachnik
Re: Education and security -- plus safety, reliability and availability Dana Epp
RE: Education and security -- another perspective (was "ACM Queue - Content") Peter Amey
RE: Education and security -- another perspective (was "ACM Queue - Content") Peter Amey
Re: Education and security -- plus safety, reliability and availability Gary McGraw
Re: Education and security -- another perspective (was "ACM Queue - Content") Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") Blue Boar
Re: Education and security -- another perspective (was "ACM Queue - Content") Jose Nazario

Friday, 09 July

Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
RE: Education and security -- another perspective (was "ACM Queue - Content") Peter Amey
Re: Education and security -- another perspective (was "ACM Queue - Content") Crispin Cowan
Secure Coding & Wikipedia Fabien
RE: Education and security -- another perspective (was "ACM Queue - Content") David Crocker
Programming languages used for security Wall, Kevin
Re: Programming languages used for security Fabien
RE: Education and security -- another perspective (was "ACM Queue - Content") ljknews
RE: Education and security -- another perspective (was "ACM Queue - Content") Wall, Kevin
Re: Programming languages used for security ljknews
Re: Programming languages used for security Crispin Cowan
RE: Programming languages used for security David Crocker
Re: Programming languages used for security Crispin Cowan

Saturday, 10 July

Re: Programming languages used for security der Mouse
Re: Programming languages used for security Crispin Cowan
Re: Programming languages used for security Dana Epp
RE: Programming languages used for security Wall, Kevin
RE: Programming languages used for security David Crocker
Re: Programming languages used for security James Walden
Re: Programming languages used for security der Mouse
RE: Programming languages used for security Wall, Kevin

Monday, 19 July

Programming languages -- the "third rail" of secure coding Kenneth R. van Wyk

Tuesday, 20 July

RE: Programming languages -- the "third rail" of secure coding Michael S Hines
Re: Programming languages -- the "third rail" of secure coding Dave Aronson
RE: Programming languages -- the "third rail" of secure coding ljknews
Re: Programming languages -- the "third rail" of secure coding der Mouse

Wednesday, 21 July

Re: Programming languages -- the "third rail" of secure coding Mark Rockman
RE: Programming languages -- the "third rail" of secure coding Peter Amey
RE: Programming languages -- the "third rail" of secure coding Wall, Kevin
RE: Programming languages -- the "third rail" of secure coding Nick Lothian
Re: Programming languages -- the "third rail" of secure coding Crispin Cowan
Re: Programming languages -- the "third rail" of secure coding Erik van Konijnenburg
Re: Programming languages -- the "third rail" of secure coding James Walden
Programming languages -- PHP David A. Wheeler

Thursday, 22 July

Developers Blame Users for security problems Greenarrow 1
Re: Programming languages -- the "third rail" of secure coding Craig E. Ward
RE: Programming languages -- the "third rail" of secure coding Michael S Hines

Friday, 23 July

Re: Programming languages -- the "third rail" of secure coding Mark Rockman

Friday, 30 July

RE: Programming languages -- the "third rail" of secure co ding Jeremy Epstein

Sunday, 01 August

RE: Programming languages -- the "third rail" of secure Nick Lothian
Re: Programming languages -- the "third rail" of secure coding Glenn and Mary Everhart
RE: Programming languages -- the "third rail" of secure coding ljknews

Monday, 02 August

RE: Programming languages -- the "third rail" of secure co ding Peter Amey
Buffer Overrun Mark Rockman
RE: Programming languages -- the "third rail" of secure coding Nick Lothian
RE: Programming languages -- the "third rail" of secure coding ljknews

Tuesday, 03 August

Book review - Threat Modeling Kenneth R. van Wyk

Friday, 06 August

Re: Programming languages -- the "third rail" of secure Crispin Cowan

Sunday, 08 August

Top security papers Matt Setzer

Monday, 09 August

Re: Top security papers Peter G. Neumann
RE: Top security papers Wall, Kevin
Re: Top security papers Julie JCH Ryan, D.Sc.
RE: Top security papers Jeremy Epstein
Re: Top security papers Crispin Cowan

Tuesday, 10 August

Re: Top security papers Nash
Re: Top security papers George Capehart

Wednesday, 11 August

OT re Cliff Stoll (was Re: Top security papers) Dave Aronson

Tuesday, 17 August

Collaboration in a Secure Development Process Gunnar Peterson

Thursday, 19 August

Re: Book review - Threat Modeling Jared W. Robinson
BOUNCE sc-l () securecoding org: Approval required: ken

Friday, 20 August

[paper] Model Checking One Million Lines of C Code Jose Nazario

Monday, 23 August

Grass roots secure coding efforts Kenneth R. van Wyk
RE: Grass roots secure coding efforts Hans Westphal
Re: Grass roots secure coding efforts Kenneth R. van Wyk

Wednesday, 01 September

Opinions on strcpy_s, strcat_s, etc.? Jared W. Robinson

Tuesday, 07 September

eSecurityPlanet column on Software Security Kenneth R. van Wyk
Government Computer News (GCN) -- Contract addendum could enforce software security Kenneth R. van Wyk

Wednesday, 08 September

Re: Government Computer News (GCN) -- Contract addendum could enforce software security Jeff Williams
Re: eSecurityPlanet column on Software Security Jari Pirhonen

Friday, 10 September

ComputerWorld interview with Theo de Raadt on Software Security Kenneth R. van Wyk
Re: ComputerWorld interview with Theo de Raadt on Software Security James Walden
Re: ComputerWorld interview with Theo de Raadt on Software Security ljknews

Sunday, 12 September

Security and Usability Article Gunnar Peterson

Tuesday, 28 September

Design flaw in Lexar JumpDrive Kenneth R. van Wyk
Re: Design flaw in Lexar JumpDrive Greenarrow 1

Wednesday, 29 September

Fw: Join us for today's live webcast, "5 Hidden Tactics for Secure Programming" Greenarrow 1

Thursday, 30 September

RE: Design flaw in Lexar JumpDrive Joel Kamentz
eWeek: App Developers Need to Redouble Security Efforts Kenneth R. van Wyk