Secure Coding: by author

49 messages starting Nov 17 05 and ending Oct 21 05
Date index | Thread index | Author index


Beau Diddley van Wyk

test Beau Diddley van Wyk (Nov 17)

Benjamin Tomhave

application security reqs - standards comparison? Benjamin Tomhave (Nov 25)

Chris Wysopal

Intel turning to hardware for rootkit detection Chris Wysopal (Dec 14)

contact

WASC Threat Classification in 4 languages contact (Oct 05)
Announcement: The Web Application Firewall Evaluation Criteria v1 contact (Oct 10)

Crispin Cowan

Intel turning to hardware for rootkit detection Crispin Cowan (Dec 14)

Dana Epp

Managing the insider threat through code obfuscation Dana Epp (Dec 15)

David A. Wheeler

Countering Trusting Trust through Diverse Double-Compiling David A. Wheeler (Dec 14)

David Eisner

Intel turning to hardware for rootkit detection David Eisner (Dec 13)

Gadi Evron

Intel turning to hardware for rootkit detection Gadi Evron (Dec 13)

Gary McGraw

BSI: IEEE article on seven pernicious kingdoms Gary McGraw (Nov 30)
Intel turning to hardware for rootkit detection Gary McGraw (Dec 14)
Intel turning to hardware for rootkit detection Gary McGraw (Dec 14)

Greenarrow 1

Intel turning to hardware for rootkit detection Greenarrow 1 (Dec 13)

Gunnar Peterson

Re: Announcement: The Web Application Firewall Evaluation Criteria v1 Gunnar Peterson (Oct 11)
Build Security In Gunnar Peterson (Oct 09)

James Stibbards

Managing the insider threat through code obfuscation James Stibbards (Dec 15)

Jari Pirhonen

application security reqs - standards comparison? Jari Pirhonen (Nov 07)
Re: application security reqs - standards comparison? Jari Pirhonen (Nov 08)

Jeremy Epstein

Managing the insider threat through code obfuscation Jeremy Epstein (Dec 15)
ZDNet: Attackers switching to applications, media play ers Jeremy Epstein (Nov 22)

j eric townsend

How to find firms to do external code reviews? j eric townsend (Dec 05)

Johan Peeters

secure application development course Johan Peeters (Dec 21)

Jose Nazario

Managing the insider threat through code obfuscation Jose Nazario (Dec 15)

Kenneth R. van Wyk

Intel turning to hardware for rootkit detection Kenneth R. van Wyk (Dec 13)
Managing the insider threat through code obfuscation Kenneth R. van Wyk (Dec 15)
Slashdot | Developing Securely In Windows Kenneth R. van Wyk (Nov 21)
Missing URL -- ZDNet: Attackers switching to applications, media players Kenneth R. van Wyk (Nov 22)
Managing the insider threat through code obfuscation Kenneth R. van Wyk (Dec 15)
Countering Trusting Trust through Diverse Double-Compiling Kenneth R. van Wyk (Dec 14)
ZDNet: Attackers switching to applications, media players Kenneth R. van Wyk (Nov 22)
test 2 Kenneth R. van Wyk (Nov 17)
Administrative: SC-L changes Kenneth R. van Wyk (Nov 18)
test posting Kenneth R. van Wyk (Nov 17)

ljknews

Re: Announcement: The Web Application Firewall Evaluation Criteria v1 ljknews (Oct 10)
Intel turning to hardware for rootkit detection ljknews (Dec 14)
Intel turning to hardware for rootkit detection ljknews (Dec 13)
Intel turning to hardware for rootkit detection ljknews (Dec 13)
Intel turning to hardware for rootkit detection ljknews (Dec 14)
How to find firms to do external code reviews? ljknews (Dec 06)

Matt Bishop

Managing the insider threat through code obfuscation Matt Bishop (Dec 15)

Michael S Hines

Intel turning to hardware for rootkit detection Michael S Hines (Dec 14)
Intel turning to hardware for rootkit detection Michael S Hines (Dec 13)

mudge

Intel turning to hardware for rootkit detection mudge (Dec 13)

oddbjorn

Re: application security reqs - standards comparison? oddbjorn (Nov 08)

Ron Forrester

Intel turning to hardware for rootkit detection Ron Forrester (Dec 13)

Steven M. Bellovin

Intel turning to hardware for rootkit detection Steven M. Bellovin (Dec 13)
Countering Trusting Trust through Diverse Double-Compiling Steven M. Bellovin (Dec 14)

Stuart Moore

story of 2 patches to fix 1 bug Stuart Moore (Oct 21)