Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.
Dropbear is an SSH 2 server, designed to be usable in small memory environments.
It supports:
* Main features of SSH 2 protocol
* Implements X11 forwarding, and authentication-agent forwarding
for OpenSSH clients
* Compatible with OpenSSH ~/.ssh/authorized_keys public key
authentication
This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that
combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy
consumption and portability. This technology has applications in a wide range of fixed and
portable secured devices including access control systems, cash terminals, public transport, PCs,
PDAs, Smart Card readers and motor vehicles. It can be used in almost any situation where
rapid, reliable and accurate identification or authentication of an individual is required.
The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32® -based applications. Application developers can use the functions in the CryptoAPI without knowing anything about the underlying implementation, in much the same way as they can use a graphics library without knowing anything about the particular graphics hardware configuration.
《為Windows Vista編寫安全的代碼》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - Cryptographic Enhancements
Chapter 8 - authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log uses a basic user authentication system to ensure user accountability and log integrity. It also has a RTF editor integrated into it.
The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
This a linux device driver for Ralink RT2500USB b/g WLAN Card.
This driver implements basic 802.11 function.
Infrastructure and Ad-hoc mode with open or shared or wpapsk or wpa2psk authentication method.
WEP-40 and WEP-104 or tkip or aes encryption.
The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the library: Base64 encoding/decoding Binary tree Random number HMAC authentication MD5 DES RTP MBus SAP