- Full text PDF available (74)
- This year (8)
- Last 5 years (55)
- Last 10 years (68)
Journals and Conferences
Electronic mail has become the unexciting and mundane electronic communication medium we love to hate. It wasn’t always that way. Hate is a fairly recent emotion. Email has been with us in one form or another since the earliest days of computer networks and bulletin board services. From inauspicious beginnings, it became one of the three “killer apps,”… (More)
F rancis Bacon is reported to have said that the three things that made his world different from that of the ancient Greeks and Romans were the printing press, the compass and gunpowder. It is instructive to note he didn’t mention the water pump, the rigid horse collar, or lateen sails—all of which were critical to the advancement of agriculture and… (More)
Malicious software knows no bounds.
T he concept of non-monolithic file systems is not new. “File forks” were an integral part of the original Macintosh Hierarchical File System. Apple separated file information into data and resource forks, where the resource fork contains a resource map followed by the resources, or links to resources, needed to use the data. Typical resources would include… (More)
The security risks of WiFi connectivity have been established---the reasons for these risks of intrusion are not as well understood.
Unmasking deceptive schemes that range from clever to clumsy.
Although WiFi technology security vulnerabilities are well known, the extent of these vulnerabilities may be surprising: War driving experiences identify many potential points of entry.