My old S.P.U.T.U.M / Cabal Network Security business cards Image by dmuth Those of you who were active in the anti-spam community in the late 90s/early 2000s might remember this group. Their websites were at www.sputum.com and www.cabal.net and can be pulled up through The Wayback Machine. Also, SPUTUM == Subgenius Police, Usenet Tactical Unit, […]
Security on the Internet is full of buzzword terminology and endless acronyms: Public keys, private keys, key exchange, SSL, SSH, PGP. In an attempt to clear up at least a little bit of the mess, we have put together a video that explains basic Diffie-Hellman key exchange using tennis balls. View this and other videos […]
The Missing Times: News Media Complicity in the UFO Cover-up is an investigation by Author and Researcher Terry Hansen into whether some of America’s most influential news organizations, many of which have maintained close ties to the US intelligence community, have willingly suppressed full and accurate news coverage of the UFO phenomenon for a variety […]
How Do I: Use .NET Frameworks Code Access Security?