Hacker Newsnew | past | comments | ask | show | jobs | submit | turnersr's submissionslogin
1.United Nations signs off on 'right to privacy in the digital age' (theregister.co.uk)
2 points by turnersr on Jan 17, 2014 | past
2. "Red October" - part two, the modules (securelist.com)
3 points by turnersr on Jan 18, 2013 | past
3.JS Implementation Of WebCrypt, funded by the US Department of Homeland Security (polycrypt.net)
3 points by turnersr on Jan 14, 2013 | past | 1 comment
4.The Parallella Board Uncovered (adapteva.com)
3 points by turnersr on Oct 24, 2012 | past
5.Everything You Wanted To Know About OpenSSL (But Were Afraid to Ask)
3 points by turnersr on Oct 22, 2012 | past
6.New Metasploit 0-day exploit for IE 7, 8 & 9 on Windows XP, Vista, and 7 (rapid7.com)
138 points by turnersr on Sept 17, 2012 | past | 51 comments
7.Protect JS crypto keys from XSS, using iframes and postMessage (hoffman-andrews.com)
3 points by turnersr on Aug 5, 2012 | past
8.Advanced Exploitation of Mozilla Firefox Use-after-free Vulnerability (vupen.com)
1 point by turnersr on June 25, 2012 | past
9.Efficient Padding Oracle Attacks on Cryptographic Hardware (inria.fr)
2 points by turnersr on June 25, 2012 | past
10.Tor malware (torproject.org)
1 point by turnersr on June 24, 2012 | past
11.Symbolic methods for security analysis (ucsd.edu)
1 point by turnersr on June 3, 2012 | past
12.Ethiopia Introduces Deep Packet Inspection (torproject.org)
2 points by turnersr on May 31, 2012 | past
13.Swift: Scripting Language for Many-Task Computing (uchicago.edu)
50 points by turnersr on May 31, 2012 | past | 13 comments
14.Dempsy: Distributed Elastic Message Processing System (dempsy.github.com)
35 points by turnersr on May 29, 2012 | past | 5 comments
15.Backdoor found in a China-made US military chip (cam.ac.uk)
536 points by turnersr on May 27, 2012 | past | 149 comments
16.Ruby SQL injection library:UNION stacked queries, logarithmic blind injection (sourceforge.net)
1 point by turnersr on May 11, 2012 | past
17.Encrypted chat in the browser (crypto.cat)
2 points by turnersr on April 30, 2012 | past
18.Plaid CTF April 27, 2012 21:00 UTC (plaidctf.com)
1 point by turnersr on April 9, 2012 | past
19.Exploit Linux Machines Through Fun Challenges (exploit-exercises.com)
160 points by turnersr on April 8, 2012 | past | 14 comments
20.VX Heavens Collection (thepiratebay.se)
1 point by turnersr on April 5, 2012 | past
21.Cracking PIN and Password Locks On Android (spreitzenbarth.de)
1 point by turnersr on April 4, 2012 | past
22.Prototyping Cryptosystems With Python (charm-crypto.com)
2 points by turnersr on April 4, 2012 | past
23.Secure Multi-Party Computations With Python (viff.dk)
17 points by turnersr on April 4, 2012 | past | 1 comment
24.Side-Channel Vulnerabilities in Web Applications (virginia.edu)
2 points by turnersr on Feb 22, 2012 | past
25.Inferring Context-Free Grammars (wikipedia.org)
2 points by turnersr on Dec 8, 2011 | past
26.Ask HN: Security Researcher Jobs
7 points by turnersr on Nov 26, 2011 | past | 3 comments
27.Interested in a 2nd edition of "Real World Haskell"? (spreadsheets.google.com)
6 points by turnersr on Aug 25, 2011 | past | 3 comments
28.Application of Algebraic Coding Theory (youtube.com)
4 points by turnersr on Aug 12, 2011 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: