Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Indie Software Security: A ~12-Step Program (matasano.com)
31 points by tptacek on Sept 24, 2009 | past | 13 comments
The Security Implications Of Google Native Client (matasano.com)
1 point by yan on Sept 10, 2009 | past
This is the exploit equivalent of that guy who played the perfect game (2008) (matasano.com)
71 points by req2 on July 6, 2009 | past | 33 comments
A Working Theory About RC4 (matasano.com)
8 points by codahale on June 10, 2009 | past
Typing The Letters A-E-S Into Your Code? You’re Doing It Wrong (matasano.com)
258 points by cscott on June 3, 2009 | past | 74 comments
The Security Implications Of Google Native Client (matasano.com)
110 points by ilitirit on May 15, 2009 | past | 23 comments
Ruby for Penetration Testers: Announcing Ruby Black Bag (matasano.com)
1 point by kf on March 20, 2009 | past
Patch Your (non-DJBDNS) Server Now. Dan Was Right. I Was Wrong. (matasano.com)
5 points by antiform on July 10, 2008 | past
So… How Do I Manage It? (matasano.com)
1 point by llimllib on July 9, 2008 | past
Ruby’s Vulnerability Handling Debacle (matasano.com)
19 points by luckystrike on July 2, 2008 | past | 5 comments
How To Hide^H^H^Handle Security Problems in Your Products (matasano.com)
1 point by nickb on June 27, 2008 | past
37Signals "just says no" to feature request: "please fix that security flaw" (matasano.com)
29 points by tptacek on June 26, 2008 | past | 33 comments
Apple Ships SUIDs With AppleScript Dictionaries. Hilarity Ensues. (matasano.com)
1 point by gaika on June 19, 2008 | past
Decompiling Perl and Python (matasano.com)
4 points by nickb on June 3, 2008 | past
Retsaot is Toaster, Reversed: Quick ‘n Dirty Firmware Reversing (matasano.com)
3 points by breily on April 29, 2008 | past
This New Vulnerability: Dowd’s Inhuman Flash Exploit (matasano.com)
38 points by kf on April 16, 2008 | past | 6 comments
Aguri: Coolest Data Structure You've Never Heard Of (matasano.com)
57 points by iamelgringo on Jan 22, 2008 | past | 39 comments
Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes (matasano.com)
7 points by nickb on Sept 10, 2007 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: