acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Computer Card Counter Detects Human Card Counters
From Schneier on Security

Computer Card Counter Detects Human Card Counters

All it takes is a computer that can track every card: The anti-card-counter system uses cameras to watch players and keep track of the actual "count" of the cards...

Six Years of Patch Tuesdays
From Schneier on Security

Six Years of Patch Tuesdays

Nice article summing up six years of Microsoft Patch Tuesdays: The total number of flaws disclosed and patched by the software maker so far this year stands at...

Helpful Hint for Fugitives: Don't Update Your Location on Facebook
From Schneier on Security

Helpful Hint for Fugitives: Don't Update Your Location on Facebook

"Fugitive caught after updating his status on Facebook." It's easy to say "so dumb," and it would be true, but what's interesting is how people just don't think...

Friday Squid Blogging: Squid Robot
From Schneier on Security

Friday Squid Blogging: Squid Robot

Cool. It's from this page.

The Commercial Speech Arms Race
From Schneier on Security

The Commercial Speech Arms Race

A few years ago, a company began to sell a liquid with identification codes suspended in it. The idea was that you would paint it on your stuff as proof of ownership...

Camouflaging a WWII Factory
From Schneier on Security

Camouflaging a WWII Factory

Great pictures.

The Bizarre Consequences of "Zero Tolerance" Weapons Policies at Schools
From Schneier on Security

The Bizarre Consequences of "Zero Tolerance" Weapons Policies at Schools

Good article: Zachary's offense? [He's six years old.] Taking a camping utensil that can serve as a knife, fork and spoon to school. He was so excited about recently...

1777 Steganography
From Schneier on Security

1777 Steganography

Fascinating.

The Current Status of P Versus NP
From Schneier on Security

The Current Status of P Versus NP

Excellent survey.  

The Doghouse: Privacy Inside
From Schneier on Security

The Doghouse: Privacy Inside

I'm just going to quote without comment: About the file: the text message file encrypted with a symmetric key combine 3 modes 1st changing the original text...

David Dittrich on Criminal Malware
From Schneier on Security

David Dittrich on Criminal Malware

Good essay: "Malware to crimeware: How far have they gone, and how do we catch up?" ;login:, August 2009: I have survived over a decade of advances in delivery...

Wi-fi Blocking Paint
From Schneier on Security

Wi-fi Blocking Paint

I wrote about this in 2004. This is an improved product: While paints blocking lower frequencies have been available for some time, Mr Ohkoshi's technology is...

Using Wi-fi to "See" Through Walls
From Schneier on Security

Using Wi-fi to "See" Through Walls

Impressive.

Friday Squid Blogging: Squidsoup
From Schneier on Security

Friday Squid Blogging: Squidsoup

Gallery of virtual art.

Pigs Defeating RFID-Enabled Feeding Systems
From Schneier on Security

Pigs Defeating RFID-Enabled Feeding Systems

Pretty clever (for a pig, that is).

1,000 Cybersecurity Experts
From Schneier on Security

1,000 Cybersecurity Experts

Yesterday, DHS Secretary Janet Napolitano said that the U.S. needed to hire 1,000 cybersecurity experts over the next three years. Bob Cringly doubts that there...

The Futility of Defending the Targets
From Schneier on Security

The Futility of Defending the Targets

This is just silly: Beaver Stadium is a terrorist target. It is most likely the No. 1 target in the region. As such, it deserves security measures commensurate...

Detecting Forged Signatures Using Pen Pressure and Angle
From Schneier on Security

Detecting Forged Signatures Using Pen Pressure and Angle

Interesting: Songhua Xu presented an interesting idea for measuring pen angle and pressure to present beautiful flower-like visual versions of a handwritten signature...

Hotel Safe Scam
From Schneier on Security

Hotel Safe Scam

This is interesting: Since then, his scams have tended to take place in luxury hotels around the world. Typically, he would arrive at a hotel, claim to be a guest...

Detecting People Who Want to Do Harm
From Schneier on Security

Detecting People Who Want to Do Harm

I'm dubious: At a demonstration of the technology this week, project manager Robert P. Burns said the idea is to track a set of involuntary physiological reactions...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account