http://www.nosdeputes.fr/anne-yvonne-le-dain http://www.assemblee-nationale.fr/presse/communiques/20150409-11.asp
voir portail de L'office parlementaire d'évaluation des choix scientifiques et technologiques http://www.assemblee-nationale.fr/commissions/opecst-index.asp
sénat, http://www.senat.fr/opecst/index.html
auditions http://www.senat.fr/rap/r14-271-2/r14-271-2.html
http://www.r00tsec.com/2011/10/list-of-javascript-obfuscate-tools.html
dollars javascript code – yet another Javascript obfuscation method for cc frauds
http://extraexploit.blogspot.fr/2010/10/dollars-javascript-code-yet-another.html
http://relentless-coding.org/projects/jsdetox/info
http://stackoverflow.com/questions/26382658/alternative-to-window-crypto-signtext-in-firefox-33
encryption exemple http://blog.engelke.com/2014/07/16/symmetric-cryptography-in-the-browser-conclusion/
http://qnimate.com/post-series/web-cryptography-api-tutorial/
subtle crypto object https://msdn.microsoft.com/en-us/library/ie/dn302325%28v=vs.85%29.aspx
Mouse Input - OSDev Wiki http://wiki.osdev.org/Mouse_Input
...
The PS/2 Mouse Interface http://www.computer-engineering.org/ps2mouse/
http://letsmakerobots.com/content/reading-usb-mouse-data-linux-somebody-else-c-app-and-my-python (http://letsmakerobots.com/node/9355)
Writing Linux Mouse Drivers (Alan Cox) http://www.linux-mag.com/id/330/
--
https://131002.net/blake/
http://www.seanet.com/~bugbee/crypto/blake/
http://www.cl.cam.ac.uk/~fms27/serpent/
https://www.gnupg.org/%28de%29/documentation/manuals/gcrypt/Working-with-cipher-handles.html
http://search.cpan.org/~aar/Crypt-GCrypt-1.24/lib/Crypt/GCrypt.pm
https://github.com/doegox/python-cryptoplus http://wiki.yobi.be/wiki/PyCryptoPlus
http://stackoverflow.com/questions/14174486/issue-with-encryption-and-decryption-of-a-file-in-c-with-aes256-cbc-using-libgcr
https://en.wikipedia.org/wiki/Zip_%28file_format%29
https://en.wikipedia.org/wiki/Ciphertext_stealing#CBC_ciphertext_stealing
https://fr.wikipedia.org/wiki/Mode_d%27op%C3%A9ration_%28cryptographie%29#Chiffrement_avec_vol_de_texte_:_.C2.AB_CipherText_Stealing_.C2.BB_.28CTS.29
http://stackoverflow.com/questions/10411036/how-can-i-encrypt-decrypt-data-using-aes-cbccts-ciphertext-stealing-mode-in-p
http://stackoverflow.com/questions/12328320/php-implementing-ciphertext-stealing-cts-with-cbc
Simian Army consists of services (Monkeys) in the cloud for generating various kinds of failures, detecting abnormal conditions, and testing our ability to survive them. The goal is to keep our cloud safe, secure, and highly available. More details can be found at this blog.
http://techblog.netflix.com/2011/07/netflix-simian-army.html
Hiding executables and DLLs in PNG files is yet another attempt to avoid detection and deliver malicious content to user systems. In this instance, the malicious content is placed at the end of the real PNG file data.
kvm, virsh, xml....
à voir pour compléter la caisse à clous
myst (my snifing tool) arp cache poisoning MitM with scapy
via http://sebsauvage.net/links/?O4AeMQ
bouquemarque: répondre au FUD
http://timesofindia.indiatimes.com/tech/tech-news/After-layoffs-IBM-announces-bonus-for-top-executives/articleshow/46074624.cms
http://www.livenewspak.com/ibm-brings-back-bonuses-for-top-execs-even-as-profits-slide/
http://www.usatoday.com/story/money/2015/01/30/despite-lackluster-performance-ibms-rometty-gets-36-million-2014-bonus/22613197/
http://www.poughkeepsiejournal.com/story/news/local/2015/01/30/ibm-ceo-pay-raise/22618399/
http://uk.businessinsider.com/ibm-ceo-ginni-rometty-gets-a-raise-2015-1?r=US
anti-anti-adblock - utilise greasemonkey
VMware is rejigging the way it shares memory among virtual machines, after turning off Transparent Page Sharing (TPS) because academics identified insecurities in the technology.
The academic paper is entitled “Wait a minute! A fast, Cross-VM attack on AES”
https://eprint.iacr.org/2014/435.pdf
slightly different opinions
http://vsphere-land.com/news/why-the-vmware-vsphere-tps-vulnerability-is-a-big-deal.html
http://wahlnetwork.com/2014/10/20/tps-vulnerability/
Hard-coded RSA keys found in firmware
(-‸ლ)
The EVP functions provide a high level interface to OpenSSL cryptographic functions.
Different performance of openssl speed on the same hardware with AES 256 (EVP and non EVP API)
https://security.stackexchange.com/questions/35036/different-performance-of-openssl-speed-on-the-same-hardware-with-aes-256-evp-an
instrumentation-driven fuzzer for binary formats
American fuzzy lop is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary.
https://linuxfr.org/users/woffer/journaux/fuzzing-eprouver-les-entrees-de-vos-developpements
en signet, très bon texte de Laurent Chemla; Voir les liens dans le texte
suite par kitetoa http://reflets.info/tout-a-cacher/