skip to main | skip to sidebar

Counter-Interference Force

Security ... think about it!

I should be able to resume posting shortly.

Video: Three Natural Laws of Security is currently unavailable. Seeking new hosting site.

2009-05-09

Using pieces of disassembled code, API calls, memory addresses and subroutines associated with the bane of a security team's existence, they analyzed the data by frequency, density, and groupings. Algorithms were then developed and the artists mapped the data to the inputs of the algorithms, which then generated virtual, 3D entities.
Interesting project ... with resulting cool pics!
Posted by rlssec
Newer Post Older Post Home

Video

  • Three Natural Laws of Security

Free Computer Security Measures

  • List of (mostly) free tools (some dangerous if misused)
  • Zone Alarm Firewall
  • Hushmail
  • Eraser
  • CrapCleaner - MRU Eraser
  • Spybot S&D via Download.com
  • Avira Free Personal Anti-virus

Blog Archive

  • ►  2012 (130)
    • February (63)
    • January (67)
  • ►  2011 (721)
    • December (46)
    • November (30)
    • October (50)
    • September (55)
    • August (7)
    • July (53)
    • June (69)
    • May (73)
    • April (70)
    • March (101)
    • February (58)
    • January (109)
  • ►  2010 (1371)
    • December (133)
    • November (127)
    • October (83)
    • September (87)
    • August (79)
    • July (33)
    • June (71)
    • May (149)
    • April (158)
    • March (169)
    • February (143)
    • January (139)
  • ▼  2009 (1213)
    • December (120)
    • November (146)
    • October (149)
    • September (67)
    • August (82)
    • July (119)
    • June (118)
    • May (184)
    • April (228)