sending ssh packets at a flat rate to obscure keystroke timings
2024-09-13
A technique used to thwart SSH keystroke timing attacks is to send keystroke packets at a flat rate. Rather than immediately sending the packet, send ...
Read More
SSH keystroke timing attack
2024-09-13
A SSH keystroke timing attack occurs when an adversary is able to capture packets of ssh sessions, and measure the timing between keystrokes. Using ...
Read More
statistical learning
2024-09-13
Statistical learning is the process of learning based on the statistical structure of input.
Statistical learning has applications in language ...
Read More
Statistics
2024-09-13
Statistics is a Mathematical discipline that includes the collection, description, analysis, and inference of conclusions derived from quantitative ...
Read More
telnet, rlogin, ftp are insecure networking protcols, used broadly into the 00's
2024-09-13
When I began studying computer security in the mid 1990’s, encryption on network protocols was the exception, not the norm.
Many devices used ...
Read More
timinganalysisssh-song_wagner_tian2001
2024-09-11
Read More
Gaussian distribution
performance
2024-09-09
Performance is the measure of useful work completed within a time period.
Performance is a common metric used in computer science, athletics, and ...
Read More
refactoring
2024-09-09
Refactoring in computer science and software development is the process of making changes to existing codebases without changing its expected ...
Read More
chmod 777
2024-09-03
Often, Linux and Unix administrators will get frustrated with figuring out permissions and use `chmod 777` on the files they are having issues with in ...
Read More
hash cracking
2024-09-03
Password hashes can be ran through hash cracking software to discover a password’s unencrypted, plain-text form.
John the Ripper and Hashcat are ...
Read More