HOME





Alexander Sotirov
Alexander Sotirov is a computer security researcher. He has been employed by Determina and VMware. In 2012, Sotirov co-founded New York based Trail of Bits with Dino Dai Zovi and Dan Guido, where he currently serves as co-CEO. He is well known for his discovery of the ANI browser vulnerability, as well as, the so-called Heap Feng Shui technique for exploiting heap buffer overflows in browsers. In 2008, he presented research at Black Hat showing how to bypass memory protection safeguards in Windows Vista. Together with a team of industry security researchers and academic cryptographers, he published research on creating a rogue certificate authority by using collisions of the MD5 The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321. MD5 ... cryptographic hash function in December 2008. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Sofia, Bulgaria
Sofia is the Capital city, capital and List of cities and towns in Bulgaria, largest city of Bulgaria. It is situated in the Sofia Valley at the foot of the Vitosha mountain, in the western part of the country. The city is built west of the Iskar (river), Iskar river and has many mineral springs, such as the Sofia Central Mineral Baths. It has a humid continental climate. Known as Serdica in Classical antiquity, antiquity, Sofia has been an area of human habitation since at least 7000 BC. The recorded history of the city begins with the attestation of the conquest of Serdica by the Roman Republic in 29 BC from the Celtic settlement of Southeast Europe, Celtic tribe Serdi. During the decline of the Roman Empire, the city was raided by Huns, Visigoths, Pannonian Avars, Avars, and Slavs. In 809, Serdica was incorporated into the First Bulgarian Empire by Khan (title), Khan Krum and became known as Sredets. In 1018, the Byzantine Empire, Byzantines ended Bulgarian rule until 1194, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Security Specialists
A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic sets of operations known as Computer program, ''programs'', which enable computers to perform a wide range of tasks. The term computer system may refer to a nominally complete computer that includes the Computer hardware, hardware, operating system, software, and peripheral equipment needed and used for full operation; or to a group of computers that are linked and function together, such as a computer network or computer cluster. A broad range of Programmable logic controller, industrial and Consumer electronics, consumer products use computers as control systems, including simple special-purpose devices like microwave ovens and remote controls, and factory devices like industrial robots. Computers are at the core of general-purpose devices ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Living People
Purpose: Because living persons may suffer personal harm from inappropriate information, we should watch their articles carefully. By adding an article to this category, it marks them with a notice about sources whenever someone tries to edit them, to remind them of WP:BLP (biographies of living persons) policy that these articles must maintain a neutral point of view, maintain factual accuracy, and be properly sourced. Recent changes to these articles are listed on Special:RecentChangesLinked/Living people. Organization: This category should not be sub-categorized. Entries are generally sorted by family name In many societies, a surname, family name, or last name is the mostly hereditary portion of one's personal name that indicates one's family. It is typically combined with a given name to form the full name of a person, although several give .... Maintenance: Individuals of advanced age (over 90), for whom there has been no new documentation in the last ten ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Violet Blue (author)
Violet Blue is an American journalist, author, editor, advisor, and educator. Blue wrote a weekly sex column for the ''San Francisco Chronicle'' until 2010. In her podcast, Open Source Sex, she reads erotica and discusses topics such as fetishes and oral sex. Awards * In January 2007, Forbes named her one of The Web Celeb 25. * Blue was named "Best Sex Educator" in 2013 by the ''San Francisco Weekly.'' Name Violet Blue is the author's legal name. In an online article, she has stated: My name really is Violet Blue. Despite any rubbish you’ve seen by my harassers and detractors, Violet Blue is the name on my passport, social security card, all my ID, and it is who I am. On August 19, 2011, Blue's Google+ account was suspended for failing to comply with the Google+ real name policy, but this decision was reversed three days later. Litigation In October 2007, Blue filed a lawsuit against adult actress Ada Mae Johnson, who had performed as "Violet Blue" since 2000, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hash Collision
In computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case is derived from a hash function which takes a data input and returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms, have been created with the intent of being Collision resistance, collision resistant, they can still sometimes map different data to the same hash (by virtue of the pigeonhole principle). Malicious users can take advantage of this to mimic, access, or alter data. Due to the possible negative applications of hash collisions in data management and computer security (in particular, cryptographic hash functions), collision avoidance has become an important topic in computer security. Background Hash collisions can be unavoidable depending on the number of objects in a set and whether or not the bit string they are mapped to is long enough in length. When there is a s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Certificate Authority
In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard. One particularly common use for certificate authorities is to sign certificates used in HTTPS, the secure browsing protocol for the World Wide Web. Another common use is in issuing identity cards by national governments for use in electronically signing documents. Overview Trusted certificates can be used to create secure connections to a server via the Internet. A certificate is ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Criticism Of Windows Vista
Windows Vista, an operating system released by Microsoft for consumers on January 30, 2007, has been widely criticized by reviewers and users. Due to issues with new security features, performance, driver support and product activation, it has been the subject of a number of negative assessments by various groups. Security Driver signing requirement For security reasons, 64-bit versions of Windows Vista allow only signed drivers to be installed in kernel mode. Because code executing in kernel mode enjoys wide privileges on the system, the signing requirement aims to ensure that only code with a known origin executes at this level. In order for a driver to be signed, a developer/software vendor has to obtain an Authenticode certificate with which to sign the driver. Authenticode certificates can be obtained from certificate authorities trusted by Microsoft. Microsoft trusts the certificate authority to verify the applicant's identity before issuing a certificate. If a driver is ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Heap Overflow
A heap overflow, heap overrun, or heap smashing is a type of buffer overflow that occurs in the heap data area. Heap overflows are exploitable in a different manner to that of stack-based overflows. Memory on the heap is dynamically allocated at runtime and typically contains program data. Exploitation is performed by corrupting this data in specific ways to cause the application to overwrite internal structures such as linked list pointers. The canonical heap overflow technique overwrites dynamic memory allocation linkage (such as malloc metadata) and uses the resulting pointer exchange to overwrite a program function pointer. For example, on older versions of Linux, two buffers allocated next to each other on the heap could result in the first buffer overwriting the second buffer's metadata. By setting the in-use bit to zero of the second buffer and setting the length to a small negative value which allows null bytes to be copied, when the program calls free() on the first ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ANI (file Format)
The ANI file format is a graphics file format used for animated mouse cursors on the Microsoft Windows operating system. The format is based on the Microsoft Resource Interchange File Format, which is used as a container for storing the individual frames (which are standard Windows icons) of the animation. File structure The RIFF file structure description: #define AF_ICON 0x1 // Frames are in Windows ICO format. #define AF_SEQUENCE 0x2 // Animation is sequenced. typedef struct ANIHEADER; RIFF('ACON' NAM(<ZSTR>).html" ;"title="IST('INFO' [INAM()">IST('INFO' [INAM() // Title. Optional. [IART() // Author. Optional. )] 'anih'() // ANI file header. ['rate'()] // Rate table (array of jiffies). // If the AF_SEQUENCE ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Bulgaria
Bulgaria, officially the Republic of Bulgaria, is a country in Southeast Europe. It is situated on the eastern portion of the Balkans directly south of the Danube river and west of the Black Sea. Bulgaria is bordered by Greece and Turkey to the south, Serbia and North Macedonia to the west, and Romania to the north. It covers a territory of and is the tenth largest within the European Union and the List of European countries by area, sixteenth-largest country in Europe by area. Sofia is the nation's capital and List of cities and towns in Bulgaria, largest city; other major cities include Burgas, Plovdiv, and Varna, Bulgaria, Varna. One of the earliest societies in the lands of modern-day Bulgaria was the Karanovo culture (6,500 BC). In the 6th to 3rd century BC, the region was a battleground for ancient Thracians, Persians, Celts and Ancient Macedonians, Macedonians; stability came when the Roman Empire conquered the region in AD 45. After the Roman state splintered, trib ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]