Considered harmful

Results: 96



#Item
1Gender / Human behavior / Discrimination / Culture / Gender studies / Gender equality / Chauvinism / Sexism in the United States / Cognitive bias / Unconscious bias training / Google's Ideological Echo Chamber / Gender role

Google’s Ideological Echo Chamber How bias clouds our thinking about diversity and inclusion go/pc-considered-harmful James Damore - damore@ July 2017 Feel free to comment (they aren’t disabled, the doc may just be o

Add to Reading List

Source URL: assets.documentcloud.org

Language: English - Date: 2017-08-07 19:08:06
2Cryptography / Public-key cryptography / Cryptographic hash functions / Key management / Cryptographic protocols / Public key infrastructure / MD5 / X.509 / Public key fingerprint / Collision resistance / MerkleDamgrd construction / SHA-2

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2018-01-29 20:02:27
3Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:12
4

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
    5

    Middleboxes No Longer Considered Harmful Michael Walfish, Jeremy Stribling, Maxwell Krohn, Hari Balakrishnan, Robert Morris, and Scott Shenker∗ MIT Computer Science and Artificial Intelligence Laboratory http://nms.csa

    Add to Reading List

    Source URL: nms.lcs.mit.edu

    Language: English - Date: 2004-11-02 10:03:32
      6

      State considered harmful A proposal for a stateless laptop Joanna Rutkowska December 2015

      Add to Reading List

      Source URL: blog.invisiblethings.org

      Language: English - Date: 2018-06-11 15:43:17
        7Computer hardware / Computing / Computer architecture / Computer memory / Computer security / Side-channel attacks / X86 architecture / Meltdown / Spectre / Lipp / Cache / Michael Schwarz

        Meltdown & Spectre Side-channels considered hARMful Qualcomm Mobile Security SummitMay, San Diego, CA Moritz Lipp (@mlqxyz)

        Add to Reading List

        Source URL: mlq.me

        Language: English - Date: 2018-06-08 04:42:32
        8

        Recursive Make Considered Harmful Peter Miller ABSTRACT For large UNIX projects, the traditional method of building the project is to use recursive

        Add to Reading List

        Source URL: aegis.sourceforge.net

        Language: English - Date: 2008-03-06 20:12:00
          9

          SFS: Random Write Considered Harmful in Solid State Drives Changwoo Mina , Kangnyeon Kimb , Hyunjin Choc , Sang-Won Leed , Young Ik Eome abde Sungkyunkwan University, Korea ac Samsung Electronics, Korea

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2012-01-30 15:25:00
            10

            Regular Expressions Considered Harmful in Client-Side XSS Filters Daniel Bates Adam Barth

            Add to Reading List

            Source URL: www.collinjackson.com

            Language: English - Date: 2010-04-29 17:31:48
              UPDATE