Month: September 2016
[Project] How to build an intelligent mirror – Part 3
Mirror, mirror on the wall, who is the fairest of all? It’s you, Albert. How Albert, our smart mirror, has grown – you can read it here. [written by Roman Kollatschny and Matthias Schmidt]
[Project] How to build an intelligent mirror – Part 2
Mirror, mirror on the wall, who is the fairest of all? It’s you, Albert. How Albert, our smart mirror, has grown – you can read it here. [written by Roman Kollatschny and Matthias Schmidt]
Exploring Docker Security – Part 3: Docker Content Trust
This third and last part of this series intends to give an overview of Docker Content Trust, which in fact combines different frameworks and tools, namely Notary and Docker Registry v2, into a rich and powerful feature set making Docker images more secure.
WhatsApp encrypts !?
The majority of the 1 billion monthly whatsapp users may be a little confused about the tiny yellow info-box in their familiar chat. End-to-end encryption? Is this one of these silly annoying whatsapp-viruses or maybe something good? The first big question is “why”. Why do we need a (so complicated) whatsapp end-to-end encryption? The most…
Secure Systems 2016 – An Overview, Walter Kriha
This is an attempt to provide an overview of the topics in “Secure Systems”, a seminar held during the summer term 2016 at the Stuttgart Media University HdM. Presentations have been given and blog entries into our new MI blog were made. With the chosen topics we have been quite lucky, as some of them…
Botnets – Structural analysis, functional principle and general overview
This paper provides an overview on the most important types of botnets in terms of network topology, functional principle as well as a short definition on the subject matter. By exploring the motivation of botnet operators, the reader will gain more insight into business models and course of actions of key players in the field.…
You must be logged in to post a comment.