Tämä artikkeli on varattu 17.3.2008 pidettävän esitelmän webbimateriaaliin.
Luentokalvot PDF ja PPT muodoissa.
Viiteluettelo
[8] Suomalaisten nettitunnuksia julki – salasanat vaihdettava heti. Tietokone.fi 13.10.2007. http://www.tietokone.fi/uutta/uutinen.asp?news_id=31624
[9] Uraanikaivos: Suomalaisien salasanojen ylellisyys. Viitattu 15.3.2008. http://10.uraanikaivos.com/yleisyys.html
[10] Traditional crypt http://www.usenix.org/events/usenix99/provos/provos_html/node9.html, viitattu 13.3.2008
[11] Collisions for Hash Functions. Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu1. 17.8.2004. http://eprint.iacr.org/2004/199.pdf
[12] Enough With The Rainbow Tables: What You Need tTo Know About Secure Password Schemes. Thomas Ptacek. 10.9.2007. http://www.matasano.com/log/958/…/
[13] NSA@home. Raudalla toteutettu MD5 ja SHA1 läpikäyntijärjestelmä. http://nsa.unaligned.org/index.php
[14] Easy Nova Data Box PRO-25UE RFID, salattu ulkoinen kovalevy. Tuotteen kotisivut http://www.easy-nova.de/index.php?siteID=18&productID=28
[15] Enclosed, but not encrypted. Christiane Rutten, Heise Security. 18.2.2008. http://www.heise-online.co.uk/security/features/print/110136
[16] Access to protected data areas without the right fingerprint. Daniel Bachfeld, Heise Security. 12.3.2008. http://www.heise-online.co.uk/security/features/print/110280
[17] Hacking the iUSB. Sprite mods. Viitattu 15.3.2008. http://spritesmods.com/?art=securehd&page=4
[18] Secustick gives false sense of security. Tweakers.net, 12.4.2007 http://tweakers.net/reviews/683
[19] 0wned by an iPod – Hacking by Firewire. Maximillian Dornseif. PacSec 2004. http://pacsec.jp/psj04/psj04-dornseif-e.ppt
[20] Hit By A Bus: Physical Access Attacks with Firewire. Adam Boileau, 2006. http://www.storm.net.nz/static/files/ab_firewire_rux2k6-final.pdf
[21] Automated OS X macintosh password retrieval via firewire. Juho Mäkinen, 29.2.2008. http://blog.juhonkoti.net/2008/02/29/automated-os-x-macintosh-password-retrieval-via-firewire
[22] Data Remanence in Semiconductor Devices. Peter Gutmann, IBM. http://www.cypherpunks.to/~peter/usenix01.pdf
[23] Cold Boot Attacks on Disk Encryption, Ed Felten. 21.2.2008. http://www.freedom-to-tinker.com/?p=1257, paperi: http://citp.princeton.edu/pub/coldboot.pdf
[24] Flylogic blog. http://www.flylogic.net/blog/
[25] Extracting a 3DES key from an IBM 4758. Richard Clayton, Mike Bond. http://www.cl.cam.ac.uk/~rnc1/descrack/
[26] Hacking IBM ThinkPad BIOS Password. SoDoItYourself.com, http://sodoityourself.com/hacking-ibm-thinkpad-bios-password/
Houses are not very cheap and not everybody is able to buy it. But, business loans are invented to help people in such situations.