Kategorien
How-to Open Source

NTS and dynamic IP addresses

Good news is that NTS relies on DNS names, no longer „naked“ IP addresses. But what happens when the DNS name changes, pointing to a different IP address? A look at the protocol, the Chrony source, and the implications.

Kategorien
How-to Open Source

Transparent, Trustworthy Time with NTP and NTS

«Time is Money», as the old adage says. Who controls the time, controls all kinds of operations and businesses around the world. And therefore, controls the world. Today, we all take accurate time for granted. Even though, today, it is delivered over the Internet mostly unsecured. But this is easy to change.

Kategorien
Publications

HomeCA: Scalable Secure IoT Network Integration

Kategorien
General How-to Open Source Research

Ransomware is different

While most types of malware such as viruses and botnets try to lay low for as long as they can, while doing their nasty work, ransomware is eager to do its work ASAP. Because of this, ransomware does not need to embed itself as deeply into the system. All it wants to do is to […]

Kategorien
Publications

Einfache Zwei-Faktor-Authentisierung

Kategorien
Publications

Fighting Ransomware with Guided Undo

Master Thesis

Kategorien
Publications

Meltdown und Spectre: Lesen ohne zu lesen

Kategorien
Publications

MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks

Kategorien
Allgemein

Datenschutz und Datensicherheit in der medizinischen Praxis

Kategorien
Publications

X.509 User Certificate-based Two-Factor Authentication for Web Applications