THE

SPRAWL

  •  
  •  
  •  
  • sprawllatest

    tor control protocol

    Tor implements a highly customizable control protocol which can be used to tune almost all aspects of its operation. In this article you will learn how to fine tune Tor client's operation, query runtime information, as well as create circuits of arbitrary size. Read more.

    tls and ssl cipher suites

    TLS/SSL protocols support a large number of cipher suites. A cipher suite is a collection of symmetric and asymmetric encryption algorithms used by hosts to establish a secure communication. Supported cipher suites can be classified based on encryption algorithm strength, key length, key exchange and authentication mechanisms. Some cipher suites offer better level of security than others (e.g. Several weak cipher suites were developed for export to comply with US export law). There are more than 200 known cipher suites. Read more.

    web warriors

    A CBC documentary Web Warriors begins by speculating the link between the release of Blaster worm and massive power blackouts that occurred shortly after. Following this assumption, the documentary explores how computer viruses can be used to disrupt national infrastructures. After a brief coverage of Defcon conference, there is an interview with MafiaBoy. Next there is an interesting twist, where we follow Donnie "a career hacker" trying and ultimately failing to track down the programmer behind the Microsoft Word virus (Sobig) in Moscow, Russia. The documentary concludes by discussing the threat of information warfare coming from Russia and China. Read more.

    bbs: the documentary

    A historical documentary on the subject of BBSs and the underground culture of the 1980s. The documentary includes more than 200 interviews with some of the most influential figures of the BBS era. It is split up into 8 sections ranging from BBS Artscene and FidoNet to Hacking/Phreaking/Anarchy/Cracking underground. Read more.

    in the realm of the hackers

    A documentary about Australian hacker scene in the 1980s. It primarily focuses on the exploits of two hackers going by the names of Electron and Phoenix. NASA's WANK work infection is covered in great length. The documentary also covers the introduction of first computer laws in Australia and subsequent arrests of Electron and Phoenix. Read more.

    hippies from hell

    This documentary covers Dutch hackers namely organizations such as xs4all, Hippies from Hell, HackTic, and TOOL lockpicking club. Read more.

    the kgb, the computer and me

    Based on Clifford Stoll's book "The Cuckoo's Egg", this documentary re-enacts a story of a Lawrence Lab astronomer and his quest to track down the reason behind a minuscule discrepancy in accounting. Clifford Stoll plays as himself. Read more.

    computer chronicles - computer security

    A 1984 episode of Computer Chronicles covers computer security concerns of the time. This episode covers a simple database dialup, WarGames, and a few security tips. Read more.



    π
    ///\oo/\\\