- Steve's Science Fiction Reading Guide (pdf)
- The wonderful “Privacy Tools” reference page: privacytools.io
- The amazingly powerful and inexpensive $49, 5-interface (not just 5 port) Ubiquity EdgeRounter X
- The “Assistive Technologies” backdoor into free Windows 10 Upgrade.
- PiVPN, incredibly simple-to-setup OpenVPN for Raspberry PI.
- Steve's & Leo's absolute favorite 6-port high-current USB charger. (Be careful if you purchase a look-alike charger, since there are clones that can short and send AC power into devices!)
- Updating Windows solutions:
- Updating a new Windows 7 Install, Step-By-Step This terrific step-by-step guide has been found to reliably work. (It's surprising to see what someone wishing to use an older version of Windows must now go through to update the OS after installation.)
- The Windows Update Update Update. (This link is here for historical purposes. The link above provides a definitive guide.) This is required to get a new installation of a previous version of Windows to recognize today's Windows Update because Windows Update was changed in a non-backward compatible fashion after those earlier Windows installation images were built.
- “Three Dumb Routers” configuration guides:
- “The Early Internet:
FREE Crypto Technology Education Resources
- If you only want 5 pages: “Nuts and Bolts of Encryption: A Primer for Policymakers”
This incredibly clear explanation of cryptographic operations was written by Princeton University's Edward Felten. As Ed explains it: “This paper offers a straightforward introduction to encryption, as it is implemented in modern systems, at a level of detail suitable for policy discussions. No prior background on encryption or data security is assumed.” It is widely regarded as the clearest and cleanest explanation of crypto operations ever written.
- “A Graduate Course in Applied Cryptography” http://toc.cryptobook.us/
A surprisingly accessible 580 page tour de force being written by to crypto/security professors: Dan Boneh, Professor of Computer Science and Electrical Engineering and Co-director of the Stanford Computer Security Lab, Stanford University and Victor Shoup of New York University.
Victor modestly describes it as: “A preliminary/partial draft of a textbook on cryptography that I am writing with Dan Boneh.”
- Crypto 101 http://www.crypto101.io/
This is an wonderful introductory course on cryptography in a 252-page PDF. It is freely available for programmers of all ages and skill levels. The Forward of the book describes itself as: ...an introduction to cryptography for programmers of any skill level. It’s a continuation of a talk of the same name, which was given by the author at PyCon 2013. The structure of this book is very similar: it starts with very simple primitives, and gradually introduces new ones, demonstrating why they’re necessary. Eventually, all of this is put together into complete, practical cryptosystems, such as TLS, GPG and OTR. The goal of this book is not to make anyone a cryptographer or a security researcher. The goal of this book is to understand how complete cryptosystems work from a bird’s eye view, and how to apply them in real software.
- Coursera offers a number of free online courses in cryptography and cybersecurity.
Favorite iOS & Android Puzzle/Game/Toys
- The Sequence, Blockwick, Infinite Loop, Hook, Auralux, Rails, Osmos HD, Klocki, Kubic, Voi, “Square it!”
Gibson Research Corporation is owned and operated by Steve Gibson. The contents
of this page are Copyright (c) 2016 Gibson Research Corporation. SpinRite, ShieldsUP,
NanoProbe, and any other indicated trademarks are registered trademarks of Gibson
|Last Edit: Feb 28, 2017 at 10:58 (58.75 days ago)||Viewed 319 times per day|