Skip Navigation
Search CERIAS
Site Navigation
About
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
People
Faculty & Professional Staff
Students
PhD Graduates
Visitors
Staff
CERIAS People Gallery
Awards
Partners
Strategic Partners
Donors
Purdue Campus Partners
Seminars
News
Research
Education
Tools & Resources
Reports & Papers Archive
ReAssure
Training Products
FTP Archive
BSD and Linux OS Mirrors
Cassandra Vulnerability Tracking System
NTP Time Server
Weblogs
Annual Symposium
Home
»
About CERIAS
» Frequently Asked Questions (FAQ)
General
About CERIAS
Alumni/Other
Assured Identity and Privacy
Blogging
Call For Papers
Category 1
CERIAS Media Citings
Cloud Security
Donors
Education
Education
End System Security
Feature
General
General
Grad Students Seeking Permanent Positions
hardware
Human Centric Security
Infosec Education
Kudos, Opinions and Rants
Network Security
News
News
Partners
Personal
Personal/Home Information Security
Policies & Law
Policy, Law and Management
Prevention, Detection and Response
R&D
Reviews
SCADA
Secure IT Practices
Software
Sponsors
Static Page
Student Employment/Internships
Students Seeking Internships
Undergrad Students Seeking Permanent Positions
Questions:
Login with Facebook, Google and LinkedIn
Looking for fail2ban++
Keynote: Howard Schmidt (Keynote Summary)
Security Fireside Chat (Summary)
Panel #3: Securing Mobile Devices (Panel Summary)
Panel #2: Big Data Analytics (Panel Summary)
Panel #1: Securing SCADA Systems (Panel Summary)
Opening Keynote: Arthur W. Coviello, Jr. (Keynote Summary)
An Interesting Opportunity
Gene Schultz, R. I. P.
More than passive defense
Bullies, Pirates and Lulz
U.S. Memorial Day Thoughts on Cyber War
Sony, Congress, The Media and Me
Panel #4: Securing Web 2.0 (Panel Summary)
Panel #3: Fighting Through: Mission Continuity Under Attack (Panel Summary)
Panel #2: Scientific Foundations of Cyber Security (Panel Summary)
Panel #1: Traitor Tracing and Data Provenance (Panel Summary)
Opening Keynote: Neal Ziring (Symposium Summary)
A Recent Interview, and other info
Can Your IPv4 Firewall Be Bypassed by IPv6 Traffic?
“Game Change” Request for comments
Panel #3: The Evolution of Research Funding and Projects (Symposium Summary)
CERIAS Seminar Presentation: David Bell (Symposium Summary)
Morning Keynote Address: DHS Undersecretary Rand Beers (Symposium Summary)
Fireside Chat (Symposium Summary)
Panel #2: Infosec Ethics (Symposium Summary)
Panel #1: Visualization of Security (Symposium Summary)
Opening Keynote: Mike McConnell (Symposium Summary)
Making the CWE Top 25, 2010 Edition
Cowed Through DNS
Blast from the Past
Drone “Flaw” Known Since 1990s Was a Vulnerability
Talking to the Police All the Time
“Verified by VISA”: Still Using SSNs Online, Dropped by PEFCU
Firefox Vulnerabilities: Souvenirs of Windows 95
Are We All Aware Yet?
Cassandra Firing GnuPG Blanks
What About the Other 11 Months?
The Secunia Personal Software Inspector
Odds & Ends
ReAssure 1.20 Release
Still no sign of land
A Quick Note about Cloud Computing
Beware SQL libraries missing prepared statement support
Other cybersecurity legislation in the U.S.
Cybersecurity Legislation
The ACM Banquet
A Cynic’s Take on Cyber Czars and 60-day Reports
Solving the Wrong Problems
Symposium Transcript: Complexity vs. Security—Choosing the Right Curve, Morning Keynote Address
Symposium Summary: Complexity vs. Security—Choosing the Right Curve, Morning Keynote Address
Symposium Summary: Unsecured Economies Panel
Symposium Summary: Distinguished Lecture
Symposium Summary: Fireside Chat
Symposium Summary: Security in the Cloud Panel
Symposium Summary: Transitive Security & Standards Adoption Panel
Cyber security challenges and windmills
CERIAS Symposium on Twitter
This time, the Senate
Bad JavaScript, no CVE for you!
Unsecured Economies, and Overly-secured Reports
A Modest Proposal
A Serious Threat to Online Trust
Rethinking computing insanity, practice and research
Presidential Politics
Barack Obama, National Security and Me, Take II
Overloaded Return Values Cause Bugs
Cassandra Lost Its Feed From Secunia
An IPMI House of Cards
Take 5 Minutes to Help Privacy Research!
Who ya gonna call?
Security Through Obscurity
ReAssure 1.10 Released
US Travel Tips for New Faculty…and for Not-so-New
Privacy Survey
Barack Obama, National Security, and Me
Weblogs moved to new system
Prescient Movie
New Record for the Largest CVE Entry
Open Source Outclassing Home Router Vendor’s Firmware
Firefox’s Super Cookies
Speculations on Teaching Secure Programming
ReAssure Version 1.01 Released
Another untimely passing
Passing of a Pioneer
Computer Security Outlook
Another Round on Passwords
Gazing in the Crystal Ball
Hypocritical Security Conference Organizers
Disloyal Software
Solving some of the Wrong Problems
Some comments on Copyright and on Fair Use
Spaf Gets Interviewed
What did you really expect?
Who is Hacking Whom? [Updated]
Purchasing Policies That Create a Barrier to Computing Diversity
Fun with Internet Video
Cyberwar
8 Security Action Items to Beat “Learned Helplessness”
Q:
Login with Facebook, Google and LinkedIn
A:
Q:
Looking for fail2ban++
A:
Q:
Keynote: Howard Schmidt (Keynote Summary)
A:
Q:
Security Fireside Chat (Summary)
A:
Q:
Panel #3: Securing Mobile Devices (Panel Summary)
A:
Q:
Panel #2: Big Data Analytics (Panel Summary)
A:
Q:
Panel #1: Securing SCADA Systems (Panel Summary)
A:
Q:
Opening Keynote: Arthur W. Coviello, Jr. (Keynote Summary)
A:
Q:
An Interesting Opportunity
A:
Q:
Gene Schultz, R. I. P.
A:
Q:
More than passive defense
A:
Q:
Bullies, Pirates and Lulz
A:
Q:
U.S. Memorial Day Thoughts on Cyber War
A:
Q:
Sony, Congress, The Media and Me
A:
Q:
Panel #4: Securing Web 2.0 (Panel Summary)
A:
Q:
Panel #3: Fighting Through: Mission Continuity Under Attack (Panel Summary)
A:
Q:
Panel #2: Scientific Foundations of Cyber Security (Panel Summary)
A:
Q:
Panel #1: Traitor Tracing and Data Provenance (Panel Summary)
A:
Q:
Opening Keynote: Neal Ziring (Symposium Summary)
A:
Q:
A Recent Interview, and other info
A:
Q:
Can Your IPv4 Firewall Be Bypassed by IPv6 Traffic?
A:
Q:
“Game Change” Request for comments
A:
Q:
Panel #3: The Evolution of Research Funding and Projects (Symposium Summary)
A:
Q:
CERIAS Seminar Presentation: David Bell (Symposium Summary)
A:
Q:
Morning Keynote Address: DHS Undersecretary Rand Beers (Symposium Summary)
A:
Q:
Fireside Chat (Symposium Summary)
A:
Q:
Panel #2: Infosec Ethics (Symposium Summary)
A:
Q:
Panel #1: Visualization of Security (Symposium Summary)
A:
Q:
Opening Keynote: Mike McConnell (Symposium Summary)
A:
Q:
Making the CWE Top 25, 2010 Edition
A:
Q:
Cowed Through DNS
A:
Q:
Blast from the Past
A:
Q:
Drone “Flaw” Known Since 1990s Was a Vulnerability
A:
Q:
Talking to the Police All the Time
A:
Q:
“Verified by VISA”: Still Using SSNs Online, Dropped by PEFCU
A:
Q:
Firefox Vulnerabilities: Souvenirs of Windows 95
A:
Q:
Are We All Aware Yet?
A:
Q:
Cassandra Firing GnuPG Blanks
A:
Q:
What About the Other 11 Months?
A:
Q:
The Secunia Personal Software Inspector
A:
Q:
Odds & Ends
A:
Q:
ReAssure 1.20 Release
A:
Q:
Still no sign of land
A:
Q:
A Quick Note about Cloud Computing
A:
Q:
Beware SQL libraries missing prepared statement support
A:
Q:
Other cybersecurity legislation in the U.S.
A:
Q:
Cybersecurity Legislation
A:
Q:
The ACM Banquet
A:
Q:
A Cynic’s Take on Cyber Czars and 60-day Reports
A:
Q:
Solving the Wrong Problems
A:
Q:
Symposium Transcript: Complexity vs. Security—Choosing the Right Curve, Morning Keynote Address
A:
Q:
Symposium Summary: Complexity vs. Security—Choosing the Right Curve, Morning Keynote Address
A:
Q:
Symposium Summary: Unsecured Economies Panel
A:
Q:
Symposium Summary: Distinguished Lecture
A:
Q:
Symposium Summary: Fireside Chat
A:
Q:
Symposium Summary: Security in the Cloud Panel
A:
Q:
Symposium Summary: Transitive Security & Standards Adoption Panel
A:
Q:
Cyber security challenges and windmills
A:
Q:
CERIAS Symposium on Twitter
A:
Q:
This time, the Senate
A:
Q:
Bad JavaScript, no CVE for you!
A:
Q:
Unsecured Economies, and Overly-secured Reports
A:
Q:
A Modest Proposal
A:
Q:
A Serious Threat to Online Trust
A:
Q:
Rethinking computing insanity, practice and research
A:
Q:
Presidential Politics
A:
Q:
Barack Obama, National Security and Me, Take II
A:
Q:
Overloaded Return Values Cause Bugs
A:
Q:
Cassandra Lost Its Feed From Secunia
A:
Q:
An IPMI House of Cards
A:
Q:
Take 5 Minutes to Help Privacy Research!
A:
Q:
Who ya gonna call?
A:
Q:
Security Through Obscurity
A:
Q:
ReAssure 1.10 Released
A:
Q:
US Travel Tips for New Faculty…and for Not-so-New
A:
Q:
Privacy Survey
A:
Q:
Barack Obama, National Security, and Me
A:
Q:
Weblogs moved to new system
A:
Q:
Prescient Movie
A:
Q:
New Record for the Largest CVE Entry
A:
Q:
Open Source Outclassing Home Router Vendor’s Firmware
A:
Q:
Firefox’s Super Cookies
A:
Q:
Speculations on Teaching Secure Programming
A:
Q:
ReAssure Version 1.01 Released
A:
Q:
Another untimely passing
A:
Q:
Passing of a Pioneer
A:
Q:
Computer Security Outlook
A:
Q:
Another Round on Passwords
A:
Q:
Gazing in the Crystal Ball
A:
Q:
Hypocritical Security Conference Organizers
A:
Q:
Disloyal Software
A:
Q:
Solving some of the Wrong Problems
A:
Q:
Some comments on Copyright and on Fair Use
A:
Q:
Spaf Gets Interviewed
A:
Q:
What did you really expect?
A:
Q:
Who is Hacking Whom? [Updated]
A:
Q:
Purchasing Policies That Create a Barrier to Computing Diversity
A:
Q:
Fun with Internet Video
A:
Q:
Cyberwar
A:
Q:
8 Security Action Items to Beat “Learned Helplessness”
A:
Current News
FBI Hopes Hard Drive Will Shine Light on Conn. Shooter’s Motive
Two CERIAS Faculty Named as ACM Distinguished Members
More News »
CERIAS Weblogs
On Student Projects, Phoenix, and Improving Your IT Operations
Login with Facebook, Google and LinkedIn
More Posts »
Upcoming Events
2013-02-06 Chris Gates, Purdue University
2013-02-13 Security Seminar
Events