Skip Navigation
Search CERIAS
Site Navigation
About
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
People
Faculty & Professional Staff
Students
PhD Graduates
Visitors
Staff
CERIAS People Gallery
Awards
Partners
Strategic Partners
Donors
Purdue Campus Partners
Seminars
News
Research
Education
Tools & Resources
Reports & Papers Archive
ReAssure
Training Products
FTP Archive
BSD and Linux OS Mirrors
Cassandra Vulnerability Tracking System
NTP Time Server
Weblogs
Annual Symposium
Home
»
About CERIAS
» Frequently Asked Questions (FAQ)
Kudos, Opinions and Rants
About CERIAS
Alumni/Other
Assured Identity and Privacy
Blogging
Call For Papers
Category 1
CERIAS Media Citings
Cloud Security
Donors
Education
Education
End System Security
Feature
General
General
Grad Students Seeking Permanent Positions
hardware
Human Centric Security
Infosec Education
Kudos, Opinions and Rants
Network Security
News
News
Partners
Personal
Personal/Home Information Security
Policies & Law
Policy, Law and Management
Prevention, Detection and Response
R&D
Reviews
SCADA
Secure IT Practices
Software
Sponsors
Static Page
Student Employment/Internships
Students Seeking Internships
Undergrad Students Seeking Permanent Positions
Questions:
On Student Projects, Phoenix, and Improving Your IT Operations
Gene Schultz, R. I. P.
Bullies, Pirates and Lulz
An old canard reappears (sort of)
What About the Other 11 Months?
Odds & Ends
Still no sign of land
More customer disservice—This time, Facebook
A Cynic’s Take on Cyber Czars and 60-day Reports
Do we need a new Internet?
A Modest Proposal
Customer (dis)service
Follow-up on the CA Hack
A Serious Threat to Online Trust
Word documents being used in new attacks
Rethinking computing insanity, practice and research
Failures in the Supply Chain
Presidential Politics
Barack Obama, National Security and Me, Take II
Centers of Academic .... Adequacy
Who ya gonna call?
Barack Obama, National Security, and Me
Virtualization Is Successful Because Operating Systems Are Weak
Confusion of Separation of Privilege and Least Privilege
Another untimely passing
Looking for Trustworthy Alternatives to Adobe PDFs
Legit Linux Codecs In the U.S.
Solving some of the Wrong Problems
Some comments on Copyright and on Fair Use
Spaf Gets Interviewed
What did you really expect?
This Week at CERIAS
Cyberwar
Fun video
Items In the news
Complexity, virtualization, security, and an old approach
More JavaScript Browser Attacks… Meanwhile (ISC)2 Requires JavaScript, and All Is Well
Think OpenOffice is the solution? Think again.
Irony and DHS
Google 419, Part II
Google learning from the Nigerians?
The gutting of cybersecurity
This Week at CERIAS
“Verified by VISA” Issues
More on passwords
Quicktime flaw on Macs brings out the crazies
I told you so
What security push?
The Vulnerability Protection Racket
On standard configurations
Surprise, Microsoft Listed as Most Secure OS
Do Open Source Devs Get Web App Security? Does Anybody?
Stuck in a Rut—Still
As if we needed more evidence that register_globals is bad
2007: The year of the 9,999 vulnerabilities?
Security Vigilantes Becoming Small-Time Terrorists
Interesting reading
Are You Still E-mailing Word documents?
On Opinion, Jihad, and E-voting
Community Comments & Feedback to Security Absurdity Article
The Dilbert Blog: Electronic Voting Machines
Who do you trust?
So you think AJAX and Web 2.0 are all that and a bag of chips
OSCON 2006: Where’s the Security?
The biggest mistake of Myspace
Reporting Vulnerabilities is for the Brave
Re: Security Absurdity
What is Higher Education’s Role in Regards to ID Theft?
Useful Awareness Videos
Using Virtual Machines to Defend Against Security and Trust Failures
Didn’t we learn anything from WarGames?
Managing Web Browser risks with the NoScript extension
Q:
On Student Projects, Phoenix, and Improving Your IT Operations
A:
Q:
Gene Schultz, R. I. P.
A:
Q:
Bullies, Pirates and Lulz
A:
Q:
An old canard reappears (sort of)
A:
Q:
What About the Other 11 Months?
A:
Q:
Odds & Ends
A:
Q:
Still no sign of land
A:
Q:
More customer disservice—This time, Facebook
A:
Q:
A Cynic’s Take on Cyber Czars and 60-day Reports
A:
Q:
Do we need a new Internet?
A:
Q:
A Modest Proposal
A:
Q:
Customer (dis)service
A:
Q:
Follow-up on the CA Hack
A:
Q:
A Serious Threat to Online Trust
A:
Q:
Word documents being used in new attacks
A:
Q:
Rethinking computing insanity, practice and research
A:
Q:
Failures in the Supply Chain
A:
Q:
Presidential Politics
A:
Q:
Barack Obama, National Security and Me, Take II
A:
Q:
Centers of Academic .... Adequacy
A:
Q:
Who ya gonna call?
A:
Q:
Barack Obama, National Security, and Me
A:
Q:
Virtualization Is Successful Because Operating Systems Are Weak
A:
Q:
Confusion of Separation of Privilege and Least Privilege
A:
Q:
Another untimely passing
A:
Q:
Looking for Trustworthy Alternatives to Adobe PDFs
A:
Q:
Legit Linux Codecs In the U.S.
A:
Q:
Solving some of the Wrong Problems
A:
Q:
Some comments on Copyright and on Fair Use
A:
Q:
Spaf Gets Interviewed
A:
Q:
What did you really expect?
A:
Q:
This Week at CERIAS
A:
Q:
Cyberwar
A:
Q:
Fun video
A:
Q:
Items In the news
A:
Q:
Complexity, virtualization, security, and an old approach
A:
Q:
More JavaScript Browser Attacks… Meanwhile (ISC)2 Requires JavaScript, and All Is Well
A:
Q:
Think OpenOffice is the solution? Think again.
A:
Q:
Irony and DHS
A:
Q:
Google 419, Part II
A:
Q:
Google learning from the Nigerians?
A:
Q:
The gutting of cybersecurity
A:
Q:
This Week at CERIAS
A:
Q:
“Verified by VISA” Issues
A:
Q:
More on passwords
A:
Q:
Quicktime flaw on Macs brings out the crazies
A:
Q:
I told you so
A:
Q:
What security push?
A:
Q:
The Vulnerability Protection Racket
A:
Q:
On standard configurations
A:
Q:
Surprise, Microsoft Listed as Most Secure OS
A:
Q:
Do Open Source Devs Get Web App Security? Does Anybody?
A:
Q:
Stuck in a Rut—Still
A:
Q:
As if we needed more evidence that register_globals is bad
A:
Q:
2007: The year of the 9,999 vulnerabilities?
A:
Q:
Security Vigilantes Becoming Small-Time Terrorists
A:
Q:
Interesting reading
A:
Q:
Are You Still E-mailing Word documents?
A:
Q:
On Opinion, Jihad, and E-voting
A:
Q:
Community Comments & Feedback to Security Absurdity Article
A:
Q:
The Dilbert Blog: Electronic Voting Machines
A:
Q:
Who do you trust?
A:
Q:
So you think AJAX and Web 2.0 are all that and a bag of chips
A:
Q:
OSCON 2006: Where’s the Security?
A:
Q:
The biggest mistake of Myspace
A:
Q:
Reporting Vulnerabilities is for the Brave
A:
Q:
Re: Security Absurdity
A:
Q:
What is Higher Education’s Role in Regards to ID Theft?
A:
Q:
Useful Awareness Videos
A:
Q:
Using Virtual Machines to Defend Against Security and Trust Failures
A:
Q:
Didn’t we learn anything from WarGames?
A:
Q:
Managing Web Browser risks with the NoScript extension
A:
Current News
FBI Hopes Hard Drive Will Shine Light on Conn. Shooter’s Motive
Two CERIAS Faculty Named as ACM Distinguished Members
More News »
CERIAS Weblogs
On Student Projects, Phoenix, and Improving Your IT Operations
Login with Facebook, Google and LinkedIn
More Posts »
Upcoming Events
2013-02-06 Chris Gates, Purdue University
2013-02-13 Security Seminar
Events