Author's posts
Pretty Good Privacy
Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …
Digital Signature Properties
Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entail. This document is intended for anybody looking to gain a basic understanding or a …
Two Plastic Bags
A little old lady was walking down the street dragging two large plastic garbage bags behind her. One of the bags was ripped and every once in a while a $20 fell out onto the sidewalk. Noticing this, a policeman stopped her, and said, “Ma’am, there are $20 bills falling out of that bag. Oh …
Bass Pro Shop
A woman goes into Bass Pro Shop to buy a rod and reel for her grandson’s birthday. She doesn’t know which one to get; so she grabs one and goes over to the counter. A Bass Pro Shop associate is standing there wearing dark glasses. She says, ‘Excuse me, sir. Can you tell me anything …
When Daddy Calls
‘Hello?’ ‘Hi honey. This is Daddy. Is Mommy near the phone?’ ‘No Daddy. She’s upstairs in the bedroom with Uncle Paul.’ After a brief pause, Daddy says, ‘But honey, you haven’t got an Uncle Paul.’ ‘Oh yes I do, and he’s upstairs in the room with Mommy, right now.’ Brief Pause. ‘Uh, okay then, this …
Public-key Directory
Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …
Public-key Cryptography
Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …
How to Stop Him from Snoring
A couple has a dog that snores. Annoyed because she can’t sleep, the wife goes to the vet to see if he can help. The vet tells the woman to tie a ribbon around the dog’s testicles, and he will stop snoring. “Yeah right!” she says. A few minutes after going to bed, the dog …
How the Fight Started
One year, a husband decided to buy his mother-in-law a cemetery plot as a Christmas gift. The next year, he didn’t buy her a gift. When his wife asked him why, he replied, “Well, she still hasn’t used the gift I bought her last year!” And that’s how the fight started… ————————– My wife walked …
R.A.P.E.D
Dear Employees, Due to the current financial situation caused by the slowdown of the economy, Management has decided to implement a scheme to put workers of 40 years of age and above on early retirement…This scheme will be known as RAPE (Retire Aged People Early). Persons selected to be RAPED can apply to management to …
Data Encryption Standard and 3DES
Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …
Link and End-to-End Encryption Techniques
Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …
Aids or Alzheimer’s
The phone rings and the lady of the house answers, ‘Hello, Mrs. Sanders, please. ”Speaking. ‘Mrs. Sanders, this is Doctor James at Saint Agnes Laboratory. When your husband’s doctor sent his biopsy to the lab last week, a biopsy from another Mr. Sanders arrived as well. We are now uncertain which one belongs to your …
She Will Make it Greater
“Whatever you give a woman, she will make greater. If you give her sperm, she’ll give you a baby. If you give her a house, she’ll give you a home. If you give her groceries, she’ll give you a meal. If you give her a smile, she’ll give you her heart. She multiplies and enlarges …
It’s Just a Catfish
This would be ‘all the catfish you can eat.’ Each year, a few people were drowning or disappearing mysteriously in Huadu, China’s Furong Reservoir. It was not until recently, when the son of a government official went swimming, in the reservoir and was drowned, that the secret was revealed. It is a 3 meter long …
Encryption Techniques
[Abstract] The purpose of this document is to analyze cryptographic transposition techniques by showing a few examples of some different techniques. The next portion of this document is to provide an answer to the question ‚ÄúIs it possible to decrypt the message that was encrypted with a two-stage transposition technique with a different key?‚Äù The …
Definition Distinction Between Guts and Balls
We’ve all heard about people “having guts” or “having balls”. But do you really know the difference between them? In an effort to keep you informed, the definition for each is listed below… Guts – is arriving home late after a night out with the guys, being met by your wife with a broom, and …
Helicopter Ride
Buddy and his wife Edna went to the state fair every year, and every year Buddy would say, ‘Edna,I’d like to ride in that helicopter’ Edna always replied, ‘I know Buddy, but that helicopter ride is fifty bucks, And fifty bucks is fifty bucks.’ One year Buddy and Edna went to the fair, and Buddy …
Business Continuity
[Abstract] The purpose of this document is to provide a basic knowledge of how having a business backup plan can maintain business continuity. Also included within this document are guidelines to maintain business continuity and an explanation of some consequences for not following the business continuity guidelines. [Content] When the September 11th attacks on the …
Choosing a Location for a Network Operations Center (NOC)
[Abstract] The purpose of this document is to provide a basic understanding of network operation centers by identifying three key factors to consider when choosing a location for a network operation center. Also included within this document are five areas of physical security to consider when constructing a network operation center. [Content] When considering constructing …
Love Making
The Italian says, “When I’ve a finished a makina da love withna my wife, I go down and gently tickle the back of her knees, she floats 6 inches above a da bed in ecstasy.” The Frenchman replies, zat is noting, “When Ah’ve finished making ze love with ze wife, Ah kiss all ze way¬† …
Single vs. Engaged vs. Married
Sipping her drink, the single girl leered and said, “Last Friday at the end of the work day I went to my boyfriend’s office wearing a leather coat. When all the other people had left, I slipped out of it and all I had on was a leather bodice, black stockings and stiletto heels. He …
Most Romantic First Line, But least Romantic Second Line
These are entries to a competition asking for a rhyme with the most romantic first line but least romantic second line: Love may be beautiful, love may be bliss but I only slept with you, because I was pissed. I thought that I could love no other Until, that is, I met your brother. Roses …
Hardening OS X
[Abstract] The purpose of this document is to provide a basic understanding of operating systems and vulnerabilities with hardening practices for ensuring Apple’s operating system OS X is secured. Also included within this document are methods for ensuring that a web server is secured. [Content] “Every Mac is secure right out of the box,” thanks …