handouts/ho01.tex
changeset 455 2d9e005100f4
parent 453 5921eebd9add
child 457 38ef1ef6082d
equal deleted inserted replaced
454:e5d97ef272f9 455:2d9e005100f4
   216 BlackHat Conference in 2014:
   216 BlackHat Conference in 2014:
   217 
   217 
   218 \begin{center}
   218 \begin{center}
   219 \url{https://www.youtube.com/watch?v=ET0MFkRorbo}
   219 \url{https://www.youtube.com/watch?v=ET0MFkRorbo}
   220 \end{center}
   220 \end{center}
       
   221 
       
   222 \noindent An article about reverse-engineering a PIN-number skimmer
       
   223 is at 
       
   224 
       
   225 \begin{center}\small
       
   226 \url{https://trustfoundry.net/reverse-engineering-a-discovered-atm-skimmer/}
       
   227 \end{center}
       
   228 
       
   229 \noindent
       
   230 including a scary video of how a PIN-pad overlay is
       
   231 installed by some crooks.
       
   232 
   221 
   233 
   222 \subsection*{Of Cookies and Salts}
   234 \subsection*{Of Cookies and Salts}
   223 
   235 
   224 Let us look at another example which will help with understanding how
   236 Let us look at another example which will help with understanding how
   225 passwords should be verified and stored.  Imagine you need to develop
   237 passwords should be verified and stored.  Imagine you need to develop