equal
deleted
inserted
replaced
216 BlackHat Conference in 2014: |
216 BlackHat Conference in 2014: |
217 |
217 |
218 \begin{center} |
218 \begin{center} |
219 \url{https://www.youtube.com/watch?v=ET0MFkRorbo} |
219 \url{https://www.youtube.com/watch?v=ET0MFkRorbo} |
220 \end{center} |
220 \end{center} |
|
221 |
|
222 \noindent An article about reverse-engineering a PIN-number skimmer |
|
223 is at |
|
224 |
|
225 \begin{center}\small |
|
226 \url{https://trustfoundry.net/reverse-engineering-a-discovered-atm-skimmer/} |
|
227 \end{center} |
|
228 |
|
229 \noindent |
|
230 including a scary video of how a PIN-pad overlay is |
|
231 installed by some crooks. |
|
232 |
221 |
233 |
222 \subsection*{Of Cookies and Salts} |
234 \subsection*{Of Cookies and Salts} |
223 |
235 |
224 Let us look at another example which will help with understanding how |
236 Let us look at another example which will help with understanding how |
225 passwords should be verified and stored. Imagine you need to develop |
237 passwords should be verified and stored. Imagine you need to develop |