netwit 2.01

Reflections on Trusting Trust by Ken Thompson



Reflections on Trusting Trust

Ken Thompson


Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763.


pdf version


Billy (BK) Rios reflects briefly on Reflections on Trusting Trust



January 4, 2012 Posted by | Uncategorized | Leave a comment

Stalking the wily hacker by Clifford Stoll



Stalking the wily hacker


An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?


May 1988 vol. 31. No. 5 COMMUNICATION OF THE ACM


wiki entry on Stoll’s 1989 book, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage



January 4, 2012 Posted by | cyber espionage, cyber security | Leave a comment