netwit 2.01

Reflections on Trusting Trust by Ken Thompson

Reflections on Trusting Trust

Ken Thompson

Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763.

pdf version

Billy (BK) Rios reflects briefly on Reflections on Trusting Trust

January 4, 2012 Posted by | Uncategorized | Leave a comment

Stalking the wily hacker by Clifford Stoll

Stalking the wily hacker

An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?

May 1988 vol. 31. No. 5 COMMUNICATION OF THE ACM

wiki entry on Stoll’s 1989 book, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage

January 4, 2012 Posted by | cyber espionage, cyber security | Leave a comment