Friday, 23 August 2013
Java Card programming: best practices
Read and remember. Very useful tips, especially about reducing memory consumption. A short summary of how the JCVM allocates memory is also given, including the amount of overhead per object.
Friday, 16 August 2013
Saturday, 3 August 2013
Hacking fingerprint USB drives
Excellent hack walkthrough and security analysis of two standard fingerprint-secured USB storage drives.
The vendor reacted in a mature, proactive way to the news that their drives were hacked. That's not something you see very often... respect to USB-Secured.com.
Subscribe to:
Posts (Atom)