Peter Gutmann (computer Scientist)
   HOME
*



picture info

Peter Gutmann (computer Scientist)
Peter Claus Gutmann is a computer scientist in the Department of Computer Science at the University of Auckland, Auckland, New Zealand. He has a Ph.D. in computer science from the University of Auckland. His Ph.D. thesis titled and a book based on the thesis were about a cryptographic security architecture. He is interested in computer security issues, including security architecture, security usability (or more usually the lack thereof), and hardware security; he has discovered several flaws in publicly released cryptosystems and protocols. He is the developer of the cryptlib open source software security library and contributed to PGP version 2. In 1994 he developed the Secure FileSystem (SFS). He is also known for his analysis of data deletion on electronic memory media, magnetic and otherwise, and devised the Gutmann method for erasing data from a hard drive more or less securely. Having lived in New Zealand for some time, he has written on such subjects as weta (a group of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Gutmann Method
The Gutmann method is an algorithm for securely erasing the contents of computer hard disk drives, such as files. Devised by Peter Gutmann and Colin Plumb and presented in the paper ''Secure Deletion of Data from Magnetic and Solid-State Memory'' in July 1996, it involved writing a series of 35 patterns over the region to be erased. The selection of patterns assumes that the user does not know the encoding mechanism used by the drive, so it includes patterns designed specifically for three types of drives. A user who knows which type of encoding the drive uses can choose only those patterns intended for their drive. A drive with a different encoding mechanism would need different patterns. Most of the patterns in the Gutmann method were designed for older MFM/ RLL encoded disks. Gutmann himself has noted that more modern drives no longer use these older encoding techniques, making parts of the method irrelevant. He said "In the time since this paper was published, some people ha ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Privacy
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection. Data privacy is challenging since attempts to use data while protecting an individual's privacy preferences and personally identifiable information. The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue. Authorities Laws Authorities by country Information types Various types of personal information often come under privacy concerns. Cable television This describes the ability to control what information one reveals about oneself over cable television, and who can access that information. For example, third parties can track IP TV programs someone has watched at any given time. "The addition of any informati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Criticism Of Windows Vista
Windows Vista, an operating system released by Microsoft for consumers on January 30, 2007, has been widely criticized by reviewers and users. Due to issues with new security features, performance, driver support and product activation, Windows Vista has been the subject of a number of negative assessments by various groups. Security Driver signing requirement For security reasons, 64-bit versions of Windows Vista allow only signed drivers to be installed in kernel mode. Because code executing in kernel mode enjoys wide privileges on the system, the signing requirement aims to ensure that only code with a known origin executes at this level. In order for a driver to be signed, a developer/software vendor has to obtain an Authenticode certificate with which to sign the driver. Authenticode certificates can be obtained from certificate authorities trusted by Microsoft. Microsoft trusts the certificate authority to verify the applicant's identity before issuing a certificate. If a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




TWiT
TWiT.tv, which is the operating trade name of TWiT LLC, is a podcast network that broadcasts many technology news podcasts, founded by technology broadcaster and author Leo Laporte in 2005, and run by his wife and company CEO Lisa Laporte. The network began operation in April 2005 with the launch of ''This Week in Tech''. ''Security Now'' was the second podcast on the network, debuting in August of that year. The network hosts 28 podcasts (as of July, 2020) though the number had fallen in half to only 14 regularly scheduled shows by January 2021. Podcasts include ''The Tech Guy'', ''This Week in Tech'', ''This Week in Enterprise Tech'', ''Security Now'', ''FLOSS Weekly'', and ''MacBreak Weekly''. In addition to shows on technology news, TWiT also has podcasts like ''Hands-On Photography". TWiT founder and owner Leo Laporte, in an October 2009 speech, stated that it grossed revenues of $1.5 million per year, while costs were around $350,000. In November 2014, during an interv ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Security Now
''Security Now!'' is a weekly podcast hosted by Steve Gibson (computer programmer), Steve Gibson and Leo Laporte. It was the second show to premiere on the TWiT.tv, TWiT Network, launching in summer 2005. The first episode, “As the Worm Turns”, was released on August 19, 2005. ''Security Now!'' consists of a discussion between Gibson and Laporte on issues of computer security and, conversely, computer insecurity, insecurity. Covered topics have included security security vulnerability, vulnerabilities, Firewall (computing), firewalls, password security, spyware, rootkits, Wi-Fi, virtual private networks, and virtual machines. Podcast feed ''Security Now!'' is distributed via its main podcast RSS (file format), RSS feed and on the GRC ''Security Now!'' page. In addition to audio, text transcriptions are published, along with Gibson distributing a low-bandwidth 16 kbit/s version of the show on his own for those with low-bandwidth sources such as satellite internet or dial-up. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Security Now!
''Security Now!'' is a weekly podcast hosted by Steve Gibson and Leo Laporte. It was the second show to premiere on the TWiT Network, launching in summer 2005. The first episode, “As the Worm Turns”, was released on August 19, 2005. ''Security Now!'' consists of a discussion between Gibson and Laporte on issues of computer security and, conversely, insecurity. Covered topics have included security vulnerabilities, firewalls, password security, spyware, rootkits, Wi-Fi, virtual private networks, and virtual machines. Podcast feed ''Security Now!'' is distributed via its main podcast RSS feed and on the GRC ''Security Now!'' page. In addition to audio, text transcriptions are published, along with Gibson distributing a low-bandwidth 16 kbit/s version of the show on his own for those with low-bandwidth sources such as satellite internet or dial-up. The podcast runs for approximately two hours, typically starting with security news. Then Gibson reads a testimonial for his so ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Steve Gibson (computer Programmer)
Steven "Steve Tiberius" Gibson (born March 26, 1955) is an American software engineer, security researcher, and IT security proponent. In the early 1980s, he worked on light pen technology for use with Apple and Atari systems, and in 1985, founded Gibson Research Corporation, best known for its SpinRite software. Early life Gibson started working on computers as a teenager, and got his first computing job with Stanford University's artificial intelligence lab when he was 15 years old. He then studied electrical engineering and computer science at the University of California, Berkeley. Career Gibson was hired as a programmer for California Pacific Computer Company in 1980, where he worked on copy protection for the company's products. He then founded Gibson Laboratories in Laguna Hills, California, in 1981, which developed a light pen for the Apple II, Atari, and other platforms before going out of business in 1983. In 1985, Gibson founded Gibson Research Corporation (GRC ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

University Of Auckland Faculty Of Science
The University of Auckland Faculty of Science is one of eight faculties and schools that make up the University of Auckland , mottoeng = By natural ability and hard work , established = 1883; years ago , endowment = NZD $293 million (31 December 2021) , budget = NZD $1.281 billion (31 December 2021) , chancellor = Cecilia Tarrant , vice_chancellor = Dawn F .... Location The Faculty of Science houses several Schools, Departments and Institutes. These are based in various locations, including the City Campus, Newmarket Campus, Leigh Campus, Tāmaki Innovation Campus and the Grafton Campus. In November 2013, the Faculty of Science embarked on a NZ$200m redevelopment/expansion project on its main buildings in the City Campus. Following multiple delays, the state-of-the-art Science Centre was opened in July 2017. The Faculty of Science administration office is based on level 6 of the new Science Centre. In 2018, design work has begun for the potential developme ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The Longest Suicide Note In History
"The longest suicide note in history" is an epithet originally used by United Kingdom Labour MP Gerald Kaufman to describe his party's 1983 general election manifesto, which emphasised socialist policies in a more profound manner than previous such documents—and which Kaufman felt would ensure that the Labour Party (then in opposition) would fail to win the election. Document ''The New Hope for Britain'' was a 39-page booklet which called for unilateral nuclear disarmament; higher personal taxation for the rich; withdrawal from the European Economic Community; abolition of the House of Lords; and the re-nationalisation of recently privatised industries such as British Aerospace and the British Shipbuilders Corporation. The manifesto was based on an earlier and much longer policy paper with a similar title, ''Labour's Plan: the New Hope for Britain''. The epithet referred not only to the orientation of the policies, but also to their marketing. Labour leader Michael Foot d ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of Microsoft Windows desktop operating systems. Software release life cycle#Release to manufacturing (RTM), Development was completed on November 8, 2006, and over the following three months, it was released in stages to computer hardware and software manufacturers, business customers and retail channels. On January 30, 2007, it was released internationally and was made available for purchase and download from the Windows Marketplace; it is the first release of Windows to be made available through a digital distribution platform. Features new to Windows Vista, New features of Windows Vista include an updated graphical user interface and Skin (computing), visual style dubbed Windows Aero, Aero, a new search component called Windows Search, red ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


White Paper
A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter. It is meant to help readers understand an issue, solve a problem, or make a decision. A white paper is the first document researchers should read to better understand a core concept or idea. The term originated in the 1920s to mean a type of position paper or industry report published by some department of the UK government. Since the 1990s, this type of document has proliferated in business. Today, a business-to-business (B2B) white paper is closer to a marketing presentation, a form of content meant to persuade customers and partners and promote a certain product or viewpoint. That makes B2B white papers a type of grey literature. In government The term ''white paper'' originated with the British government and many point to the Churchill White Paper of 1922 as the earliest well-known example under this name. Gertrude Bell, the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]