JavaScript is disabled in your web browser. To take full advantage of this site, please enable javascript and refresh the page.
M a i n

The future masters of technology will have to be light-hearted and intelligent.
The machine easily masters the grim and the dumb.


- Marshall McLuhan


Welcome to machinae.

The navigation menu on the left is powered by javascript. If you do not see it, please enable javascript in your browser.

Collected here are a few articles related to computer security. For my students, these materials may be useful as a supplement to the course materials.

I have reviewed some penetration testing tools here.

I have compiled a modest timeline of cryptology here, spanning pre-history to present day. In class, we have talked so much about the actual hands-on implementation of cryptology, but lacked the time to really delve into the historical usage and evolution of cryptology. It is quite edifying, and may give you some unconventional ideas for using crypto. I research crypto history as a hobby, so this section is slowly growing.

While I encourage you to learn how to implement technology, I would also encourage you to think about why you are using technology. Is it simply a means to an end, or are you using technology to make life better? I would like you all to be functionally competent, able to walk into a network and say: "I know how to make this work well." But beyond hands-on ability, which is not to be scoffed at, I would also like you to be able to step back and look at the system as a whole. Can you now strategize growth and improvement?

As always, we learn most when we engage. I would be delighted to hear from you. You may reach me via the slightly-munged email address at the bottom of the page.

Shan



Next : Intro to Pen Testing»

© Copyright 2005 - 2007 machinae
Send all communication to
webmaster at machinae dot com