<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments for zaphCoder</title>
	<atom:link href="http://zaph.com/blog/?feed=comments-rss2" rel="self" type="application/rss+xml" />
	<link>http://zaph.com/blog</link>
	<description>All About Code</description>
	<lastBuildDate>Sun, 29 Nov 2015 01:19:48 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.1</generator>
	<item>
		<title>Comment on Cryptography pioneer: We need good code by Lucas</title>
		<link>http://zaph.com/blog/?p=1149#comment-138</link>
		<dc:creator>Lucas</dc:creator>
		<pubDate>Sun, 29 Nov 2015 01:19:48 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1149#comment-138</guid>
		<description>SSL decryption in Wireshark or SSLdump reqerius you to own the private keys used to decrypt the connection.In an EDH, no such keys exist. It&#039;s a straight DH exchange, with randomly generated keys.In a straight DH exchange, this would be vulnerable to MITM attacks (the snoop would simply complete DH exchanges with both sides of the connection, deriving two different keys, and translate  etween the two).EDH uses the cert keypairs to guarantee that the DH exchange happened without an MITM tampering.EDH has &quot;perfect forward secrecy&quot;  because no stationary set of keys is used to protect all the sessions. If you compromise the server key, all you get is the ability to sign DH parameters in a future session.</description>
		<content:encoded><![CDATA[<p>SSL decryption in Wireshark or SSLdump reqerius you to own the private keys used to decrypt the connection.In an EDH, no such keys exist. It&#8217;s a straight DH exchange, with randomly generated keys.In a straight DH exchange, this would be vulnerable to MITM attacks (the snoop would simply complete DH exchanges with both sides of the connection, deriving two different keys, and translate  etween the two).EDH uses the cert keypairs to guarantee that the DH exchange happened without an MITM tampering.EDH has &#8220;perfect forward secrecy&#8221;  because no stationary set of keys is used to protect all the sessions. If you compromise the server key, all you get is the ability to sign DH parameters in a future session.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Cryptography pioneer: We need good code by Ade</title>
		<link>http://zaph.com/blog/?p=1149#comment-134</link>
		<dc:creator>Ade</dc:creator>
		<pubDate>Sun, 29 Nov 2015 01:14:53 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1149#comment-134</guid>
		<description>lonervamp,There is more.The failure to dyepcrt is not just with Diffie Hellman Ephemeral. The dyepcrtion method used by Wireshark, ssldump, unsniff will not work for exportable RSA keys either (i.e less than 1024 bit).This is because a temporary RSA key exchange takes place to negotiate a exportable cipher. This is just like DHE, but for weaker encryption and uses RSA.This may sound weird, but the so called weak export ciphers are actually immune to dyepcrtion using tools like Wireshark / ssldump / unsniff etc. However unlike DHE , RSA &quot;ephemeral&quot; for export is vulnerable to brute force. This means agencies like NSA in the United States can simply brute force keys like DES56, irrespective of the key exchange strength !A hobby attacker, or someone who has stolen server keys, can certainly not brute force an export cipher like DES56 very easily.</description>
		<content:encoded><![CDATA[<p>lonervamp,There is more.The failure to dyepcrt is not just with Diffie Hellman Ephemeral. The dyepcrtion method used by Wireshark, ssldump, unsniff will not work for exportable RSA keys either (i.e less than 1024 bit).This is because a temporary RSA key exchange takes place to negotiate a exportable cipher. This is just like DHE, but for weaker encryption and uses RSA.This may sound weird, but the so called weak export ciphers are actually immune to dyepcrtion using tools like Wireshark / ssldump / unsniff etc. However unlike DHE , RSA &#8220;ephemeral&#8221; for export is vulnerable to brute force. This means agencies like NSA in the United States can simply brute force keys like DES56, irrespective of the key exchange strength !A hobby attacker, or someone who has stolen server keys, can certainly not brute force an export cipher like DES56 very easily.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Books by Sudheesh</title>
		<link>http://zaph.com/blog/?page_id=5#comment-129</link>
		<dc:creator>Sudheesh</dc:creator>
		<pubDate>Sun, 29 Nov 2015 01:06:50 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?page_id=5#comment-129</guid>
		<description>Having a CISSP certification is more than an HR thing. As meoninted, its not about technical skills and merit. It&#039;s about having a professional understanding of the 10 bodies of knowledge and being able to apply that thinking in an infosec kind of way. It is purposefully &quot;an inch deep, and a mile wide&quot; for a reason.In the realm of information security, before we even THINK about technical safeguards we have to understand the real problems. The real risks. The real threats. The biggest failure in the industry right now is having geeks think they are information security professionals. It is rather sad to see a person with an A+ Security cert or Cisco Security cert try to sit around a table and talk about applying qualitative risk analysis to determine what assets need to be protected, and to what degree. They fail miserably because they were taught that security was a technical problem, and not a business one. Big mistake there.I always look at it like this. A CSO/CISO/security consultant would have a CISSP. The people that report to him and apply the technical safeguards to meet corporate security policies would have a SANS GIAC or something similar.Is the CISSP a good cert to have? Absolutely. It means you have a good understanding of the 10 bodies of knowledge and can have a competent conversation with other infosec pros in the process of doing your job function. And if you take the certification seriously, it also shows that you follow a code of ethics in how you conduct yourself and your work in the field. I really wish security vendors would have more CISSP... then we wouldn&#039;t see so much FUD being spread around.Is the CISSP essential to show your &#039;leet Snort skills? Absolutely not. But it wasn&#039;t designed for that. Combining a cert to show you understand deeper, more important infosec principles and practices (ie: CISSP) with a technical cert like GIAC gives you the breadth of knowledge needed to be an infosec pro in this day and age.I don&#039;t think you are giving yourself the credit you deserve. The security principles and practices that you learned and had re-enforced are now part of you. It can&#039;t be taken away. And that might be why you look back and think it doesn&#039;t echo your views on how security principles should be taught. I have no idea of your full background, but if you are like most, the CISSP looks trivial NOW because you already went through it. A combination of real world experience and the 10 CBK have given you a stronger foundation than most people in the field. Don&#039;t give up on it so quickly. Renew.</description>
		<content:encoded><![CDATA[<p>Having a CISSP certification is more than an HR thing. As meoninted, its not about technical skills and merit. It&#8217;s about having a professional understanding of the 10 bodies of knowledge and being able to apply that thinking in an infosec kind of way. It is purposefully &#8220;an inch deep, and a mile wide&#8221; for a reason.In the realm of information security, before we even THINK about technical safeguards we have to understand the real problems. The real risks. The real threats. The biggest failure in the industry right now is having geeks think they are information security professionals. It is rather sad to see a person with an A+ Security cert or Cisco Security cert try to sit around a table and talk about applying qualitative risk analysis to determine what assets need to be protected, and to what degree. They fail miserably because they were taught that security was a technical problem, and not a business one. Big mistake there.I always look at it like this. A CSO/CISO/security consultant would have a CISSP. The people that report to him and apply the technical safeguards to meet corporate security policies would have a SANS GIAC or something similar.Is the CISSP a good cert to have? Absolutely. It means you have a good understanding of the 10 bodies of knowledge and can have a competent conversation with other infosec pros in the process of doing your job function. And if you take the certification seriously, it also shows that you follow a code of ethics in how you conduct yourself and your work in the field. I really wish security vendors would have more CISSP&#8230; then we wouldn&#8217;t see so much FUD being spread around.Is the CISSP essential to show your &#8216;leet Snort skills? Absolutely not. But it wasn&#8217;t designed for that. Combining a cert to show you understand deeper, more important infosec principles and practices (ie: CISSP) with a technical cert like GIAC gives you the breadth of knowledge needed to be an infosec pro in this day and age.I don&#8217;t think you are giving yourself the credit you deserve. The security principles and practices that you learned and had re-enforced are now part of you. It can&#8217;t be taken away. And that might be why you look back and think it doesn&#8217;t echo your views on how security principles should be taught. I have no idea of your full background, but if you are like most, the CISSP looks trivial NOW because you already went through it. A combination of real world experience and the 10 CBK have given you a stronger foundation than most people in the field. Don&#8217;t give up on it so quickly. Renew.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Sort times for NSMutableArray by James</title>
		<link>http://zaph.com/blog/?p=1345#comment-127</link>
		<dc:creator>James</dc:creator>
		<pubDate>Sun, 29 Nov 2015 01:02:09 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1345#comment-127</guid>
		<description>great overview! I love it. How is the coxliempty relationship interpreted, e.g., between quicksort und mergesort the coxliempty path is quadratic what does that mean? Thanks a lot for your work and sharing this with us! lnxnt</description>
		<content:encoded><![CDATA[<p>great overview! I love it. How is the coxliempty relationship interpreted, e.g., between quicksort und mergesort the coxliempty path is quadratic what does that mean? Thanks a lot for your work and sharing this with us! lnxnt</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Cryptography pioneer: We need good code by Maria</title>
		<link>http://zaph.com/blog/?p=1149#comment-123</link>
		<dc:creator>Maria</dc:creator>
		<pubDate>Sun, 29 Nov 2015 00:48:57 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1149#comment-123</guid>
		<description>Russ,Your comment, &quot;The core prolebm with being only focused on &quot;the real world&quot; is that you only have incentives to solve the immediate prolebms at hand, and only to an acceptable level. There is no incentive, time, or resources to deal with the general case, and especially the values and needs of all stakeholders, not just the people paying your salary.&quot;Really is at the core of the prolebm, which is IMHO, fundamentally a research prolebm which will require interdisciplinary teams of scientists.There is so much evidence that people, in their personal or professional endeavors, simply don&#039;t see the incentive to pay for security. This is the reason why &quot;metrics&quot; and &quot;RoI on security&quot; etc. has(is?) dominated the research funding/attention for so long. As we continue to debate on how to govern cybersapce the research presented at WEIS is increasingly pertinent, and is the only source of it&#039;s kind. Glad to have seen you there!</description>
		<content:encoded><![CDATA[<p>Russ,Your comment, &#8220;The core prolebm with being only focused on &#8220;the real world&#8221; is that you only have incentives to solve the immediate prolebms at hand, and only to an acceptable level. There is no incentive, time, or resources to deal with the general case, and especially the values and needs of all stakeholders, not just the people paying your salary.&#8221;Really is at the core of the prolebm, which is IMHO, fundamentally a research prolebm which will require interdisciplinary teams of scientists.There is so much evidence that people, in their personal or professional endeavors, simply don&#8217;t see the incentive to pay for security. This is the reason why &#8220;metrics&#8221; and &#8220;RoI on security&#8221; etc. has(is?) dominated the research funding/attention for so long. As we continue to debate on how to govern cybersapce the research presented at WEIS is increasingly pertinent, and is the only source of it&#8217;s kind. Glad to have seen you there!</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Medical costs by Frank</title>
		<link>http://zaph.com/blog/?p=1401#comment-116</link>
		<dc:creator>Frank</dc:creator>
		<pubDate>Sun, 29 Nov 2015 00:29:18 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1401#comment-116</guid>
		<description>I just had a CT scan done they charged my inuscanre $542.00 and I owe nothing. I have awesome inuscanre. My inuscanre paid the entire amount. Now I also had an MRI done recently, but I have not got the EOB on that one yet. I&#039;m sure they paid well on that too. I am guessing if you don&#039;t have ins. you would have to pay the MRI place the full amount.</description>
		<content:encoded><![CDATA[<p>I just had a CT scan done they charged my inuscanre $542.00 and I owe nothing. I have awesome inuscanre. My inuscanre paid the entire amount. Now I also had an MRI done recently, but I have not got the EOB on that one yet. I&#8217;m sure they paid well on that too. I am guessing if you don&#8217;t have ins. you would have to pay the MRI place the full amount.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Medical costs by Kali</title>
		<link>http://zaph.com/blog/?p=1401#comment-109</link>
		<dc:creator>Kali</dc:creator>
		<pubDate>Sun, 29 Nov 2015 00:07:51 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1401#comment-109</guid>
		<description>Most health iaesrnncus WILL cover standard Radiographic tests such as CT scans, X-rays and MRI&#039;s. As far as not having health insurance, most hospitals and maybe doctors offices will offer a financial aid for people who do not have health insurance. MRI&#039;s are used for diagnostic purposes so, if you need one and your doctor has ordered one, then I don&#039;t see why you would have a hard time getting your health insurance to cover it, or to get financial aid for one. If you can&#039;t get financial aid to assist you, than the MRI place or hospital will be able to work a payment plan out with you. Good Luck!</description>
		<content:encoded><![CDATA[<p>Most health iaesrnncus WILL cover standard Radiographic tests such as CT scans, X-rays and MRI&#8217;s. As far as not having health insurance, most hospitals and maybe doctors offices will offer a financial aid for people who do not have health insurance. MRI&#8217;s are used for diagnostic purposes so, if you need one and your doctor has ordered one, then I don&#8217;t see why you would have a hard time getting your health insurance to cover it, or to get financial aid for one. If you can&#8217;t get financial aid to assist you, than the MRI place or hospital will be able to work a payment plan out with you. Good Luck!</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Cryptography pioneer: We need good code by Matti</title>
		<link>http://zaph.com/blog/?p=1149#comment-107</link>
		<dc:creator>Matti</dc:creator>
		<pubDate>Sat, 28 Nov 2015 23:58:21 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1149#comment-107</guid>
		<description>they can break DH. Sure, but you need the private key used in that exnhgcae from at least one of the partys(say, A). If you have that key you can just use it as exponent for the public value of the other party(B). Just like A would do it.This private key you need differs for DH and EDH.For DH, your secret is the private key of the certificate that you use. The peer will decrypt this with the public key of your certificate. You&#039;re authenticated at this very moment, different certificates with different public keys won&#039;t work, DH would produce different keys for the two parties.For EDH, your secret is a random value that you only need as long as the handshake takes. The key-pair of your certificate is only used for authentication, eg you can in addition sign your public value.After an (E)DH key agreement, there are always exatly two parties posessing the resulting key. You need authentication to make sure they are the right two parties and not A-Attacker and Attacker-B.Simple DH is probably pretty old. It took a moment for me to realise that it&#039;s the stupid variant of what I learned in my studies during the last few years.Now, did I earn one of your many books? *g*</description>
		<content:encoded><![CDATA[<p>they can break DH. Sure, but you need the private key used in that exnhgcae from at least one of the partys(say, A). If you have that key you can just use it as exponent for the public value of the other party(B). Just like A would do it.This private key you need differs for DH and EDH.For DH, your secret is the private key of the certificate that you use. The peer will decrypt this with the public key of your certificate. You&#8217;re authenticated at this very moment, different certificates with different public keys won&#8217;t work, DH would produce different keys for the two parties.For EDH, your secret is a random value that you only need as long as the handshake takes. The key-pair of your certificate is only used for authentication, eg you can in addition sign your public value.After an (E)DH key agreement, there are always exatly two parties posessing the resulting key. You need authentication to make sure they are the right two parties and not A-Attacker and Attacker-B.Simple DH is probably pretty old. It took a moment for me to realise that it&#8217;s the stupid variant of what I learned in my studies during the last few years.Now, did I earn one of your many books? *g*</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Medical costs by Sunil</title>
		<link>http://zaph.com/blog/?p=1401#comment-78</link>
		<dc:creator>Sunil</dc:creator>
		<pubDate>Sun, 22 Feb 2015 03:52:48 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1401#comment-78</guid>
		<description>There are a lot of variables to your quoetisn. The allowable amount of the procedure would hidge on the zip code where services are rendered, procedure codes billed and the contract with that paticular facility. Generally speaking the MRI companies bill somewhere in the range of $1200 per episode. The insurance company will leverage about $600-$900. If you are looking to get this done, I would suggest reaching out to a radiology facility versus doing this out-patient hospital. You are more likely to work a deal with the smaller facility then the monster hospital system. Call around  you may get a better deal in the less populated areas of town. FYI- Keep in mind that the MRI itself is not the only charge  A radiologist will often sneak a seperate bill in there for about $100-200.</description>
		<content:encoded><![CDATA[<p>There are a lot of variables to your quoetisn. The allowable amount of the procedure would hidge on the zip code where services are rendered, procedure codes billed and the contract with that paticular facility. Generally speaking the MRI companies bill somewhere in the range of $1200 per episode. The insurance company will leverage about $600-$900. If you are looking to get this done, I would suggest reaching out to a radiology facility versus doing this out-patient hospital. You are more likely to work a deal with the smaller facility then the monster hospital system. Call around  you may get a better deal in the less populated areas of town. FYI- Keep in mind that the MRI itself is not the only charge  A radiologist will often sneak a seperate bill in there for about $100-200.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Medical costs by Krishna</title>
		<link>http://zaph.com/blog/?p=1401#comment-75</link>
		<dc:creator>Krishna</dc:creator>
		<pubDate>Sun, 22 Feb 2015 00:50:38 +0000</pubDate>
		<guid isPermaLink="false">http://zaph.com/blog/?p=1401#comment-75</guid>
		<description>Assuming you are in the US   an MRI can easily run 2000-2500. Plus you will have to pay sereval hundred to the radiologist who reads the MRI.If you have health insurance, you pay per your health insurance plan. Call the customer service for your health insurance and ask them about your plan details.  Most health insurance companies have an approved charge that is about 60% of what the providers normal charge is. You would pay your co-pay amount (ex: 20%) of the approved charge.If you do not have health insurance, the hospital will bill you the full price. You can call them and set up a payment plan- say 100 per month. This is usually interest free. As long as you make your payments every month- they will not put it on your credit. If you can pay them a lump sum, they may be willing to negotiate with you and accept less.</description>
		<content:encoded><![CDATA[<p>Assuming you are in the US   an MRI can easily run 2000-2500. Plus you will have to pay sereval hundred to the radiologist who reads the MRI.If you have health insurance, you pay per your health insurance plan. Call the customer service for your health insurance and ask them about your plan details.  Most health insurance companies have an approved charge that is about 60% of what the providers normal charge is. You would pay your co-pay amount (ex: 20%) of the approved charge.If you do not have health insurance, the hospital will bill you the full price. You can call them and set up a payment plan- say 100 per month. This is usually interest free. As long as you make your payments every month- they will not put it on your credit. If you can pay them a lump sum, they may be willing to negotiate with you and accept less.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
