A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false statement, to see whether sensitive information gets out to other people as well. Special attention is paid to the quality of the prose of the unique language, in the hopes that the suspect will repeat it verbatim in the leak, thereby identifying the version of the document. The term was coined by Tom Clancy in his novel Patriot Games, although Clancy did not invent the technique. The actual method (usually referred to as a barium meal test in espionage circles) has been used by intelligence agencies for many years. The fictional character Jack Ryan describes the technique he devised for identifying the sources of leaked classified documents: Each summary paragraph has six different versions, and the mixture of those paragraphs is unique to each numbered copy of the paper. There are over a thousand possible permutations, but only ninety-six numbered copies of the actual document. The reason the summary paragraphs are so lurid is to entice a reporter to quote them verbatim in the public media. If he quotes something from two or three of those paragraphs, we know which copy he saw and, therefore, who leaked it. A refinement of this technique uses a thesaurus program to shuffle through synonyms, thus making every copy of the document unique. (Wikipedia).
How to Make a Swinging Log Trap
This is a very cool trap seen in quite a few movies. The mechanism uses the weight of the falling logs to smash what comes between them. It is more of a trap to build just to have some fun smashing things than it is practical for obtaining food. Enjoy. -~-~~-~~~-~~-~- Check out my latest
From playlist Practical Projects & Skills
Dutch police use eagles to hunt illegal drones
Police in the Netherlands are taking a unique approach toward finding illegal, and potentially unsafe, drones. They are the first in the world using eagles to hunt and catch them. The NewsHour Weekend's Christopher Booker has more.
From playlist Drones
Naked Survival Tip: Baiting the Birds | Naked and Afraid
Kim demonstrates how to build a bird trap from scratch to catch your prey. | For more, visit http://dsc.discovery.com/tv-shows/naked-and-afraid/#mkcpgn=ytdsc1 Watch full episodes! | https://www.youtube.com/user/discoveryfulleps/videos
From playlist Naked and Afraid
What's Inside A Wasp's Nest | What's Inside?
A wasp's nest is a complex structure that is a specialized nursery for all aerial-nest-building wasp species. These nests are easily identifiable — most of us have seen one at one time or another hanging from the outside of your home or on a tree. While these structures may look relatively
From playlist What's Inside
Rope Trick for my neighborhood
During my show, a rope is spotted in my sleeve. I pull it...
From playlist My Magic
This is a new and improved version of the trap shown in my previous video, "How to Build a Trip Wire Snare". Enjoy. #NightHawkInLight -~-~~-~~~-~~-~- Check out my latest video: "How To View Invisible Air Currents With Lasers" https://www.youtube.com/watch?v=K94Cc21KEIA -~-~~-~~~-~~-~-
From playlist Practical Projects & Skills
Year of BeeKeeping Episode 32, Swarm Traps
I start putting up swarm traps, though this may be a bad year.
From playlist BeeKeeping
Year of BeeKeeping Episode 33, More Swarm Traps
I make and put up some more swarm traps.
From playlist BeeKeeping
Canarytokens - Honeypots Made Easy
Hey guys! HackerSploit here back again with another video, in this video I will be demonstrating how to setup Canarytokens. Canarytokens lets you implant traps in your production systems rather than setting up separate honeypots. Canarytokens: https://canarytokens.org/generate ⭐Help Supp
From playlist Ethical Hacking & Penetration Testing - Complete Course
3. Buffer Overflow Exploits and Defenses
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-orient
From playlist MIT 6.858 Computer Systems Security, Fall 2014
Why the Arctic is climate change's canary in the coal mine - William Chapman
View full lesson: http://ed.ted.com/lessons/why-the-arctic-is-climate-change-s-canary-in-the-coal-mine-william-chapman The Arctic may seem like a frozen and desolate environment where nothing ever changes. But the climate of this unique and remote region can be both an early indicator of
From playlist New TED-Ed Originals
The Isle of Dogs: Explain the Name
Isle of Dogs, you love dogs, we all love dogs. Ko-Fi: https://ko-fi.com/jagohazzard Patreon: https://patreon.com/jagohazzard
From playlist London
The Meat of It - Ryan Kitchens - REdeploy 2019
Incident Reviews in Software have a tendency to rely on seemingly satisfying yet shallow and misleading oversimplifications, hiding from us that what we think is ‘the meat of it’ is rather an empty bite. Resilience Engineering warns us about boiling down complex situations to simple expla
From playlist REdeploy 2019
CERIAS Security: Resilient Systems for Mission Assurance 4/4
Clip 4/4 Speaker: Dave Keppler · Senior Information Security Scientist · MITRE The ability for information services to continue operating despite attacks is a core enabler of mission assurance goals. Existing security techniques lack this concept of resilience and are inadequate for prot
From playlist The CERIAS Security Seminars 2008
OSB 2015 - Hacking Minecraft! - Jonan Scheffler
Minecraft is an incredibly popular game with developers. I'll give a brief tour of opportunities to practice your craft in the Minecraft world and walkthrough some tutorials using popular open source projects.
From playlist Open Source Bridge 2015
GTAC 2014: I Don't Test Often ... But When I Do, I Test in Production
Gareth Bowles (Netflix) Every day, Netflix has more customers consuming more content on an increasing number of client devices. We're also constantly innovating to improve our customers' experience. Testing in such a rapidly changing environment is a huge challenge, and we've concluded th
From playlist GTAC 2014
Math 131 103116 Introduction to Infinite Series
Infinite series. Summation notation, sequence of partial sums, convergence, divergence. Cauchy Criterion for convergence of a series; nth term test (divergence test). Convergence of nonnegative series. Comparison test; Cauchy's lacunary test (nonnegative, nonincreasing series); geometr
From playlist Course 7: (Rudin's) Principles of Mathematical Analysis
DjangoCon US 2018 - Strategies for Zero Down Time, Frequent Deployments by Nick Humrich
DjangoCon US 2018 - Strategies for Zero Down Time, Frequent Deployments by Nick Humrich Deployments can be stressful, but should’nt be. We all hear about big companies deploying several, if not thousands of times a day. In order to acheive this, you have to be able to deploy without impac
From playlist DjangoCon US 2018