Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Capture-the-Flag Hacking Events (CTFs)

Capture the Flag (CTF) in computer security is an exercise in which “flags” are secretly hidden in purposefully-vulnerable programs or websites. It can either be for competitive or educational purposes. Competitors steal flags either from other competitors (attack/defense-style CTFs) or from the organizers (jeopardy-style challenges). Several variations exist. Competitions can including hiding flags in hardware devices, they can be both online or in-person, and can be advanced or entry-level. The game is based on the traditional outdoor sport of the same name.
—Wikipedia, “Capture the flag (cybersecurity)”

Capture the Flag (CTF) events are listed by CTFTime.org.
—CTFTime. “CTF Events“

A satellite eyes the moon. - Illustration: Elena Lacey
Articles / CyberSecurity

The Feds Want These Teams to Hack a Satellite—From Home

Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.

The Feds Want These Teams to Hack a Satellite—From Home Read More

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Can Generative AI Bots Be Trusted?
  • Computer Science Education Week 2023
  • Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
  • Using Algorithms to Deliver Disaster Aid
  • DeepMind AI accurately forecasts weather — on a desktop computer
  • The U.S. v. Google: The Case That Will Determine the Future of Tech
  • Standards to Secure the Sensors That Power IoT
  • Making Connections
  • Let Us Not Put All Our Eggs in One Basket
  • Security by Labeling

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (670)
    • Climate (24)
    • Computing & Technology (337)
    • CyberSecurity (236)
    • Web Resources (39)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (39)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (653)
    • Articles (559)
    • Books, Reports, Films & Images (67)
    • News & Information (30)
    • Organizations (4)
  • — General (1)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (58)
  • Artificial Intelligence Research (7)
  • Avalanche Awesomeness (5)
  • Avalanche Control & Mitigation (5)
  • Avalanche Education (8)
  • Avalanche Photos (5)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (11)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (7)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (7)
  • Computer Crimes (5)
  • Computer Science Education (13)
  • Computer Security (17)
  • Coronavirus-Covid19 (15)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (11)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (11)
  • Ethics (32)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (7)
  • Geopolitics (9)
  • Google (Firm) (8)
  • Government Policy (12)
  • Government Regulation (12)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (31)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (23)
  • History – Internet (16)
  • History – Silicon Valley (8)
  • How To (10)
  • HTML (6)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (7)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (15)
  • Law & Policy (6)
  • Machine Learning (13)
  • Malware (10)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (6)
  • Passwords (8)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (10)
  • Privacy & Personal Information (12)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (8)
  • Resources (6)
  • Russia (42)
  • Security (9)
  • Security Guidance (8)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (27)
  • SolarWinds (5)
  • Spyware (8)
  • Supply Chain Attack (5)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (6)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (8)
  • Trustworthy Systems (5)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Forecasting (5)
  • Weather Phenomena (6)
  • Web Accessibility (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

December 4-10, 2023 is Computer Science Education Week

Logo - CSEdWeek

Featured Books

Book Cover - The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations"
Book Cover - The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime"
Book Cover - A Hacker's Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back"
Book Cover - A Biography of the Pixel"
Book Cover - Steve Jobs"
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News"
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives"
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution"
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage"
Book Cover - A New History of Modern Computing: How the computer became universal"
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon"
Book Cover - Hackers: Heroes of the Computer Revolution"
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton"
Book Cover - We Have Root: Even More Advice from Schneier on Security"
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed."
Book Cover - Facebook: The Inside Story by Steven Levy"
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State"
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics"
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age"
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power"
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order"
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers"
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America"
Book Cover- Permanent Record"
Book Cover - The Perfect Weapon"
Book Cover - Dawn of the Code War"
Book Cover - Zucked"
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier"
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier"
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier"
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier"
Copyright © 2020-2023 Wallace Web Design, LLC