Software Carpentry
Security

Evil Exists

What Are We Trying to Do?

Technology Alone Cannot Solve the Problem!

How to Think About Security

Rule 1: Don't Trust Your Input

Paths and I/O

Rule 2: Never Run User Commands

Cryptography 101

How Asymmetric Cryptography Works?

Securing HTTP

How do you login remotely?

Do and Don't

Summary