10 awesome websites you will like
City Creator - Create a pixel city. Tiii.me - Calculate how long it takes to binge watch any series. CodePen - Infinite Tree of Life. Good Movies Box - A great collection of lesser-known movies to browse, when you're in need of a good movie to watch....
An Overview of Cryptography
Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of mill...
WLAN : Mind if I come in ?
A brief introduction to wireless network penetration. Wireless LANs (WLAN) are extremely convenient for lap top users, and for home networks : no need for cables all over the place. Obviously, this poses kind of a risk : anyone with a WLAN enabled co...
Top 5 Encrypted Messaging Softwares
Top 5 Encrypted Messaging Softwares
Strong Password Generator
What is a Digital Signature?
(Bob's private key)
The Black Chamber - Caesar Cipher
According to Suetonius, Caesar simply replaced each letter in a message with the letter that is three places further down the alphabet. Cryptographers often think in terms of the plaintext alphabet as being the alphabet used to write the original...
Lifetimes of cryptographic hash functions
Quick summary of my take on compare-by-hash: If you are using compare-by-hash to generate addresses for data that can be supplied by malicious users, you should have a plan to migrate to a new hash every few years. For example, BitTorrent falls into...
Secure Shell FAQ Section 1: About Secure Shell
To paraphrase the README file:
OpenPGP.org - The OpenPGP Alliance Home Page
The International PGP Home Page
Full-Disk Encryption Suites - Network Computing
One stolen laptop loaded with sensitive information could sink your business. To avoid disaster, a comprehensive security strategy must include a way to prevent data leakage from your mobile
Projects - dheera.net - Dheera Venkatraman's web site
Edit International - Xerox Helped Win The Cold War
Vigay.com : Why you should refuse National ID Cards
Research team finds disk encryption foils law enforcement...
Computer scientist cracks mysterious 'Copiale Cipher'
The manuscript seems straight out of fiction: a strange handwritten message in abstract symbols and Roman letters meticulously covering 105 yellowing pages, hidden in the depths of an academic archive.
The Pain of Connecting to WPA Wi-Fi on the Linux Command...
What follows is a list of freely available crypto systems, with comments based on my limited reading in books and on the net. I am not an expert in cryptography, and the following comments are therefor not to be taken as anything but an introductory...
Mad:)Cipher - Free Online Cryptogram Puzzle
EasyBMP Cross-Platform Windows BMP Library: Steganography...
Don't want to give them your real email? Use a temporary email. No registration, lasts 60 mins. Protection from Spam
The FreeBSD Diary -- Setting up an encrypted file system...
Hide your data by encrypting the disk
MIT PGP Key Server
Index: Verbose Index:
Matt Blaze: James Randi owes me a million dollars
Braingle: Pigpen / Masonic Cipher
The pigpen cipher (sometimes called the masonic cipher or Freemason's cipher) is a simple substitution cipher exchanging letters for symbols based on a grid. The scheme was developed and used by the Freemasons in the early 1700s for record-keeping an...
Unbreakable Fighting Umbrella: Philippine Secret Service...
=from Wired.com= The entourage of the Philippine president, Gloria Macapagal-Arroyo, has an unusual secret weapon. Her security team defends the head of the government with umbrellas. Not ordinary umbrellas, but unbreakable fighting umbrellas. Watch...
Manual One-time pad
DDJ, Jan96: Randomness and Netscape Browser
Visual Cryptography Kit
Freeze Memory Chips, Steal Encrypted Data
Princeton University researchers have come out with a method to steal encrypted information stored on computer hard disks.
Clone Credit Card With A Cassette Tape
Ever wonder how a credit card works? Well it is just a magnetic strip like a cassette tape. There have been pocket sized credit sized card cloners forever but I just wanted to point out how basic the technology is. I don't really care if they upgrade...
Alan Kaminsky -- Cryptographic One-Way Hash Functions
NSA :: Overview
Top 10 Tricks for Creatively Hiding Your Stuff
Every kid has a creative stash for secret stuff, but that useful enthusiasm doesn't have to die off just because we've traded treehouses for desks. See how you can hide money, files, workspaces, and more in today's Top 10. Photo by sylvar. 10.
How To Encrypt Your Business Data For Free
Laptops and external storage drives are tempting targets for thieves, but you can stymie criminals from getting your sensitive business data by encrypting it. That way you'll only need to replace stolen hardware, not customer records or trade secrets...
Off-the-Record Messaging Protocol version 2
World Fastest MD5 cracker BarsWF : Svarichevskiy Mikhail...
Braingle: Rail Fence Cipher
Free Encryption / Cryptographic Libraries and Source Code...
Free encryption / cryptographic source code, free encryption libraries, free software - add security to your application
Moserware: A Stick Figure Guide to the Advanced Encryption...
Jeff Moser on software development
Send Email | Send anonymous email
This tool let you send anonymous email messages for free. Send an email to a friend when you have no access to your regular email account.