Windows - Howto Hide Files inside JPGs -tweak hack xp vista...
http://youtube.jimmyr.com/ to request tutorials Learn to hide any file(s) inside a regular jpg image. Simple quick trick. Free Compression software I used ht...
Let's say that you need to send your friend a message, but you don't want another person to know what it is. You can use a full-blown encryption tool, such as PGP. If the message isn't that important or if it is intended to be decrypted by hand, yo...
How To Make a Secret Compartment in Your Wall
Watch more Home Security & Safety videos: http://www.howcast.com/guides/154-Home-Security-and-Safety Subscribe to Howcast's YouTube Channel - http://howc.st/...
An Overview of Cryptography
Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of mill...
Secret Knock detecting Entrance to my garage / workshop
This is (what I think is) a great example of the kind of fun, inspiring projects that come out of communities like Make, BoingBoing, and the DIY nerd world i...
Secret bookshelf door. Motorized. electronic lock
Here is the start of my secret bookshelf door which leads into my basement. It will have a motor which automatically opens and closes the shelves. There will...
Tap code - Wikipedia, the free encyclopedia
The , sometimes called the , is a way to messages, letter by letter, in a very simple way and transmit it using a series of tap sounds, hence its name. It has been commonly used by prisoners to communicate with each other. The method of communicatin...
Public Key Cryptography: Diffie-Hellman Key Exchange
Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...
What is a Digital Signature?
(Bob's private key)
Unbreakable Fighting Umbrella: Philippine Secret Service...
=from Wired.com= The entourage of the Philippine president, Gloria Macapagal-Arroyo, has an unusual secret weapon. Her security team defends the head of the government with umbrellas. Not ordinary umbrellas, but unbreakable fighting umbrellas. Watch ...
Strong Password Generator
A Simple Guide to Cryptography
is an ancient mathematical science that was originally used for military communications, and designed to conceal the contents of a message should it fall into the hands of the enemy. Recent developments in cryptography have added additional uses, inc...
Encryption -- from Wolfram MathWorld
The #1 tool for creating Demonstrations and anything technical.
Top Secret America: Who is TSA?
Washington Post reporters Dana Priest and William M. Arkin's investigation of the government's response to 9/11. Top Secret America explores what they found.
Send Email | Send anonymous email
This tool let you send anonymous email messages for free. Send an email to a friend when you have no access to your regular email account.
What follows is a list of freely available crypto systems, with comments based on my limited reading in books and on the net. I am not an expert in cryptography, and the following comments are therefor not to be taken as anything but an introductory...
Braingle: Pigpen / Masonic Cipher
The pigpen cipher (sometimes called the masonic cipher or Freemason's cipher) is a simple substitution cipher exchanging letters for symbols based on a grid. The scheme was developed and used by the Freemasons in the early 1700s for record-keeping an...
Black Crawling Systems Archives - Encryption Technologies...
This archive is primarily to serve the North American community until the US regulations catch up with the rest of the world.
Secret Knock Detecting Lock
Unlock your door with a secret knock. More information, source and schematics at http://grathio.com
How To Safely Store A Password
These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for storing passwords.
Feature Column from the AMS
University of British Columbia, Vancouver, Canada
Don't want to give them your real email? Use a temporary email. No registration, lasts 60 mins. Protection from Spam
Morse Code Translator
The translator can translate to and from Morse code and can play the sound of the Morse code to you. You can use it to send messages to your friends. The speed, pitch and volume of the sound are all fully adjustable.
Pigpen cipher - Wikipedia, the free encyclopedia
The (sometimes referred to as the , , , or ) is a geometric cipher which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.
Secret Coder Tool
A Mini-Course in Cryptography
Breaking disk encryption with RAM dumps - Hack a Day
If you haven't gotten a chance yet, do watch the video of this attack. It's does a good job explaining the problem. Full drive encryption stores the key in RAM while the computer is powered on. The RAM's stored data doesn't immediately disappear when...
EasyBMP Cross-Platform Windows BMP Library: Steganography...
xkcd: Password Strength
Search comic titles and transcripts:
Moserware: A Stick Figure Guide to the Advanced Encryption...
Jeff Moser on software development
Keeping your data from the FBI@Everything2.com
Vanish: Enhancing the Privacy of the Web with Self-Destructing...
Computing and communicating through the Web makes it virtually impossible to leave the past behind. College Facebook posts or pictures can resurface during a job interview; a lost or stolen laptop can expose personal photos or messages; or a legal ...
The First Few Milliseconds of an HTTPS Connection
What exactly happens when an HTTPS connection is established? This article analyzes the data exchanged between the browser and the server, down to the byte, in order to set up a secured connection.
Visual cryptography - Wikipedia, the free encyclopedia
is a technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer.
Furthermore, anyone sitting between your machine and the machines you visit can see where you are surfing. For example, if your employer or web provider has a proxy server, it can log every access you make, every site you visit, every picture you do...
MR01001101 :: cryptography steganography resources and challenges...
52 Things People Should Know To Do Cryptography
MR01001101 :: Early Cryptography
What is cryptography? Cryptography is the process or skill of communicating in or deciphering secret writings. Its name stems from the Greek kryptós, meaning "hidden" and gráphein meaning "to write".