16 Secret Hiding Places For Your Valuables
We are all rather cautious when it comes to storing our valuables, even if it's in our own homes. So what better way to hide them than somewhere no one would even think about looking?
Windows - Howto Hide Files inside JPGs -tweak hack xp vista...
http://youtube.jimmyr.com/ to request tutorials Learn to hide any file(s) inside a regular jpg image. Simple quick trick. Free Compression software I used ht...
An Overview of Cryptography
Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of mill...
How To Make a Secret Compartment in Your Wall
Watch more Home Security & Safety videos: http://www.howcast.com/guides/154-Home-Security-and-Safety Subscribe to Howcast's YouTube Channel - http://howc.st/...
Let's say that you need to send your friend a message, but you don't want another person to know what it is. You can use a full-blown encryption tool, such as PGP. If the message isn't that important or if it is intended to be decrypted by hand, yo...
Thought Moments (with eye tracking)
Thought Moments, 2004. A film by Michael Simon Toon - The Buddha observed mind states after a physical or mental object enters the mind, describing them as T...
Secret bookshelf door. Motorized. electronic lock
Here is the start of my secret bookshelf door which leads into my basement. It will have a motor which automatically opens and closes the shelves. There will...
What is a Digital Signature?
(Bob's private key)
Unbreakable Fighting Umbrella: Philippine Secret Service...
=from Wired.com= The entourage of the Philippine president, Gloria Macapagal-Arroyo, has an unusual secret weapon. Her security team defends the head of the government with umbrellas. Not ordinary umbrellas, but unbreakable fighting umbrellas. Watch ...
Where to find public records online
Click to viewYou can use the web to find lots of things: information, videos, books, music, games, and yes, even public records. While our most private information can (usually) not be found online, you can track down items like birth certificates, m...
Strong Password Generator
Secret Knock detecting Entrance to my garage / workshop
This is (what I think is) a great example of the kind of fun, inspiring projects that come out of communities like Make, BoingBoing, and the DIY nerd world i...
What follows is a list of freely available crypto systems, with comments based on my limited reading in books and on the net. I am not an expert in cryptography, and the following comments are therefor not to be taken as anything but an introductory...
Public Key Cryptography: Diffie-Hellman Key Exchange
Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...
Tap code - Wikipedia, the free encyclopedia
The , sometimes called the , is a way to messages, letter by letter, in a very simple way and transmit it using a series of tap sounds, hence its name. It has been commonly used by prisoners to communicate with each other. The method of communicatin...
A Simple Guide to Cryptography
is an ancient mathematical science that was originally used for military communications, and designed to conceal the contents of a message should it fall into the hands of the enemy. Recent developments in cryptography have added additional uses, inc...
Braingle: Pigpen / Masonic Cipher
The pigpen cipher (sometimes called the masonic cipher or Freemason's cipher) is a simple substitution cipher exchanging letters for symbols based on a grid. The scheme was developed and used by the Freemasons in the early 1700s for record-keeping an...
Top Secret America: Who is TSA?
Washington Post reporters Dana Priest and William M. Arkin's investigation of the government's response to 9/11. Top Secret America explores what they found.
False Bottom Secret Compartment
Secret compartments are extremely useful (and awesome!). If you're a deep-cover government agent trying to keep important documents out of the hands o...
Backend Devs - DIY
Backend Devs write scripts for servers which communicate with the apps and websites we all use. We're the masters of fast responses and requests.
Feature Column from the AMS
University of British Columbia, Vancouver, Canada
Send Email | Send anonymous email
This tool let you send anonymous email messages for free. Send an email to a friend when you have no access to your regular email account.
Encryption -- from Wolfram MathWorld
The #1 tool for creating Demonstrations and anything technical.
Secret Knock Detecting Lock
Unlock your door with a secret knock. More information, source and schematics at http://grathio.com
How To Safely Store A Password
These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for storing passwords.
Pigpen cipher - Wikipedia, the free encyclopedia
The (sometimes referred to as the , , , or ) is a geometric cipher which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.
Morse Code Translator
The translator can translate to and from Morse code and can play the sound of the Morse code to you. You can use it to send messages to your friends. The speed, pitch and volume of the sound are all fully adjustable.
EasyBMP Cross-Platform Windows BMP Library: Steganography...
Black Crawling Systems Archives - Encryption Technologies...
This archive is primarily to serve the North American community until the US regulations catch up with the rest of the world.
Breaking disk encryption with RAM dumps - Hack a Day
If you haven't gotten a chance yet, do watch the video of this attack. It's does a good job explaining the problem. Full drive encryption stores the key in RAM while the computer is powered on. The RAM's stored data doesn't immediately disappear when...
Keeping your data from the FBI@Everything2.com
xkcd: Password Strength
Search comic titles and transcripts:
Don't want to give them your real email? Use a temporary email. No registration, lasts 60 mins. Protection from Spam
A Mini-Course in Cryptography
Secret Coder Tool
Visual cryptography - Wikipedia, the free encyclopedia
is a technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer.
WLAN : Mind if I come in ?
A brief introduction to wireless network penetration. Wireless LANs (WLAN) are extremely convenient for lap top users, and for home networks : no need for cables all over the place. Obviously, this poses kind of a risk : anyone with a WLAN enabled co...
MR01001101 :: cryptography steganography resources and challenges...
Vanish: Enhancing the Privacy of the Web with Self-Destructing...
Computing and communicating through the Web makes it virtually impossible to leave the past behind. College Facebook posts or pictures can resurface during a job interview; a lost or stolen laptop can expose personal photos or messages; or a legal ...
52 Things People Should Know To Do Cryptography
MR01001101 :: Early Cryptography
What is cryptography? Cryptography is the process or skill of communicating in or deciphering secret writings. Its name stems from the Greek kryptós, meaning "hidden" and gráphein meaning "to write".