Windows - Howto Hide Files inside JPGs -tweak hack xp vista...
http://youtube.jimmyr.com/ to request tutorials Learn to hide any file(s) inside a regular jpg image. Simple quick trick. Free Compression software I used ht...
How To Make a Secret Compartment in Your Wall
Watch more Home Security & Safety videos: http://www.howcast.com/guides/154-Home-Security-and-Safety Subscribe to Howcast's YouTube Channel - http://howc.st/...
Secret Knock detecting Entrance to my garage / workshop
This is (what I think is) a great example of the kind of fun, inspiring projects that come out of communities like Make, BoingBoing, and the DIY nerd world i...
Secret bookshelf door. Motorized. electronic lock
Here is the start of my secret bookshelf door which leads into my basement. It will have a motor which automatically opens and closes the shelves. There will...
Secret Knock Detecting Lock
Unlock your door with a secret knock. More information, source and schematics at http://grathio.com
Send Email | Send anonymous email
This tool let you send anonymous email messages for free. Send an email to a friend when you have no access to your regular email account.
Top Secret America: Who is TSA?
Washington Post reporters Dana Priest and William M. Arkin's investigation of the government's response to 9/11. Top Secret America explores what they found.
Public Key Cryptography: Diffie-Hellman Key Exchange
Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...
Let's say that you need to send your friend a message, but you don't want another person to know what it is. You can use a full-blown encryption tool, such as PGP. If the message isn't that important or if it is intended to be decrypted by hand, yo...
Morse Code Translator
The translator can translate to and from Morse code and can play the sound of the Morse code to you. You can use it to send messages to your friends. The speed, pitch and volume of the sound are all fully adjustable.
Complex password generator - makemeapassword.com
Black Crawling Systems Archives - Encryption Technologies...
This archive is primarily to serve the North American community until the US regulations catch up with the rest of the world.
Tap code - Wikipedia, the free encyclopedia
The , sometimes called the , is a way to messages, letter by letter, in a very simple way and transmit it using a series of tap sounds, hence its name. It has been commonly used by prisoners to communicate with each other. The method of communicatin...
What is a Digital Signature?
(Bob's private key)
10 Top Secret Places on Earth
Design, Places, People, Technology and Concepts
Lecture Slides and Video Archives
Here are links to the PDF, PowerPoint and CSD () files for the lecture slides. You may print a hardcopy of the slides to refer to during lecture.
CABINET // How to Make Anything Signify Anything
Cabinet Magazine a quarterly of Art and Culture
HTG Explains: What is Encryption and How Does It Work?
Encryption has a long history dating back to when the ancient Greeks and Romans sent secret messages by substituting letters only decipherable with a secret key. Join us for a quick history lesson and learn more about how encryption works.
Braingle: Pigpen / Masonic Cipher
The pigpen cipher (sometimes called the masonic cipher or Freemason's cipher) is a simple substitution cipher exchanging letters for symbols based on a grid. The scheme was developed and used by the Freemasons in the early 1700s for record-keeping an...
Projects - dheera.net - Dheera Venkatraman's web site
The First Few Milliseconds of an HTTPS Connection
What exactly happens when an HTTPS connection is established? This article analyzes the data exchanged between the browser and the server, down to the byte, in order to set up a secured connection.
EasyBMP Cross-Platform Windows BMP Library: Steganography...
An Overview of Cryptography
Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of mill...
Encrypting a USB Key using TrueCrypt
Free online teleprompter.
Moserware: A Stick Figure Guide to the Advanced Encryption...
Jeff Moser on software development
Undelete files from NTFS with TestDisk - CGSecurity
Keeping your data from the FBI@Everything2.com
xkcd: Password Strength
Search comic titles and transcripts:
Hide secret files in JPG files
marcofolio.net, If you want to hide secret files in JPG files, you'll here read how to do it.
hidden compartment / diversion safe : cd cases
**UPDATE: i found this video, which is a tutorial on how to make this. the overall project isnt hard to figure out, all you'll need is time, patience, a dremel tool and a lot of superglue. http://www.youtube.com/watch?v=ueMEidAuD5w this is a hollowe...
cisco vpnclient password decoder
Feature Column from the AMS
University of British Columbia, Vancouver, Canada
Secret Passageways | Deadly Computer Blog
Public Key Cryptography: RSA Encryption Algorithm
RSA Public Key Encryption Algorithm. How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation & time...
WLAN : Mind if I come in ?
A brief introduction to wireless network penetration. Wireless LANs (WLAN) are extremely convenient for lap top users, and for home networks : no need for cables all over the place. Obviously, this poses kind of a risk : anyone with a WLAN enabled co...
Don't want to give them your real email? Use a temporary email. No registration, lasts 60 mins. Protection from Spam
Breaking disk encryption with RAM dumps - Hack a Day
If you haven't gotten a chance yet, do watch the video of this attack. It's does a good job explaining the problem. Full drive encryption stores the key in RAM while the computer is powered on. The RAM's stored data doesn't immediately disappear when...
Lifetimes of cryptographic hash functions
Quick summary of my take on compare-by-hash: If you are using compare-by-hash to generate addresses for data that can be supplied by malicious users, you should have a plan to migrate to a new hash every few years. For example, BitTorrent falls into...
Encryption -- from Wolfram MathWorld
The #1 tool for creating Demonstrations and anything technical.
The Towers of Hanoi
Athey Educational publish practice tests for Grammar School and independent school selection. This page is just for fun!