10 Ways to Ensure Your Data is Safe From the Feds :: HTMList.com,...
Don't want to give them your real email? Use a temporary email. No registration, lasts 60 mins. Protection from Spam
Online Hex Dec Bin Oct converter for programmers, direct...
Strong Password Generator
Decrypt and Copy DVDs to Your Hard Drive Without Ripping...
Rainbow Tables . net
cisco vpnclient password decoder
NSA :: Overview
PHP Security Consortium: Password Hashing
WLAN : Mind if I come in ?
A brief introduction to wireless network penetration. Wireless LANs (WLAN) are extremely convenient for lap top users, and for home networks : no need for cables all over the place. Obviously, this poses kind of a risk : anyone with a WLAN enabled co...
Furthermore, anyone sitting between your machine and the machines you visit can see where you are surfing. For example, if your employer or web provider has a proxy server, it can log every access you make, every site you visit, every picture you do...
Rainbow table - Wikipedia, the free encyclopedia
Undelete files from NTFS with TestDisk - CGSecurity
HTG Explains: What is Encryption and How Does It Work?
Encryption has a long history dating back to when the ancient Greeks and Romans sent secret messages by substituting letters only decipherable with a secret key. Join us for a quick history lesson and learn more about how encryption works.