Here Are All The Sites You Should Enable Two Factor Authentication...
Two factor authentication! In this age of endless massive hacks we seem to be in the middle of, it's one of the easiest ways you can dramatically boost..
Hide secret files in JPG files
marcofolio.net, If you want to hide secret files in JPG files, you'll here read how to do it.
Secret bookshelf door. Motorized. electronic lock
Here is the start of my secret bookshelf door which leads into my basement. It will have a motor which automatically opens and closes the shelves. There will...
Secret Knock detecting Entrance to my garage / workshop
This is (what I think is) a great example of the kind of fun, inspiring projects that come out of communities like Make, BoingBoing, and the DIY nerd world i...
Secret Knock Detecting Lock
Unlock your door with a secret knock. More information, source and schematics at http://grathio.com
Undelete files from NTFS with TestDisk - CGSecurity
HowStuffWorks "Someone told me that if there are 20 people...
Someone told me that if there are 20 people in a room, there's a 50/50 chance that two of them will have the same birthday. How can such a small group have two people with the same birthday in it?
Encryption -- from Wolfram MathWorld
The #1 tool for creating Demonstrations and anything technical.
Tap code - Wikipedia, the free encyclopedia
The , sometimes called the , is a way to messages, letter by letter, in a very simple way and transmit it using a series of tap sounds, hence its name. It has been commonly used by prisoners to communicate with each other. The method of communicatin...
What is a Digital Signature?
(Bob's private key)
An Overview of Cryptography
Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of mill...