Cryptographic software

Results: 2705



#Item
51Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Cryptography standards / X.509 / Internet Standards / PKCS / Code signing / Portable Executable / Public key certificate / Cryptographic Message Syntax

Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-07-29 12:01:34
52Computing / Software / Cryptographic hash functions / Error detection and correction / Hashing / Checksum / SHA-1 / Sha1sum / Hash list / OneDrive / Hash function / Zip

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

Add to Reading List

Source URL: orb.essex.ac.uk

Language: English - Date: 2015-12-05 03:37:29
53Microcontrollers / Disk encryption / Instruction set architectures / Cryptographic software / Non-volatile memory / PIC microcontroller / USB flash drive / Serial Peripheral Interface Bus / In-system programming / Flash memory / Firmware / Encryption

Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2015-05-26 11:04:26
54Internet Standards / Secure Shell / Cryptographic software / OpenSSH / Internet protocols / Computer access control / FreeIPA / Password / Lightweight Directory Access Protocol / Generic Security Services Application Program Interface / Authentication

FreeIPA Training Series SSSD and OpenSSH Integration Jan Cholasta

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:16:17
55Disk encryption / Cryptographic software / Cryptography / Cross-platform software / Password / Erlang / Crypt / BitLocker / GBDE

ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage Definitions

Add to Reading List

Source URL: rvasec.com

Language: English - Date: 2015-07-01 07:40:04
56Disk encryption / Cryptographic software / Password / USB flash drive / Crypt / BitLocker / Password manager

Encryption Procedure Removable Media Encryption – User Guide (Revision Date: Table of Contents

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-11-17 11:50:26
57Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
58Public-key cryptography / PGP / Key management / Cross-platform software / Cryptographic software / GNU Privacy Guard / X.509 / Ssh-keygen / Public key fingerprint / Key

1 Certificates /etc/ssl/certs $ cat GlobalSign_Root_CA.pem -----BEGIN TRUSTED CERTIFICATE----MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-29 16:43:01
59Hypertext Transfer Protocol / Secure communication / Cryptographic protocols / Cryptographic software / Stunnel / Internet privacy / HTTPS / Load balancing / HTTP cookie

ALOHA LOAD BALANCER MANAGING SSL ON THE FRONTEND “APPNOTE” #0021 ― MANAGING SSL ON THE FRONTEND This application note is intended to help you implement SSL management on the frontend (connection to an HTTP server)

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
60Disk encryption / Cryptographic software / Online backup services / Cryptography / Windows Vista / USB flash drive / TrueCrypt / Dropbox / BitLocker / Bluetooth / Encryption / Computer security

VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES Filming for human rights can be dangerous. It can put you, the people you are filming

Add to Reading List

Source URL: librarywebfiles.s3.amazonaws.com

Language: English - Date: 2015-05-12 14:38:07
UPDATE