The Crypt

Results: 208



#Item
61PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
62Bitcoin / Peer-to-peer computing / Graphics hardware / Salsa20 / Graphics processing unit / Crypt / Application-specific integrated circuit / Hash function / ASICS / Software / Computing / Electronic engineering

NeoScrypt - the latest proof of work algorithm As of the 26th of July 2014, NeoScrypt will be the latest proof of work (PoW) algorithm to hit the cryptocurrency world. It has been designed as an "ASIC-resistant" algorit

Add to Reading List

Source URL: www.feathercoin.com

Language: English - Date: 2014-07-26 13:27:07
63Computing / Cloud storage / Online backup services / System software / Mozy / Web hosting / Crypt / Encrypting File System / Disk encryption / Cryptographic software / Software

Mozy Encryption Technology The MozyEnterprise® advantage Simple Seamlessly manage backup, sync, and mobile access for multi-user

Add to Reading List

Source URL: mozy.com

Language: English
64Computing / System software / Encryption software / USB flash drive / Crypt / Encryption / Windows / Smart card / Universal Serial Bus / Cryptographic software / Disk encryption / Microsoft Windows

VALIDY FILE CRYPT Data theft protection file encryption To protect files containing confidential data against any undesirable intervention it is indispensable to encrypt them. So that the protection is solid, it is neces

Add to Reading List

Source URL: www.validy.com

Language: English - Date: 2008-03-19 10:19:01
65Unix / Crypt / File system / Computer virus / Operating system / Microsoft Word / Software / System software / Antivirus software

Cybersoft.com CyberSoft White Papers Special Attributes of the VFind Tool Kit Peter V. Radatti CyberSoft, Inc.

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
66Password / Salt / Computer network security / John the Ripper / Crack / Crypt / Web application security / MD5 / Password policy / Computer security / Cryptography / System software

Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:05
67PBKDF2 / Password / Salt / Crypt / LastPass Password Manager / SHA-2 / Bcrypt / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Cryptographic software

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
68Security / Computer security / Cryptographic software / Crypt / Password manager / Disk encryption / Password psychology / Cryptography / Password / Passphrase

NinjaStik First time use instructions Welcome to your new NinjaStik – online anonymity made easy. Getting started: Turn off your computer, plug the NinjaStik into a USB port, turn on your computer. You will need to tel

Add to Reading List

Source URL: www.ninjastik.com

Language: English - Date: 2013-08-06 14:51:07
69Medway / Norman architecture / Rochester Cathedral / Textus Roffensis / England / Kent / Counties of England / English Gothic architecture

Hidden Treasures: Fresh Expressions The ‘Hidden Treasures: Fresh Expressions’ project focuses on the Crypt, the Library, and the ‘hidden collections’ in the Cathedral’s ownership. At the very heart of the proj

Add to Reading List

Source URL: www.rochestercathedral.org

Language: English - Date: 2014-01-24 08:38:41
70Computing / Public-key cryptography / Internet / Security / Internet standards / Transport Layer Security / Buffer overflow / HTTP Secure / Transmission Control Protocol / Cryptographic protocols / Secure communication / Electronic commerce

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:38:52
UPDATE