The Crypt

Results: 208



#Item
61The GNU Privacy Handbook  The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
62NeoScrypt - the latest proof of work algorithm  As of the 26th of July 2014, NeoScrypt will be the latest proof of work (PoW) algorithm to hit the cryptocurrency world. It has been designed as an

NeoScrypt - the latest proof of work algorithm As of the 26th of July 2014, NeoScrypt will be the latest proof of work (PoW) algorithm to hit the cryptocurrency world. It has been designed as an "ASIC-resistant" algorit

Add to Reading List

Source URL: www.feathercoin.com

Language: English - Date: 2014-07-26 13:27:07
63Mozy Encryption Technology The MozyEnterprise® advantage Simple Seamlessly manage backup, sync, and mobile access for multi-user

Mozy Encryption Technology The MozyEnterprise® advantage Simple Seamlessly manage backup, sync, and mobile access for multi-user

Add to Reading List

Source URL: mozy.com

Language: English
64VALIDY FILE CRYPT Data theft protection file encryption To protect files containing confidential data against any undesirable intervention it is indispensable to encrypt them. So that the protection is solid, it is neces

VALIDY FILE CRYPT Data theft protection file encryption To protect files containing confidential data against any undesirable intervention it is indispensable to encrypt them. So that the protection is solid, it is neces

Add to Reading List

Source URL: www.validy.com

Language: English - Date: 2008-03-19 10:19:01
65Cybersoft.com  CyberSoft White Papers Special Attributes of the VFind Tool Kit Peter V. Radatti CyberSoft, Inc.

Cybersoft.com CyberSoft White Papers Special Attributes of the VFind Tool Kit Peter V. Radatti CyberSoft, Inc.

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
66Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:05
67Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
68NinjaStik First time use instructions Welcome to your new NinjaStik – online anonymity made easy. Getting started: Turn off your computer, plug the NinjaStik into a USB port, turn on your computer. You will need to tel

NinjaStik First time use instructions Welcome to your new NinjaStik – online anonymity made easy. Getting started: Turn off your computer, plug the NinjaStik into a USB port, turn on your computer. You will need to tel

Add to Reading List

Source URL: www.ninjastik.com

Language: English - Date: 2013-08-06 14:51:07
69Hidden Treasures:  Fresh Expressions The ‘Hidden Treasures: Fresh Expressions’ project focuses on the Crypt, the Library, and the ‘hidden collections’ in the Cathedral’s ownership. At the very heart of the proj

Hidden Treasures: Fresh Expressions The ‘Hidden Treasures: Fresh Expressions’ project focuses on the Crypt, the Library, and the ‘hidden collections’ in the Cathedral’s ownership. At the very heart of the proj

Add to Reading List

Source URL: www.rochestercathedral.org

Language: English - Date: 2014-01-24 08:38:41
70Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:38:52