finds you similar websites
auto-suggest    top sites

Apr 25th, 2024

18 Popular Sites Like Yp.to Cr

Our technology has searched the www and identified a lot of awesome security and software sites like Yp.to Cr. Stop on by and explore sites that resemble Yp.to Cr.

Displaying 21 to 30 of 500 alternatives to Yp.to Cr. (Updated: Apr 25th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Yp.to Cr:
  cr.yp.to
Welcome to cr.yp.to. Some popular pages that you might be looking for: United Airlines sucks (part 40); D. J. Bernstein's home page; the qmail home page; ...
http://cr.yp.to/
popularity:
security
software
linux
djb
crypto
unix
programming
cryptography
dns
qmail
new search by a custom tag signature
  CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
  Secure Programming for Linux and Unix HOWTO
This book provides a set of design and implementation guidelines for writing ... Such programs include application programs used as viewers of remote data, web ...
similarity:
popularity:
security
programming
linux
unix
c
howto
secure
development
c++
c\/c++
  CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
  Rootkit Hunter
http://www.rootkit.nl/files/rootkit_documentation.html|Documentation ... Copyright Rootkit.nl / Michael Boelen, 2003-2009. All rights reserved. Hosted by Shock Media ...
similarity:
popularity:
security
linux
rootkit
tools
sysadmin
software
server
unix
opensource
hacking
  Keyczar
Keyczar: An open source cryptographic toolkit ... Introducing Keyczar ... Keyczar was originally developed by members of the Google Security Team and is ...
similarity:
popularity:
security
python
cryptography
java
programming
opensource
google
software
library
tools
  Darik's Boot and Nuke (Hard Drive Disk Wipe)
Self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, also prevents or thoroughly hinders all known techniques of hard disk forensic analysis.
similarity:
popularity:
security
software
tools
utilities
wipe
utility
erase
linux
sysadmin
computer
  Top 100 Network Security Tools
Review of the top 100 network security tools (free or commercial), as voted on by 3,200 Nmap Security Scanner users ... I (Fyodor) asked users from the nmap ...
similarity:
popularity:
security
tools
network
software
hacking
linux
sysadmin
networking
windows
utilities
  Проект OpenNet - главная страница
Проект OpenNet - все о Unix системах и открытых технологиях ... palm.opennet.ru. Мобильный Linux. ФОРУМ - Форум для администраторов - Форум для пользователей ...
similarity:
popularity:
linux
opensource
unix
news
documentation
software
freebsd
security
russian
programming
  Tinfoil Hat Linux
A secure single floppy linux. For the paranoid among us. ... If you maintain a PGP Certificate Authority or signing key and have to have a safe place to use the CA key. ...
similarity:
popularity:
linux
security
privacy
software
distro
pgp
tools
encryption
cryptography
tinfoil
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.