cr.yp.to
Welcome to cr.yp.to. Some popular pages that you might be looking for: United Airlines sucks (part 40); D. J. Bernstein's home page; the qmail home page; ...
http://cr.yp.to/
popularity:
security
software
linux
djb
crypto
unix
programming
cryptography
dns
qmail
|
Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES)
No information avaiable
similarity:
popularity:
security
cryptography
aes
encryption
tutorial
crypto
comic
algorithms
humor
programming
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
ScramDisk - Free Disk Encryption Software
No information avaiable
similarity:
popularity:
security
software
encryption
cryptography
crypto
disk
privacy
tools
networking
filesystem
|
Main Page - OWASP
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
hacking
internet
application
webdev
software
|
RootPrompt -- Nothing but Unix
Unix news and information for sysadmins.
similarity:
popularity:
linux
unix
news
sysadmin
security
blog
geek
tech
programming
technology
|
root labs rdist
This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...
similarity:
popularity:
security
blog
blogs
crypto
cryptography
linux
software
research
computers
opensource
|
Nessus
Free, open-source vulnerability and remote security scanner.
similarity:
popularity:
security
network
software
tools
scanner
linux
opensource
networking
vulnerability
sysadmin
|
Fefes Homepage
You can send email to web@fefe.de. Please use my GnuPG key. News ... If you like the software on fefe.de, you should also look at the web sites from Dan ...
similarity:
popularity:
programming
linux
people
software
security
code
development
network
blog
hacking
|
bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|