finds you similar websites
auto-suggest    top sites

Jun 9th, 2024

18 Popular Sites Like pajhome.org.uk

moreofit has scoured through the web and spotted a lot of quality security and programming sites like pajhome.org.uk. Come by and check out websites that are similar to pajhome.org.uk.

Displaying 31 to 40 of 500 alternatives to pajhome.org.uk. (Updated: Jun 9th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like pajhome.org.uk:
  Paj's Home
No information avaiable
http://pajhome.org.uk/index.html
popularity:
security
programming
javascript
cryptography
sha1
md5
authentication
people
encryption
webmaster
new search by a custom tag signature
  Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
similarity:
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
  OpenSSL: The Open Source toolkit for SSL/TLS
Open source toolkit for SSL/TLS.
similarity:
popularity:
ssl
security
openssl
opensource
encryption
software
programming
linux
tools
cryptography
  RSA Laboratories - Crypto FAQ
No information avaiable
similarity:
popularity:
cryptography
security
rsa
faq
crypto
reference
encryption
programming
theory
laboratories
  How We Learned to Cheat at Online Poker: A Study in Software Security [Cigital]
Poker is a card game that many people around the world enjoy. Poker is played at kitchen tables, in casinos, and cardrooms -- and more recently, the Web. ...
similarity:
popularity:
poker
security
programming
random
games
interesting
algorithm
algorithms
toread
cryptography
  RSA
No information avaiable
similarity:
popularity:
security
software
rsa
technology
computer
cryptography
encryption
computersoftware
authentication
securid
  Jasypt: Java simplified encryption - How to encrypt user passwords
Almost all modern web applications need, in one way or another, to encrypt their ... We could say that, from the moment that an application has users, and ...
similarity:
popularity:
security
java
encryption
password
programming
howto
passwords
cryptography
development
tips
  SecurityFocus interview with Solar Designer on John the Ripper 1.7
No information avaiable
similarity:
popularity:
security
password
cryptography
programming
passwords
code
crypto
rainbowtable
generator
generators
  Bruce Schneier Facts
Things you might not know about cryptographer and security expert Bruce Schneier
similarity:
popularity:
security
humor
cryptography
fun
programming
funny
schneier
encryption
facts
math
  John Resig - OCR and Neural Nets in JavaScript
No information avaiable
similarity:
popularity:
javascript
ocr
captcha
programming
neuralnetworks
security
ai
web
greasemonkey
neural
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
< prev ... 1 2 3 4 5 6 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.