Paj's Home
No information avaiable
http://pajhome.org.uk/index.html
popularity:
security
programming
javascript
cryptography
sha1
md5
authentication
people
encryption
webmaster
|
Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
similarity:
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
|
OpenSSL: The Open Source toolkit for SSL/TLS
Open source toolkit for SSL/TLS.
similarity:
popularity:
ssl
security
openssl
opensource
encryption
software
programming
linux
tools
cryptography
|
RSA Laboratories - Crypto FAQ
No information avaiable
similarity:
popularity:
cryptography
security
rsa
faq
crypto
reference
encryption
programming
theory
laboratories
|
How We Learned to Cheat at Online Poker: A Study in Software Security [Cigital]
Poker is a card game that many people around the world enjoy. Poker is played at kitchen tables, in casinos, and cardrooms -- and more recently, the Web. ...
similarity:
popularity:
poker
security
programming
random
games
interesting
algorithm
algorithms
toread
cryptography
|
RSA
No information avaiable
similarity:
popularity:
security
software
rsa
technology
computer
cryptography
encryption
computersoftware
authentication
securid
|
Jasypt: Java simplified encryption - How to encrypt user passwords
Almost all modern web applications need, in one way or another, to encrypt their ... We could say that, from the moment that an application has users, and ...
similarity:
popularity:
security
java
encryption
password
programming
howto
passwords
cryptography
development
tips
|
SecurityFocus interview with Solar Designer on John the Ripper 1.7
No information avaiable
similarity:
popularity:
security
password
cryptography
programming
passwords
code
crypto
rainbowtable
generator
generators
|
Bruce Schneier Facts
Things you might not know about cryptographer and security expert Bruce Schneier
similarity:
popularity:
security
humor
cryptography
fun
programming
funny
schneier
encryption
facts
math
|
John Resig - OCR and Neural Nets in JavaScript
No information avaiable
similarity:
popularity:
javascript
ocr
captcha
programming
neuralnetworks
security
ai
web
greasemonkey
neural
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|