

|  | 
				Renowned security technologist and author.			 
				
					http://www.schneier.com/				
							 
						popularity:
						 
							security						 
							cryptography						 
							blog						 
							technology						 
							privacy						 
							crypto						 
							encryption						 
							blogs						 
							people						 
							schneier						 | 
|  | 
					Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								news							 
								privacy							 
								crypto							 
								blog							 
								technology							 
								schneier							 
								blogs							 
								newsletter							 | 
|  | 
					This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...				 
							similarity:
							 
							popularity:
							 
								security							 
								blog							 
								blogs							 
								crypto							 
								cryptography							 
								linux							 
								software							 
								research							 
								computers							 
								opensource							 | 
|  | 
					J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...				 
							similarity:
							 
							popularity:
							 
								security							 
								encryption							 
								cryptography							 
								hardware							 
								hack							 
								research							 
								crypto							 
								memory							 
								hacking							 
								privacy							 | 
|  | 
					5/2009: Schneier and Ranum Face Off. Techtarget interviewed Bruce and myself ... Ranum's Rants. I'm blogging periodically about security on Tenable's blog. ...				 
							similarity:
							 
							popularity:
							 
								security							 
								blog							 
								reference							 
								blogs							 
								geek							 
								computer							 
								unix							 
								photography							 
								people							 
								networking							 | 
|  | 
					Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...				 
							similarity:
							 
							popularity:
							 
								cryptography							 
								security							 
								reference							 
								encryption							 
								crypto							 
								algorithms							 
								tutorial							 
								computing							 
								computer							 
								programming							 | 
|  | 
					Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...				 
							similarity:
							 
							popularity:
							 
								security							 
								password							 
								passphrase							 
								encryption							 
								privacy							 
								crypto							 
								reference							 
								tools							 
								cryptography							 
								passwords							 | 
|  | 
					Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								crypto							 
								hash							 
								encryption							 
								reference							 
								programming							 
								tutorial							 
								algorithms							 
								md5							 | 
|  | 
					The Business Justification for Data Security. Building a Web Application Security Program. Securosis: On Holiday. Database Security: The Other First Steps ...				 
							similarity:
							 
							popularity:
							 
								security							 
								blog							 
								technology							 
								mac							 
								sysadmin							 
								networking							 
								network							 
								osx							 
								infosec							 
								blogs							 | 
|  | 
					Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.				 
							similarity:
							 
							popularity:
							 
								security							 
								encryption							 
								software							 
								opensource							 
								tools							 
								cryptography							 
								windows							 
								linux							 
								freeware							 
								privacy							 | 
|  | 
					An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...				 
							similarity:
							 
							popularity:
							 
								cryptography							 
								security							 
								encryption							 
								wikipedia							 
								crypto							 
								reference							 
								pgp							 
								pki							 
								privacy							 
								public-key							 | 
 an example search result
			an example search result