finds you similar websites
auto-suggest    top sites

Jun 13th, 2025

14 Popular Sites Like http://ahprojects.com/c/i...

Our team has studied the web and came across a lot of high-quality security and privacy sites like this one. Take a look and discover additional sites that match this one.

Displaying 41 to 50 of 500 alternatives to http://ahprojects.com/c/itp/thesis. (Updated: Jun 13th, 2025)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  AH Projects » Thesis
The algorithm utilizes the Viola Jones method of calculating the integral image ... The sub-window (in red) is scanned across the image at various scales ...
http://ahprojects.com/c/itp/thesis
popularity:
security
privacy
face
computervision
research
makeup
design
facerecognition
recognition
camera
new search by a custom tag signature
  Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
  Proxify® anonymous proxy - surf the Web privately and securely
Free web proxy with optional removal of cookies, scripts, ads and referers. Requires cookies.
similarity:
popularity:
proxy
anonymous
privacy
security
web
tools
internet
online
free
browser
  www.sikurezza.org - Italian Security Mailing List | Main / Home
No information avaiable
similarity:
popularity:
security
hacking
sicurezza
linux
networking
network
informatica
privacy
research
computer
  Privacy.org - The Source for News, Information, and Action
Provides up-to-date electronic privacy news stories from around the Web, as well as links to cryptography, encryption, and electronic privacy information.
similarity:
popularity:
privacy
security
news
politics
internet
rights
information
activism
technology
computer
  How to Find the Person behind an Email Address - Reverse Email Search
Know the email address of someone but nothing more? Learn techniques to help you uncover the location and other details of the email sender.
similarity:
popularity:
email
search
security
howto
privacy
people
research
identity
google
tools
  Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
  Feature: Protect Your Privacy When Downloading
Earlier this week, a Lifehacker reader caught downloading copyrighted material using BitTorrent told us about the scary warning letter she received from her ISP after ...
similarity:
popularity:
privacy
bittorrent
torrent
security
p2p
lifehacker
howto
torrents
tips
software
  TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
  Identity Theft Resource Center | A Nonprofit Organization
Advocacy center and information hub includes links, documents, and news for victims of identity theft. Also provides scam alerts, statistics, and more.
similarity:
popularity:
security
identity
privacy
identitytheft
theft
reference
idtheft
consumer
credit
identity_theft
  Privoxy - Home Page
Web proxy with advanced filtering capabilities for protecting privacy, filtering content, managing cookies, controlling access, and removing ads, banners, and pop-ups. ...
similarity:
popularity:
proxy
privacy
security
software
web
internet
tools
anonymous
opensource
network
< prev ... 1 2 3 4 5 6 7 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.