finds you similar websites
auto-suggest    top sites

May 26th, 2024

14 Popular Sites Like http://www.unixwiz.net/te...

We have explored the internet and found tons of excellent security and cryptography sites like this one. So come and explore more sites that are similar to this one.

Displaying 51 to 60 of 500 alternatives to http://www.unixwiz.net/techtips/igu.... (Updated: May 26th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
new search by a custom tag signature
  Python Cryptography Toolkit
No information avaiable
similarity:
popularity:
python
cryptography
security
crypto
programming
library
encryption
development
code
pycrypto
  Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
  Enigma
The official website of Frank Spiess.
similarity:
popularity:
cryptography
enigma
history
flash
cool
security
encryption
crypto
tools
reference
  The International PGP Home Page
Contains updated information, FAQs and relevant links regarding the latest PGP versions.
similarity:
popularity:
security
pgp
encryption
software
privacy
crypto
tools
cryptography
opensource
freeware
  Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
  FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
  clipperz - Google Code
Software solutions are certainly an option, but I think you could also consider ... here<BR/><A HREF="http://code.google.com/p/clipperz" REL="nofollow">http://code.google.com/p ...
similarity:
popularity:
javascript
library
encryption
cryptography
security
crypto
opensource
ajax
programming
development
  Keyczar
Keyczar: An open source cryptographic toolkit ... Introducing Keyczar ... Keyczar was originally developed by members of the Google Security Team and is ...
similarity:
popularity:
security
python
cryptography
java
programming
opensource
google
software
library
tools
  md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com
md5.rednoize.com. Search for md5 hashes. Type search term. Search. MD5. SHA1. Search in 56,091,995 md5/sha1 hashes. 17,738,931 searches answered since feb 2005. ...
similarity:
popularity:
md5
security
tools
password
hacking
crypto
search
crack
hash
sha1
  CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
< prev 1 ... 4 5 6 7 8 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.