finds you similar websites
auto-suggest    top sites

May 26th, 2024

11 Popular Sites Like http://citp.princeton.edu...

The team has researched the net and turned up a lot of superb security and encryption sites like this one. So come and discover other webpages that are alternatives to this one.

Displaying 51 to 60 of 500 alternatives to http://citp.princeton.edu/memory/. (Updated: May 26th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Center for Information Technology Policy » L...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
http://citp.princeton.edu/memory/
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
new search by a custom tag signature
  invisiblethings' blog
VM escapes, hypervisor compromises (via "classic" rootkits, as well as Bluepill ... The training offers quite a unique chance, I think, to absorb the results of 1 ...
similarity:
popularity:
security
blog
hacking
blogs
malware
rootkits
research
virtualization
hack
software
  Help Net Security
Help Net Security is a daily updated security related site. ... Device control and endpoint security for Mac users. New book: "Automating System Administration ...
similarity:
popularity:
security
news
hacking
network
infosec
hack
linux
portal
software
sysadmin
  AntiOnline - Maximum Security for a Connected World: Info on Computer Security, Hackers, DOS and DDOS attacks, Encryption, Hot Fixes, Security News and More!!
Archive of hacking related materials. Everything from file archives to its very own zine.
similarity:
popularity:
security
hacking
news
computer
technology
hack
hacks
tools
forum
geek
  网络安全焦点::自由的信息安全、黑客攻防和漏洞研究组织
自由的信息安全、黑客攻防和漏洞研究组织 ... http://hope.xfocus.net. 精华文档. 文档:xfocus.chm. 日期:2006-01-14. 大小:17.81M. 京ICP备05012090号. Copyright © 1998-2006 XFOCUS Team. All Rights Reserved ...
similarity:
popularity:
security
网络安全
hack
network
hacker
安全
黑客
tech
linux
hacking
  Axantum Software AB | AxCrypt | File Encryption Software
AxCrypt File Encryption for Windows and Xecrets Online Password Manager by Axantum Software AB ... So far, we have received 1,465,017 registrations, it is ...
similarity:
popularity:
encryption
security
software
freeware
opensource
windows
free
privacy
tools
utilities
  Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
  Passwords recovery - MD5, SHA1, MySQL
MD5 Online. Passwords recovery: md5, md5(md5), sha1, MySQL, md5 rainbow tables ... PassCracking uses combined technique (classic rainbow tables, hybrid rainbow ...
similarity:
popularity:
md5
security
password
crack
tools
hacking
hack
crypto
cryptography
passwords
  Vanish: Enhancing the Privacy of the Web with Self-Destructing Data
College Facebook posts or pictures can resurface during a job interview; a lost or stolen ... emails maintained by an email provider — against accidental, ...
similarity:
popularity:
security
privacy
encryption
software
data
opensource
vanish
tools
socialnetworking
web
  Uninformed
In August 2008 Verizon Wireless released a firmware upgrade for their xv6800 ... In particular, support for accessing the device's built-in Qualcomm gpsOne ...
similarity:
popularity:
security
hacking
programming
magazine
exploits
reverse-engineer
hack
journal
blog
windows
  .:: Phrack Magazine ::.
Hacker magazine by the community, for the community.
similarity:
popularity:
security
hacking
magazine
hack
programming
news
hacker
hacks
phrack
computer
< prev 1 ... 4 5 6 7 8 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.