finds you similar websites
auto-suggest    top sites

May 17th, 2024

11 Popular Sites Like http://citp.princeton.edu...

The team has researched the net and turned up a lot of superb security and encryption sites like this one. So come and discover other webpages that are alternatives to this one.

Displaying 41 to 50 of 500 alternatives to http://citp.princeton.edu/memory/. (Updated: May 17th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Center for Information Technology Policy » L...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
http://citp.princeton.edu/memory/
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
new search by a custom tag signature
  milw0rm - exploits : vulnerabilities : videos : papers : shellcode
milw0rm exploits and 0day exploits database ... send all submissions to submit[at]milw0rm.com [gpg] Videos hosted by Tradebit file hosting ...
similarity:
popularity:
security
hacking
exploits
hack
exploit
vulnerabilities
reference
tools
programming
code
  jsCrypto
No information avaiable
similarity:
popularity:
javascript
cryptography
encryption
security
crypto
library
programming
opensource
aes
js
  The Metasploit Project
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.
similarity:
popularity:
security
hacking
tools
exploit
software
network
opensource
hack
exploits
linux
  Public key infrastructure - Wikipedia, the free encyclopedia
This article's external links may not follow Wikipedia's content policies or guidelines. ... Retrieved from "http://en.wikipedia.org/wiki/Public_key_infrastructure" ...
similarity:
popularity:
pki
security
cryptography
encryption
crypto
certificate
wikipedia
reference
wiki
ssl
  Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
similarity:
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
  .:[ packet storm ]:. - http://packetstormsecurity.org/
Information and computer security full disclosure web site ... http://packetstormsecurity.org/0906-exploits/0906-exploits.tgz. June 29, 2009 ...
similarity:
popularity:
security
hacking
tools
exploits
news
network
software
hack
internet
exploit
  A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
  www.arg0.net - EncFS
No information avaiable
similarity:
popularity:
security
encryption
linux
filesystem
fuse
encfs
privacy
opensource
software
crypto
  JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
  The GNU Privacy Handbook
Please direct questions, bug reports, or suggestions concerning this ... When referring to the manual please specify which version of the manual you have ...
similarity:
popularity:
gpg
security
encryption
privacy
pgp
reference
crypto
documentation
howto
linux
< prev ... 1 2 3 4 5 6 7 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.