Crack the Code in Cyber Command’s Logo...
No information avaiable
http://www.wired.com/dangerroom/2010/07/solve-the-mystery-code-in-cyber-commands-logo/
popularity:
security
cryptography
usa
wired
cool
cyber
via:packrati.us
crime
puzzle
military
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
FBI: Spies Hid Secret Messages on Public Websites | Danger Room | Wired.com
Moscow communicated with a ring of alleged spies in America by encoding instructions in otherwise innocent-looking images on public websites. It's a process
similarity:
popularity:
wired
cryptography
spies
espionage
spy
security
fbi
internet
via:packrati.us
technology
|
An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
Steganography - Wikipedia, the free encyclopedia
The word steganography is of Greek origin and means "concealed writing" ... Retrieved from "http://en.wikipedia.org/wiki/Steganography" ...
similarity:
popularity:
steganography
security
cryptography
encryption
wikipedia
reference
article
cool
code
wiki
|
National Security Agency/Central Security Service (NSA/CSS) -- Site Start Page
No information avaiable
similarity:
popularity:
security
government
nsa
intelligence
reference
cryptography
gov
usa
search
law
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
|
Cryptography and Network Security, Fourth Edition
No information avaiable
similarity:
popularity:
cryptography
security
resources
books
reference
education
crypto
book
programming
network
|