Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
http://world.std.com/~reinhold/diceware.html
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
Features - KeePass
No information avaiable
similarity:
popularity:
security
password
software
opensource
encryption
tools
keepass
passwords
free
manager
|
Free Password Manager - Store passwords - Desktop or Online
Offers web-based password management and storage.
similarity:
popularity:
password
security
passwords
tools
online
web
software
free
manager
privacy
|
Default Router Passwords - The internets most comprehensive router password database
Routerpasswords.com is the internets most complete default router password database. ... Welcome to the DRPD 2008 (Default Router Password Database) ...
similarity:
popularity:
router
security
password
hacking
networking
passwords
reference
hack
tools
network
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
Password Recovery Speeds
This document shows the approximate amount of time required for a computer or a ... probably will) be possible to guess correctly without trying all the ...
similarity:
popularity:
security
password
passwords
hacking
crack
reference
cracking
recovery
time
encryption
|
Random Key Generator
No information avaiable
similarity:
popularity:
password
generator
security
encryption
tools
random
key
authentication
passwords
useful
|
Jasypt: Java simplified encryption - How to encrypt user passwords
Almost all modern web applications need, in one way or another, to encrypt their ... We could say that, from the moment that an application has users, and ...
similarity:
popularity:
security
java
encryption
password
programming
howto
passwords
cryptography
development
tips
|
How I’d Hack Your Weak Passwords - Passwords - Lifehacker
No information avaiable
similarity:
popularity:
security
password
passwords
lifehacker
hack
hacking
internet
tips
reference
howto
|
Public-key cryptography - Wikipedia, the free encyclopedia
An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...
similarity:
popularity:
cryptography
security
encryption
wikipedia
crypto
reference
pgp
pki
privacy
public-key
|
Strong Password Generator
Generates hard to decrypt passwords from 5 to 21 characters long, using upper and lower case, numbers, and symbols.
similarity:
popularity:
password
security
generator
tools
passwords
utility
web
free
tool
online
|