finds you similar websites
auto-suggest    top sites

May 29th, 2024

11 Popular Sites Like http://www.jasypt.org/how...

The team has scoured through the www and came across several popular security and java sites like this one. So come and view additional webpages that are alternatives to this one.

Displaying 61 to 70 of 500 alternatives to http://www.jasypt.org/howtoencryptu.... (Updated: May 29th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Jasypt: Java simplified encryption - How to e...
Almost all modern web applications need, in one way or another, to encrypt their ... We could say that, from the moment that an application has users, and ...
http://www.jasypt.org/howtoencryptuserpasswords.html
popularity:
security
java
encryption
password
programming
howto
passwords
cryptography
development
tips
new search by a custom tag signature
  Java examples (example source code) Organized by topic
Provide collection Swing controls. [Commercial] ... Copyright 2009 - 12 Demo Source and Support. All rights reserved. All other trademarks are property of their ...
similarity:
popularity:
java
programming
examples
code
reference
tutorial
source
example
development
javascript
  Convert Java to EXE - Why, When, When Not and How
Helps you choose the best tool for transforming your Java apps into native executables, and considers alternative ways to simplify Java application deployment.
similarity:
popularity:
java
exe
programming
deployment
tools
development
howto
article
windows
tutorial
  Overview (Java 2 Platform SE 5.0)
This document is the API specification for the Java 2 Platform Standard Edition ... Provides the classes necessary to create an applet and the classes an ...
similarity:
popularity:
java
api
programming
reference
javadoc
documentation
development
j2se
docs
software
  truelicense: The TrueLicense Library Collection Homepage
No information avaiable
similarity:
popularity:
java
licensing
license
security
library
opensource
tool
development
programming
software
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
  ONJava.com: The Independent Source for Enterprise Java -- java development, open and emerging enterp
O'Reilly Network's ONJava site offers comprehensive and enterprise Java, JSP, ... We've expanded our Java news coverage and improved our search! ...
similarity:
popularity:
java
programming
development
news
j2ee
oreilly
articles
blog
reference
tutorial
  Javalobby - Sun Java, JSP and J2EE technology programming forums, software downloads, jobs and tutorials
Represents the needs and concerns of the Java developer and user community to companies and organizations who influence the evolution of Java.
similarity:
popularity:
java
programming
development
news
community
j2ee
daily
forum
blog
articles
  Default Password List
User can access/change operational setting but not security settings. 3COM ... This will recover a lost password and reset the switch config to Factory Default ...
similarity:
popularity:
password
security
router
reference
default
hacking
list
hardware
passwords
hack
  Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
  Linux: How to Encrypt and decrypt files with a password
It is an encryption and signing tool for Linux/UNIX like operating system such ... GnuPG stands for GNU Privacy Guard and is GNU's tool for secure communication ...
similarity:
popularity:
linux
encryption
gpg
security
howto
encrypt
password
cryptography
files
decrypt
< prev 1 ... 5 6 7 8 9 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.