finds you similar websites
auto-suggest    top sites

May 2nd, 2024

10 Popular Sites Like http://www.schneier.com/c...

moreofit has searched the internet and found a lot of popular security and cryptography sites like this one. Come and explore other webpages that complement this one.

Displaying 11 to 20 of 500 alternatives to http://www.schneier.com/crypto-gram.... (Updated: May 2nd, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
http://www.schneier.com/crypto-gram.html
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
new search by a custom tag signature
  securosis.com
The Business Justification for Data Security. Building a Web Application Security Program. Securosis: On Holiday. Database Security: The Other First Steps ...
similarity:
popularity:
security
blog
technology
mac
sysadmin
networking
network
osx
infosec
blogs
  SANS Institute - Network, Security, Computer, Audit Information & Training
Research and education organization offering computer security training for system and network administrators and security professionals.
similarity:
popularity:
security
training
reference
technology
infosec
internet
computer
news
network
education
  Welcome to CERT
Studies Internet security vulnerabilities, provides incident response services, and publishes security alerts and computer virus information.
similarity:
popularity:
security
internet
cert
news
network
computer
reference
virus
technology
hacking
  Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
  Krebs on Security
No information avaiable
similarity:
popularity:
security
blog
blogs
computer
news
virus
tech
info
krebs
forensics
  SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc
SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. ... sans.org(Portal) GIAC. My ISC How To Submit ...
similarity:
popularity:
security
internet
news
network
infosec
virus
daily
blog
tools
networking
  An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
  An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
  The Register: Security News and Views for the world
No information avaiable
similarity:
popularity:
security
news
geek
technology
internet
malware
hacking
blogs
spam
it
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.