finds you similar websites
auto-suggest    top sites

May 14th, 2024

13 Popular Sites Like http://www.guardian.co.uk...

We have scanned through the www and came across tons of of the best security and encryption sites like this one. Take a look and discover sites that are similar to this one.

Displaying 1 to 10 of 500 alternatives to http://www.guardian.co.uk/technolog.... (Updated: May 14th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Tales from the encrypt: the secrets of data p...
This article was first published on guardian.co.uk at 16.52 BST on Tuesday 30 June 2009. ... our dating site today. guardian.co.uk © Guardian News and Media ...
http://www.guardian.co.uk/technology/2009/jun/30/data-protection-internet
popularity:
security
encryption
death
privacy
data
will
law
computers
corydoctorow
family
new search by a custom tag signature
  Vanish: Enhancing the Privacy of the Web with Self-Destructing Data
College Facebook posts or pictures can resurface during a job interview; a lost or stolen ... emails maintained by an email provider — against accidental, ...
similarity:
popularity:
security
privacy
encryption
software
data
opensource
vanish
tools
socialnetworking
web
  TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
  The GNU Privacy Guard - GnuPG.org
GnuPG is a complete and free replacement for PGP.
similarity:
popularity:
security
encryption
pgp
software
opensource
privacy
gnu
gpg
cryptography
tools
  Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
  Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
  PGP Corporation - Home Page
Helps companies secure e-business operations through firewall, encryption, and intrusion detection.
similarity:
popularity:
security
encryption
pgp
software
privacy
tools
cryptography
internet
email
technology
  EPIC - Tools for Protecting Online Privacy
The Electronic Privacy Information Center (EPIC) focuses public attention on emerging civil liberties, privacy, First ... Search epic.org. Hot Policy Issues ...
similarity:
popularity:
privacy
security
tools
software
internet
encryption
email
anonymous
utilities
online
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
  How to Encrypt and Hide Your Entire Operating System from Prying Eyes
No information avaiable
similarity:
popularity:
security
encryption
privacy
truecrypt
lifehacker
howto
windows
software
computer
linux
  Axantum Software AB | AxCrypt | File Encryption Software
AxCrypt File Encryption for Windows and Xecrets Online Password Manager by Axantum Software AB ... So far, we have received 1,465,017 registrations, it is ...
similarity:
popularity:
encryption
security
software
freeware
opensource
windows
free
privacy
tools
utilities
1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.