The GNU Privacy Handbook
Please direct questions, bug reports, or suggestions concerning this ... When referring to the manual please specify which version of the manual you have ...
http://www.gnupg.org/gph/en/manual.html
popularity:
gpg
security
encryption
privacy
pgp
reference
crypto
documentation
howto
linux
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
www.arg0.net - EncFS
No information avaiable
similarity:
popularity:
security
encryption
linux
filesystem
fuse
encfs
privacy
opensource
software
crypto
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
Tinfoil Hat Linux
A secure single floppy linux. For the paranoid among us. ... If you maintain a PGP Certificate Authority or signing key and have to have a safe place to use the CA key. ...
similarity:
popularity:
linux
security
privacy
software
distro
pgp
tools
encryption
cryptography
tinfoil
|
FreeOTFE
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
eCryptfs
No information avaiable
similarity:
popularity:
linux
security
filesystem
encryption
crypto
kernel
privacy
cryptography
opensource
storage
|
An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
Vanish: Enhancing the Privacy of the Web with Self-Destructing Data
College Facebook posts or pictures can resurface during a job interview; a lost or stolen ... emails maintained by an email provider — against accidental, ...
similarity:
popularity:
security
privacy
encryption
software
data
opensource
vanish
tools
socialnetworking
web
|
Zfone Project Home Page
Home page for Zfone, Phil Zimmermann's Secure VoIP project. ... ZRTP SDK | ZRTP Specification | Wireshark support | Download | Support | Bug Reports | Licensing Policy ...
similarity:
popularity:
voip
security
encryption
privacy
software
cryptography
pgp
sip
phone
tools
|
Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
|