

|  | 
				And if the built-in encryption is used, the message cannot be read even if it is ... Locating trailing whitespace in text is like finding a polar bear in ...			 
				
					http://www.darkside.com.au/snow/				
									
							 
						popularity:
						 
							steganography						 
							security						 
							software						 
							encryption						 
							cryptography						 
							text						 
							tools						 
							linux						 
							crypto						 
							steg						 | 
|  | 
					Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...				 
							similarity:
							 
							popularity:
							 
								cryptography							 
								security							 
								reference							 
								encryption							 
								crypto							 
								algorithms							 
								tutorial							 
								computing							 
								computer							 
								programming							 | 
|  | 
					A secure single floppy linux. For the paranoid among us. ... If you maintain a PGP Certificate Authority or signing key and have to have a safe place to use the CA key. ...				 
							similarity:
							 
							popularity:
							 
								linux							 
								security							 
								privacy							 
								software							 
								distro							 
								pgp							 
								tools							 
								encryption							 
								cryptography							 
								tinfoil							 | 
|  | 
					Security tools, exploits, reading, and links from Fyodor.				 
							similarity:
							 
							popularity:
							 
								security							 
								hacking							 
								tools							 
								network							 
								software							 
								nmap							 
								sysadmin							 
								internet							 
								linux							 
								networking							 | 
|  | 
					Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...				 
							similarity:
							 
							popularity:
							 
								security							 
								password							 
								passphrase							 
								encryption							 
								privacy							 
								crypto							 
								reference							 
								tools							 
								cryptography							 
								passwords							 | 
|  | 
					The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.				 
							similarity:
							 
							popularity:
							 
								security							 
								hacking							 
								tools							 
								exploit							 
								software							 
								network							 
								opensource							 
								hack							 
								exploits							 
								linux							 | 
|  | 
					AxCrypt File Encryption for Windows and Xecrets Online Password Manager by Axantum Software AB ... So far, we have received 1,465,017 registrations, it is ...				 
							similarity:
							 
							popularity:
							 
								encryption							 
								security							 
								software							 
								freeware							 
								opensource							 
								windows							 
								free							 
								privacy							 
								tools							 
								utilities							 | 
|  | 
					Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...				 
							similarity:
							 
							popularity:
							 
								security							 
								network							 
								opensource							 
								software							 
								linux							 
								tools							 
								ids							 
								snort							 
								networking							 
								sysadmin							 | 
|  | 
					Home page for Zfone, Phil Zimmermann's Secure VoIP project. ... ZRTP SDK | ZRTP Specification | Wireshark support | Download | Support | Bug Reports | Licensing Policy ...				 
							similarity:
							 
							popularity:
							 
								voip							 
								security							 
								encryption							 
								privacy							 
								software							 
								cryptography							 
								pgp							 
								sip							 
								phone							 
								tools							 | 
|  | 
					Welcome to cr.yp.to. Some popular pages that you might be looking for: United Airlines sucks (part 40); D. J. Bernstein's home page; the qmail home page; ...				 
							similarity:
							 
							popularity:
							 
								security							 
								software							 
								linux							 
								djb							 
								crypto							 
								unix							 
								programming							 
								cryptography							 
								dns							 
								qmail							 | 
|  | 
					Free, open-source vulnerability and remote security scanner.				 
							similarity:
							 
							popularity:
							 
								security							 
								network							 
								software							 
								tools							 
								scanner							 
								linux							 
								opensource							 
								networking							 
								vulnerability							 
								sysadmin							 | 
 an example search result
			an example search result