finds you similar websites
auto-suggest    top sites

May 15th, 2024

18 Popular Sites Like http://xlife.zuavra.net/i...

Our team has searched the internet and found a lot of noted linux and encryption sites like this one. Come by and explore additional websites that match this one.

Displaying 11 to 20 of 500 alternatives to http://xlife.zuavra.net/index.php/6.... (Updated: May 15th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Xlife: How to get started with EncFS in three...
No information avaiable
http://xlife.zuavra.net/index.php/66/
popularity:
linux
encryption
encfs
security
crypto
fuse
privacy
storage
filesystem
unix
new search by a custom tag signature
  The GNU Privacy Handbook
Please direct questions, bug reports, or suggestions concerning this ... When referring to the manual please specify which version of the manual you have ...
similarity:
popularity:
gpg
security
encryption
privacy
pgp
reference
crypto
documentation
howto
linux
  Ubuntu’s Encrypted Home Directory: A Canonical Approach to Data Privacy | Linux Magazine
No information avaiable
similarity:
popularity:
ubuntu
encryption
security
howto
linux
privacy
admin
ecryptfs
software
filesystem
  Feraga | Creating a privacy optimized GNU/Linux installation for USB flash drives
feraga.com
similarity:
popularity:
linux
usb
debian
livecd
privacy
encryption
distro
security
crypto
software
  Linux: How to Encrypt and decrypt files with a password
It is an encryption and signing tool for Linux/UNIX like operating system such ... GnuPG stands for GNU Privacy Guard and is GNU's tool for secure communication ...
similarity:
popularity:
linux
encryption
gpg
security
howto
encrypt
password
cryptography
files
decrypt
  TECH SOURCE FROM BOHOL: 10 Best Hacking and Security Software Tools for Linux
Hacks, News, Tutorials, Reviews about Linux, Open Source, Ubuntu, Google, Apple, Microsoft, Programming, Gadgets, and everything related to Digital Technology.
similarity:
popularity:
linux
security
tools
hacking
software
unix
sysadmin
hack
utilities
ubuntu
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
  grsecurity
grsecurity is an innovative approach to security utilizing a multi-layered ... It is licensed under the GPL. It offers among many other features: ...
similarity:
popularity:
security
linux
kernel
software
sysadmin
grsecurity
opensource
rbac
server
unix
  Linux Security HOWTO
This document is a general overview of security issues that face the ... It covers general security philosophy and a number of specific examples of how ...
similarity:
popularity:
linux
security
howto
reference
tutorial
sysadmin
unix
guides
server
networking
  SSH Filesystem
The idea of sshfs was taken from the SSHFS filesystem distributed with LUFS, ... There were some limitations of that codebase, so I rewrote it. Features of this ...
similarity:
popularity:
ssh
linux
filesystem
fuse
sshfs
security
network
remote
software
sysadmin
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.