The Open-source PKI Book
This document describes Public Key Infrastructures, the PKIX ... of this document can be found at the OSPKI Book WWW site at http://ospkibook.sourceforge.net ...
http://ospkibook.sourceforge.net/
popularity:
pki
security
ssl
opensource
reference
crypto
documentation
openssl
book
cryptography
|
frequently used SSL commands
generate a new private key and matching Certificate Signing Request (eg to send ... add -config <openssl.cnf> if your config file has not been set in the ...
similarity:
popularity:
ssl
openssl
keytool
security
howto
reference
linux
cryptography
certificate
java
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
Cryptography and Network Security, Fourth Edition
No information avaiable
similarity:
popularity:
cryptography
security
resources
books
reference
education
crypto
book
programming
network
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
|
ISECOM - OSSTMM Open Source Security Testing Methodology Manual
The Open Source Security Testing Methodology Manual (OSSTMM) is a peer-reviewed ... The OSSTMM focuses on the technical details of exactly which items need to be ...
similarity:
popularity:
security
opensource
methodology
pentest
testing
reference
hacking
policy
howto
standards
|
ISECOM - Institute for Security and Open Methodologies
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
similarity:
popularity:
security
opensource
infosec
reference
standards
hacking
technology
sysadmin
certification
pentest
|
OWASP - Home
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
webdev
reference
software
application
internet
|
CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
|