|
The Entropy Key is a small, unobtrusive and easily installed USB stick that ... It has been developed by UK-based Simtec Electronics, a design consultancy and ...
http://www.entropykey.co.uk/
popularity:
security
hardware
entropy
usb
linux
cryptography
encryption
crypto
electronics
random
|
|
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
|
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
|
NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. ... Contact me: nsa unaligned org (figure out where to put the @ and .) irc.unaligned.org #nsa ...
similarity:
popularity:
security
hardware
fpga
crypto
cryptography
hash
hack
diy
md5
electronics
|
|
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
|
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
|
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
|
Manufacturer of the Gatekeeper portable USB ... Yoggie launches new breed of secure USB flash drive ... Yoggie brings true online anonymity to consumers ...
similarity:
popularity:
security
firewall
hardware
linux
yoggie
mobile
usb
laptop
network
gadgets
|
|
No information avaiable
similarity:
popularity:
linux
security
filesystem
encryption
crypto
kernel
privacy
cryptography
opensource
storage
|
|
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
|
No information avaiable
similarity:
popularity:
security
usb
authentication
hardware
encryption
token
key
privacy
openid
web
|