LavaRnd
Downloadable pseudo-random number generator. The LavaRND generator is seeded with a seven-way cryptographic hash of a digitization of a chaotic system, or, in other words, a digital picture of six Lava Lite Lamps.
http://www.lavarnd.org/
popularity:
random
math
security
generator
software
cryptography
hardware
programming
numbers
number
|
Symantec
No information avaiable
similarity:
popularity:
software
security
antivirus
software_developers
virus
softwaredevelopers
symantec
computer
safari_export
computers
|
CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org. International in scope and free for public use, CWE™ provides a unified, measurable set of ...
similarity:
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
|
CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org ... Contact cwe@mitre.org for more information. ...
similarity:
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
|
Security Guide for Windows - Random Password Generator
No information avaiable
similarity:
popularity:
password
generator
security
tools
software
online
secure
utilities
free
tool
|
An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
WolframTones: Generate a Composition
Note: JavaScript must be enabled in order to use this page. Please click here for instructions on how to enable JavaScript for your browser. ...
similarity:
popularity:
music
generator
audio
software
art
math
ringtone
tools
cool
sound
|
The R Project for Statistical Computing
R, also called GNU S, is a strongly functional language and environment to statistically explore data sets, make many graphical displays of data from custom command ...
similarity:
popularity:
statistics
software
r
programming
opensource
math
tools
visualization
mathematics
science
|
An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
The GNU Privacy Guard - GnuPG.org
GnuPG is a complete and free replacement for PGP.
similarity:
popularity:
security
encryption
pgp
software
opensource
privacy
gnu
gpg
cryptography
tools
|
Wiretapped - Computer Security Software etc.
No information avaiable
similarity:
popularity:
security
hacking
software
tools
networking
internet
linux
network
cryptography
reference
|