|
Movable Type has a wide-ranging portfolio of ... Movable Type Ltd. 31 York Terrace, Cambridge CB1 2PR. info @ movable-type.co.uk. 01223 305774. 07973 559336 ...
http://www.movable-type.co.uk/
popularity:
javascript
security
encryption
programming
hashing
cryptography
gps
crypto
lib
software
|
|
No information avaiable
similarity:
popularity:
javascript
cryptography
encryption
security
crypto
library
programming
opensource
aes
js
|
|
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
|
|
Software solutions are certainly an option, but I think you could also consider ... here<BR/><A HREF="http://code.google.com/p/clipperz" REL="nofollow">http://code.google.com/p ...
similarity:
popularity:
javascript
library
encryption
cryptography
security
crypto
opensource
ajax
programming
development
|
|
No information avaiable
similarity:
popularity:
javascript
encryption
security
cryptography
crypto
web
opensource
development
library
code
|
|
No information avaiable
similarity:
popularity:
security
programming
javascript
cryptography
sha1
md5
authentication
people
encryption
webmaster
|
|
No information avaiable
similarity:
popularity:
security
cryptography
password
programming
hashing
crypto
passwords
web
hash
encryption
|
![]() |
Provides a script to remove comments and unnecessary whitespaces from ... JSMin. The JavaScript Minifier. Douglas Crockford. www.crockford.com. 2003-12-04 ...
similarity:
popularity:
javascript
tools
optimization
compression
programming
development
ajax
webdev
software
web
|
|
ADsafe makes it safe to put guest code (such as third party scripted advertising ... The ADsafe subset can be verified mechanically by tools like JSLint so that no ...
similarity:
popularity:
javascript
security
adsafe
advertising
webdev
programming
xss
tools
json
ads
|
|
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
|
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|