Crypt

Results: 686



#Item
151Computing / System software / Encryption software / USB flash drive / Crypt / Encryption / Windows / Smart card / Universal Serial Bus / Cryptographic software / Disk encryption / Microsoft Windows

VALIDY FILE CRYPT Data theft protection file encryption To protect files containing confidential data against any undesirable intervention it is indispensable to encrypt them. So that the protection is solid, it is neces

Add to Reading List

Source URL: www.validy.com

Language: English - Date: 2008-03-19 10:19:01
152System administration / Unix / Crack / Password cracking / Password / Shadow password / Crypt / Passwd / Unix security / System software / Software / Computer security

"Crack Version 4.1" A Sensible Password Checker for Unix Alec D.E. Muffett Unix Software Engineer Aberystwyth, Wales, UK ( or )

Add to Reading List

Source URL: www.crypticide.com

Language: English - Date: 2004-08-23 05:36:41
153Unix / Crypt / File system / Computer virus / Operating system / Microsoft Word / Software / System software / Antivirus software

Cybersoft.com CyberSoft White Papers Special Attributes of the VFind Tool Kit Peter V. Radatti CyberSoft, Inc.

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
154Key derivation function / Passwd / PBKDF2 / Crypt / Key / Shadow password / Key stretching / Cryptography / Key management / Password

scrypt: A key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-04 07:18:10
155Password / Cryptography / Roboform / Crypt / Password policy / Password strength / Security / Computer security / Access control

Microsoft Word - FINAL - PDF.doc

Add to Reading List

Source URL: www.womensaid.ie

Language: English - Date: 2013-02-22 11:50:06
156Password / Salt / Computer network security / John the Ripper / Crack / Crypt / Web application security / MD5 / Password policy / Computer security / Cryptography / System software

Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:05
157Crypt / SHA-1 / BATON / Key generation / Cryptographic software / NSA cryptography / SHA-2 / Cryptography / Key management / Cryptographic hash functions

MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
158Public-key cryptography / Electronic commerce / Key / Secure voice / Crypt / RSA / Cryptography / Secure communication / Key management

1 2 Contents Preface.................................................................................................................................................. 3

Add to Reading List

Source URL: mttgroup.ch

Language: English - Date: 2014-11-18 04:09:23
159PBKDF2 / Password / Salt / Crypt / LastPass Password Manager / SHA-2 / Bcrypt / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Cryptographic software

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
160Security / Computer security / Cryptographic software / Crypt / Password manager / Disk encryption / Password psychology / Cryptography / Password / Passphrase

NinjaStik First time use instructions Welcome to your new NinjaStik – online anonymity made easy. Getting started: Turn off your computer, plug the NinjaStik into a USB port, turn on your computer. You will need to tel

Add to Reading List

Source URL: www.ninjastik.com

Language: English - Date: 2013-08-06 14:51:07
UPDATE