ROT13

Results: 8



#Item
1GNU/Linux on ARM for $50-$100 Dobrica Pavlinušić http://blog.rot13.org DORS/CLUC 2013

GNU/Linux on ARM for $50-$100 Dobrica Pavlinušić http://blog.rot13.org DORS/CLUC 2013

Add to Reading List

Source URL: www.rot13.org

- Date: 2013-05-18 16:03:20
    2Windows 7: ROT13 or Vigenère? ;-) HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{EF1F-11D0-9888006097DEACF9}\Count. ROT13  Windows 7 – Windows 2008 R2 Beta

    Windows 7: ROT13 or Vigenère? ;-) HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{EF1F-11D0-9888006097DEACF9}\Count. ROT13 Windows 7 – Windows 2008 R2 Beta

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2009-10-31 16:27:21
      3Designing Ethical Phishing Experiments: A study of (ROT13) rOnl query features Markus Jakobsson Jacob Ratkiewicz

      Designing Ethical Phishing Experiments: A study of (ROT13) rOnl query features Markus Jakobsson Jacob Ratkiewicz

      Add to Reading List

      Source URL: markus-jakobsson.com

      Language: English - Date: 2010-09-01 01:19:52
        4Substitution cipher / Cipher / Known-plaintext attack / Frequency analysis / Affine cipher / Classical cipher / Cryptography / ROT13 / Caesar cipher

        Intro to Cryptography: Define: plaintext ciphertext encryption function decryption function

        Add to Reading List

        Source URL: betweenthenumbers.files.wordpress.com

        Language: English - Date: 2015-03-22 21:36:56
        5Key / Cryptanalysis / Public-key cryptography / Index of cryptography articles / Cryptography / ROT13 / Cipher

        Cryptography Quiz – Unit 1; Chapter 1 What is the difference between a cipher and a code?

        Add to Reading List

        Source URL: betweenthenumbers.files.wordpress.com

        Language: English - Date: 2015-04-04 21:47:48
        6Applied Decryption  Distributed Network Attack / Forensic Toolkit / FTK Imager / Password Recovery Toolkit  Advanced • One-Day Instructor-Led Course

        Applied Decryption Distributed Network Attack / Forensic Toolkit / FTK Imager / Password Recovery Toolkit Advanced • One-Day Instructor-Led Course

        Add to Reading List

        Source URL: ad-pdf.s3.amazonaws.com

        Language: English - Date: 2014-07-11 18:25:47
        7On the 2ROT13 Encryption Algorithm ak, #mum cryptolabs April 1, 2005

        On the 2ROT13 Encryption Algorithm ak, #mum cryptolabs April 1, 2005

        Add to Reading List

        Source URL: phoenix.clifford.at

        Language: English - Date: 2005-04-01 02:29:25
        8

        PDF Document

        Add to Reading List

        Source URL: www.pruefziffernberechnung.de

        Language: English - Date: 2004-10-15 14:53:54