wiby  
Settings



Kermit Security Reference

https://www.kermitproject.org/security.html

Authentication 1.4. Encryption 1.5. Integrity S ECURITY is the hot topic on the Internet. Security systems and protocols abound. But it was not always so. In the early days, the m

Debian Disguised Work

http://disguised.work/

systems use full-disk encryption and LVM, this isn't trivial and would have required me to play Tetris and swap files back and forth using another drive. Another solution proposed

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

Novel Encryption Technology Available Nowhere Else Orthogonal Latin Squares Balanced Block Mixing Questions, Comments or HTML Problems? Contact Terry Ritter (About the Author) , a
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.


Find more...