wiby  
Settings



qmail: Second most popular MTA on the Internet

http://www.usenix.org.uk/mirrors/qmail/top.html

while isolating the encryption in a low-privilege process for security. You can get UCSPI-TLS patches for qmail, sslserver, and mailfront , along with a detailed UCSPI-TLS on qmai

Vigay.com : Main Homepage

http://www.vigay.com/

privacy and secure encryption methods. If you would like help with these matters, please feel free to contact me or view the security pages . Irrespective of whether you're a chil
All the news in one place

Things that make me mad

https://www.increasinglyadequate.com/mad.html

last. People who say encryption doesn't matter because somebody could torture you for the key. That's a bizarre justification for their own laziness. It's akin to telling people n
Basically, just a list of things that make me mad.

Linux

https://www.billdietrich.me/Linux.html

security mechanisms and encryption and more. Linux kernel map Linux kernel map Interactive map of Linux kernel sleeplessbeastie's "How to display kernel release information" Kerne
Linux operating system basics, parts, myths, and truths

Cocaine Inc

https://www.cocaine.wiki/cokecrime/

advanced communications encryption technologies that, law enforcement officials concede, are all but unbreakable. They use the Web to camouflage the movement of dirty money. They

PTBSync Desktop Organizer

https://netcult.ch/elmue/Desktop-Organizer/

because it uses strong encryption. A big battery assures that the door can be opened during a power failure. Remote Control your Computer with Infrared An infrared receiver and a

DVD FAQ

https://demystified.info/dvdfaq.html

country. It's not an encryption system, it's just one byte of information on the disc that the player checks. Some studios originally announced that only their new releases would
The official DVD FAQ (Frequently Asked Questions about DVD). The most comprehensive source of DVD technical information in the galaxy. By Jim Taylor.

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

Authentication, encryption. Creating or reverse-engineering malware. Social engineering. Physical penetration. Wi-Fi, and the physical layer of Ethernet. Cloud services. What I'll
How to become a bug-bounty hunter and do penetration testing

Apollo Archive

https://jim.rees.org/apollo-archive/

contained some encryption routines. Since it's illegal to import these to the US, I've removed them from the file. US law also prohibits me from telling you where to get the origi

Capability Comparison

https://secushare.org/comparison

Requirement SVPN Link Encryption ✓ ⊕ ⊕ ⊕ ✓ ✓ ✓ ✓ ✓ ✓ Forward Secrecy ⊝ ⊝ ⊙ ⊝ ⊕ ✓ ⊝ ✓ ✓ ⊕ E2E Encryption –– ✗ ⊙ –– –– ✓ ✓ ✓ ⊙ ✓ No Strangers –– ✗ ✗ ✗ ✖ –– ✓ ✓ ✓ ✓ Secret Friends ––

The Kermit 95 2.0 GUI

https://www.kermitproject.org/k95gui.html

of authentication and encryption methods used, if any. Cursor coordinates in 1-based column,row (X,Y) notation. Terminal screen dimensions, rows × columns. Pull corner for c

Electricmonk.nl weblog

https://www.electricmonk.nl/log/

it checks whether the encryption stuff is still valid and secure. According to the intertubes , SEC_ERROR_OCSP_FUTURE_RESPONSE” generally indicates that the computer’s
Ferry Boender's blog


Find more...