background preloader

Computer and Information Technology

Facebook Twitter

Information Leak. Computer Security Resource Center. 2600: The Hacker Quarterly. -= EthicalHack.org =- An Overview of Cryptography. As an aside, the AES selection process managed by NIST was very public. A similar project, the New European Schemes for Signatures, Integrity and Encryption (NESSIE), was designed as an independent project meant to augment the work of NIST by putting out an open call for new cryptographic primitives. NESSIE ran from about 2000-2003. While several new algorithms were found during the NESSIE process, no new stream cipher survived cryptanalysis. As a result, the ECRYPT Stream Cipher Project (eSTREAM) was created, which has approved a number of new stream ciphers for both software and hardware implementation. Similar — but different — is the Japanese Government Cryptography Research and Evaluation Committees (CRYPTREC) efforts to evaluate algorithms submitted for government and industry applications.

CAST-128/256: CAST-128, described in Request for Comments (RFC) 2144, is a DES-like substitution-permutation crypto algorithm, employing a 128-bit key operating on a 64-bit block. 3.3.

Computer and Information Technology II

Hacktivismo. cDc releases Goolag Scanner (posted by MiB on Februari 20th, 2008) SECURITY ADVISORY: The following program may screw a large Internet search engine and make the Web a safer place. LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world's most attractive hacker group, announced the release of Goolag Scanner, a web auditing tool. Goolag Scanner enables everyone to audit his or her own web site via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. "It's no big secret that the Web is the platform," said cDc spokesmodel Oxblood Ruffin. Goolag Scanner will be released open source under the GNU Affero General Public license. Goolag Scanner is a standalone windows GUI based application.

Press Contact Oxblood Ruffin oxblood at hacktivismo.com About Goolag Scanner About Johnny I Hack Stuff and here See J. HOWTO bypass Internet Censorship, a tutorial on getting around filters and blocked ports. Wireless LAN Security / Wardriving / WiFi Security / 802.11. Introduction to Algorithms - Download free content from MIT.

Antionline. Offensive Security Training and Professional Services. How to Hack: Ethical Hacking and Cyber Security | Go Hacking.