background preloader

Crypto

Facebook Twitter

Hacking

The code monkey's guide to cryptographic hashes for content-based addressing - LinuxWorld. Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops. Malicious cryptography, part two. By Frederic Raynal This two-part article series looks at how cryptography is a double-edged sword: it is used to make us safer, but it is also being used for malicious purposes within sophisticated viruses.

Part two continues the discussion of armored viruses and then looks at a Bradley worm - a worm that uses cryptography in such a way that it cannot be analyzed. Then it is shown how Skype can be used for malicious purposes, with a crypto-virus that is very difficult to detect. Malicious cryptography, part one. By Frederic Raynal Cryptology is everywhere these days. Most users make good use of it even if they do not know they are using cryptographic primitives from day to day. This two-part article series looks at how cryptography is a double-edged sword: it is used to make us safer, but it is also being used for malicious purposes within sophisticated viruses.

Cr.yp.to.