All The Cheat Sheets That A Web Developer Needs
How to Design Programs
We are a community of motherfucking programmers who have been humiliated by software development methodologies for years. We are tired of XP, Scrum, Kanban, Waterfall, Software Craftsmanship (aka XP-Lite) and anything else getting in the way of...Programming, Motherfucker. We are tired of being told we're autistic idiots who need to be manipulated to work in a Forced Pair Programming chain gang without any time to be creative because none of the 10 managers on the project can do... Programming, Motherfucker. We must destroy these methodologies that get in the way of...Programming, Motherfucker. Programming, Motherfucker - Do you speak it?
Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing.
Norman Matloff University of California, Davis June 17, 2008 ©2003-2008, N. Matloff A Quick, Painless Tutorial on the Python Language
Invent Your Own Computer Games with Python Chapters Download the complete book as a PDF. Chapter 1 - Installing Python [related content] Chapter 2 - The Interactive Shell [related content] Chapter 3 - Strings [related content]
The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. However most techies know that in reality it's often a difficult and time consuming process.
Lecture Slides and Video Archives
"ON TRIAL: LEE HARVEY OSWALD" (PART 21)(WITNESS: DR. CYRIL WECHT)
About Cyril H. Wecht, Forensic Pathologist, Attorney, Medical-Legal Consultant
Crime Scene Investigation Articles -- Crime Scene Investigator Network
Visible Proofs: Forensic Views of the Body: Galleries: Technologies
How To Set Up SSH Encrypted MySQL Replication
The CrypTool Portal raises awareness and interest in cryptography for everyone.All learning programs in the CrypTool project are open source and available for free. The CrypTool project develops the world most-widespread free e-learning programs in the area of cryptography and cryptoanalysis. The CrypTool Portal consists of e-learning software (CT1, CT2, JCT, CTO) and an additional website: CrypTool - Educational Tool for Cryptography and Cryptanalysis
How to Bypass Most Firewall Restrictions and Access the Internet Privately
Ciphers By Ritter: Cryptography and Technology Scalable and fast block cipher designs with guaranteed diffusion and dynamically variable block size in power-of-2 steps. Here we have a typical hybrid realization: The figure shows connections from a block of 8 input bytes at the top, which are each substituted through keyed "8-bit" invertible tables or Each table represents about 1684 bits of keying. Each yellow diamond represents half of a linear BBM component. Each mixing takes two bytes in, and produces a 2-byte result.
Ophcrack Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. Making a Faster Crytanalytical Time-Memory Trade-Off, Philippe Oechslin, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings.
The CrypTool Portal raises awareness and interest in cryptography for everyone.All learning programs in the CrypTool project are open source and available for free. The CrypTool project develops the world most-widespread free e-learning programs in the area of cryptography and cryptoanalysis. The CrypTool Portal consists of e-learning software (CT1, CT2, JCT, CTO) and an additional website: E-Learning Software: CrypTool 1 (CT1) was the first version of CrypTool. CrypTool - Educational Tool for Cryptography and Cryptanalysis
Logic is a powerful tool; it can be used to discern and to discover truth. Sometimes, though, this tool falls into the hands of those who would abuse it. Armed with the laws of logic and a few simple, plausible, and apparently harmless assumptions, philosophers can construct proofs of the most absurd conclusions. These proofs can give us pause; should we believe the unbelievable? Logical Paradoxes
How to Make Anything Signify Anything Detail from a photograph of World War I cryptographers trained by William and Elizebeth Friedman, Aurora, Illinois, early 1918. By facing either forward or sideways, the soldiers formed a coded phrase utilizing Francis Bacon’s biliteral cipher. The intended message was the Baconian motto “Knowledge is power,” but there were insufficient people to complete the r (and the w was compromised by one soldier looking the wrong way).Included as a pull-out poster in issue 40, Knowledge Is Powe is also available for purchase in an unfolded version suitable for framing. To see a large version of the full photograph, go here.
What follows is a list of freely available crypto systems, with comments based on my limited reading in books and on the net. I am not an expert in cryptography, and the following comments are therefor not to be taken as anything but an introductory words on the subject. For another more extensive source for Cryptography available on the net, go to The International Cryptographic Software Pages... The above situation changes in the new year (Jan 1997) when control of civilian cryptography was removed from the ITAR regulations and put under the control of the Dept. of Commerce. These new regulations (See especially Part 742 section 15 and Supplement 6, and Category 5 part 2. Also 740.13(e) gives the general exemption for open source, royalty free software, and the requirements for making use of this.) Cryptography
What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. Visual Cryptography
Handbook of Applied Cryptography
md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com
An Overview of Cryptography
The 10 most badass secret codes in history (and how to crack them)
Simple Complexity — Making Simple Sense From Complex Data