OneTime — Encryption with One-Time Pads Note (2014-01-09): OneTime 2.0 is currently in beta testing. See the compatibility notes for details. OneTime is an open source encryption program that uses the one-time pad algorithm to allow two parties to communicate privately. It has features to assist with the bureaucracy of pad management, and comes with built-in help. OneTime requires Python 2.6 or higher, and is for users who are comfortable running command-line programs. Gnu Privacy Guard (GnuPG) Mini Howto > Linux Reviews > Howtos > GnuPG Privacy Howtos > This documents explains how to use the GNU Privacy Guard (GnuPG), an Open Source OpenPGP compatible encryption system To keep this program totally free the use of the RSA algorithm and other patented algorithm has been avoided. The document was originally written by Michael Fischer v. Mollar in German.
htshells - Just Another Hacker htshells is a series of web based attacks based around the .htaccess files. Most of the attacks are centered around two attack categories. Remote code/command execution and information disclosure. These attacks are intended for use during penetration tests or security assessments. It was created to get shell in a CMS that restricted uploads based on extension and placed each uploaded file in it's own directory.
How To Trace Your Emails Back To The Source Most people won’t notice this, but emails actually arrive in your inbox with a “˜receipt’, which contains a lot of information about the sender. In order to find the sender’s identity, we only need to retrieve an IP address, but inside the email header we can also find the originating domain, reply-to address and sometimes even the email client, for example Thunderbird. Why would you want to find out the identity of the sender? Well, you may have heard of shady email scams or emails supposedly from Paypal inviting you to re-enter your personal information.
An Encrypted Internet Is a Basic Human Right Nico Sell is co-founder and co-chairman of Wickr Inc. This Op-Ed is part of a series provided by the World Economic Forum Technology Pioneers, class of 2015. Sell contributed this article to Live Science's Expert Voices: Op-Ed & Insights. George Washington could have become a king, but instead devoted his life to giving power back to the people.
Making and verifying signatures A digital signature certifies and timestamps a document. If the document is subsequently modified in any way, a verification of the signature will fail. A digital signature can serve the same purpose as a hand-written signature with the additional benefit of being tamper-resistant. Scapy Security Power Tools was out in August 2007. I wrote a complete chapter on ScapyI can give trainings on many subjects (Scapy, networks, shellcoding, exploit writing, etc.). Contact me directly: email@example.com About Scapy What is Scapy Scapy is a powerful interactive packet manipulation program. Buzzblog: Need a valid e-mail address to register but don't want the spam? Try this Seam-based Web app Here's yet another way to dodge the irksome requirement of presenting a valid e-mail address to register for a Web site: 10 Minute Mail, a Seam-based Web application that fills the bill just long enough to get you onto the site … and then disappears. No fuss, no muss, and best of all, no spam. (2010's 25 Geekiest 25th Anniversaries) Reminds me of Anonymizer Nyms, a somewhat controversial product that debuted at our DEMOfall 2006 conference. However, unlike that $20-a-year offering, 10 Minute Mail is free. It's also reminiscent of PrefPass, another Demo debut that aims to ease registration pains.