Gl Inet - homeroam GL.inet with external antenna. Bought on ebay, and shipped to Denmark, Europe. 250 DKK, which is about 30 euro. Delivery date 9 days after. This a very cool box! It is cheap!It comes pre-installed with OpenWrt, no hazzle.It is powered by mini-USB. Is It the Dawn of the Encryption App? We might live in an age of persistent and pervasive surveillance. The recent revelations about the secret National Security Agency programs aimed at collecting vast amounts of data on Americans and foreigners seemingly confirm what tinfoil-wearing netizens have feared for years: They're watching us; technology has turned against its users. Amidst prying eyes, a small but growing group of hackers and programmers is working on applications that use cryptography — the science of creating techniques to hide data and render it readable only to intended recipients — to fight surveillance and give regular citizens access to what was once only reserved to computer experts.
EG File Encryption ● What is EG File Encryption? “EG File Encryption” is a software to encrypt files/folders. This software is easy, simple to use and absolutely free. You can encrypt your important, sensitive files/folders and make safe them from being accessed. Encryption is a best and powerful tool to make the data safe from being accessed. Here encrypted files/folders can be renamed, deleted but cannot be accessed. MyResearch Toolbox - Available Applications Access 2010 Microsoft Access is a database management system that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. Data is stored in a format based on the Access Jet Database Engine. It can also import or link directly to data stored in other applications and databases. ARS SharePoint 2010 A secure place to store, organize, share, and access information from almost any device.
Microsoft CryptoAPI The Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API, MS-CAPI or simply CAPI) is an application programming interface included with Microsoft Windows operating systems that provides services to enable developers to secure Windows-based applications using cryptography. It is a set of dynamically linked libraries that provides an abstraction layer which isolates programmers from the code used to encrypt the data. The Crypto API was first introduced in Windows NT 4.0  and enhanced in subsequent versions. CryptoAPI supports both public-key and symmetric key cryptography, though persistent symmetric keys are not supported.
OpenPGP.org - Downloads The best place to go for downloading free software that implements the OpenPGP standard is The International PGP Home Page. This site in Norway has been run by PGP activist Stale Schumacher since before PGP Inc was incorporated. To download PGP, you can rely on these trusted sites: Where to find PGP Detailed information by Phil Zimmermann on where to find PGP, and what versions are available. www.pgpi.org International PGP home page, for freeware versions of PGP outside of US, including source code. Includes many foreign language translations of PGP and manuals.
Crypto prof asked to remove NSA-related blog post Matthew Green is a well-known cryptography professor, currently teaching in the computer science department of Johns Hopkins University in Baltimore. Last week, Green authored a long and interesting blog post about the recent revelations that the National Security Agency (NSA) has, among much else, subverted crypto standards. In his words, "The TL;DR ['too long; didn't read' version] is that the NSA has been doing some very bad things." And Green went on to speculate at some length about what those "bad things" were and what they might mean. Today, Green's academic dean contacted him to ask that "all copies" of the blog post be removed from university servers. Green said that the move was not "my Dean's fault," but he did not elaborate.
CryptSync CryptSync CryptSync is a small utility that synchronizes two folders while encrypting the contents in one folder. That means one of the two folders has all files unencrypted (the files you work with) and the other folder has all the files encrypted. The synchronization works both ways: a change in one folder gets synchronized to the other folder. If a file is added or modified in the unencrypted folder, it gets encrypted. If a file is added or modified in the encrypted folder, it gets decrypted to the other folder. String String is a class built into the Java language defined in the java.lang package. It represents character strings. Strings are ubiquitous in Java. Study the String class and its methods carefully. It will serve you well to know how to manipulate them skillfully. String literals in Java programs, such as "abc", are implemented as instances of this class like this:
On the (provable) security of TLS: Part 1 If you sit a group of cryptographers down and ask them whether TLS is provably secure, you're liable to get a whole variety of answers. Some will just giggle. Others will give a long explanation that hinges on the definitions of 'prove' and 'secure'. What you will probably not get is a clear, straight answer. In fairness, this is because there is no clear, straight answer.