Our sponsor needs your help!
One of our sponsors needs your help, http://www.virginmediabusiness.co.uk/pitch-to-rich/grow/krystal-hosting/
Go check out their video and Don't forget to vote !
~ Thanks for your help
A short explanation of MD5
A brief but potent look at the art of breaking cryptosystems.
MD5 Collisions and how to Form Them
A case study of analyzing the insecure use of the 'one time pad' encryption scheme. Walks through an attack on the improper use of this otherwise unbreakable encryption.
A basic explanation of cryptography.
This is an article over some common forms of encryption and some examples of what they look like.
The cum security toolkit (cst) contains a cgi vulnerability scanner and a port scanner, and can be used as a hacking tool, or as a security vulnerability assesment tool.
A brief but potent primer on encryption, encoding and hashes, and the differences between them.
Description of Enigma, how it works, a bit about its history, and how it was eventually broken! Enjoy!
This Tutorial Will Help You Hide Your Data In Pictures.
A simple intro to basic number theory concepts and their applications to the field of encryption.
the "one-way" hash broken.
This is a short article on the simplest encryption methods.
A description/proof of concept to make cracking near impossible.
send text to someone without text being read by any1 else
Most Read Articles