Uh oh. Looks like your using an ad blocker.
Our site is support by ads that help to pay our hosting costs. Please disable or whitelist us within your ad blocker to help us keep the site online.
All money generate by ads and donations is used to pay the hosting costs of the site.
A short explanation of MD5
A brief but potent look at the art of breaking cryptosystems.
MD5 Collisions and how to Form Them
A case study of analyzing the insecure use of the 'one time pad' encryption scheme. Walks through an attack on the improper use of this otherwise unbreakable encryption.
A basic explanation of cryptography.
This is an article over some common forms of encryption and some examples of what they look like.
The cum security toolkit (cst) contains a cgi vulnerability scanner and a port scanner, and can be used as a hacking tool, or as a security vulnerability assesment tool.
A brief but potent primer on encryption, encoding and hashes, and the differences between them.
Description of Enigma, how it works, a bit about its history, and how it was eventually broken! Enjoy!
This Tutorial Will Help You Hide Your Data In Pictures.
A simple intro to basic number theory concepts and their applications to the field of encryption.
the "one-way" hash broken.
This is a short article on the simplest encryption methods.
A description/proof of concept to make cracking near impossible.
send text to someone without text being read by any1 else
Most Read Articles