lets you instantly set up secure conversations. It's an open source encrypted, private alternative to WEB chat systems. Messages are encrypted inside your own browser using AES-256. Encrypted data is securely wiped after one hour of inactivity. Runs as a Tor hidden service.
a tool by the Electronic Frontier Foundation that tests your browser "fingerprint" to see how unique it is based on the information it will share with sites it visits.
KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk.
social bookmarks manager; allows you to easily add sites you like to your personal collection of links, to categorize those sites with keywords, and to share your collection not only between your own browsers, but also with others.
Filter Unnecessary JPEG Data by removing unnecessary data from images you email or post on the net, without affecting the image quality whatsoever (no decompression/recompression is performed in the filtration), removing such extraneous information
Because one can locate your InterNet side by the log files, one finds also you. This is for example with the Deeplinking a danger, if the Web master does not permit this to the linked side.
a free, open-source, light-weight and easy-to-use password safe for Windows. You can store your passwords in a highly-encrypted database locked with one master key or key-disk.
a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats.
The numbers that control your life. You're identified by dozens of numbers. Your phone number, your driver's license number, your social security number, your zip code, your license plate, your credit card numbers. I find these numbers fascinating. Who distributes them? What can they be used for? How can you use them? How are they issued?
a group of international experts involved in network and system security. THC was founded in 1995 in Germany, has published over 60 software releases and technical papers and currently is among the top ten security groups worldwide.
As CD's are not 100% indestructible many people want to make a backup of their games. Using the backup to play the game thus saving the original. (Fight the DRM)
Linux Video Camera and CCTV (close circuit TV) security and surveillance solution with Motion Detection also support web and semi-automatic control of Pan/Tilt/Zoom cameras using a variety of protocols.
A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
"locks down" an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system's current state of hardening, granularly reporting on each of the security setti
a general purpose monitoring platform. provides a framework dealing with (among others) packet demultiplexing, timers, threads and communication. This allows programmers to concentrate on the precise functionnalities they want to implement...
PktFilter is a software that can configure the IP filtering device driver found in Windows 2000/XP/Server 2003, with filtering rules following a syntax similar to IP Filter
in Uninformed Vol1 2005.May by Nikos Drakos, Computer Based Learning Unit, University of Leeds. + Ross Moore, Mathematics Department, Macquarie University, Sydney.
a circle of cells with windows facing inwards, towards a tower, wherein jailers could look out and inspect the prisoners at any time, unseen by their subjects.
a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of
The men and women running SAC in 1960 essentially put the entire planet’s population at risk by deliberately disabling the PAL safety mechanisms. Perhaps we should keep that in mind before we put too much trust in the people charged with our nation’s
A joint project of the Electronic Frontier Foundation and Harvard, Stanford, Berkeley, University of San Francisco, University of Maine, George Washington School of Law, and Santa Clara University School of Law clinics
special access codes prepared by the US National Security Agency have been secretly built into Windows (logical and expected this is why China and other states stay away of windows, even some tastes of Linux must have been compromised)
by Zubair Alexander - author of this article looks at how Windows stores passwords and discusses why pass phrases are a better option than passwords and how to determine the strength of our passwords.
automatically hardens software applications against a wide range of bugs. These bugs — known as memory errors — often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior.
the prototype version of the KeeLogger with full documentation, electrical schematics, and program. Operation of this device is similar to the KeeLogger Pro version, although download is initiated by a special button.
from Sysinternals Freeware, a Registry monitoring utility that will show you which applications are accessing your Registry, which keys they are accessing, and the Registry data that they are reading and writing - all in real-time.
(Mostly HP JetDirects, but a little info on the Ricoh Savins), This article will attempt to point out some of the more interesting things that can be done with a network based printer to make it reveal information about its users, owners and the network i
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-
useful resource for checking whether your popup blocker is working well. Also seems like a good way to make sure you are developing "good" popups for when you need them.
a simple, fast offline-mode VNC password cracker. It takes a set of challenge-response pairs of the type passed during a VNC authentication attempt, and attempts to recover the passwords using a dictionary file.
(TrashReg) is an advanced Registry cleaning tool. The main function of RTKF is to allow the removal of unnecessary keys from the Windows Registry. Many programs leave keys in the Registry, even after programs removal...