Newsgroup:
comp.security.misc
Add New Display Options
1
reply
PROVABLEPRIME Version 1.1.1 released
started 2014-11-23 20:27:03 UTC
2014-12-07 14:36:08 UTC
Mok-Kong Shen
6
replies
Good File Level Encryption Software That is Cross Platform?
started 2014-11-30 10:37:32 UTC
2014-12-03 17:23:08 UTC
W
14
replies
Encryption Software That Makes File Look Like Ordinary File?
started 2014-10-23 02:40:31 UTC
2014-11-16 23:12:43 UTC
Jim
1
reply
FBI Most Wanted Hacker Jeremy Hammond Used His Cat's Name for Password
started 2014-11-15 05:46:16 UTC
2014-11-15 07:45:05 UTC
Anonymous Remailer (austria)
2
replies
NZ ——> Constable Henderson COVER-UP of U.S.M.C. Drug Running Operations
started 2014-11-07 14:28:37 UTC
2014-11-09 08:11:55 UTC
Moe Trin
2
replies
A code of Maurer's algorithm of provable primes generation
started 2014-09-04 12:33:14 UTC
2014-10-11 02:49:12 UTC
Mok-Kong Shen
2
replies
WTF is all this?
started 2014-10-07 06:12:52 UTC
2014-10-07 10:24:55 UTC
j***@specsol.spam.sux.com
1
reply
[Article] Most USB thumb drives can be reprogrammed to silently infect computers
started 2014-10-03 22:43:32 UTC
2014-10-04 00:36:03 UTC
William Unruh
9
replies
New 'Bash' software bug may pose bigger threat than 'Heartbleed'
started 2014-09-28 18:05:39 UTC
2014-10-01 22:07:31 UTC
Benoit
1
reply
How much real improvements in PKI since more than a decade?
started 2014-09-24 15:28:37 UTC
2014-09-27 17:18:10 UTC
e***@notatla.org.uk
3
replies
On Risks and Vulnerabilities of Digital Signatures
started 2014-06-15 13:35:05 UTC
2014-09-21 14:38:52 UTC
Mok-Kong Shen
5
replies
Truecrypt on Windows 8
started 2014-08-02 06:51:04 UTC
2014-08-09 17:43:56 UTC
Jim
1
reply
What could be done against the total surveillance on the Internet?
started 2014-07-08 14:50:20 UTC
2014-07-09 21:05:38 UTC
Mok-Kong Shen
2
replies
Tor is not secure
started 2014-07-05 12:17:58 UTC
2014-07-08 11:43:36 UTC
Mok-Kong Shen
2
replies
New Encryption Cypher
started 2014-06-19 00:52:55 UTC
2014-06-22 17:38:17 UTC
Bill Dee
4
replies
A new encryption software of mine
started 2014-06-08 18:43:17 UTC
2014-06-09 12:18:32 UTC
Mok-Kong Shen
5
replies
Can someone explain why I need "hard" passwords?
started 2014-04-26 08:40:11 UTC
2014-04-29 00:17:46 UTC
William Unruh
6
replies
OpenSSL bug, is stunnel also compromised?
started 2014-04-09 11:51:54 UTC
2014-04-11 13:12:15 UTC
D. Stussy
1
reply
OT File wiping on various operating systems.
started 2014-04-02 08:15:05 UTC
2014-04-04 18:52:21 UTC
Anonymous
3
replies
How to protect your USB-key?
started 2014-02-10 23:46:39 UTC
2014-02-11 07:45:07 UTC
William Unruh
13
replies
Firewall Appliance With Eight Segments
started 2014-02-09 02:33:39 UTC
2014-02-11 02:00:58 UTC
W
4
replies
match code key to product
started 2013-12-24 08:22:01 UTC
2013-12-24 15:09:37 UTC
Barry Margolin
5
replies
Improving avalanche property of functions with bit rotations
started 2013-12-13 03:03:26 UTC
2013-12-15 00:57:56 UTC
Mok-Kong Shen
1
reply
tracing connections from a tor daemon to local process
started 2013-10-31 23:08:58 UTC
2013-11-01 19:50:31 UTC
Barry Margolin
4
replies
How can Heat-assisted disks be bulk erased?
started 2013-10-01 23:17:28 UTC
2013-10-02 18:53:36 UTC
Mark F
1
reply
NAIROBI [breaking] ——> BRITISH GOV'T: "Israel Staged 1976 Entebbe Incident"
started 2013-09-23 00:50:42 UTC
2013-09-23 09:12:21 UTC
m***@here.com
9
replies
Any good practical means against universal surveillance?
started 2013-08-03 16:05:25 UTC
2013-08-10 21:53:39 UTC
Mok-Kong Shen
3
replies
Remailers and similar systems are not secure
started 2013-07-05 00:49:53 UTC
2013-07-26 14:01:45 UTC
Mok-Kong Shen
11
replies
NEOCLASSIC, An encryption scheme based largely on use of well-known classical crypto techniques
started 2013-07-07 22:42:05 UTC
2013-07-23 17:25:37 UTC
Mok-Kong Shen
2
replies
A silly question to Server Identy Check (RFC 2595)
started 2013-04-04 20:33:39 UTC
2013-06-17 11:48:38 UTC
Peter Schoo
Click to Load More...
Loading...