First  |  Prev |  Next  |  Last
Pages: 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
Binary code
132 ! Count on your fingers in binary. Unmistakable message! -- Nick, KI6VAV. Support severely wounded and disabled Veterans and their families: https://www.woundedwarriorproject.org/ Thank a Veteran! Support Our Troops: http://anymarine.com/ You are not forgotten. Thanks ! ! ~Semper Fi... 31 Mar 2010 02:13
A=1, B=2, C=3... Z=26
T H I S = 20 + 8 + 9 + 19 = 56 I S = 9 + 19 = 28 A = 1 = 1 C I P H E R = 3 + 9 + 16 + 8 + 5 + 18 = 59 TOTAL = 144 ... 31 Mar 2010 01:08
Request to Use and Abuse My SHA512 Program
I implemented FIPS 180-3 (I'm not really a competent Windows programmer). You can find the executable here: http://www.s-512.com/filehash.exe and the source code here: http://www.s-512.com/filehash.zip Anyway, I will review the code carefully in the next few days, and do some unit tests (boundary cases... 6 Apr 2010 17:35
Prime Number distribution solved; visual proof included. - dbl3-2-1207.JPG (0/1)
Subj: Prime Number distribution solved - visual proof included. A regular pattern found in the first 300Million Prime Sums using the log of the golden ratio Lp! (Lp(X) = LOG(X) / LOG(1.618...)) ------- Lp Results for the first 300 Million Primesums The referenced Web Site has a Table that reveals a pattern i... 30 Mar 2010 19:33
Not much from change the from 1930's
On Mar 29, 9:40 am, mstem...(a)walkabout.empros.com (Michael Stemper) wrote: In article <v30sq5ph6b29vrrmjril9ri62pfjenr...(a)4ax.com>, David C. Ullrich <ullr...(a)math.okstate.edu> writes: On Fri, 26 Mar 2010 14:15:53 EDT, Maury Barbato <mauriziobarb...(a)aruba.it> wrote: G. A. Edgar wrote: You need to ... 29 Mar 2010 13:37
How much cyber security is really there?
The Wall Street Journal of 26-28 March says that a Frenchman having "no training in computers" was able to hack within hours into Twitter accounts, including that of the US President. So how much "practical" cyber security is really there today, despite the avaiability of such nice theoretical results as those of p... 7 Apr 2010 05:41
digital signature without hashing?
Is there a way to digitally sign a large file without using an SHA-like hash function? I'm asking because of a remark in DJB's "CubeHash" submission[1], proposing a rather slow configuration of the function as the default: My justification for recommending CubeHash8/1 is that, for most applications of h... 3 Apr 2010 10:24
Certicate chain
I've just installed a new certificate for a website. It works fine with IE but neither with FF (Error code: sec_error_untrusted_issuer) nor with Opera (OCSP error). Using Java I see the following chain: 0 Subject CN=www.cgc-instruments.com, OU=EssentialSSL, OU=Domain Control Validated Issuer CN=EssentialSSL C... 28 Mar 2010 03:36
Very basic questions
Gentlemen Maybe I have the wrong venue, but than maybe one of you knowledgeable gents will kindly enlighten me. Last I heard, PGP provided pretty solid security. Is that still the case? Is there anything better, and about as easy to use, these days? I'll wish to encrypt a file up to several MB, and maybe a whole... 15 Apr 2010 02:39
Counted Hash Basics
Counted Hashing as an historic tool, and beyond...into ignotum per ignotius. ACA's Nicodemus and Tridigital ciphers both use a counting method to turn a word or words into a string of numbers. It is easy enough to see that given enough source letters, 26, the whole alphabet could be assigned to the ranking, rep... 26 Mar 2010 17:57
First  |  Prev |  Next  |  Last
Pages: 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36