First  |  Prev |  Next  |  Last
Pages: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
New Forum: BulletProof, Bitmap Steganography, XOR
On Jun 10, 12:16 pm, jmorton123 <jmorton...(a)rock.com> wrote: Any time of yours that you devote to focusing critical thought on this software will be an investment for others who will carry on from what you have to offer. Three things ... 1. Why no source code? 2. Why does your XOR program read into 17... 14 Jun 2010 16:15
New Forum: BulletProof, Bitmap Steganography, XOR
I just uploaded a new forum where anyone who can come up with any constructive criticism is welcome to post regarding the three freeware programs: BulletProof, Bitmap Steganography, XOR available for download at KingKonglomerate.com Ten years ago in this very same newsgroup I first published this software. It ... 15 Jun 2010 05:26
Steganography: 100's or 1000's of Apps. Available
I will give you half of what you want since it does not take any additional programming. Here is where to find this technique: I will be starting a blog on my site in 1 - 3 weeks. I will post a blog announcement in this newsgroup when it is up and running. In this blog I will explain in detail how the Steganog... 12 Jun 2010 11:32
decrypt openssl aes-256
I need decrypt openssl AES-256 encrypted file. Can someone specify online tool that do decryption? Or standalone console application(no installation). ... 15 Jun 2010 09:48
Bit; Beyond Comprehension
Bit; Beyond Comprehension A Factual, Esoteric Computer Scientist's Diary of When his Life Experience Broadened including Inheriting $1/2m then Ten Jails over Four Countries in Three Years http://BitThe.com by JFL A True Story Excerpts from the Full Book Text Bit; Beyond Comprehension http://BitTh... 9 Jun 2010 10:51
Fallout 3 crypto?
This message is found on a computer in the computer game Fallout 3. I don't know if it's a cipher or just garbage, but it would be fun if it was an easter egg. I haven't been able to get anything meaningful out of it, so I'll post it here. OBDCW32872H230 UWH FWPFGWF877 OWGQD WOQY 3C9U 3 QUGWIHCBQ987 97Y912 D81T... 9 Jun 2010 05:21
Simple Paper and Pencil Cipher
I am looking for a 'wallet vault' that allows me to carry the pin codes of my diverse credit and ATM cards safely with me on a slip of paper and decipher them without the aid of computers or pocket calculators in a simple paper and pencil operation in a matter of minutes in case I forgot one of them. This is... 10 Jun 2010 08:53
Question About Cryptographically Hashing a Hash (SHA-512), ThenHashing That Hash, Etc.
On 2010-06-08, Datesfat Chicks <datesfat.chicks(a)gmail.com> wrote: "Bryan" <bryanjugglercryptographer(a)yahoo.com> wrote in message news:bb46f9fd-6295-4d4a-aa13-1e62e0f69a71(a)v29g2000prb.googlegroups.com... Datesfat Chicks wrote: "Bryan" wrote [D. Chicks had written:] Clearly, a "cycle" will exist,... 10 Jun 2010 06:42
Applied Computing 2010: 1st call extension until 25 June 2010
Apologies for cross-postings. Please send to interested colleagues and students -- CALL FOR PAPERS - Deadline for submissions (1st call extension): 25 June 2010 -- IADIS INTERNATIONAL CONFERENCE APPLIED COMPUTING 2010 October 14 - 16, 2010 – TIMISOARA, ROMANIA (http://www.computing-conf.org/) * Conferen... 8 Jun 2010 12:35
A news about open-source security
Title: Open-Source Could Mean an Open Door for Hackers http://www.technologyreview.com/computing/25480/?a=f Quote: Using nonlinear regression and other models, Ransbotham found that attacks on vulnerabilities in open-source software occurred three days sooner and with nearly 50 percent greater frequency. ... 8 Jun 2010 03:39
First  |  Prev |  Next  |  Last
Pages: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23