'Cryptography' Websites
Robert Sosinski
Robert Sosinski’s webpage about Software Engineering, Cloud Computing and Cryptographic Security.
Passwords, forensic, security and system recovery software. Crack lost
Password recovery and password crack software: for archives (ZIP, RAR, ARJ, ACE), Microsoft Office (Word, Excel, Access, Outlook), Lotus SmartSuite (WordPro, 1-2-3, Approach, Organizer), Adobe Acrobat PDF, Windows NT XP Vista 2003 2000 7, Intuit Qicken & QickBooks, WiFi networks, Microsoft SQL servers, iPhone, iPod Tou
EMC Community Network - ECN: Space: RSA Share
The RSA Share Project is a free software community designed to give developers the tools and support they need to integrate security into their products. It includes RSA BSAFE, the world's leading encryption software.
Reversible Computation | RC
Welcome to the Conference on Reversible Computation
Welcome to InvisiHosting - Anonymous Private Web Hosting, Registration
Anonymous, private web hosting, service provider, and professional development, defending free speech on the internet. No credit card or identification required.
Internet software: Sniffer, SocksChain, Coin, P2P Messenger from Ufaso
Internet software: Sniffer, SocksChain, Coin, P2P Messenger from Ufasoft company
DGC Magazine Blog
Digital Gold Currency Blog. Covering digital currencies, precious metals, online payments and any and all alternatives to fiat!
Enrico Zimuel - Software developer since 1996, speaker, author
Enrico Zimuel - Software developer since 1996, specialized in web technologies and secure software. Open source contributor. TEDx and international speakers. Author of books and articles. Teacher at ITS ICT Piemonte.
Numbers stations
Numbers stations and other odd radio stations, espionage, jamming, cryptography, code messages, SIGINT
Infiscale - Infinite Scalability
Infiscale's software defined infrastructure provides everything needed for complete scalability and uptime to multiple industries. We can help you gather, store, and use unlimited amounts of data.
Boffoonery! Comedy Benefit For Bletchley Park
A evening of cracking comedy in celebration of those brilliant boffins of Bletchley Park
IP Cores, Inc: Security, FEC, Compression, and DSP IP Cores for ASIC a
Proven and compact high performance intellectual property cores for FPGA and ASIC designs. Security IP cores for variety of AES modes, including AES-based ECB/CBC/OCB/CFB, AES-GCM and AES-XTS cores, flow-through AES/CCM cores with header parsing for IEEE 802.11 (WiFi), 802.16e (WiMAX), 802.15.3 (MBOA), 802.15.4 (Zigbee
Richard Brisson's Collection of Crypto and Clandestine Equipment
Camp X, Cryptologic and Clandestine Artifacts
Biometric Security from Veridt, LLC
Specializing in biometric technology for authentication solutions for physical and logical secure access, personal identity verification, and fraud protection
About - Colin MacKinnon
Thrillers. Spies. Strange manuscripts. The Web site of Colin MacKinnon, author of Finding Hoseyn, Morning Spy, Evening Spy, The Contractor.
Compris - Intelligent Text Processing Technologies
Copyright solutions for texts: text watermark, search engine for plagiated texts, shop system for texts; automatic anwering of questions on texts; information extraction from web pages, competitor surveillance in the internet, hiding / compressing / encrypting data; turn-key solutions for internet projects; lexical dat
Cryptex® Security Boxes - Cryptex® Security Boxes
A Cryptex® Security Box is a self-contained cylindrical lockbox. Master artisan Justin Nevins created the first Cryptex® Security Box in 2004, and has been producing them for fans of the device and for art collectors around the world ever since.
Smart Card Basics – Welcome!
This is a basic background on smart cards, their many applications, and smart card market growth. The top applications for smart cards are: SIM cards, Healthcare, Loyalty and Stored Value cards, Securing Digital Content and Physical Assets, smart card readers, card printer, and Enterprise and Network Security smart car
Sniper Flash Cards: Civilian Sniper Instruction with Mil-Dot Scope
Sniper training to find holdover and windage in urban combat with a mil-dot scope in five seconds without ancillary devices like laser rangefinders or the Mildot Master.