Tag: Encryption

SilentEye

SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures or sounds. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. SilentEye is free to use (under GNU GPL v3). Main Features Hide …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/25/silenteye/

ForensicUserInfo

ForensicUserInfo will extract the following information: RID Login Name Name Description User Comment LM Hash NT Hash Last Login Date Password Reset Date Account Expiry Date Login Fail Date Login Count Failed Logins Profile Path Groups http://www.woanware.co.uk/forensics/forensicuserinfo.html

Permanent link to this article: https://www.darknessgate.com/2014/11/11/forensicuserinfo/

nogotofail

Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in a flexible, scalable, powerful way. It includes testing for common SSL certificate verification issues, HTTPS and TLS/SSL library bugs, SSL and STARTTLS stripping issues, cleartext issues, …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/11/07/nogotofail/

SEANux

SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme. It is charged up with penetration testing tools and other useful applications for general purposes. http://seanux.sea.sy/#download

Permanent link to this article: https://www.darknessgate.com/2014/11/02/seanux/

Spring 2014 Lectures & Videos – Offensives computer security course

This page contains all the lecture Lecture Slides and youtube videos for the Spring 2014 semester of this course. http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html

Permanent link to this article: https://www.darknessgate.com/2014/11/02/spring-2014-lectures-videos-offensives-computer-security-course/

Encrypted Disk Detector

Encrypted Disk Detector (v2 released 04/22/2013) is a command-line tool that can quickly and non-intrusively check for encrypted volumes on a computer system during incident response. The decision can then be made to investigate further and determine whether a live acquisition needs to be made in order to secure and preserve the evidence that would …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/10/18/encrypted-disk-detector-2/

Emerging Security Vulnerabilities & the Impact to Business

This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/10/13/emerging-security-vulnerabilities-impact-business/

Cryptography and Cryptanalysis

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Permanent link to this article: https://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/

Cryptography

This class teaches the theory, foundations and applications of modern cryptography. In particular, we treat cryptography from a complexity-theoretic viewpoint. In recent years, researchers have found many practical applications for these theoretical results, and so we will also discuss their impact along the way and how one may use the theory to design secure systems. …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/09/30/cryptography/

Cisco CCNA Video Lecture

Video Lectures, Video Courses, Science Animations, Lecture Notes, Online Test, Lecture Presentations. http://www.learnerstv.com/Free-Computer-Science-Video-lectures-ltv578-Page1.htm

Permanent link to this article: https://www.darknessgate.com/2014/09/26/cisco-ccna-video-lecture/

Cryptography from Fachbereich Informatik

This lecture deals with the following cryptographic topics: Cryptographic Foundations (security goals, historical ciphers, AES, a sketch of RSA) Foundations of information theory (terms, probability theory, Shannon’s theorem) Entropy Design principles of cryptographic hash functions Pseudo random number generators and stream ciphers A sketch of elliptic curve cryptography Quantum cryptography Implementation issues (efficiency, obfuscation) https://www.fbi.h-da.de/organisation/personen/baier-harald/teaching/lectures-summer-term-2012/cryptography.html  

Permanent link to this article: https://www.darknessgate.com/2014/09/25/cryptography-fachbereich-informatik/