<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / emmineb / tag / cryptography</title>
<link>http://netvouz.com/emmineb/tag/cryptography?feed=rss</link>
<description>emmineb&#39;s bookmarks tagged &quot;cryptography&quot; on Netvouz</description>
<item><title>Cryptome</title>
<link>http://cryptome.org/</link>
<description>[wikipedia:] Cryptome is a website hosted in the United States since 1996 by independent scholars[1] and architects John Young and Deborah Natsios[2] that functions as a repository for information about freedom of speech, cryptography, spying, and surveillance. According to the site:     Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance—open, secret and classified documents—but not limited to those.[3] Cryptome hosted documents, consisting of over 54,000 files,[4] include suppressed photographs of U.S. soldiers killed in Iraq, lists of people believed to be MI6 agents</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Sat, 03 Jul 2010 08:31:49 GMT</pubDate>
</item><item><title>Phone hacking, News International and operational disaster for News Corp by Guy Rundle | Crikey | 7 July 2011</title>
<link>http://www.crikey.com.au/2011/07/07/rundle-a-moral-and-operational-disaster-for-news-corp/</link>
<description>Back in the day, the analogue and offline day, when a plenitude of images did not circulate, one of the most vital jobs in the newspaper industry was that of the “picture-snatcher”?—?the reporter, often a cub/cadet, who would accompany a senior colleague to the house of a grieving widow whose family member had just been trampled by a horse/died of dropsy/ etc, and, while the bereaved was being engaged in conversation, snatch a picture of the decedent from the mantelpiece, and then sprint back to the office with it.</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Sat, 16 Jul 2011 00:06:15 GMT</pubDate>
</item><item><title>Security Videos (various authors)</title>
<link>http://137.132.19.24/security_course/vid_tutorials/</link>
<description>A Penetration Attack Reconstructed.avi A Quick and Dirty Intro to Nessus using the Auditor Boot CD!.swf Adding Modules to a Slax or Backtrack Live CD from Windows.swf Airplay replay attack - no wireless client required.swf Anonym.OS LiveCD with build in Tor Onion routing and Privoxy.swf BackTrack LiveCD to HD Installation Instruction Video .swf Basic Nmap Usage!.swf Basic Tools for Wardriving!.swf Bluesnarfer attack tool demonstration.swf Bluesnarfing a Nokia 6310i hand set.avi Breaking WEP in 10 minutes.avi</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Mon, 28 May 2007 09:57:42 GMT</pubDate>
</item><item><title>TrueCrypt: Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP/2000 and Linux</title>
<link>http://www.truecrypt.org/</link>
<description>Main Features:     * Creates a virtual encrypted disk within a file and mounts it as a real disk.     * Encrypts an entire hard disk partition or a storage device such as USB flash drive.     * Encryption is automatic, real-time (on-the-fly) and transparent.     * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:       1) Hidden volume (steganography – more information may be found here).       2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).     * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: LRW. Further information regarding features of the software may be found in the documentation.</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Wed, 21 Mar 2007 07:23:13 GMT</pubDate>
</item><item><title>wikipedia: Codex Seraphinianus</title>
<link>http://en.wikipedia.org/wiki/Codex_Seraphinianus</link>
<description>The Codex Seraphinianus is a book written and illustrated by the Italian architect and industrial designer Luigi Serafini during thirty months, from 1976 to 1978.[1] The book is approximately 360 pages long (depending on edition), and appears to be a visual encyclopedia of an unknown world, written in one of its languages, an incomprehensible (at least for us) alphabetic writing.</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Thu, 03 Jan 2008 14:18:56 GMT</pubDate>
</item><item><title>wikipedia: Voynich manuscript</title>
<link>http://en.wikipedia.org/wiki/Voynich_manuscript</link>
<description>The Voynich manuscript is a mysterious illustrated book with incomprehensible contents. It is thought to have been written between approximately 1450 and 1520 by an unknown author in an unidentified script and language. Over its recorded existence, the Voynich manuscript has been the object of intense study by many professional and amateur cryptographers, including some top American and British codebreakers of World War II fame (all of whom failed to decrypt a single word). This string of failures has turned the Voynich manuscript into a famous subject of historical cryptology, but it has also given weight to the theory that the book is simply an elaborate hoax — a meaningless sequence of arbitrary symbols.</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Thu, 03 Jan 2008 14:15:54 GMT</pubDate>
</item><item><title>YouTube: Marble adding machine in wood</title>
<link>http://www.youtube.com/watch?v=GcDshWmhF4A</link>
<description>Matthias Wandel&#39;s astounding wooding calculatory enigma. A woodworker turns his talents to binary mathematics via a cunning series of cats-eyes, clinkers and rounders. Plus many other marbled wonders: Woodgears.ca &lt;&lt;mathematics&gt;&gt;</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Thu, 28 Jun 2007 13:05:40 GMT</pubDate>
</item><item><title>Commercial Telegraphic Code Books</title>
<link>http://dtc.umn.edu/~reedsj/codebooks.html</link>
<description>Code books were used in the era of telegraphs (from 1845 until well into the second half of the 20th century) to shorten telegrams, which were paid for by the word. These books, arranged like dictionaries, would list many useful phrases or even sentences, each with its corresponding code word. One sent the code words, and the recipient of the telegram would have to look up their meanings in his copy of the code book. This could save quite a bit of money on intercontinental telegrams, since the price per word on undersea cable connections was very high. (The word cable means both the actual telegraph cable layed on the ocean bed, and to a cablegram sent over via the ``submarine telegraph,&#39;&#39; and then, as a verb, to send a cablegram, as in ``the arrest warrant</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Thu, 03 Jan 2008 14:10:01 GMT</pubDate>
</item><item><title>From Tesla Motors to the “Patriot Hack” Martin Eberhard on Protecting Your Privacy Online</title>
<link>http://www.fourhourworkweek.com/blog/2008/10/08/from-tesla-motors-to-the-patriot-hack-martin-eberhard-on-protecting-your-privacy-online/</link>
<description>Nursing the best dark brew I’ve ever had, I moved from a great article on free global phone calls to another on the language of gang signs, ultimately landing on a column signed not with an anonymous pseudonym but by Martin Eberhard, co-founder of Tesla Motors. It was so interesting, in fact, that I reached out to Martin after my bear-rich Pacific Northwest roadtrip and asked for permission to reprint his article here. He graciously agreed. This article is broken up into four sections, which I titled: The Patriot Hack - From China’s Firewall to Lockpicking (15%) The Political and Technical Landscape (60%) Strategies to Protect Your Privacy (10%) The “Haystack” Call to Action (15%)</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Sun, 08 Feb 2009 17:17:18 GMT</pubDate>
</item><item><title>In Defense of Piracy - WSJ.com by LAWRENCE LESSIG professor of law at Stanford Law School, and co-founder</title>
<link>http://online.wsj.com/article/SB122367645363324303.html</link>
<description>In early February 2007, Stephanie Lenz&#39;s 13-month-old son started dancing. Pushing a walker across her kitchen floor, Holden Lenz started moving to the distinctive beat of a song by Prince, &quot;Let&#39;s Go Crazy.&quot; He had heard the song before. The beat had obviously stuck. So when Holden heard the song again, he did what any sensible 13-month-old would do -- he accepted Prince&#39;s invitation and went &quot;crazy&quot; to the beat. Holden&#39;s mom grabbed her camcorder and, for 29 seconds, captured the priceless image of Holden dancing, with the barely discernible Prince playing on a CD player somewhere in the background.</description>
<category domain="http://netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Sun, 08 Feb 2009 12:39:55 GMT</pubDate>
</item></channel></rss>