<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / emmineb / tag / cryptography</title>
<link>http://www.netvouz.com/emmineb/tag/cryptography?feed=rss&amp;pg=1</link>
<description>emmineb&#39;s bookmarks tagged &quot;cryptography&quot; on Netvouz</description>
<item><title>Java Morse Code Translator</title>
<link>http://morsecode.scphillips.com/jtranslator.html</link>
<description>The Java Morse code translator translates to and from Morse code and can play the Morse to you as sound. It runs on your computer and therefore is very quick. You have full control over the speed, pitch and volume of the sounds. CGI Morse Code Translator</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Mon, 19 Nov 2007 15:08:44 GMT</pubDate>
</item><item><title>Low Cost and Portable GPS Jammer</title>
<link>http://www.phrack.org/archives/60/p60-0x0d.txt</link>
<description></description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Sun, 28 Jan 2007 05:53:49 GMT</pubDate>
</item><item><title>Schneier on Security: Anonymity and the Internet February 3, 2010</title>
<link>http://www.schneier.com/blog/archives/2010/02/anonymity_and_t_3.html</link>
<description>Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only the proper people have access to their own information. We&#39;ll know who is sending us spam and who is trying to hack into corporate networks. And when there are massive denial-of-service attacks, such as those against Estonia or Georgia or South Korea, we&#39;ll know who was responsible and take action accordingly. The problem is that it won&#39;t work. Any design of the Internet must allow for anonymity. Universal identification is impossible. Even attribution -- knowing who is responsible for particular Internet packets -- is impossible. Attempting to build such a system is futile, and will only give cr</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Sat, 06 Feb 2010 09:14:41 GMT</pubDate>
</item><item><title>Beyond The Beyond | playground for global guerrillas |  By Bruce Sterling 100201</title>
<link>http://www.wired.com/beyond_the_beyond/2010/02/internet-playground-for-global-guerrillas/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+wiredbeyond+%28Blog+-+Beyond+the+Beyond%2FSterling%29</link>
<description>No rules: Internet security a Hobbesian &quot;state of nature&quot; Ars Technica By Nate Anderson  | Last updated February 1, 2010
Life in cyberspace can be nasty, brutish, and short. So says a new report (PDF) on international cybersecurity, which argues that the Internet is a Hobbesian “state of nature” where anything goes, where even government attacks maintain “plausible deniability,” and where 80 percent of industrial control software is hooked into an IP network.</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Thu, 04 Feb 2010 20:55:32 GMT</pubDate>
</item><item><title>Hide data in files with easy steganography tools - Lifehacker</title>
<link>http://www.lifehacker.com/software/privacy/geek-to-live--hide-data-in-files-with-easy-steganography-tools-230915.php</link>
<description>Unlike encryption, which obscures data in such a way that it&#39;s obvious someone&#39;s keeping something from listeners-in (and therefore heightens interest in that info), stego techniques offer no hint to the outsider that there&#39;s any private data contained within the visible file. Like hiding your valuables from burglars in an empty cereal box in your kitchen cabinet, steganography keeps the existence of the secret item from everyone but those in the know.</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Wed, 30 May 2007 07:19:26 GMT</pubDate>
</item><item><title>How to Learn Morse Code</title>
<link>http://www.wikihow.com/Learn-Morse-Code</link>
<description>Morse Code was first used in the 1840s, and even after more than 160 years, it is still used today, especially by amateur radio operators. In 1844, Samuel F.B. Morse developed this code, which can be sent quickly over the telegraph. It&#39;s also useful for emergency signaling (SOS) with a radio, mirror, or flashlight, and even for people with severe disabilities to communicate. Plus, you can probably communicate faster with Morse code than you can with SMS text messaging![1] In order to master Morse code, however, you need to approach it like a new language. Here&#39;s how to get started.</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Thu, 30 Oct 2008 11:12:11 GMT</pubDate>
</item><item><title>How to Mask Your IP and Use Country Restricted Services</title>
<link>http://6initiative.com/how-to-mask-your-ip-and-use-country-restricted-sites-2/</link>
<description>A warning from our reader, Mark: ”Whoever runs that proxy can see all your internet communications - including MSN conversations and any passwords that are not encrypted! Use this at your own risk and do not transmit any sensitive data through the proxy unless you know and fully trust the person who runs it!”</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Sun, 11 Jun 2006 15:47:14 GMT</pubDate>
</item><item><title>How to Obscure Any URL</title>
<link>http://www.netvouz.com/dangerous/5691959942316050298?url=file:///D:/0%20temp%20incubate/0%20read.check/2sort/2netvouz%20emmineb2/dsv%20www/Agnosis/Maschinen/obscure.htm</link>
<description>The URL (Universal Resource Locator) of the page you are now viewing is http://www.pc-help.org/obscure.htm. It is also http://3513587746@3484559912/o%62s%63ur%65%2e%68t%6D. Go ahead and click on that link. It&#39;ll take you right back to this very page. The weird-looking address above takes advantage of several things many people don&#39;t know about the structure of a valid URL. There&#39;s a little more to Internet addressing than commonly meets the eye; there are conventions which allow for some interesting variations in how an Internet address is expressed.</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Thu, 28 Jun 2007 16:18:00 GMT</pubDate>
</item><item><title>IP check</title>
<link>http://ip-check.info/?lang=en</link>
<description>START TEST! Please click here to start the full anonymity test IP check and see all results. START TEST! Please click here to start the full anonymity test IP check and see all results. Make the anonymity test for your Tor/Torbutton or JonDonym/JonDoFox configuration! Visit this IP check regularly to see which new tests have been added meanwhile.</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Wed, 29 Jun 2011 07:53:34 GMT</pubDate>
</item><item><title>IP Enforcement Directive 2: European Community goes criminal</title>
<link>http://wiki.ffii.org/Ipred2060510En</link>
<description>Analysis of the IP Enforcement Directive text (IPRED2) proposed by the European Commission on 2 May 2006. The Commission bulldozes through criminal law, completely mixes up infringement and organised crime and at the same time manages to exceed its legislative competence.</description>
<category domain="http://www.netvouz.com/emmineb?category=8510405148731529291"></category>
<author>emmineb</author>
<pubDate>Wed, 05 Jul 2006 16:31:52 GMT</pubDate>
</item></channel></rss>