TorBT - Torrents and Magnet Links Search Engine

Computer Security Hub

File Name
Size
Penetration Testing/Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests.mp4
1.3 GB
Penetration Testing/Using Web Proxy Servers for Hacking.mp4
384 MB
Penetration Testing/Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge.mp4
305 MB
Windows Registry/Windows Registry Tutorial.mp4
273 MB
Cryptography Courses/Extras and Lectures/Introduction to Public-Key Cryptography.mp4
218 MB
Penetration Testing/Introduction to Phishing Email Hacking Attacks.mp4
210 MB
Windows Registry/Hacking the Windows Registry.mp4
186 MB
Penetration Testing/Disposable Email for Hacking and Security.mp4
181 MB
Penetration Testing/Introduction to Hacking.mp4
178 MB
Penetration Testing/Network Mapping.mp4
172 MB
Penetration Testing/Hacking DNS.mp4
162 MB
VBS Scripting/VBScript Basics » Part 6 _ Input Box.mp4
158 MB
Penetration Testing/Introduction to Practical Hacking and Penetration Testing.mp4
151 MB
Penetration Testing/Hacking - How to hack usernames and passwords - For Beginners.wmv.mp4
143 MB
Penetration Testing/Step-byStep SQL Injection Attack.mp4
140 MB
VBS Scripting/VBScript Basics » Part 25 _ Replace Command _ InputBox by Lines.mp4
128 MB
VBS Scripting/VBScript Basics » Part 13 _ Automation_ Internet Explorer _ HTML.mp4
128 MB
Penetration Testing/Hacking - How to hack a WPA_WPA2 Router - For Beginners.mp4
122 MB
Cryptography Courses/Extras and Lectures/Theory and Practice of Cryptography.mp4
119 MB
VBS Scripting/VBScript Basics » Part 2 _ Message Box - Constants.mp4
118 MB
Penetration Testing/Beginner Hacking - Episode 1 - Setting up Backtrack in a Virtual Machine.mp4
116 MB
VBS Scripting/VBScript Basics » Part 5 _ Run Command.mp4
115 MB
VBS Scripting/VBScript Basics » Part 15 _ Copy_Move_Rename Files+Folders.mp4
112 MB
Batch File Programming/Batch Programming Lessons/Batch Programing_ Lesson 3 (Create Text Files and Extract from them).mp4
110 MB
Computer Books/Professional C++ 2nd Edition.pdf
108 MB
Penetration Testing/Security+ Online Training_ Module 1 - Mitigating Threats.mp4
100 MB
Penetration Testing/BT5QA.mp4
99 MB
VBS Scripting/VBScript Basics » Part 1 _ Message Box - Numbers.mp4
98 MB
VBS Scripting/VBScript Basics » Part 12 _ Automation_ Internet Explorer _ SendKeys.mp4
98 MB
VBS Scripting/VBScript Basics » Part 3 _ If Then Statments.mp4
97 MB
VBS Scripting/VBScript Basics » Part 28 _ GetFile & GetFolder_ Attributes.mp4
97 MB
VBS Scripting/VBScript Basics » Part 23 _ Replace Command _ By Words.mp4
96 MB
VBS Scripting/VBScript Basics » Part 22 _ OpenTextFile _ Append Files.mp4
96 MB
Penetration Testing/Cross site scripting attacks (XSS), cookie session ID stealing -Part 1.mp4
91 MB
Penetration Testing/Creating a Phishing Website for Hacking.mp4
90 MB
VBS Scripting/VBScript Basics » Part 7 _ Do Loops.mp4
90 MB
Penetration Testing/Cross site scripting attacks (XSS), cookie session ID stealing -Part 2.mp4
90 MB
VBS Scripting/VBScript Basics » Part 24 _ Replace Command _ By Lines.mp4
88 MB
VBS Scripting/VBScript Basics » Part 10 _ Script Directory.mp4
84 MB
VBS Scripting/VBScript Basics » Part 8 _ SendKeys.mp4
83 MB
Batch File Programming/Batch Programming Lessons/Batch Programming Lesson 1 (Basics).mp4
78 MB
VBS Scripting/VBScript Basics » Part 20 _ OpenTextFile _ Read Files.mp4
78 MB
VBS Scripting/VBScript Basics » Part 16 _ Create Shortcuts.mp4
73 MB
Penetration Testing/Run an exploit and use pivoting with Meterpreter, Metasploit and Backtrack5.mp4
73 MB
Batch File Programming/Batch Programming Lessons/Batch Programing_ Lesson 4 (How to Copy,Move and Rename files + MORE).mp4
72 MB
VBS Scripting/VBScript Basics » Part 27 _ GetFile & GetFolder_ Properties.mp4
72 MB
VBS Scripting/VBScript Basics » Part 18 _ Create_Delete Files+Folders.mp4
72 MB
VBS Scripting/VBScript Basics » Part 17 _ Special Folders.mp4
71 MB
VBS Scripting/VBScript Basics » Part 19 _ OpenTextFile _ Open Files.mp4
70 MB
VBS Scripting/VBScript Basics » Part 11 _ Subroutines.mp4
69 MB
VBS Scripting/VBScript Basics » Part 21 _ OpenTextFile _ Write Files.mp4
68 MB
Penetration Testing/DEFCON 16_ Nmap_ Scanning the Internet.mp4
60 MB
Penetration Testing/Exploit and maintain access with a Meterpreter backdoor using Metasploit.mp4
58 MB
Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 3.mp4
57 MB
VBS Scripting/VBScript Basics » Part 14 _ File_Folder Exists.mp4
49 MB
Windows Registry/What Are Bits, and Are They Important_ (32-Bit vs 64-Bit).mp4
47 MB
VBS Scripting/VBScript Basics » Part 26 _ With Command.mp4
46 MB
Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 2.mp4
45 MB
VBS Scripting/VBScript Basics » Part 9 _ Len, Left, & Right.mp4
43 MB
Computer Books/Windows 8 Hacks.pdf
43 MB
Penetration Testing/Hacking - WPA_WPA2 Wordlists Q&A.mp4
42 MB
Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 1.mp4
42 MB
Penetration Testing/Hacking to Acquire Passwords from HTML Forms Password Boxes.mp4
41 MB
VBS Scripting/VBScript Basics » Part 4 _ Vertical & Horizontal Spacing.mp4
41 MB
Cryptography Courses/Extras and Lectures/Lesson 14_ One-way and hash functions (intypedia).mp4
39 MB
Windows Registry/The Difference Between 32 Bit and 64 Bit.mp4
39 MB
Penetration Testing/Use Metasploit to run an exploit and launch Meterpreter- part 1.mp4
35 MB
Cryptography Courses/Extras and Lectures/Lesson 3_ Public-key cipher systems (intypedia).mp4
34 MB
Batch File Programming/Batch Programming Lessons/Batch Programming_ Lesson 2 (User Input, Variables).mp4
34 MB
Penetration Testing/Offensive Security - Advanced Windows Exploitation (AWE) v 1.1.zip
34 MB
Penetration Testing/Basics of ipconfig, ping, tracert, nslookup, and netstat.mp4
32 MB
Cryptography Courses/Extras and Lectures/Lesson 1_ History of cryptography and its early stages in Europe (intypedia).mp4
29 MB
Cryptography Courses/Extras and Lectures/Lesson 2_ Symmetric-key cryptography (intypedia).mp4
29 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 10 - Enviroment Variables.mp4
28 MB
Penetration Testing/CMD hacking basics.mp4
28 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 7 - Variables in Directors.mp4
27 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/5 b. PRG Security Definitions (25 minVid).mp4
27 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 8 - If Not Command.mp4
27 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/3 b. Attacks on stream ciphers and the one time pad (24 min).mp4
25 MB
Computer Books/Packet Guide To Voice Over IP.pdf
25 MB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/3 b. Security for many-time key (23 min).mp4
25 MB
Penetration Testing/Hacking - Collecting Network Information - For Beginners.mp4
25 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 12 - Upgrade.mp4
25 MB
Cryptography Courses/2 a. Block Ciphers (week 2)/2 b. The Data Encryption Standard (22 min Vid).mp4
24 MB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4
23 MB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/4 b. Constructions from ciphers and MACs (21 min).mp4
23 MB
Cryptography Courses/3 a. Message Integrity (week 3)/3 b. CBC-MAC and NMAC (20 min).mp4
22 MB
Cryptography Courses/4 b. Odds and ends (week 4)/8 - 3 - Deterministic EncryptionSIV and wide PRP (21 min).mp4
22 MB
Cryptography Courses/2 a. Block Ciphers (week 2)/3 b. Exhaustive search attacks (20 min Vid).mp4
22 MB
vlc-2.0.7-win32.exe
22 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/4 b. Real-world stream ciphers (20 min Vid).mp4
22 MB
Cryptography Courses/Extras and Lectures/Diffie Hellman Key Exchange.mp4
21 MB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4
21 MB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4
21 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/2 b. Stream ciphers and pseudo random generators (20 min).mp4
21 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 1 - Basic Commands.mp4
21 MB
Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4
21 MB
Penetration Testing/Command Line Basics for Ethical Hacking.mp4
21 MB
Cryptography Courses/1 a. Course Overview/3 b. History of cryptography (19 min Vid).mp4
20 MB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4
20 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 6 - Directors, Del, and Ren.mp4
20 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/1 b. Information theoretic security and the one time pad (19 min Vid).mp4
20 MB
Cryptography Courses/1 a. Course Overview/4 b. Discrete probability (Crash course) (18 min Vid).mp4
20 MB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4
20 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 9 - Custom Pause and Animation.mp4
20 MB
Penetration Testing/Getting started w_BackTrack4 VM installation.mp4
19 MB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 3 - Modular eth roots (17 min).mp4
19 MB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/5 b. Case study TLS (18 min).mp4
19 MB
Cryptography Courses/2 a. Block Ciphers (week 2)/1 b. What are block ciphers (17 min Vid).mp4
19 MB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function (17 min).mp4
18 MB
Penetration Testing/ARP Spoofing - Man-in-the-middle attack.mp4
18 MB
Networking/Windows command line networking (nslookup).mp4
18 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 11 - Basic Encryption.mp4
18 MB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/4 b. Modes of operation many time key (CBC) (16 min).mp4
18 MB
Penetration Testing/Configure Pure-FTPd in BackTrack.mp4
18 MB
Cryptography Courses/2 a. Block Ciphers (week 2)/4 b. More attacks on block ciphers (16 min Vid).mp4
18 MB
Networking/Windows command line networking (route).mp4
17 MB
Penetration Testing/Hacking - VMware Answering Questions - For Beginners.mp4
17 MB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4
17 MB
Cryptography Courses/3 a. Message Integrity (week 3)/5 b. PMAC and the Carter-Wegman MAC (16 min).mp4
17 MB
Cryptography Courses/1 a. Course Overview/2 b.What is cryptography (15 min Vid).mp4
17 MB
Penetration Testing/Penetration Testers Open Source Toolkit.pdf
17 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/6 b. Semantic Security (16 min Vid).mp4
17 MB
Cryptography Courses/3 a. Message Integrity (week 3)/1 b. Message Authentication Codes (16 min).mp4
17 MB
Networking/Windows command line networking (netstat).mp4
16 MB
Cryptography Courses/3 b. Collision Resistance (week 3)/2 b. Generic birthday attack (16 min).mp4
16 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 4 - User Input.mp4
16 MB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4
16 MB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4
16 MB
Cryptography Courses/4 b. Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4
16 MB
Cryptography Courses/4 b. Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4
16 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 5 - Variables.mp4
15 MB
Networking/Windows command line networking (ipconfig).mp4
15 MB
Penetration Testing/Use Metasploit to run an exploit and launch Meterpreter- part 2.mp4
15 MB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/6 b. CBC padding attacks (14 min).mp4
15 MB
Cryptography Courses/1 a. Course Overview/5 b. Discrete probability (crash course, cont.) (14 min Vid).mp4
15 MB
Cryptography Courses/4 b. Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4
15 MB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4
14 MB
Cryptography Courses/2 a. Block Ciphers (week 2)/5 b. The AES block cipher (14 min Vid).mp4
14 MB
Penetration Testing/Offensive Security - Wireless Attacks ( WiFu) v2.0.pdf
14 MB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/1 b. Active attacks on CPA-secure encryption (13 min).mp4
14 MB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4
14 MB
Computer Books/Hackers handbook to web applications.pdf
14 MB
Cryptography Courses/4 b. Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4
13 MB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/3 b. Chosen ciphertext attacks (12 min).mp4
13 MB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4
13 MB
Cryptography Courses/2 a. Block Ciphers (week 2)/6 b. Block ciphers from PRGs (12 min Vid).mp4
13 MB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/1 b. Review PRPs and PRFs (12 min).mp4
13 MB
Cryptography Courses/3 b. Collision Resistance (week 3)/3 b. The Merkle-Damgard Paradigm (12 min).mp4
13 MB
Computer Books/Gray Hat Hacking 2nd Edition.pdf
13 MB
Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4
12 MB
Penetration Testing/AWE-3.pdf
12 MB
Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4
12 MB
Computer Books/The Complete FreeBSD 4th Edition.pdf
12 MB
Cryptography Courses/3 b. Collision Resistance (week 3)/1 b. Introduction (11 min).mp4
12 MB
Penetration Testing/Hacking With Netcat Basics.mp4.mp4
12 MB
Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4
12 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/7 b. Stream ciphers are semantically secure (11 min Vid).mp4
12 MB
Cryptography Courses/1 a. Course Overview/1 b. Course Overview (11 min Vid).mp4
12 MB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4
11 MB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4
11 MB
Cryptography Courses/3 a. Message Integrity (week 3)/2 b. MACs Based On PRFs (10 min).mp4
11 MB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/7 b. Attacking non-atomic decryption (10 min).mp4
11 MB
Networking/Windows command line networking (tracert).mp4
11 MB
Penetration Testing/AWE-2.pdf
11 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 13 - Blank Lines and Comments_Remarks.mp4
11 MB
Penetration Testing/AWE-1.pdf
11 MB
Computer Books/Professional C++.pdf
11 MB
Penetration Testing/Hacking and Securing iOS Applications.pdf
11 MB
Penetration Testing/Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf
10 MB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/5 b. Modes of operation many time key (CTR) (10 min).mp4
10 MB
Penetration Testing/Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf
9.9 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 2 - Start and Color Commands.mp4
9.7 MB
Computer Books/How Google Test Software.pdf
9.6 MB
Cryptography Courses/3 b. Collision Resistance (week 3)/6 b.Timing attacks on MAC verification (9 min).mp4
9.4 MB
Cryptography Courses/3 a. Message Integrity (week 3)/4 b. MAC padding (9 min).mp4
9.3 MB
Computer Books/CEH Certified Ethical Hacker Study Guide V413HAV.pdf
9.3 MB
Networking/Windows command line networking (arp, getmac).mp4
9.0 MB
Cryptography Courses/3 b. Collision Resistance (week 3)/4 b. Constructing compression functions (8 min).mp4
8.8 MB
Computer Books/The shellcoders handbook 2nd Edition.pdf
8.7 MB
Computer Books/The Modern Web.pdf
8.2 MB
Cryptography Courses/Extras and Lectures/How SSL works tutorial - with HTTPS example.mp4
8.1 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 3 - Goto Command, Markers, and Loops.mp4
8.0 MB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/2 b. Modes of operation one time key (8 min).mp4
8.0 MB
Cryptography Courses/3 b. Collision Resistance (week 3)/5 b. HMAC (7 min).mp4
7.8 MB
Computer Books/Absolute FreeBSD 2nd Edition.pdf
7.8 MB
Penetration Testing/The basics of working with Netcat - Part 2.mp4
7.7 MB
Penetration Testing/AWE-4.pdf
7.5 MB
Penetration Testing/XSS Attacks - Exploits and Defense.pdf
7.3 MB
Cryptography Courses/Extras and Lectures/Security+ Encryption.mp4
7.0 MB
Penetration Testing/Metasploit The Penetration Testers Guide.pdf
6.9 MB
Penetration Testing/SQL Injection Attacks and Defense.pdf
6.5 MB
Computer Books/Hacking VoIP Protocols, Attacks and Countermeasures.pdf
6.4 MB
Networking/Windows command line networking (ping).mp4
6.1 MB
Penetration Testing/How to open BackTrack 5 in VMware Player_.mp4
6.1 MB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4
5.7 MB
Batch File Programming/Batch Programming Lessons/Batch Scripting - 14 - Speaking Batch File.mp4
5.6 MB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/2 b. Definitions (6 min).mp4
5.6 MB
Penetration Testing/hacking a server with netcat (part 2).mp4
5.3 MB
Penetration Testing/Footprinting.pdf
4.5 MB
Penetration Testing/Hacking the art of explotation.pdf
4.4 MB
Computer Books/GIS For Web Developers.pdf
3.9 MB
Batch File Programming/Batch File Programming.pdf
3.8 MB
Computer Books/Linux System Administration.pdf
3.7 MB
Computer Books/C++ Programming Language.pdf
3.3 MB
Penetration Testing/hacking a server with netcat (part 1).mp4
3.1 MB
Penetration Testing/Firewalls and Internet Security 2nd Edition.pdf
3.1 MB
Computer Books/Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf
2.9 MB
Computer Books/Applied Cryptography.pdf
2.8 MB
Computer Books/Practical C++ Programming 1995.pdf
2.7 MB
Computer Books/ObJ-C Programming Notes.pdf
2.6 MB
Information Packets/Cryptosystem.pdf
2.3 MB
Computer Books/An Introduction To Keyloggers, RATS And Malware.pdf
2.2 MB
Computer Books/The Linux Command Line.pdf
2.0 MB
Cryptography Courses/1 a. Course Overview/3 a. History of cryptography.pptx
1.6 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/1 a. Information theoretic security and the one time pad.pptx
1.5 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/5 a. PRG Security Definitions.pptx
1.3 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/2 a. Stream ciphers and pseudo random generators.pptx
1.1 MB
Cryptography Courses/1 b. Stream Ciphers (week 1)/3 a. Attacks on stream ciphers and the one time pad.pptx
1.0 MB
Cryptography Courses/1 a. Course Overview/2 a. What is cryptography.pptx
1.0 MB
Computer Books/The C Programming Language.pdf
897 kB
Cryptography Courses/3 b. Collision Resistance (week 3)/3. The Merkle-Damgard Paradigm.pptx
818 kB
Cryptography Courses/2 a. Block Ciphers (week 2)/2 a. The Data Encryption Standard.pptx
809 kB
Cryptography Courses/5 a. Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pptx
735 kB
Cryptography Courses/1 b. Stream Ciphers (week 1)/4 a. Real-world stream ciphers.pptx
732 kB
Information Packets/Rootkit.pdf
627 kB
Cryptography Courses/2 a. Block Ciphers (week 2)/3 a. Exhaustive search attacks.pptx
622 kB
Cryptography Courses/5 a. Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pptx
602 kB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/1 a. Active attacks on CPA-secure encryption.pptx
548 kB
Cryptography Courses/2 a. Block Ciphers (week 2)/4 a. More attacks on block ciphers.pptx
524 kB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.1-numth-annotated.pptx
522 kB
Cryptography Courses/3 b. Collision Resistance (week 3)/2. Generic birthday attack.pptx
515 kB
Cryptography Courses/4 b. Odds and ends (week 4)/08.3-odds-and-ends.pptx
513 kB
Cryptography Courses/08.3-odds-and-ends.pptx
513 kB
Penetration Testing/Coding and Cryptography.pdf
506 kB
Cryptography Courses/1 b. Stream Ciphers (week 1)/7 a. Stream ciphers are semantically secure.pptx
481 kB
Cryptography Courses/5 a. Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pptx
478 kB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.3-numth-annotated.pptx
464 kB
Information Packets/Portable Document Format.pdf
462 kB
Cryptography Courses/4 b. Odds and ends (week 4)/08.4-odds-and-ends.pptx
450 kB
Cryptography Courses/5 a. The AES block cipher.pptx
435 kB
Cryptography Courses/2 a. Block Ciphers (week 2)/5 a. The AES block cipher.pptx
435 kB
Penetration Testing/Password Cracking Techniques.pdf
433 kB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/1 a. Review PRPs and PRFs.pptx
415 kB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/2 a. Modes of operation one time key.pptx
399 kB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/6 a. CBC padding attacks.pptx
381 kB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/4 a. Modes of operation many time key (CBC).pptx
366 kB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pptx
351 kB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/5 a. Case study TLS.pptx
351 kB
Cryptography Courses/3 b. Collision Resistance (week 3)/6. Timing attacks on MAC verification.pptx
326 kB
Cryptography Courses/3 a. Message Integrity (week 3)/3. CBC-MAC and NMAC.pptx
326 kB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/3 a. Security for many-time key.pptx
318 kB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pptx
309 kB
Cryptography Courses/1 a. Course Overview/1 a. Course Overview.pptx
293 kB
Cryptography Courses/3 a. Message Integrity (week 3)/2. MACs Based On PRFs.pptx
284 kB
Information Packets/IPv6.pdf
282 kB
Cryptography Courses/3 a. Message Integrity (week 3)/1. Message Authentication Codes.pptx
280 kB
Cryptography Courses/2 a. Block Ciphers (week 2)/6 a. Block ciphers from PRGs.pptx
276 kB
Penetration Testing/Cracking Passwords Guide.pdf
272 kB
Cryptography Courses/1 b. Stream Ciphers (week 1)/6 a. Semantic Security.pptx
269 kB
Information Packets/Transport Layer Security.pdf
266 kB
Cryptography Courses/4 b. Odds and ends (week 4)/08.2-odds-and-ends.pptx
264 kB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/3 a. Chosen ciphertext attacks.pptx
262 kB
Cryptography Courses/3 a. Message Integrity (week 3)/4. MAC padding.pptx
249 kB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/4 a. Constructions from ciphers and MACs.pptx
246 kB
Cryptography Courses/3 b. Collision Resistance (week 3)/5. HMAC.pptx
243 kB
Cryptography Courses/3 a. Message Integrity (week 3)/5. PMAC and the Carter-Wegman MAC.pptx
241 kB
Cryptography Courses/3 b. Collision Resistance (week 3)/4. Constructing compression functions.pptx
240 kB
Cryptography Courses/4 b. Odds and ends (week 4)/08.5-odds-and-ends.pptx
239 kB
Information Packets/User Datagram Protocol.pdf
238 kB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/7 a. Attacking non-atomic decryption.pptx
237 kB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.5-numth-annotated.pptx
234 kB
Cryptography Courses/2 a. Block Ciphers (week 2)/1 a. What are block ciphers.pptx
224 kB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.4-numth-annotated.pptx
224 kB
Cryptography Courses/2 b. Using Block Ciphers (week 2)/5 a. Modes of operation many time key (CTR).pptx
224 kB
Cryptography Courses/4 a. Authenticated Encryption (week 4)/2 a. Definitions.pptx
222 kB
Cryptography Courses/5 a. Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pptx
210 kB
Information Packets/Cryptographic hash function.pdf
209 kB
Cryptography Courses/1 a. Course Overview/5 a. Discrete probability (crash course, cont.).pptx
208 kB
Cryptography Courses/4 b. Odds and ends (week 4)/08.1-odds-and-ends.pptx
206 kB
Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.2-numth-annotated.pptx
206 kB
Cryptography Courses/Encryption/Encrypting Files and Folders With EFS (Windows) 8.docx
206 kB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pptx
204 kB
Cryptography Courses/3 b. Collision Resistance (week 3)/1. Introduction.pptx
204 kB
Batch File Programming/Batch file Wikipedia Info.pdf
200 kB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pptx
200 kB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pptx
194 kB
Cryptography Courses/12.2-pubkey-dh.pptx
194 kB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pptx
191 kB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pptx
187 kB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pptx
186 kB
Cryptography Courses/1 a. Course Overview/4 a. Discrete probability (Crash course).pptx
185 kB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pptx
185 kB
Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pptx
182 kB
Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pptx
180 kB
Information Packets/Transport layer.pdf
164 kB
Information Packets/Internet Group Management Protocol.pdf
164 kB
Information Packets/Network Time Protocol.pdf
146 kB
Information Packets/ICMPv6.pdf
139 kB
Information Packets/IPsec.pdf
138 kB
Information Packets/Mobile IP.pdf
128 kB
Information Packets/Shell script.pdf
121 kB
Information Packets/Tunneling protocol.pdf
88 kB
Information Packets/IPv6 packet.pdf
82 kB
Information Packets/Neighbor Discovery Protocol.pdf
82 kB
Information Packets/Client–server model.pdf
77 kB
Penetration Testing/List of MS-DOS commands.pdf
63 kB
Information Packets/Obfuscated TCP.pdf
61 kB
Batch File Programming/Batch File Informal Programming.pdf
58 kB
Information Packets/tcpcrypt.pdf
58 kB
Information Packets/Tcpcrypt - Encrypting the internet.pdf
52 kB
Information Packets/Domain Name System.pdf
42 kB
Telnet/Linux Unix Command - Telnet.pdf
36 kB
Penetration Testing/Backdoor (Computing).pdf
18 kB
Telnet/Telnet.pdf
17 kB
Penetration Testing/How to Use The Command Line.pdf
16 kB
Information Packets/NETSH (Network Shell).pdf
16 kB
Cryptography Courses/Encryption/File and Disk Encryption.docx
16 kB
Penetration Testing/REN.pdf
15 kB
Information Packets/IF.pdf
15 kB
Information Packets/Secure Deletion.pdf
14 kB
Cryptography Courses/Encryption/Learn to Encrypt Your Internet Communications.docx
13 kB
Information Packets/CALL.pdf
13 kB
Cryptography Courses/Encryption/Encrypt Your Data.docx
12 kB
Information Packets/ISO image.pdf
12 kB
Information Packets/Begin Mod Commands.pdf
11 kB
Information Packets/DEL.pdf
9.5 kB
Information Packets/CIPHER.pdf
9.2 kB
Information Packets/FIND.pdf
8.2 kB
Information Packets/MOVE.pdf
7.5 kB
Information Packets/NSLOOKUP (TCP IP).pdf
7.1 kB
Penetration Testing/NET ACCOUNTS, USER, GROUP, LOCALGROUP.pdf
7.0 kB
Cryptography Courses/Encryption/Encryption Basics.pdf
6.8 kB
Information Packets/Choosing a Password.pdf
6.6 kB
Information Packets/GOTO.pdf
6.5 kB
Information Packets/Back Orifice.pdf
6.2 kB
Information Packets/Avoid SMS Text Messages If You Can.pdf
4.7 kB
Batch File Programming/Batch File Scripts/Shutdown PC.bat
57 B
Batch File Programming/Batch File Scripts/Clean PC Disk Space.bat
55 B
Batch File Programming/Batch File Scripts/Restart PC.bat
54 B