BT种子基本信息
- 种子哈希:6d049854cd2d561af02dde929d6e8b3cb783244b
- 文档大小:11.0 GB
- 文档个数:340个文档
- 下载次数:1327次
- 下载速度:极快
- 收录时间:2021-09-17
- 最近下载:2024-12-25
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- Penetration Testing/Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests.mp4 1.4 GB
- Penetration Testing/Using Web Proxy Servers for Hacking.mp4 402.7 MB
- Penetration Testing/Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge.mp4 320.2 MB
- Windows Registry/Windows Registry Tutorial.mp4 286.1 MB
- Cryptography Courses/Extras and Lectures/Introduction to Public-Key Cryptography.mp4 228.9 MB
- Penetration Testing/Introduction to Phishing Email Hacking Attacks.mp4 220.3 MB
- Windows Registry/Hacking the Windows Registry.mp4 195.4 MB
- Penetration Testing/Disposable Email for Hacking and Security.mp4 189.6 MB
- Penetration Testing/Introduction to Hacking.mp4 187.2 MB
- Penetration Testing/Network Mapping.mp4 179.8 MB
- Penetration Testing/Hacking DNS.mp4 169.4 MB
- VBS Scripting/VBScript Basics » Part 6 _ Input Box.mp4 166.0 MB
- Penetration Testing/Introduction to Practical Hacking and Penetration Testing.mp4 157.9 MB
- Penetration Testing/Hacking - How to hack usernames and passwords - For Beginners.wmv.mp4 150.1 MB
- Penetration Testing/Step-byStep SQL Injection Attack.mp4 146.3 MB
- VBS Scripting/VBScript Basics » Part 25 _ Replace Command _ InputBox by Lines.mp4 134.7 MB
- VBS Scripting/VBScript Basics » Part 13 _ Automation_ Internet Explorer _ HTML.mp4 134.0 MB
- Penetration Testing/Hacking - How to hack a WPA_WPA2 Router - For Beginners.mp4 127.4 MB
- Cryptography Courses/Extras and Lectures/Theory and Practice of Cryptography.mp4 125.2 MB
- VBS Scripting/VBScript Basics » Part 2 _ Message Box - Constants.mp4 124.2 MB
- Penetration Testing/Beginner Hacking - Episode 1 - Setting up Backtrack in a Virtual Machine.mp4 122.0 MB
- VBS Scripting/VBScript Basics » Part 5 _ Run Command.mp4 120.2 MB
- VBS Scripting/VBScript Basics » Part 15 _ Copy_Move_Rename Files+Folders.mp4 117.2 MB
- Batch File Programming/Batch Programming Lessons/Batch Programing_ Lesson 3 (Create Text Files and Extract from them).mp4 115.5 MB
- Computer Books/Professional C++ 2nd Edition.pdf 113.7 MB
- Penetration Testing/Security+ Online Training_ Module 1 - Mitigating Threats.mp4 105.0 MB
- Penetration Testing/BT5QA.mp4 103.7 MB
- VBS Scripting/VBScript Basics » Part 1 _ Message Box - Numbers.mp4 103.3 MB
- VBS Scripting/VBScript Basics » Part 12 _ Automation_ Internet Explorer _ SendKeys.mp4 102.4 MB
- VBS Scripting/VBScript Basics » Part 3 _ If Then Statments.mp4 101.7 MB
- VBS Scripting/VBScript Basics » Part 28 _ GetFile & GetFolder_ Attributes.mp4 101.4 MB
- VBS Scripting/VBScript Basics » Part 23 _ Replace Command _ By Words.mp4 100.6 MB
- VBS Scripting/VBScript Basics » Part 22 _ OpenTextFile _ Append Files.mp4 100.1 MB
- Penetration Testing/Cross site scripting attacks (XSS), cookie session ID stealing -Part 1.mp4 95.8 MB
- Penetration Testing/Creating a Phishing Website for Hacking.mp4 94.7 MB
- VBS Scripting/VBScript Basics » Part 7 _ Do Loops.mp4 94.3 MB
- Penetration Testing/Cross site scripting attacks (XSS), cookie session ID stealing -Part 2.mp4 93.9 MB
- VBS Scripting/VBScript Basics » Part 24 _ Replace Command _ By Lines.mp4 92.2 MB
- VBS Scripting/VBScript Basics » Part 10 _ Script Directory.mp4 88.2 MB
- VBS Scripting/VBScript Basics » Part 8 _ SendKeys.mp4 87.4 MB
- Batch File Programming/Batch Programming Lessons/Batch Programming Lesson 1 (Basics).mp4 82.1 MB
- VBS Scripting/VBScript Basics » Part 20 _ OpenTextFile _ Read Files.mp4 81.5 MB
- VBS Scripting/VBScript Basics » Part 16 _ Create Shortcuts.mp4 76.4 MB
- Penetration Testing/Run an exploit and use pivoting with Meterpreter, Metasploit and Backtrack5.mp4 76.2 MB
- Batch File Programming/Batch Programming Lessons/Batch Programing_ Lesson 4 (How to Copy,Move and Rename files + MORE).mp4 76.0 MB
- VBS Scripting/VBScript Basics » Part 27 _ GetFile & GetFolder_ Properties.mp4 76.0 MB
- VBS Scripting/VBScript Basics » Part 18 _ Create_Delete Files+Folders.mp4 75.9 MB
- VBS Scripting/VBScript Basics » Part 17 _ Special Folders.mp4 74.1 MB
- VBS Scripting/VBScript Basics » Part 19 _ OpenTextFile _ Open Files.mp4 73.0 MB
- VBS Scripting/VBScript Basics » Part 11 _ Subroutines.mp4 72.0 MB
- VBS Scripting/VBScript Basics » Part 21 _ OpenTextFile _ Write Files.mp4 71.7 MB
- Penetration Testing/DEFCON 16_ Nmap_ Scanning the Internet.mp4 62.5 MB
- Penetration Testing/Exploit and maintain access with a Meterpreter backdoor using Metasploit.mp4 60.8 MB
- Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 3.mp4 59.6 MB
- VBS Scripting/VBScript Basics » Part 14 _ File_Folder Exists.mp4 51.7 MB
- Windows Registry/What Are Bits, and Are They Important_ (32-Bit vs 64-Bit).mp4 48.9 MB
- VBS Scripting/VBScript Basics » Part 26 _ With Command.mp4 47.7 MB
- Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 2.mp4 46.9 MB
- VBS Scripting/VBScript Basics » Part 9 _ Len, Left, & Right.mp4 45.4 MB
- Computer Books/Windows 8 Hacks.pdf 44.9 MB
- Penetration Testing/Hacking - WPA_WPA2 Wordlists Q&A.mp4 44.5 MB
- Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 1.mp4 43.9 MB
- Penetration Testing/Hacking to Acquire Passwords from HTML Forms Password Boxes.mp4 43.0 MB
- VBS Scripting/VBScript Basics » Part 4 _ Vertical & Horizontal Spacing.mp4 42.6 MB
- Cryptography Courses/Extras and Lectures/Lesson 14_ One-way and hash functions (intypedia).mp4 41.3 MB
- Windows Registry/The Difference Between 32 Bit and 64 Bit.mp4 40.6 MB
- Penetration Testing/Use Metasploit to run an exploit and launch Meterpreter- part 1.mp4 37.0 MB
- Cryptography Courses/Extras and Lectures/Lesson 3_ Public-key cipher systems (intypedia).mp4 36.1 MB
- Batch File Programming/Batch Programming Lessons/Batch Programming_ Lesson 2 (User Input, Variables).mp4 36.0 MB
- Penetration Testing/Offensive Security - Advanced Windows Exploitation (AWE) v 1.1.zip 35.5 MB
- Penetration Testing/Basics of ipconfig, ping, tracert, nslookup, and netstat.mp4 33.6 MB
- Cryptography Courses/Extras and Lectures/Lesson 1_ History of cryptography and its early stages in Europe (intypedia).mp4 30.7 MB
- Cryptography Courses/Extras and Lectures/Lesson 2_ Symmetric-key cryptography (intypedia).mp4 30.0 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 10 - Enviroment Variables.mp4 29.1 MB
- Penetration Testing/CMD hacking basics.mp4 29.0 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 7 - Variables in Directors.mp4 28.7 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/5 b. PRG Security Definitions (25 minVid).mp4 28.1 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 8 - If Not Command.mp4 27.9 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/3 b. Attacks on stream ciphers and the one time pad (24 min).mp4 26.7 MB
- Computer Books/Packet Guide To Voice Over IP.pdf 26.4 MB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/3 b. Security for many-time key (23 min).mp4 26.1 MB
- Penetration Testing/Hacking - Collecting Network Information - For Beginners.mp4 26.0 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 12 - Upgrade.mp4 26.0 MB
- Cryptography Courses/2 a. Block Ciphers (week 2)/2 b. The Data Encryption Standard (22 min Vid).mp4 25.7 MB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4 24.5 MB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/4 b. Constructions from ciphers and MACs (21 min).mp4 24.0 MB
- Cryptography Courses/3 a. Message Integrity (week 3)/3 b. CBC-MAC and NMAC (20 min).mp4 23.4 MB
- Cryptography Courses/4 b. Odds and ends (week 4)/8 - 3 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 23.1 MB
- Cryptography Courses/2 a. Block Ciphers (week 2)/3 b. Exhaustive search attacks (20 min Vid).mp4 23.0 MB
- vlc-2.0.7-win32.exe 22.9 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/4 b. Real-world stream ciphers (20 min Vid).mp4 22.9 MB
- Cryptography Courses/Extras and Lectures/Diffie Hellman Key Exchange.mp4 22.5 MB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4 22.4 MB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4 22.2 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/2 b. Stream ciphers and pseudo random generators (20 min).mp4 22.2 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 1 - Basic Commands.mp4 22.0 MB
- Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 22.0 MB
- Penetration Testing/Command Line Basics for Ethical Hacking.mp4 21.9 MB
- Cryptography Courses/1 a. Course Overview/3 b. History of cryptography (19 min Vid).mp4 21.5 MB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4 21.0 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 6 - Directors, Del, and Ren.mp4 21.0 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/1 b. Information theoretic security and the one time pad (19 min Vid).mp4 21.0 MB
- Cryptography Courses/1 a. Course Overview/4 b. Discrete probability (Crash course) (18 min Vid).mp4 20.8 MB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4 20.8 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 9 - Custom Pause and Animation.mp4 20.6 MB
- Penetration Testing/Getting started w_BackTrack4 VM installation.mp4 20.3 MB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 3 - Modular eth roots (17 min).mp4 20.0 MB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/5 b. Case study TLS (18 min).mp4 19.9 MB
- Cryptography Courses/2 a. Block Ciphers (week 2)/1 b. What are block ciphers (17 min Vid).mp4 19.6 MB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function (17 min).mp4 19.4 MB
- Penetration Testing/ARP Spoofing - Man-in-the-middle attack.mp4 19.4 MB
- Networking/Windows command line networking (nslookup).mp4 19.4 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 11 - Basic Encryption.mp4 19.0 MB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/4 b. Modes of operation many time key (CBC) (16 min).mp4 18.8 MB
- Penetration Testing/Configure Pure-FTPd in BackTrack.mp4 18.6 MB
- Cryptography Courses/2 a. Block Ciphers (week 2)/4 b. More attacks on block ciphers (16 min Vid).mp4 18.6 MB
- Networking/Windows command line networking (route).mp4 18.3 MB
- Penetration Testing/Hacking - VMware Answering Questions - For Beginners.mp4 18.2 MB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4 18.1 MB
- Cryptography Courses/3 a. Message Integrity (week 3)/5 b. PMAC and the Carter-Wegman MAC (16 min).mp4 17.9 MB
- Cryptography Courses/1 a. Course Overview/2 b.What is cryptography (15 min Vid).mp4 17.8 MB
- Penetration Testing/Penetration Testers Open Source Toolkit.pdf 17.8 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/6 b. Semantic Security (16 min Vid).mp4 17.6 MB
- Cryptography Courses/3 a. Message Integrity (week 3)/1 b. Message Authentication Codes (16 min).mp4 17.4 MB
- Networking/Windows command line networking (netstat).mp4 17.1 MB
- Cryptography Courses/3 b. Collision Resistance (week 3)/2 b. Generic birthday attack (16 min).mp4 16.9 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 4 - User Input.mp4 16.7 MB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4 16.5 MB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4 16.4 MB
- Cryptography Courses/4 b. Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4 16.4 MB
- Cryptography Courses/4 b. Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4 16.3 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 5 - Variables.mp4 16.2 MB
- Networking/Windows command line networking (ipconfig).mp4 16.1 MB
- Penetration Testing/Use Metasploit to run an exploit and launch Meterpreter- part 2.mp4 15.8 MB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/6 b. CBC padding attacks (14 min).mp4 15.7 MB
- Cryptography Courses/1 a. Course Overview/5 b. Discrete probability (crash course, cont.) (14 min Vid).mp4 15.3 MB
- Cryptography Courses/4 b. Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4 15.3 MB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4 15.2 MB
- Cryptography Courses/2 a. Block Ciphers (week 2)/5 b. The AES block cipher (14 min Vid).mp4 15.2 MB
- Penetration Testing/Offensive Security - Wireless Attacks ( WiFu) v2.0.pdf 15.2 MB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/1 b. Active attacks on CPA-secure encryption (13 min).mp4 14.7 MB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4 14.6 MB
- Computer Books/Hackers handbook to web applications.pdf 14.2 MB
- Cryptography Courses/4 b. Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4 13.9 MB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/3 b. Chosen ciphertext attacks (12 min).mp4 13.7 MB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4 13.6 MB
- Cryptography Courses/2 a. Block Ciphers (week 2)/6 b. Block ciphers from PRGs (12 min Vid).mp4 13.5 MB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/1 b. Review PRPs and PRFs (12 min).mp4 13.3 MB
- Cryptography Courses/3 b. Collision Resistance (week 3)/3 b. The Merkle-Damgard Paradigm (12 min).mp4 13.2 MB
- Computer Books/Gray Hat Hacking 2nd Edition.pdf 13.2 MB
- Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4 13.0 MB
- Penetration Testing/AWE-3.pdf 13.0 MB
- Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4 12.8 MB
- Computer Books/The Complete FreeBSD 4th Edition.pdf 12.5 MB
- Cryptography Courses/3 b. Collision Resistance (week 3)/1 b. Introduction (11 min).mp4 12.5 MB
- Penetration Testing/Hacking With Netcat Basics.mp4.mp4 12.4 MB
- Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4 12.4 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/7 b. Stream ciphers are semantically secure (11 min Vid).mp4 12.3 MB
- Cryptography Courses/1 a. Course Overview/1 b. Course Overview (11 min Vid).mp4 12.3 MB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4 11.8 MB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.8 MB
- Cryptography Courses/3 a. Message Integrity (week 3)/2 b. MACs Based On PRFs (10 min).mp4 11.7 MB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/7 b. Attacking non-atomic decryption (10 min).mp4 11.6 MB
- Networking/Windows command line networking (tracert).mp4 11.2 MB
- Penetration Testing/AWE-2.pdf 11.2 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 13 - Blank Lines and Comments_Remarks.mp4 11.1 MB
- Penetration Testing/AWE-1.pdf 11.1 MB
- Computer Books/Professional C++.pdf 11.1 MB
- Penetration Testing/Hacking and Securing iOS Applications.pdf 11.1 MB
- Penetration Testing/Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf 11.0 MB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/5 b. Modes of operation many time key (CTR) (10 min).mp4 10.9 MB
- Penetration Testing/Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf 10.3 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 2 - Start and Color Commands.mp4 10.1 MB
- Computer Books/How Google Test Software.pdf 10.1 MB
- Cryptography Courses/3 b. Collision Resistance (week 3)/6 b.Timing attacks on MAC verification (9 min).mp4 9.8 MB
- Cryptography Courses/3 a. Message Integrity (week 3)/4 b. MAC padding (9 min).mp4 9.8 MB
- Computer Books/CEH Certified Ethical Hacker Study Guide V413HAV.pdf 9.7 MB
- Networking/Windows command line networking (arp, getmac).mp4 9.5 MB
- Cryptography Courses/3 b. Collision Resistance (week 3)/4 b. Constructing compression functions (8 min).mp4 9.2 MB
- Computer Books/The shellcoders handbook 2nd Edition.pdf 9.2 MB
- Computer Books/The Modern Web.pdf 8.6 MB
- Cryptography Courses/Extras and Lectures/How SSL works tutorial - with HTTPS example.mp4 8.5 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 3 - Goto Command, Markers, and Loops.mp4 8.4 MB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/2 b. Modes of operation one time key (8 min).mp4 8.4 MB
- Cryptography Courses/3 b. Collision Resistance (week 3)/5 b. HMAC (7 min).mp4 8.2 MB
- Computer Books/Absolute FreeBSD 2nd Edition.pdf 8.2 MB
- Penetration Testing/The basics of working with Netcat - Part 2.mp4 8.0 MB
- Penetration Testing/AWE-4.pdf 7.9 MB
- Penetration Testing/XSS Attacks - Exploits and Defense.pdf 7.7 MB
- Cryptography Courses/Extras and Lectures/Security+ Encryption.mp4 7.3 MB
- Penetration Testing/Metasploit The Penetration Testers Guide.pdf 7.2 MB
- Penetration Testing/SQL Injection Attacks and Defense.pdf 6.9 MB
- Computer Books/Hacking VoIP Protocols, Attacks and Countermeasures.pdf 6.8 MB
- Networking/Windows command line networking (ping).mp4 6.4 MB
- Penetration Testing/How to open BackTrack 5 in VMware Player_.mp4 6.3 MB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4 6.0 MB
- Batch File Programming/Batch Programming Lessons/Batch Scripting - 14 - Speaking Batch File.mp4 5.9 MB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/2 b. Definitions (6 min).mp4 5.9 MB
- Penetration Testing/hacking a server with netcat (part 2).mp4 5.6 MB
- Penetration Testing/Footprinting.pdf 4.7 MB
- Penetration Testing/Hacking the art of explotation.pdf 4.6 MB
- Computer Books/GIS For Web Developers.pdf 4.1 MB
- Batch File Programming/Batch File Programming.pdf 4.0 MB
- Computer Books/Linux System Administration.pdf 3.9 MB
- Computer Books/C++ Programming Language.pdf 3.5 MB
- Penetration Testing/hacking a server with netcat (part 1).mp4 3.3 MB
- Penetration Testing/Firewalls and Internet Security 2nd Edition.pdf 3.2 MB
- Computer Books/Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf 3.0 MB
- Computer Books/Applied Cryptography.pdf 2.9 MB
- Computer Books/Practical C++ Programming 1995.pdf 2.8 MB
- Computer Books/ObJ-C Programming Notes.pdf 2.7 MB
- Information Packets/Cryptosystem.pdf 2.4 MB
- Computer Books/An Introduction To Keyloggers, RATS And Malware.pdf 2.3 MB
- Computer Books/The Linux Command Line.pdf 2.1 MB
- Cryptography Courses/1 a. Course Overview/3 a. History of cryptography.pptx 1.6 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/1 a. Information theoretic security and the one time pad.pptx 1.6 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/5 a. PRG Security Definitions.pptx 1.4 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/2 a. Stream ciphers and pseudo random generators.pptx 1.2 MB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/3 a. Attacks on stream ciphers and the one time pad.pptx 1.1 MB
- Cryptography Courses/1 a. Course Overview/2 a. What is cryptography.pptx 1.1 MB
- Computer Books/The C Programming Language.pdf 918.2 kB
- Cryptography Courses/3 b. Collision Resistance (week 3)/3. The Merkle-Damgard Paradigm.pptx 837.4 kB
- Cryptography Courses/2 a. Block Ciphers (week 2)/2 a. The Data Encryption Standard.pptx 828.6 kB
- Cryptography Courses/5 a. Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pptx 752.8 kB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/4 a. Real-world stream ciphers.pptx 750.1 kB
- Information Packets/Rootkit.pdf 642.2 kB
- Cryptography Courses/2 a. Block Ciphers (week 2)/3 a. Exhaustive search attacks.pptx 637.0 kB
- Cryptography Courses/5 a. Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pptx 616.9 kB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/1 a. Active attacks on CPA-secure encryption.pptx 561.0 kB
- Cryptography Courses/2 a. Block Ciphers (week 2)/4 a. More attacks on block ciphers.pptx 536.8 kB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.1-numth-annotated.pptx 534.3 kB
- Cryptography Courses/3 b. Collision Resistance (week 3)/2. Generic birthday attack.pptx 527.1 kB
- Cryptography Courses/4 b. Odds and ends (week 4)/08.3-odds-and-ends.pptx 525.3 kB
- Cryptography Courses/08.3-odds-and-ends.pptx 525.3 kB
- Penetration Testing/Coding and Cryptography.pdf 517.7 kB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/7 a. Stream ciphers are semantically secure.pptx 493.0 kB
- Cryptography Courses/5 a. Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pptx 489.9 kB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.3-numth-annotated.pptx 475.2 kB
- Information Packets/Portable Document Format.pdf 472.9 kB
- Cryptography Courses/4 b. Odds and ends (week 4)/08.4-odds-and-ends.pptx 460.7 kB
- Cryptography Courses/5 a. The AES block cipher.pptx 445.5 kB
- Cryptography Courses/2 a. Block Ciphers (week 2)/5 a. The AES block cipher.pptx 445.5 kB
- Penetration Testing/Password Cracking Techniques.pdf 443.3 kB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/1 a. Review PRPs and PRFs.pptx 425.3 kB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/2 a. Modes of operation one time key.pptx 408.9 kB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/6 a. CBC padding attacks.pptx 390.1 kB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/4 a. Modes of operation many time key (CBC).pptx 375.0 kB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pptx 359.8 kB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/5 a. Case study TLS.pptx 359.5 kB
- Cryptography Courses/3 b. Collision Resistance (week 3)/6. Timing attacks on MAC verification.pptx 333.5 kB
- Cryptography Courses/3 a. Message Integrity (week 3)/3. CBC-MAC and NMAC.pptx 333.3 kB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/3 a. Security for many-time key.pptx 325.7 kB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pptx 316.3 kB
- Cryptography Courses/1 a. Course Overview/1 a. Course Overview.pptx 300.2 kB
- Cryptography Courses/3 a. Message Integrity (week 3)/2. MACs Based On PRFs.pptx 290.4 kB
- Information Packets/IPv6.pdf 288.9 kB
- Cryptography Courses/3 a. Message Integrity (week 3)/1. Message Authentication Codes.pptx 286.7 kB
- Cryptography Courses/2 a. Block Ciphers (week 2)/6 a. Block ciphers from PRGs.pptx 282.4 kB
- Penetration Testing/Cracking Passwords Guide.pdf 278.4 kB
- Cryptography Courses/1 b. Stream Ciphers (week 1)/6 a. Semantic Security.pptx 275.4 kB
- Information Packets/Transport Layer Security.pdf 272.6 kB
- Cryptography Courses/4 b. Odds and ends (week 4)/08.2-odds-and-ends.pptx 270.4 kB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/3 a. Chosen ciphertext attacks.pptx 268.2 kB
- Cryptography Courses/3 a. Message Integrity (week 3)/4. MAC padding.pptx 255.3 kB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/4 a. Constructions from ciphers and MACs.pptx 252.2 kB
- Cryptography Courses/3 b. Collision Resistance (week 3)/5. HMAC.pptx 249.2 kB
- Cryptography Courses/3 a. Message Integrity (week 3)/5. PMAC and the Carter-Wegman MAC.pptx 246.5 kB
- Cryptography Courses/3 b. Collision Resistance (week 3)/4. Constructing compression functions.pptx 245.9 kB
- Cryptography Courses/4 b. Odds and ends (week 4)/08.5-odds-and-ends.pptx 245.0 kB
- Information Packets/User Datagram Protocol.pdf 243.8 kB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/7 a. Attacking non-atomic decryption.pptx 243.0 kB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.5-numth-annotated.pptx 240.1 kB
- Cryptography Courses/2 a. Block Ciphers (week 2)/1 a. What are block ciphers.pptx 229.7 kB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.4-numth-annotated.pptx 229.5 kB
- Cryptography Courses/2 b. Using Block Ciphers (week 2)/5 a. Modes of operation many time key (CTR).pptx 229.2 kB
- Cryptography Courses/4 a. Authenticated Encryption (week 4)/2 a. Definitions.pptx 227.6 kB
- Cryptography Courses/5 a. Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pptx 215.3 kB
- Information Packets/Cryptographic hash function.pdf 213.6 kB
- Cryptography Courses/1 a. Course Overview/5 a. Discrete probability (crash course, cont.).pptx 212.5 kB
- Cryptography Courses/4 b. Odds and ends (week 4)/08.1-odds-and-ends.pptx 210.8 kB
- Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.2-numth-annotated.pptx 210.7 kB
- Cryptography Courses/Encryption/Encrypting Files and Folders With EFS (Windows) 8.docx 210.6 kB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pptx 209.4 kB
- Cryptography Courses/3 b. Collision Resistance (week 3)/1. Introduction.pptx 209.3 kB
- Batch File Programming/Batch file Wikipedia Info.pdf 205.1 kB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pptx 204.3 kB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pptx 198.8 kB
- Cryptography Courses/12.2-pubkey-dh.pptx 198.8 kB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pptx 195.7 kB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pptx 191.4 kB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pptx 190.7 kB
- Cryptography Courses/1 a. Course Overview/4 a. Discrete probability (Crash course).pptx 189.8 kB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pptx 189.6 kB
- Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pptx 186.1 kB
- Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pptx 184.6 kB
- Information Packets/Transport layer.pdf 167.6 kB
- Information Packets/Internet Group Management Protocol.pdf 167.5 kB
- Information Packets/Network Time Protocol.pdf 149.7 kB
- Information Packets/ICMPv6.pdf 142.3 kB
- Information Packets/IPsec.pdf 141.1 kB
- Information Packets/Mobile IP.pdf 130.8 kB
- Information Packets/Shell script.pdf 123.6 kB
- Information Packets/Tunneling protocol.pdf 90.6 kB
- Information Packets/IPv6 packet.pdf 84.2 kB
- Information Packets/Neighbor Discovery Protocol.pdf 83.7 kB
- Information Packets/Client–server model.pdf 79.0 kB
- Penetration Testing/List of MS-DOS commands.pdf 64.2 kB
- Information Packets/Obfuscated TCP.pdf 62.5 kB
- Batch File Programming/Batch File Informal Programming.pdf 59.9 kB
- Information Packets/tcpcrypt.pdf 59.6 kB
- Information Packets/Tcpcrypt - Encrypting the internet.pdf 53.0 kB
- Information Packets/Domain Name System.pdf 42.5 kB
- Telnet/Linux Unix Command - Telnet.pdf 36.3 kB
- Penetration Testing/Backdoor (Computing).pdf 18.5 kB
- Telnet/Telnet.pdf 17.1 kB
- Penetration Testing/How to Use The Command Line.pdf 16.8 kB
- Information Packets/NETSH (Network Shell).pdf 16.7 kB
- Cryptography Courses/Encryption/File and Disk Encryption.docx 16.3 kB
- Penetration Testing/REN.pdf 15.8 kB
- Information Packets/IF.pdf 15.1 kB
- Information Packets/Secure Deletion.pdf 14.2 kB
- Cryptography Courses/Encryption/Learn to Encrypt Your Internet Communications.docx 13.6 kB
- Information Packets/CALL.pdf 13.5 kB
- Cryptography Courses/Encryption/Encrypt Your Data.docx 12.3 kB
- Information Packets/ISO image.pdf 12.2 kB
- Information Packets/Begin Mod Commands.pdf 11.1 kB
- Information Packets/DEL.pdf 9.7 kB
- Information Packets/CIPHER.pdf 9.5 kB
- Information Packets/FIND.pdf 8.4 kB
- Information Packets/MOVE.pdf 7.6 kB
- Information Packets/NSLOOKUP (TCP IP).pdf 7.3 kB
- Penetration Testing/NET ACCOUNTS, USER, GROUP, LOCALGROUP.pdf 7.2 kB
- Cryptography Courses/Encryption/Encryption Basics.pdf 6.9 kB
- Information Packets/Choosing a Password.pdf 6.7 kB
- Information Packets/GOTO.pdf 6.7 kB
- Information Packets/Back Orifice.pdf 6.3 kB
- Information Packets/Avoid SMS Text Messages If You Can.pdf 4.9 kB
- Batch File Programming/Batch File Scripts/Shutdown PC.bat 57 Bytes
- Batch File Programming/Batch File Scripts/Clean PC Disk Space.bat 55 Bytes
- Batch File Programming/Batch File Scripts/Restart PC.bat 54 Bytes
==查看完整文档列表==