Zfone VOIP Encryption Phone Plug In
Research Links
Of course it does not work with Skype because that almost certainly is used by the snoops in the government.
Research Links
Of course it does not work with Skype because that almost certainly is used by the snoops in the government.
The MD5 hash of drowssap is: B497DD1A701A33026F7211533620780D
Going the other direct with a hash is much more difficult. It is a brute force approach to find this by trial and error.
When you take the above hash and plug it into this website you get back the correct answer.
I need to know more about double entry book keeping and beyond. This is where I will put my notes.
Research Links
For a WordPress installation you could just secure the admin areas and thus avoid the yearly fee.
Research LInks
How does Digipass work?
The secure key has a unique serial number allocated to it which is only known by the bank. The key has a clock in it which is synchronized with the clock on the bank's computers before it is sent out. You set the PIN on the secure key which is only known by you.
I guess the internal clock must only be accurate to human scale time intervals.
Research Links
This is a video series by Steve Gordon and is well done. I wanted to understand the cryptology underlying Bitcoin and found this series after fishing around on YouTube. For my purposes I started off with the 11th lecture in the series that details the number theory required to understand encryption. I have embedded the 11th lecture in the series below and it starts with lecture 11 but it is only one in the CS322 lecture series and the series is probably better viewed by going direct to YouTube. Fore an easy and quick summary and numeric example see: RSA Code Made Easy
Research Links: Steve Gordon
I want a system dedicated to only financial or encrypted transmissions. These are my notes on the topic.
Research Links
The task bar at the bottom is what I have condition to and find it much more usable than other Linux versions.