"cryptography" tag
bitcoin-visual

An Introduction to Bitcoin: The Open Source Cryptographic Currency

Bitcoin is the new ‘virtual currency’ that has aroused the interest of millions of people, financial and banking institutions, and government agencies. As it is relatively new, much is not known about it….

Bitwise Tips and Tricks

Power Programming: Bitwise Tips and Tricks

If you are a seasoned programmer, these tips and tricks will seem very familiar, and are probably already part of your repertoire. If you are a novice programmer or a student, they should…

Web Exploitation

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such wide usage helps crackers gain more knowledge on vulnerabilities…

Marching packets

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service attack, which we discussed in detail. This month, we…

Securing Database Servers

Securing Database Servers

With the ever-expanding data requirements for Web applications, database administrators often configure security parameters at the OS and database layer. Unfortunately, administrators seldom consider implementing security at a network layer to protect the…

Wi-Fi penetration testing

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage and awareness, hackers (or, rather, crackers) are exploiting the…

Cryptography and Steganography with Python

Cryptography and Steganography with Python

Steganography and cryptography have been widely used to hide sensitive information. This article offers a brief introduction to how both these methods can be used together. The implementation uses Python with the Stepic…

A Voyage to the Kernel, Day 9

[Segment 2.3] On the 9th day of our “voyage to the kernel”, we learn about cryptography.

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.