Computer Security Hub

mp4   Hot:189   Size:10.2 GB   Created:2017-09-17 07:31:12   Update:2021-12-11 12:15:27  

Download link

File List

  • Penetration Testing/Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests.mp4 1.28 GB
    Penetration Testing/Using Web Proxy Servers for Hacking.mp4 384.08 MB
    Penetration Testing/Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge.mp4 305.41 MB
    Windows Registry/Windows Registry Tutorial.mp4 272.89 MB
    Cryptography Courses/Extras and Lectures/Introduction to Public-Key Cryptography.mp4 218.31 MB
    Penetration Testing/Introduction to Phishing Email Hacking Attacks.mp4 210.12 MB
    Windows Registry/Hacking the Windows Registry.mp4 186.34 MB
    Penetration Testing/Disposable Email for Hacking and Security.mp4 180.85 MB
    Penetration Testing/Introduction to Hacking.mp4 178.5 MB
    Penetration Testing/Network Mapping.mp4 171.47 MB
    Penetration Testing/Hacking DNS.mp4 161.56 MB
    VBS Scripting/VBScript Basics » Part 6 _ Input Box.mp4 158.36 MB
    Penetration Testing/Introduction to Practical Hacking and Penetration Testing.mp4 150.62 MB
    Penetration Testing/Hacking - How to hack usernames and passwords - For Beginners.wmv.mp4 143.1 MB
    Penetration Testing/Step-byStep SQL Injection Attack.mp4 139.52 MB
    VBS Scripting/VBScript Basics » Part 25 _ Replace Command _ InputBox by Lines.mp4 128.44 MB
    VBS Scripting/VBScript Basics » Part 13 _ Automation_ Internet Explorer _ HTML.mp4 127.76 MB
    Penetration Testing/Hacking - How to hack a WPA_WPA2 Router - For Beginners.mp4 121.54 MB
    Cryptography Courses/Extras and Lectures/Theory and Practice of Cryptography.mp4 119.42 MB
    VBS Scripting/VBScript Basics » Part 2 _ Message Box - Constants.mp4 118.44 MB
    Penetration Testing/Beginner Hacking - Episode 1 - Setting up Backtrack in a Virtual Machine.mp4 116.31 MB
    VBS Scripting/VBScript Basics » Part 5 _ Run Command.mp4 114.62 MB
    VBS Scripting/VBScript Basics » Part 15 _ Copy_Move_Rename Files+Folders.mp4 111.81 MB
    Batch File Programming/Batch Programming Lessons/Batch Programing_ Lesson 3 (Create Text Files and Extract from them).mp4 110.13 MB
    Computer Books/Professional C++ 2nd Edition.pdf 108.48 MB
    Penetration Testing/Security+ Online Training_ Module 1 - Mitigating Threats.mp4 100.15 MB
    Penetration Testing/BT5QA.mp4 98.86 MB
    VBS Scripting/VBScript Basics » Part 1 _ Message Box - Numbers.mp4 98.53 MB
    VBS Scripting/VBScript Basics » Part 12 _ Automation_ Internet Explorer _ SendKeys.mp4 97.65 MB
    VBS Scripting/VBScript Basics » Part 3 _ If Then Statments.mp4 96.97 MB
    VBS Scripting/VBScript Basics » Part 28 _ GetFile & GetFolder_ Attributes.mp4 96.69 MB
    VBS Scripting/VBScript Basics » Part 23 _ Replace Command _ By Words.mp4 95.95 MB
    VBS Scripting/VBScript Basics » Part 22 _ OpenTextFile _ Append Files.mp4 95.5 MB
    Penetration Testing/Cross site scripting attacks (XSS), cookie session ID stealing -Part 1.mp4 91.36 MB
    Penetration Testing/Creating a Phishing Website for Hacking.mp4 90.3 MB
    VBS Scripting/VBScript Basics » Part 7 _ Do Loops.mp4 89.97 MB
    Penetration Testing/Cross site scripting attacks (XSS), cookie session ID stealing -Part 2.mp4 89.55 MB
    VBS Scripting/VBScript Basics » Part 24 _ Replace Command _ By Lines.mp4 87.89 MB
    VBS Scripting/VBScript Basics » Part 10 _ Script Directory.mp4 84.16 MB
    VBS Scripting/VBScript Basics » Part 8 _ SendKeys.mp4 83.33 MB
    Batch File Programming/Batch Programming Lessons/Batch Programming Lesson 1 (Basics).mp4 78.33 MB
    VBS Scripting/VBScript Basics » Part 20 _ OpenTextFile _ Read Files.mp4 77.74 MB
    VBS Scripting/VBScript Basics » Part 16 _ Create Shortcuts.mp4 72.88 MB
    Penetration Testing/Run an exploit and use pivoting with Meterpreter, Metasploit and Backtrack5.mp4 72.68 MB
    Batch File Programming/Batch Programming Lessons/Batch Programing_ Lesson 4 (How to Copy,Move and Rename files + MORE).mp4 72.45 MB
    VBS Scripting/VBScript Basics » Part 27 _ GetFile & GetFolder_ Properties.mp4 72.45 MB
    VBS Scripting/VBScript Basics » Part 18 _ Create_Delete Files+Folders.mp4 72.42 MB
    VBS Scripting/VBScript Basics » Part 17 _ Special Folders.mp4 70.65 MB
    VBS Scripting/VBScript Basics » Part 19 _ OpenTextFile _ Open Files.mp4 69.59 MB
    VBS Scripting/VBScript Basics » Part 11 _ Subroutines.mp4 68.71 MB
    VBS Scripting/VBScript Basics » Part 21 _ OpenTextFile _ Write Files.mp4 68.35 MB
    Penetration Testing/DEFCON 16_ Nmap_ Scanning the Internet.mp4 59.58 MB
    Penetration Testing/Exploit and maintain access with a Meterpreter backdoor using Metasploit.mp4 57.99 MB
    Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 3.mp4 56.85 MB
    VBS Scripting/VBScript Basics » Part 14 _ File_Folder Exists.mp4 49.31 MB
    Windows Registry/What Are Bits, and Are They Important_ (32-Bit vs 64-Bit).mp4 46.67 MB
    VBS Scripting/VBScript Basics » Part 26 _ With Command.mp4 45.51 MB
    Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 2.mp4 44.68 MB
    VBS Scripting/VBScript Basics » Part 9 _ Len, Left, & Right.mp4 43.27 MB
    Computer Books/Windows 8 Hacks.pdf 42.82 MB
    Penetration Testing/Hacking - WPA_WPA2 Wordlists Q&A.mp4 42.45 MB
    Penetration Testing/Encrypt data transfers with Stunnel and OpenSSL - Part 1.mp4 41.91 MB
    Penetration Testing/Hacking to Acquire Passwords from HTML Forms Password Boxes.mp4 40.99 MB
    VBS Scripting/VBScript Basics » Part 4 _ Vertical & Horizontal Spacing.mp4 40.64 MB
    Cryptography Courses/Extras and Lectures/Lesson 14_ One-way and hash functions (intypedia).mp4 39.43 MB
    Windows Registry/The Difference Between 32 Bit and 64 Bit.mp4 38.76 MB
    Penetration Testing/Use Metasploit to run an exploit and launch Meterpreter- part 1.mp4 35.33 MB
    Cryptography Courses/Extras and Lectures/Lesson 3_ Public-key cipher systems (intypedia).mp4 34.45 MB
    Batch File Programming/Batch Programming Lessons/Batch Programming_ Lesson 2 (User Input, Variables).mp4 34.36 MB
    Penetration Testing/Offensive Security - Advanced Windows Exploitation (AWE) v 1.1.zip 33.82 MB
    Penetration Testing/Basics of ipconfig, ping, tracert, nslookup, and netstat.mp4 32.02 MB
    Cryptography Courses/Extras and Lectures/Lesson 1_ History of cryptography and its early stages in Europe (intypedia).mp4 29.27 MB
    Cryptography Courses/Extras and Lectures/Lesson 2_ Symmetric-key cryptography (intypedia).mp4 28.56 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 10 - Enviroment Variables.mp4 27.79 MB
    Penetration Testing/CMD hacking basics.mp4 27.65 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 7 - Variables in Directors.mp4 27.37 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/5 b. PRG Security Definitions (25 minVid).mp4 26.8 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 8 - If Not Command.mp4 26.62 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/3 b. Attacks on stream ciphers and the one time pad (24 min).mp4 25.43 MB
    Computer Books/Packet Guide To Voice Over IP.pdf 25.17 MB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/3 b. Security for many-time key (23 min).mp4 24.92 MB
    Penetration Testing/Hacking - Collecting Network Information - For Beginners.mp4 24.79 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 12 - Upgrade.mp4 24.77 MB
    Cryptography Courses/2 a. Block Ciphers (week 2)/2 b. The Data Encryption Standard (22 min Vid).mp4 24.5 MB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4 23.4 MB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/4 b. Constructions from ciphers and MACs (21 min).mp4 22.84 MB
    Cryptography Courses/3 a. Message Integrity (week 3)/3 b. CBC-MAC and NMAC (20 min).mp4 22.34 MB
    Cryptography Courses/4 b. Odds and ends (week 4)/8 - 3 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 22.06 MB
    Cryptography Courses/2 a. Block Ciphers (week 2)/3 b. Exhaustive search attacks (20 min Vid).mp4 21.9 MB
    vlc-2.0.7-win32.exe 21.87 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/4 b. Real-world stream ciphers (20 min Vid).mp4 21.87 MB
    Cryptography Courses/Extras and Lectures/Diffie Hellman Key Exchange.mp4 21.43 MB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4 21.36 MB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4 21.21 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/2 b. Stream ciphers and pseudo random generators (20 min).mp4 21.17 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 1 - Basic Commands.mp4 20.97 MB
    Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 20.96 MB
    Penetration Testing/Command Line Basics for Ethical Hacking.mp4 20.89 MB
    Cryptography Courses/1 a. Course Overview/3 b. History of cryptography (19 min Vid).mp4 20.47 MB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4 20.06 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 6 - Directors, Del, and Ren.mp4 20.04 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/1 b. Information theoretic security and the one time pad (19 min Vid).mp4 20.04 MB
    Cryptography Courses/1 a. Course Overview/4 b. Discrete probability (Crash course) (18 min Vid).mp4 19.82 MB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4 19.82 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 9 - Custom Pause and Animation.mp4 19.63 MB
    Penetration Testing/Getting started w_BackTrack4 VM installation.mp4 19.4 MB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 3 - Modular eth roots (17 min).mp4 19.09 MB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/5 b. Case study TLS (18 min).mp4 18.96 MB
    Cryptography Courses/2 a. Block Ciphers (week 2)/1 b. What are block ciphers (17 min Vid).mp4 18.67 MB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function (17 min).mp4 18.53 MB
    Penetration Testing/ARP Spoofing - Man-in-the-middle attack.mp4 18.53 MB
    Networking/Windows command line networking (nslookup).mp4 18.52 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 11 - Basic Encryption.mp4 18.09 MB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/4 b. Modes of operation many time key (CBC) (16 min).mp4 17.96 MB
    Penetration Testing/Configure Pure-FTPd in BackTrack.mp4 17.77 MB
    Cryptography Courses/2 a. Block Ciphers (week 2)/4 b. More attacks on block ciphers (16 min Vid).mp4 17.75 MB
    Networking/Windows command line networking (route).mp4 17.4 MB
    Penetration Testing/Hacking - VMware Answering Questions - For Beginners.mp4 17.4 MB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4 17.22 MB
    Cryptography Courses/3 a. Message Integrity (week 3)/5 b. PMAC and the Carter-Wegman MAC (16 min).mp4 17.06 MB
    Cryptography Courses/1 a. Course Overview/2 b.What is cryptography (15 min Vid).mp4 17.01 MB
    Penetration Testing/Penetration Testers Open Source Toolkit.pdf 16.99 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/6 b. Semantic Security (16 min Vid).mp4 16.79 MB
    Cryptography Courses/3 a. Message Integrity (week 3)/1 b. Message Authentication Codes (16 min).mp4 16.55 MB
    Networking/Windows command line networking (netstat).mp4 16.28 MB
    Cryptography Courses/3 b. Collision Resistance (week 3)/2 b. Generic birthday attack (16 min).mp4 16.14 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 4 - User Input.mp4 15.96 MB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4 15.71 MB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4 15.63 MB
    Cryptography Courses/4 b. Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4 15.62 MB
    Cryptography Courses/4 b. Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4 15.58 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 5 - Variables.mp4 15.43 MB
    Networking/Windows command line networking (ipconfig).mp4 15.35 MB
    Penetration Testing/Use Metasploit to run an exploit and launch Meterpreter- part 2.mp4 15.05 MB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/6 b. CBC padding attacks (14 min).mp4 14.99 MB
    Cryptography Courses/1 a. Course Overview/5 b. Discrete probability (crash course, cont.) (14 min Vid).mp4 14.64 MB
    Cryptography Courses/4 b. Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4 14.57 MB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4 14.53 MB
    Cryptography Courses/2 a. Block Ciphers (week 2)/5 b. The AES block cipher (14 min Vid).mp4 14.52 MB
    Penetration Testing/Offensive Security - Wireless Attacks ( WiFu) v2.0.pdf 14.49 MB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/1 b. Active attacks on CPA-secure encryption (13 min).mp4 14.02 MB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4 13.89 MB
    Computer Books/Hackers handbook to web applications.pdf 13.52 MB
    Cryptography Courses/4 b. Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4 13.21 MB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/3 b. Chosen ciphertext attacks (12 min).mp4 13.04 MB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4 12.93 MB
    Cryptography Courses/2 a. Block Ciphers (week 2)/6 b. Block ciphers from PRGs (12 min Vid).mp4 12.87 MB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/1 b. Review PRPs and PRFs (12 min).mp4 12.72 MB
    Cryptography Courses/3 b. Collision Resistance (week 3)/3 b. The Merkle-Damgard Paradigm (12 min).mp4 12.58 MB
    Computer Books/Gray Hat Hacking 2nd Edition.pdf 12.55 MB
    Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4 12.41 MB
    Penetration Testing/AWE-3.pdf 12.36 MB
    Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4 12.21 MB
    Computer Books/The Complete FreeBSD 4th Edition.pdf 11.95 MB
    Cryptography Courses/3 b. Collision Resistance (week 3)/1 b. Introduction (11 min).mp4 11.91 MB
    Penetration Testing/Hacking With Netcat Basics.mp4.mp4 11.84 MB
    Cryptography Courses/5 a. Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4 11.83 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/7 b. Stream ciphers are semantically secure (11 min Vid).mp4 11.74 MB
    Cryptography Courses/1 a. Course Overview/1 b. Course Overview (11 min Vid).mp4 11.72 MB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4 11.29 MB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.27 MB
    Cryptography Courses/3 a. Message Integrity (week 3)/2 b. MACs Based On PRFs (10 min).mp4 11.18 MB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/7 b. Attacking non-atomic decryption (10 min).mp4 11.09 MB
    Networking/Windows command line networking (tracert).mp4 10.71 MB
    Penetration Testing/AWE-2.pdf 10.67 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 13 - Blank Lines and Comments_Remarks.mp4 10.63 MB
    Penetration Testing/AWE-1.pdf 10.59 MB
    Computer Books/Professional C++.pdf 10.58 MB
    Penetration Testing/Hacking and Securing iOS Applications.pdf 10.58 MB
    Penetration Testing/Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf 10.45 MB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/5 b. Modes of operation many time key (CTR) (10 min).mp4 10.43 MB
    Penetration Testing/Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf 9.85 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 2 - Start and Color Commands.mp4 9.66 MB
    Computer Books/How Google Test Software.pdf 9.63 MB
    Cryptography Courses/3 b. Collision Resistance (week 3)/6 b.Timing attacks on MAC verification (9 min).mp4 9.39 MB
    Cryptography Courses/3 a. Message Integrity (week 3)/4 b. MAC padding (9 min).mp4 9.3 MB
    Computer Books/CEH Certified Ethical Hacker Study Guide V413HAV.pdf 9.29 MB
    Networking/Windows command line networking (arp, getmac).mp4 9.01 MB
    Cryptography Courses/3 b. Collision Resistance (week 3)/4 b. Constructing compression functions (8 min).mp4 8.78 MB
    Computer Books/The shellcoders handbook 2nd Edition.pdf 8.74 MB
    Computer Books/The Modern Web.pdf 8.23 MB
    Cryptography Courses/Extras and Lectures/How SSL works tutorial - with HTTPS example.mp4 8.1 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 3 - Goto Command, Markers, and Loops.mp4 8.05 MB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/2 b. Modes of operation one time key (8 min).mp4 7.98 MB
    Cryptography Courses/3 b. Collision Resistance (week 3)/5 b. HMAC (7 min).mp4 7.83 MB
    Computer Books/Absolute FreeBSD 2nd Edition.pdf 7.78 MB
    Penetration Testing/The basics of working with Netcat - Part 2.mp4 7.67 MB
    Penetration Testing/AWE-4.pdf 7.54 MB
    Penetration Testing/XSS Attacks - Exploits and Defense.pdf 7.34 MB
    Cryptography Courses/Extras and Lectures/Security+ Encryption.mp4 6.98 MB
    Penetration Testing/Metasploit The Penetration Testers Guide.pdf 6.9 MB
    Penetration Testing/SQL Injection Attacks and Defense.pdf 6.54 MB
    Computer Books/Hacking VoIP Protocols, Attacks and Countermeasures.pdf 6.45 MB
    Networking/Windows command line networking (ping).mp4 6.11 MB
    Penetration Testing/How to open BackTrack 5 in VMware Player_.mp4 6.05 MB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4 5.73 MB
    Batch File Programming/Batch Programming Lessons/Batch Scripting - 14 - Speaking Batch File.mp4 5.61 MB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/2 b. Definitions (6 min).mp4 5.61 MB
    Penetration Testing/hacking a server with netcat (part 2).mp4 5.32 MB
    Penetration Testing/Footprinting.pdf 4.49 MB
    Penetration Testing/Hacking the art of explotation.pdf 4.35 MB
    Computer Books/GIS For Web Developers.pdf 3.93 MB
    Batch File Programming/Batch File Programming.pdf 3.79 MB
    Computer Books/Linux System Administration.pdf 3.69 MB
    Computer Books/C++ Programming Language.pdf 3.3 MB
    Penetration Testing/hacking a server with netcat (part 1).mp4 3.13 MB
    Penetration Testing/Firewalls and Internet Security 2nd Edition.pdf 3.08 MB
    Computer Books/Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf 2.86 MB
    Computer Books/Applied Cryptography.pdf 2.77 MB
    Computer Books/Practical C++ Programming 1995.pdf 2.72 MB
    Computer Books/ObJ-C Programming Notes.pdf 2.62 MB
    Information Packets/Cryptosystem.pdf 2.29 MB
    Computer Books/An Introduction To Keyloggers, RATS And Malware.pdf 2.19 MB
    Computer Books/The Linux Command Line.pdf 1.96 MB
    Cryptography Courses/1 a. Course Overview/3 a. History of cryptography.pptx 1.57 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/1 a. Information theoretic security and the one time pad.pptx 1.54 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/5 a. PRG Security Definitions.pptx 1.33 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/2 a. Stream ciphers and pseudo random generators.pptx 1.15 MB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/3 a. Attacks on stream ciphers and the one time pad.pptx 1.04 MB
    Cryptography Courses/1 a. Course Overview/2 a. What is cryptography.pptx 1.03 MB
    Computer Books/The C Programming Language.pdf 896.64 KB
    Cryptography Courses/3 b. Collision Resistance (week 3)/3. The Merkle-Damgard Paradigm.pptx 817.76 KB
    Cryptography Courses/2 a. Block Ciphers (week 2)/2 a. The Data Encryption Standard.pptx 809.2 KB
    Cryptography Courses/5 a. Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pptx 735.2 KB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/4 a. Real-world stream ciphers.pptx 732.52 KB
    Information Packets/Rootkit.pdf 627.16 KB
    Cryptography Courses/2 a. Block Ciphers (week 2)/3 a. Exhaustive search attacks.pptx 622.09 KB
    Cryptography Courses/5 a. Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pptx 602.48 KB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/1 a. Active attacks on CPA-secure encryption.pptx 547.85 KB
    Cryptography Courses/2 a. Block Ciphers (week 2)/4 a. More attacks on block ciphers.pptx 524.22 KB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.1-numth-annotated.pptx 521.77 KB
    Cryptography Courses/3 b. Collision Resistance (week 3)/2. Generic birthday attack.pptx 514.73 KB
    Cryptography Courses/4 b. Odds and ends (week 4)/08.3-odds-and-ends.pptx 512.96 KB
    Cryptography Courses/08.3-odds-and-ends.pptx 512.96 KB
    Penetration Testing/Coding and Cryptography.pdf 505.6 KB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/7 a. Stream ciphers are semantically secure.pptx 481.45 KB
    Cryptography Courses/5 a. Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pptx 478.41 KB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.3-numth-annotated.pptx 464.1 KB
    Information Packets/Portable Document Format.pdf 461.82 KB
    Cryptography Courses/4 b. Odds and ends (week 4)/08.4-odds-and-ends.pptx 449.88 KB
    Cryptography Courses/5 a. The AES block cipher.pptx 435.02 KB
    Cryptography Courses/2 a. Block Ciphers (week 2)/5 a. The AES block cipher.pptx 435.02 KB
    Penetration Testing/Password Cracking Techniques.pdf 432.89 KB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/1 a. Review PRPs and PRFs.pptx 415.3 KB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/2 a. Modes of operation one time key.pptx 399.32 KB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/6 a. CBC padding attacks.pptx 380.94 KB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/4 a. Modes of operation many time key (CBC).pptx 366.22 KB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pptx 351.32 KB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/5 a. Case study TLS.pptx 351.07 KB
    Cryptography Courses/3 b. Collision Resistance (week 3)/6. Timing attacks on MAC verification.pptx 325.72 KB
    Cryptography Courses/3 a. Message Integrity (week 3)/3. CBC-MAC and NMAC.pptx 325.45 KB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/3 a. Security for many-time key.pptx 318.07 KB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pptx 308.88 KB
    Cryptography Courses/1 a. Course Overview/1 a. Course Overview.pptx 293.19 KB
    Cryptography Courses/3 a. Message Integrity (week 3)/2. MACs Based On PRFs.pptx 283.57 KB
    Information Packets/IPv6.pdf 282.1 KB
    Cryptography Courses/3 a. Message Integrity (week 3)/1. Message Authentication Codes.pptx 279.99 KB
    Cryptography Courses/2 a. Block Ciphers (week 2)/6 a. Block ciphers from PRGs.pptx 275.78 KB
    Penetration Testing/Cracking Passwords Guide.pdf 271.83 KB
    Cryptography Courses/1 b. Stream Ciphers (week 1)/6 a. Semantic Security.pptx 268.96 KB
    Information Packets/Transport Layer Security.pdf 266.24 KB
    Cryptography Courses/4 b. Odds and ends (week 4)/08.2-odds-and-ends.pptx 264.1 KB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/3 a. Chosen ciphertext attacks.pptx 261.9 KB
    Cryptography Courses/3 a. Message Integrity (week 3)/4. MAC padding.pptx 249.32 KB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/4 a. Constructions from ciphers and MACs.pptx 246.32 KB
    Cryptography Courses/3 b. Collision Resistance (week 3)/5. HMAC.pptx 243.33 KB
    Cryptography Courses/3 a. Message Integrity (week 3)/5. PMAC and the Carter-Wegman MAC.pptx 240.7 KB
    Cryptography Courses/3 b. Collision Resistance (week 3)/4. Constructing compression functions.pptx 240.14 KB
    Cryptography Courses/4 b. Odds and ends (week 4)/08.5-odds-and-ends.pptx 239.28 KB
    Information Packets/User Datagram Protocol.pdf 238.1 KB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/7 a. Attacking non-atomic decryption.pptx 237.26 KB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.5-numth-annotated.pptx 234.48 KB
    Cryptography Courses/2 a. Block Ciphers (week 2)/1 a. What are block ciphers.pptx 224.32 KB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.4-numth-annotated.pptx 224.15 KB
    Cryptography Courses/2 b. Using Block Ciphers (week 2)/5 a. Modes of operation many time key (CTR).pptx 223.83 KB
    Cryptography Courses/4 a. Authenticated Encryption (week 4)/2 a. Definitions.pptx 222.28 KB
    Cryptography Courses/5 a. Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pptx 210.22 KB
    Information Packets/Cryptographic hash function.pdf 208.61 KB
    Cryptography Courses/1 a. Course Overview/5 a. Discrete probability (crash course, cont.).pptx 207.56 KB
    Cryptography Courses/4 b. Odds and ends (week 4)/08.1-odds-and-ends.pptx 205.82 KB
    Cryptography Courses/5 b. Intro. Number Theory (week 5)/10.2-numth-annotated.pptx 205.79 KB
    Cryptography Courses/Encryption/Encrypting Files and Folders With EFS (Windows) 8.docx 205.71 KB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pptx 204.47 KB
    Cryptography Courses/3 b. Collision Resistance (week 3)/1. Introduction.pptx 204.39 KB
    Batch File Programming/Batch file Wikipedia Info.pdf 200.31 KB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pptx 199.52 KB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pptx 194.14 KB
    Cryptography Courses/12.2-pubkey-dh.pptx 194.14 KB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pptx 191.08 KB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pptx 186.9 KB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pptx 186.18 KB
    Cryptography Courses/1 a. Course Overview/4 a. Discrete probability (Crash course).pptx 185.32 KB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pptx 185.2 KB
    Cryptography Courses/6 a. Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pptx 181.7 KB
    Cryptography Courses/6 b. Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pptx 180.23 KB
    Information Packets/Transport layer.pdf 163.64 KB
    Information Packets/Internet Group Management Protocol.pdf 163.53 KB
    Information Packets/Network Time Protocol.pdf 146.21 KB
    Information Packets/ICMPv6.pdf 138.97 KB
    Information Packets/IPsec.pdf 137.82 KB
    Information Packets/Mobile IP.pdf 127.75 KB
    Information Packets/Shell script.pdf 120.69 KB
    Information Packets/Tunneling protocol.pdf 88.44 KB
    Information Packets/IPv6 packet.pdf 82.24 KB
    Information Packets/Neighbor Discovery Protocol.pdf 81.71 KB
    Information Packets/Client–server model.pdf 77.12 KB
    Penetration Testing/List of MS-DOS commands.pdf 62.71 KB
    Information Packets/Obfuscated TCP.pdf 61.05 KB
    Batch File Programming/Batch File Informal Programming.pdf 58.52 KB
    Information Packets/tcpcrypt.pdf 58.2 KB
    Information Packets/Tcpcrypt - Encrypting the internet.pdf 51.81 KB
    Information Packets/Domain Name System.pdf 41.51 KB
    Telnet/Linux Unix Command - Telnet.pdf 35.49 KB
    Penetration Testing/Backdoor (Computing).pdf 18.11 KB
    Telnet/Telnet.pdf 16.68 KB
    Penetration Testing/How to Use The Command Line.pdf 16.42 KB
    Information Packets/NETSH (Network Shell).pdf 16.3 KB
    Cryptography Courses/Encryption/File and Disk Encryption.docx 15.9 KB
    Penetration Testing/REN.pdf 15.38 KB
    Information Packets/IF.pdf 14.77 KB
    Information Packets/Secure Deletion.pdf 13.89 KB
    Cryptography Courses/Encryption/Learn to Encrypt Your Internet Communications.docx 13.24 KB
    Information Packets/CALL.pdf 13.23 KB
    Cryptography Courses/Encryption/Encrypt Your Data.docx 12.04 KB
    Information Packets/ISO image.pdf 11.95 KB
    Information Packets/Begin Mod Commands.pdf 10.87 KB
    Information Packets/DEL.pdf 9.51 KB
    Information Packets/CIPHER.pdf 9.24 KB
    Information Packets/FIND.pdf 8.16 KB
    Information Packets/MOVE.pdf 7.47 KB
    Information Packets/NSLOOKUP (TCP IP).pdf 7.15 KB
    Penetration Testing/NET ACCOUNTS, USER, GROUP, LOCALGROUP.pdf 7.05 KB
    Cryptography Courses/Encryption/Encryption Basics.pdf 6.76 KB
    Information Packets/Choosing a Password.pdf 6.56 KB
    Information Packets/GOTO.pdf 6.5 KB
    Information Packets/Back Orifice.pdf 6.17 KB
    Information Packets/Avoid SMS Text Messages If You Can.pdf 4.74 KB
    Batch File Programming/Batch File Scripts/Shutdown PC.bat 57 B
    Batch File Programming/Batch File Scripts/Clean PC Disk Space.bat 55 B
    Batch File Programming/Batch File Scripts/Restart PC.bat 54 B

Download Info

  • Tips

    “Computer Security Hub” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.