Yechezkel_Kohen
Member's groups
-
If you have a hacking tutorial please post it here
-
wireless networks, wep/wpa encryption, sniffers, backtrack, setup, connection problems, aircrack and other wireless related discussions
-
Linux / Open Source
-
Intel or AMD? nVidia or ATI? android or Iphone ? All things computing hardware
-
For great discussions on various subjects and to have some fun relaxed topics
-
Feel free to ask all questions you got in this place…We love to answer
-
Discussion about particular books and papers
-
For all your hacking of electronics like radios, circuitry, alarms, radar detectors, cameras, remote controls or robots you can participate in this forum. Great area for DIY projects. Topics include Raspberry Pi and Arduino.
-
Got something to share about your favorite games? Strategies? Game codes? Discuss gaming topics here!
-
tools and programs please post your favorites
-
Gain help on compiling, objects, classes, and functions Tutorials and coding .
-
Comments & Suggestions
Latest Activity
-
Mark Stamp wrote a new post, Chapter 7, part 6, Information Security: Principles and Practice 12 years, 10 months ago
Information Security: Principles and Practice, 2nd edition, by Mark Stamp
Chapter 7: Authentication
Sections 7.4.1-7.4.2
biometrics, fingerprints, hand geometry
Class Lecture, 20112011-07-17 14:47:43
source -
Mark Stamp wrote a new post, Chapter 7, part 5, Information Security: Principles and Practice 12 years, 10 months ago
Information Security: Principles and Practice, 2nd edition, by Mark Stamp
Chapter 7: Authentication
Sections 7.4
biometrics
Class Lecture, 20112011-07-17 14:45:32
source -
Mark Stamp wrote a new post, Chapter 7, part 4, Information Security: Principles and Practice 12 years, 10 months ago
Information Security: Principles and Practice, 2nd edition, by Mark Stamp
Chapter 7: Authentication
Sections 7.3.6
other password issues
Class Lecture, 20112011-07-17 14:42:01
source -
Mark Stamp wrote a new post, Chapter 7, part 3, Information Security: Principles and Practice 12 years, 10 months ago
Information Security: Principles and Practice, 2nd edition, by Mark Stamp
Chapter 7: Authentication
Sections 7.3.4-7.3.5
password cracking
Class Lecture, 20112011-07-17 14:41:00
source
Gloss