Hiển thị các bài đăng có nhãn Cryptography. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn Cryptography. Hiển thị tất cả bài đăng
Different Types of Hash Codes-How to Find Which Hash types?

Different Types of Hash Codes-How to Find Which Hash types?

You have hashes but don't know which type it is.  Don't worry, here i listed different types of Hash codes.

DES(Unix)
Example: IvS7aeT4NzQPM
Used in Linux and other similar OS.
Length: 13 characters.
Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"), then there follows the actual hash.
Notes: [1] [2]

Domain Cached Credentials
What is Brute Force Cracking Attack?|Cracking HASH passwords

What is Brute Force Cracking Attack?|Cracking HASH passwords


Hi friends, If you don't know about cracking encrypted or ciphered data using Brute Force attack,this article will help you to gain much knowledge about the Brute Force attack.  

What is Brute Force attack?
     Brute force attack is one of the password cracking method. In this method we are not decrypting the passwords.  Instead  we are trying to crack the password by comparing different
Introduction to Cracking MD5 Encryption- Breaking the Hash Functions

Introduction to Cracking MD5 Encryption- Breaking the Hash Functions





You may often heard this word "MD5 Hash".  If you don't know what it is, this post may help you.  If you know about MD5 Algorithm, you can skip to Cracking MD5 Encryption Section. In this article i will explain clearly what MD5 Hash

Introduction to MD5 Algorithm:
you can refer this link Introduction To Cryptography ,if you don't know about  encryption.

MD5 is widely used Hash Algorithms by
Cracking MD5 Hash algorithm-List of web sites 2

Cracking MD5 Hash algorithm-List of web sites 2



I have listed some website  in previous posts.  some of other sites listed here. List of Websites to crack the MD5 Hash Algorithm



 www.tmto.org
 md5.noisette.ch
md5decryption.com
www.c0llision.net
www.netmd5crack.com
www.md5decrypter.com
md5hashcracker.appspot.com
www.hashhack.com
isc.sans.edu
www.md5crack.com
passcracking.com
authsecu.com
md5.rednoize.com
md5.web-max.ca
www.cmd5.
How to use the Axcrypt for encryption?

How to use the Axcrypt for encryption?

In my last i gave you details about Axcrypt.  In this post i am going to guide you how to encrypt the file using Axcrypt software.

Download the Axcrypt from here:
 http://space.dl.sourceforge.net/project/axcrypt/AxCrypt/1.6.4.4/AxCrypt-Setup.exe

If the above link is not working then try this:
 http://downloads.sourceforge.net/axcrypt/AxCrypt-Setup.exe?Download


Install the Axcrypt.

After
Hide Confidential data  inside image files

Hide Confidential data inside image files

We know that internet is insecure medium .  I have explained about this in introduction about cryptography.  If you don't know about cryptography,then read the Introduction to Cryptography.
As i told intruders can steal your information.  If you like to send confidential data,we should use Cryptography. 

There is one drawback about cryptography i.e.,intruders know that you are sending encrypted
A List of  Message Digest(MD5) Cracking websites

A List of Message Digest(MD5) Cracking websites

http://www.md5lookup.com/
http://md5.rednoize.com
http://nz.md5.crysm.net
http://us.md5.crysm.net
http://md5crack.com/crackmd5.php

http://www.xmd5.org
http://gdataonline.com
http://www.hashchecker.com
http://passcracking.ru
http://www.milw0rm.com/md5
http://plain-text.info
http://www.securitystats.com/tools/hashcrack.php
http://www.schwett.com/md5/
http://passcrack.spb.ru/ ->sha1
http://shm.pl/