OpenPGP

GNU Privacy Guard

GNU Privacy Guard (GnuPG or GPG) is a free-software replacement for Symantec's PGP cryptographic software suite. The software is compliant with RFC 4880, the IETF standards-track specification of OpenPGP. Modern versions of PGP are interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is part of the GNU Project and received major funding from the German government in 1999. (Wikipedia).

GNU Privacy Guard
Video thumbnail

Privacy Matters

http://privacymatters.nl/

From playlist awareness

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Best Linux Distributions For Penetration Testing

Hey Guys! HackerSploit here back again with another video, in this video, i am going to be showing you the best Linux Distros For Ethical hacking. A security-focused operating system is a hacker’s best companion as it helps them to discover the weaknesses in computer systems or computer ne

From playlist Linux

Video thumbnail

How to protect your computer from malware and hackers 2017 | Malware protection tutorial

Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- How to protect your computer from malware and hackers in 2017? Protection against malware and viruses is often

From playlist TUTORIALS & HOW TO's

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Video thumbnail

The Complete PGP Encryption Tutorial | Gpg4win & GnuPG

Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to use PGP on Windows and Linux with Gpg4win and GnuPG. Links Used In Video: gpg4win: https://www.gpg4win.org HACKERSPLOIT WEBSITE: https://hsploit.com/ ⭐SUPPORT HACKERSPLOIT BY USING THE

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

What do we mean by device security? Why should we care about this?

Keep your smart devices safe! Learn what device security is, and how it protects your phones, tablets, and computers from being accessed and exploited by cybercriminals.

From playlist Internet Safety

Video thumbnail

GRCon21 - Keynote: Future Interference Management, Future Spectrum Monitoring

Presented by John Chapin at GNU Radio Conference 2021

From playlist GRCon 2021

Video thumbnail

Shell Scripting - File Encrypter/Decrypter

Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr

From playlist Shell Scripting

Video thumbnail

29C3: The Tor software ecosystem (EN)

Speakers: Roger Dingledine | Jacob Appelbaum At the very beginning, Tor was just a socks proxy that protected the origin and/or destination of your TCP flows. Now the broader Tor ecosystem includes a diverse set of projects -- browser extensions to patch Firefox and Thunderbird's privacy

From playlist 29C3: Not my department

Video thumbnail

Black Hat USA 2010: Attacking Phone Privacy 1/5

Speaker: Karsten Nohl Our most popular phone technologies use decade-old proprietary cryptography. GSM's 64bit A5/1 cipher, for instance, is vulnerable to time memory trade-offs but commercial cracking hardware costs hundreds of thousands of dollars. We discuss how cryptographic improveme

From playlist BH USA 2010 - PRIVACY

Video thumbnail

How to use Facebook anonymously | Stop Facebook tracking | Protect yourself from hackers and doxxing

Do you know how to use Facebook anonymously? Facebook tracks you all over the web and to regain your online privacy, you need stop Facebook tracking mechanisms. In this video, you'll learn how to stop Facebook tracking. How much Facebook knows about you? Everything: https://youtu.be/9sFl

From playlist TUTORIALS & HOW TO's

Video thumbnail

Privacy: The Next Frontier - Ari Gesher

From OSCON 2015 in Amsterdam: Open Source technologies – from GNU, to Linux, Apache, Hadoop, and Spark – have played a role in democratizing access to capabilities and transforming how the world views and solves whole classes of problems. In our increasingly networked and recorded world,

From playlist OSCON - Amsterdam 2015

Video thumbnail

Facebook: Adjusting Your Privacy Settings

In this video, you’ll learn more about adjusting your privacy settings in Facebook. Visit https://www.gcflearnfree.org/facebook101/adjusting-your-privacy-settings/1/ for our text-based lesson. This video includes information on: • Using Facebook's privacy settings • Blocking unwanted comm

From playlist Facebook

Video thumbnail

How to stop Twitter from tracking you for censorship | Security by compartmentalization tutorial

Twitter announced that it will track its users browsing history and spy on their activity outside of Twitter, so that they can better censor opinions and people they disagree with. This is Twitter's official censorship and surveillance campaign. I present you with an easy solution that wil

From playlist TUTORIALS & HOW TO's

Video thumbnail

F-Droid - All Of Android Free (and Open Source) Software in One Place

F-Droid is a repository of Free and Open Source apps for Android. It's your first step on the journey to improve your smartphone privacy and security. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1w

From playlist TUTORIALS & HOW TO's

Video thumbnail

Solubility

070 - Solubility In this video Paul Andersen explains how the dissolution of a solute in a solution can be explained as a reversible reaction. Bonds in the solid solute are broken and the ions are dissolved in a solution. The Ksp (or solubility product constant) can be used to explain t

From playlist AP Chemistry Video Essentials

Video thumbnail

Shmoocon 2010: GSM: SRSLY? 1/6

Clip 1/6 Speakers: Chris Paget and Karsten Nohl The worlds most popular radio system has over 3 billion handsets in 212 countries and not even strong encryption. Perhaps due to cold-war era laws, GSM's security hasn't received the scrutiny it deserves given its popularity. This bothere

From playlist ShmooCon 2010

Video thumbnail

Cloud Security Tutorial - Cloud Encryption Services

Learn best practices for keeping your data in the cloud safe and secure. Explore more Cloud Security courses and advance your skills on LinkedIn Learning: https://www.linkedin.com/learning/topics/cloud-security?u=0?trk=sme-youtube_M136048R124-15-06_learning&src=yt-other This is an excerpt

From playlist IT Security

Related pages

Key management | False positives and false negatives | Elliptic-curve Diffie–Hellman | Gen Digital | Seahorse (software) | Twofish | Web of trust | ElGamal encryption | International Data Encryption Algorithm | Libgcrypt | MD5 | Hybrid cryptosystem | ROCA vulnerability | Session key | Elliptic Curve Digital Signature Algorithm | Curve25519 | Key server (cryptographic) | Blowfish (cipher) | Triple DES | Cryptographic hash function | Digital Signature Algorithm | Pretty Good Privacy | Cryptography | RSA (cryptosystem) | SHA-1 | Gpg4win | SHA-2 | Camellia (cipher) | CAST-128 | Side-channel attack | EdDSA | Key signing party | Symmetric-key algorithm | Enigmail | OpenPGP card | Exponentiation by squaring | Curve448 | Digital signature | Acoustic cryptanalysis | GPG Mail | RIPEMD | Public-key cryptography | Advanced Encryption Standard