Disk encryption

TrueCrypt version history

TrueCrypt is based on Encryption for the Masses (E4M), an open source on-the-fly encryption program first released in 1997. However, E4M was discontinued in 2000 as the author, Paul Le Roux, began working on commercial encryption software. (Wikipedia).

Video thumbnail

History of computers - A Timeline

A timeline from the first computer, The Turing Machine, to the 1970's. Hope you guys enjoy,and make sure to subscribe and like! Adding subtitles for our video is welcomed! Your translation can help people around the world see our awesome videos! http://www.youtube.com/timedtext_cs_panel?c

From playlist Computers

Video thumbnail

Google Docs: Version History

We'll show you how to recover old versions of your docs, see which collaborator made each change, and more! The version history feature makes all of these things possible. As you (or your collaborators) work on the document, Google Docs saves every change, and it allows you to view those c

From playlist Google Docs

Video thumbnail

Tech Developments of World War I | History

During World War I the governments of all the warring powers put enormous effort into scientific and technical development for military ends. #TheWorldWars Subscribe for more History: http://histv.co/SubscribeHistoryYT Check out exclusive HISTORY videos and full episodes: http://www.histo

From playlist War & Battle | History

Video thumbnail

Drawn History: The 1930s | History

Learn more about the 1930s, a particularly tumultuous decade in world history that got its start with a bang - or, more accurately, a crash. Subscribe for more HISTORY: http://histv.co/SubscribeHistoryYT Newsletter: https://www.history.com/newsletter Website - http://www.history.com /pos

From playlist Drawn History: Illustrations & Animations of Historical Events | History

Video thumbnail

25c3: Full-Disk-Encryption Crash-Course

Speaker: Juergen Pabel Everything to hide This is not a hacking presentation, no vulnerabilities are presented. It's a crash-course in full-disk-encryption ("FDE") concepts, products and implementation aspects. An overview of both commercial and open-source offerings for Windows, Linux,

From playlist 25C3: Nothing to hide

Video thumbnail

August 1920 - Our World 100 Years Ago I THE GREAT WAR

This is the first version of our new monthly video where we give you a brief overview about what was going on in the world exactly 100 years ago. » SUPPORT THE CHANNEL Patreon: https://www.patreon.com/thegreatwar Become a member: https://www.youtube.com/channel/UCUcyEsEjhPEDf69RRVhRh4A/

From playlist Our World 100 Years Ago

Video thumbnail

Before Pixar, There Was Bell Labs | Flashback | History

Some of the 20th century's most important inventions—computers, transistors, satellites—were pioneered at Bell Labs. But these scientists also delved into the creative, and their research in computer-generated films and music would set the foundation for an entire future of media. #History

From playlist Flashback | History

Video thumbnail

History's Most Controversial Photos | History

Look back at some of the photographs and photography installations that left their mark on history. Newsletter: https://www.history.com/newsletter Website - http://www.history.com /posts Facebook - https://www.facebook.com/History Twitter - https://twitter.com/history HISTORY Topical Vid

From playlist Examine the Past | History

Video thumbnail

26C3: Lightning Talks - Day 1 9/12

Clip 9/12 Speakers: Oliver Pritzkow, Sven Guckes 4 minutes of fame 4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. For more information go to: http://events.ccc.de/congress/2009/Fahrplan/events/3563.en.html

From playlist 26C3: Here be dragons day 1

Video thumbnail

DEFCON 18: Katana: Portable Multi-Boot Security Suite 3/3

Speaker: JP Dunnin Tired of keeping up with dozens of CDs and flash drives loaded with various Live operating systems and applications? I will be introducing the Katana: Portable Multi-Boot Security Suite; which brings many of the best live operating systems and portable applications to

From playlist DEFCON 18-2

Video thumbnail

30C3: Keynote (EN)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speaker: Glenn Greenwald

From playlist 30C3

Video thumbnail

DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption

Speaker: MARCIA HOFMANN SENIOR STAFF ATTORNEY, ELECTRONIC FRONTIER FOUNDATION Can the government force you to turn over your encryption passphrase or decrypt your data? The law surrounding police attempts to force decryption is developing at breakneck speed, with two major court decisions

From playlist DEFCON 20

Video thumbnail

The Greatest Story Ever Told Part II

Part 1 || http://www.youtube.com/watch?v=A2wG0sXbMhw If you think this video will help educate people, PLEASE suggest it to YouTube here! http://goo.gl/GNZFSe In this episode we take a look at where our modern technology came from. Facebook || www.facebook.com/coldfustion Google + || htt

From playlist Technology History

Video thumbnail

25c3: The Privacy Workshop Project

Speakers: Christoph Brüning, Kai Schubert Enhancing the value of privacy in todays students view The lecture intends to give an overview of the Privacy Workshop project started in Siegen (NRW, Germany) and to animate listeners to participate in the project. Update 2008-12-30: we finally

From playlist 25C3: Nothing to hide

Video thumbnail

History NOW Official Channel Trailer | New Videos Every Week | History NOW

Watch the official channel trailer for History NOW and Subscribe for all the latest episodes featuring new content every week. #HistoryNOW Subscribe to History NOW for more: https://www.youtube.com/c/GetHistoryNow?sub_confirmation=1 Watch more from the History Makers: https://www.y

From playlist Watch History NOW | HISTORY

Video thumbnail

Shmoocon 2010: Becoming Jack Flack: Real Life Cloak & Dagger 5/6

Clip 5/6 Speakers: Taylor Banks and Adam Bregenzer Are you on too many social networking sites? Have all of your exes found you on facebook? If the fuzz came looking, how easy it would be for them to find you? kaos.theory, the creators of Anonym.OS, bring you this abridged guide to bec

From playlist ShmooCon 2010

Video thumbnail

DEFCON 18: A New Approach to Forensic Methodology Case Studies 3/4

Speakers: David C. Smith, Samuel Petreski Imagine the following experiment, a unique case is given to three digital forensic analysts and each is given the opportunity to engage the requester in order to develop the information needed to process the case. Based on the information gather

From playlist DEFCON 18-3

Video thumbnail

Bet You Didn't Know: Chinese New Year | History

Can you guess which 2 creatures of the zodiac are the most important symbols of Chinese New Year? Get the full history of the holiday. #HistoryChannel Subscribe for more History: http://histv.co/SubscribeHistoryYT Check out exclusive HISTORY videos and full episodes: http://www.history.co

From playlist Web Originals | History

Related pages

Triple DES | E4M | TrueCrypt | International Data Encryption Algorithm | CAST-128 | VeraCrypt | Deniable encryption | Blowfish (cipher)