Disk encryption

VeraCrypt

VeraCrypt is a free and open-source utility for on-the-fly encryption (OTFE). The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can also encrypt a partition or (in Windows) the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially released on 22 June 2013. Many security improvements have been implemented and concerns within the TrueCrypt code audits have been addressed. VeraCrypt includes optimizations to the original cryptographic hash functions and ciphers, which boost performance on modern CPUs. (Wikipedia).

VeraCrypt
Video thumbnail

Making the Most of Bootstrap

Bootstrap is a set of templates and tools that fast-track front-end web development. Basically, it makes your site look pretty and professional! We'll go over tips and tricks and make sure you're taking full advantage of the opportunities Bootstrap can provide.

From playlist CS50 Seminars 2016

Video thumbnail

The Complete VeraCrypt Encryption Tutorial

Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to use VeraCrypt to create encrypted volumes and how to encrypt drives. Links Used In Video: https://veracrypt.ft/en/ Our Platforms: Hsploit: https://hsploit.com/ HackerSploit Forum: https

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

You Should Make A Digital Bugout Bag

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone International Red Cross recommends that all persons have an emergency survival kit with multiday supplies of the most essential items. This is in case of any natural or man-made cri

From playlist TUTORIALS & HOW TO's

Video thumbnail

Photoshop

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Photoshop

Video thumbnail

How to protect your online privacy in 2020 | Tutorial

This the Hated One's latest privacy tutorial in 2020. Learn the mindset on how to protect your privacy online with an easy to follow guide. Please support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJ

From playlist TUTORIALS & HOW TO's

Video thumbnail

Best Linux Distributions For Penetration Testing

Hey Guys! HackerSploit here back again with another video, in this video, i am going to be showing you the best Linux Distros For Ethical hacking. A security-focused operating system is a hacker’s best companion as it helps them to discover the weaknesses in computer systems or computer ne

From playlist Linux

Video thumbnail

How to protect your computer from malware and hackers 2017 | Malware protection tutorial

Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- How to protect your computer from malware and hackers in 2017? Protection against malware and viruses is often

From playlist TUTORIALS & HOW TO's

Video thumbnail

Standout as a Data Analyst with THIS TOOL

How I learned GIT 👉🏼 https://lukeb.co/GitDataCamp In this video, we cover one of my favorite tools to use as a data analyst: Git (with GitHub). Git is a version control system that allows you to track your changes when working on your project. GitHub is an online platform that allows y

From playlist How I use... as a Data Analyst

Video thumbnail

How to protect your online privacy in 2019 | Tutorial

You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content. To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is t

From playlist TUTORIALS & HOW TO's

Video thumbnail

Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization | The Hated One w/ Closed Ntwrk

Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails. Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps: 00:00:00 The Hated One remembers to be a human 00

From playlist The state of surveillance

Video thumbnail

Photoshop Artists

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Photoshop

Video thumbnail

IMT2681 Cloud presentations

Cloud Technologies presentations

From playlist Archive - Cloud Computing

Video thumbnail

Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Training | Edureka

Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training This ‘Parrot Security OS’ video by Edureka will help you learn all about one of the topmost Linux distribution for ethical hacking – Parrot Security OS. Below is the list of topics covered in this session: 1

From playlist Cyber Security Training for Beginners | Edureka

Video thumbnail

#MegaFavNumbers : RSA's Unsolvable Modulus

RSA was the first Public Key Cryptosystem available to the public. Despite massive improvements, both to the security of RSA and the Public key crypto itself, RSA is still -the- benchmark people tend to learn about first. Now find out why RSA-2048 is one of my #MegaFavNumbers. #MegaFavNum

From playlist MegaFavNumbers

Video thumbnail

JupyterLab Opening Files

Meeting of the Jupyter/IPython development team.

From playlist JupyterLab Documentation

Video thumbnail

How to use an oscilloscope / What is an oscilloscope / Oscilloscope tutorial

Visit my website for more Tips, Videos, DIY projects and more: http://www.mjlorton.com/ --------------------- Click "Show more" ------------------------------- Tutorial on the basics of what an oscilloscope is, how it works and how to use it. The oscilloscope is an electronic "time machine

From playlist How to use an Oscilloscope

Video thumbnail

Privacy, Surveillance & Decentralization Podcast | The Hated One w/ Closed Ntwrk

My podcast discussion with Closed Ntwrk on privacy, surveillance, decentralization and how we win back the Internet. Help produce independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Closed Ntwrk: https://www.closedntwrk.com/episode-12-collab-w

From playlist The state of surveillance

Video thumbnail

全髋关节置换术

(English Version: https://www.youtube.com/watch?v=DosqbEy8ecY) http://www.nucleusinc.com/ - 这个三维动画介绍了右髋关节的全髋关节置换术。该手术包括切开、露出髋关节、放置髋臼修复假体(窝)、割掉发炎的股沟头、放置股骨头假体(球)。

From playlist 在中国医学动画

Video thumbnail

First Draft of History: How a Free Press Protects Freedom

Journalism is an essential part of providing information in free societies, but journalists and their ability to serve the public is under constant threat of being silenced, even violence. How do journalists do their jobs in the face of danger and what happens when they can’t fill that rol

From playlist Journalism Under Siege: Truth and Trust in a Time of Turmoil, Fall 2018

Video thumbnail

Citrix : Web Interface website for the Citrix Access Gateway

More videos like this online at http://www.theurbanpenguin.com Here we take a look at creating a Citrix Web Interface web site to support the Citrix Access Gateway. In doing so we will also look at the importance of backing up the webinterface.conf and using that as a template fro new site

From playlist Citrix

Related pages

GOST (block cipher) | TrueCrypt | Disk encryption software | Twofish | Block cipher mode of operation | Serpent (cipher) | PBKDF2 | Multiple encryption | Cryptographic hash function | Key (cryptography) | Streebog | SHA-2 | Camellia (cipher) | Cipher | Salt (cryptography) | Cold boot attack | Bit | Deniable encryption | Keystroke logging | Comparison of disk encryption software | RIPEMD | Advanced Encryption Standard