Stop asking for that.
Only for emergencies.
This list is just a reference which hopefully saves some googling. Let's make it clear that we're talking about symmetric encryption here, that is, a password (or better, a passphrase) is supplied when the file is encrypted, and the same password can be used to decrypt it. No public/private key stuff or other preparation should […]
Port mirroring with the most popular Linux bridge implementations.
TMTOWTDI, even for password hashing.