This list is just a reference which hopefully saves some googling. Let's make it clear that we're talking about symmetric encryption here, that is, a password (or better, a passphrase) is supplied when the file is encrypted, and the same password can be used to decrypt it. No public/private key stuff or other preparation should […]
Archive of entries posted by
Doing something interesting to practice.
Port mirroring with the most popular Linux bridge implementations.
Bulk replication of directory trees.
TMTOWTDI, even for password hashing.