Communities

People & Pages

Collections

Post has attachment

Post has attachment
Trend Micro OfficeScan v11.0 and XG (12.0) Unauthorized Remote Encryption Key Disclosure CVE-2017-14083 (apparitionsec / hyp3rlinx)*
[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/CVE-2017-14083-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-ENCRYPTION-KEY-DISCLOSURE.txt
[+] ISR: ApparitionSec



Vendor:
====...

Post has attachment
Public
Our encryption solution has a new name! But it's still the ultra-secure, simple to manage software you know

Post has attachment
Public
Attache Case # 3 - Encryption / Decryption Software for Windows
Everyone has information that no one wants to see. Eye can not be hit on the day of leakage. Encryption of files is important to prevent such a situation. Attache Case # 3 introduced this time is file encryption and decryption software. How to use Attache C...

Post has attachment

Post has attachment

Post has attachment
4 Syskey Encryption Alternatives for Windows 10

Post has attachment
James Grime Code Breaker
The earliest record of encryption was used by Julius Caesar to contact his military in secret and nobody would know what he was saying. The Pig Pen cipher works by substituting each letter for a symbol. Caesar cypher works by replacing the letter used by one from a fixed number of positions further down the alphabet.

We know that a formula for encryption is:
Original Letter = New Letter - Key
So, if Key = 2
Encryption: B+2= D (A B C D E)

Try to decode these messages using a Caesar Cipher with a left shift of 3
Zxom cfpe (First letter is C)
Exoa olzh (First letter H)
Kfzb clla (First letter N)

Don’t forget James Grime code breaker, visiting the school today at 4:30pm, for more information check out the link below
http://www.nordangliaeducation.com/our-schools/singapore/article/2017/9/26/james-grime-code-breaker-and-enigma-machine-guru-visiting-dcis
http://singingbanana.com/about/

Post has attachment
Well, that's fun. #Equifax didn't even use encryption on our personal data. #facepalm

Post has attachment
Equifax- an Environment of (Failed) Encryption by Hadley Green
Wait while more posts are being loaded