User can brute force login in AuthBrute.java via intents. Currently we only display a successful /unsuccessful message via logcat - we should also redirect the user in the app itself to the correct page, if the right passord was guessed.
🔐 TrueCrypt can create a virtual encrypted disk within a file, encrypt a partition and the whole storage device, Encryption is very important to prevent Crackers stealing Source Codes of Companies. 🔐
This repository contains the material for one lecture about Two-Server Blind Password Registration based on the Paper "Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols" by Franziskus Kiefer and Mark Manulis.
Hash collision detecting algorithm based on Floyd cycle detection. Created at the University as the project within IT Security classes in 2016. The purpose of this task was to learn how hash functions works and become aware of IT security threats.
User can brute force login in AuthBrute.java via intents. Currently we only display a successful /unsuccessful message via logcat - we should also redirect the user in the app itself to the correct page, if the right passord was guessed.