elhacker.INFO Downloads
Name Last modified Size
Parent Directory -
1. Goals and Learning Objectives.mp4 2022-05-30 22:13 7.2M
3.1 N.S.A. Able to Foil Basic Safeguards of Privacy on Web.html 2022-05-30 22:13 152
3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4 2022-05-30 22:13 17M
4.1 Inception.html 2022-05-30 22:13 96
4.3 Windowsscope.html 2022-05-30 22:13 204
4.4 Choose the Right BitLocker Countermeasure.html 2022-05-30 22:13 118
4.5 Wikipedia - Disk encryption.html 2022-05-30 22:13 106
4.6 Passware Kit Enterprise - Hard Disk Decryption.html 2022-05-30 22:13 107
4.7 nullcon Goa 2015 Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video.html 2022-05-30 22:13 104
4.8 Cold Boot Attack Demo - Video.html 2022-05-30 22:13 104
4.9 Security Pitfalls in Cryptography.html 2022-05-30 22:13 135
4.10 Evil Maid goes after TrueCrypt!.html 2022-05-30 22:13 145
4.11 Inception over firewire attack - video.html 2022-05-30 22:13 104
4.12 Report - Cold Boot Attack on DDR2 and DDR3 RAM.html 2022-05-30 22:13 149
4. Disk Encryption Attacks - Physical.mp4 2022-05-30 22:13 38M
5.1 Security Pitfalls in Cryptography.html 2022-05-30 22:13 135
5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4 2022-05-30 22:13 7.2M
6.1 CipherShed.html 2022-05-30 22:13 88
6.2 DiskCryptor.html 2022-05-30 22:13 99
6.3 Truecrpyt v7.2 (latest full version) - Download.html 2022-05-30 22:13 109
6.4 Windows BitLocker.html 2022-05-30 22:13 131
6.5 BestCrypt Container Encryption.html 2022-05-30 22:13 139
6.6 Symantec Drive Encryption.html 2022-05-30 22:13 131
6.7 Comparison of disk encryption software From Wikipedia.html 2022-05-30 22:13 129
6.8 Veracrypt.html 2022-05-30 22:13 92
6. Windows - Disk Encryption - An Introduction.mp4 2022-05-30 22:13 7.5M
7.1 What's new in Windows 10, versions 1507 and 1511.html 2022-05-30 22:13 157
7.2 Every Windows 10 in-place Upgrade is a SEVERE Security risk.html 2022-05-30 22:13 133
7.3 Windows BitLocker Drive Encryption Step-by-Step Guide.html 2022-05-30 22:13 131
7.4 YUBIKEYS.html 2022-05-30 22:13 110
7. Windows - Disk Encryption - Bitlocker.mp4 2022-05-30 22:13 30M
8.1 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT.html 2022-05-30 22:13 125
8. Windows - Setting Up BitLocker.mp4 2022-05-30 22:13 24M
9.1 yubico.com.html 2022-05-30 22:13 113
9.2 Truecrypt 7 Derived CodeWindows Incorrect Impersonation Token Handling EoP.html 2022-05-30 22:13 130
9.3 httpssourceforge.netpveracryptcodecimastertreesrcBootEFIReadme.txt#l19.html 2022-05-30 22:13 144
9.4 httpwww.openwall.comlistsoss-security201601111.html 2022-05-30 22:13 116
9.5 GERMAN GOVERNMENT AUDITS TRUECRYPT.html 2022-05-30 22:13 126
9.6 IsTrueCryptAuditedYet Yes!.html 2022-05-30 22:13 94
9.7 Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS.html 2022-05-30 22:13 174
9.8 Truecrypt 7 Derived CodeWindows Drive Letter Symbolic Link Creation EoP.html 2022-05-30 22:13 130
9.9 Veracrypt FAQ.html 2022-05-30 22:13 110
9.10 Veracrypt.html 2022-05-30 22:13 92
9.11 Nitrokey.com.html 2022-05-30 22:13 87
9.12 VeraCrypt - Operating Systems Supported for System Encryption.html 2022-05-30 22:13 154
9. Windows - Disk Encryption - VeraCrypt.mp4 2022-05-30 22:13 25M
10.1 httpswww.ciphershed.org.html 2022-05-30 22:13 88
10.2 BestCrypt Volume Encryption.html 2022-05-30 22:13 136
10.3 Comparison of disk encryption software From Wikipedia.html 2022-05-30 22:13 129
10.4 httpsdiskcryptor.net.html 2022-05-30 22:13 99
10.5 Symantec Drive Encryption.html 2022-05-30 22:13 131
10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4 2022-05-30 22:13 6.8M
11.1 VeraCrypt - Beginner's Tutorial.html 2022-05-30 22:13 130
11. Windows, Mac & Linux - Setting up VeraCrypt.mp4 2022-05-30 22:13 30M
12.1 Use FileVault to encrypt the startup disk on your Mac - Apple.html 2022-05-30 22:13 101
12.3 OS X Security and Privacy Guide - full disk encryption.html 2022-05-30 22:13 138
12. Mac - Filevault2.mp4 2022-05-30 22:13 13M
13.1 Startup key combinations for Mac.html 2022-05-30 22:13 101
13.2 pmset -- manipulate power management settings - Man Page.html 2022-05-30 22:13 158
13.4 Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9.html 2022-05-30 22:13 123
13.5 DeepSleep - Hibernate your Mac.html 2022-05-30 22:13 97
13.6 Apple Technical White Paper - Best Practices for Deploying FileVault 2.html 2022-05-30 22:13 108
14.1 LUKS support for storing keys in TPM NVRAM.html 2022-05-30 22:13 99
14.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 2022-05-30 22:13 163
14.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 2022-05-30 22:13 167
14.4 Plain dm-crypt.html 2022-05-30 22:13 149
14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4 2022-05-30 22:13 14M
15.1 The Debian Administrator's Handbook.html 2022-05-30 22:13 132
15.2 Arch - Disk encryption.html 2022-05-30 22:13 113
15.3 Cryptsetup & LUKS.html 2022-05-30 22:13 101
15.4 zuluCrypt.html 2022-05-30 22:13 102
15.5 Arch - dm-cryptEncrypting an entire system.html 2022-05-30 22:13 134
15. Linux - Setting up DMCryptLUKS.mp4 2022-05-30 22:13 13M
16.1 Arch - Encrypted boot partition (GRUB).html 2022-05-30 22:13 170
16.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 2022-05-30 22:13 163
16.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 2022-05-30 22:13 167
16. Linux - Encrypting the boot partition with Grub2.mp4 2022-05-30 22:13 12M
17.1 Report - Ten Reasons to Buy Self-Encrypting Drives.html 2022-05-30 22:13 201
17. Self Encrypting Drives (SEDs).mp4 2022-05-30 22:13 3.2M
18.1 Security Requirements and Precautions.html 2022-05-30 22:13 150
18.2 TRESOR Runs Encryption Securely Outside RAM.html 2022-05-30 22:13 107
18. Defense Against Disk Decryption Attacks.mp4 2022-05-30 22:13 21M
19.1 httpwww.kekaosx.comen.html 2022-05-30 22:13 87
19.2 httpswww.aescrypt.com.html 2022-05-30 22:13 86
19.3 httpwww.peazip.org.html 2022-05-30 22:13 84
19.4 httpswww.gnupg.org.html 2022-05-30 22:13 83
19. File Encryption.mp4 2022-05-30 22:13 11M
20.1 veracrypt - Plausible Deniability.html 2022-05-30 22:13 130
20.2 Appeals Court Upholds Constitutional Right Against Forced Decryption.html 2022-05-30 22:13 164
20.3 httpsxkcd.com538 - Cartoon.html 2022-05-30 22:13 82
20.4 veracrypt - Hidden Volume.html 2022-05-30 22:13 122
20.5 Arch - Plain dm-crypt.html 2022-05-30 22:13 149
20.6 Key disclosure law From Wikipedia.html 2022-05-30 22:13 109
20. Mandatory Key Disclosure & Plausible Deniability.mp4 2022-05-30 22:13 21M
21. Nesting Crypto Systems & Obfuscation.mp4 2022-05-30 22:13 8.9M
22.1 KINGPIN How One Hacker Took Over the Billion-Dollar Cybercrime Underground.html 2022-05-30 22:13 84
22.2 Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court.html 2022-05-30 22:13 107
22.3 Darkmarket.html 2022-05-30 22:13 251
22. Case Studies in Disk Decryption.mp4 2022-05-30 22:13 5.9M