elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1. Goals and Learning Objectives.mp4 7.2M
3.1 N.S.A. Able to Foil Basic Safeguards of Privacy on Web.html 152
3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4 17M
4.1 Inception.html 96
4.3 Windowsscope.html 204
4.4 Choose the Right BitLocker Countermeasure.html 118
4.5 Wikipedia - Disk encryption.html 106
4.6 Passware Kit Enterprise - Hard Disk Decryption.html 107
4.7 nullcon Goa 2015 Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video.html 104
4.8 Cold Boot Attack Demo - Video.html 104
4.9 Security Pitfalls in Cryptography.html 135
4.10 Evil Maid goes after TrueCrypt!.html 145
4.11 Inception over firewire attack - video.html 104
4.12 Report - Cold Boot Attack on DDR2 and DDR3 RAM.html 149
4. Disk Encryption Attacks - Physical.mp4 38M
5.1 Security Pitfalls in Cryptography.html 135
5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4 7.2M
6.1 CipherShed.html 88
6.2 DiskCryptor.html 99
6.3 Truecrpyt v7.2 (latest full version) - Download.html 109
6.4 Windows BitLocker.html 131
6.5 BestCrypt Container Encryption.html 139
6.6 Symantec Drive Encryption.html 131
6.7 Comparison of disk encryption software From Wikipedia.html 129
6.8 Veracrypt.html 92
6. Windows - Disk Encryption - An Introduction.mp4 7.5M
7.1 What's new in Windows 10, versions 1507 and 1511.html 157
7.2 Every Windows 10 in-place Upgrade is a SEVERE Security risk.html 133
7.3 Windows BitLocker Drive Encryption Step-by-Step Guide.html 131
7.4 YUBIKEYS.html 110
7. Windows - Disk Encryption - Bitlocker.mp4 30M
8.1 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT.html 125
8. Windows - Setting Up BitLocker.mp4 24M
9.1 yubico.com.html 113
9.2 Truecrypt 7 Derived CodeWindows Incorrect Impersonation Token Handling EoP.html 130
9.3 httpssourceforge.netpveracryptcodecimastertreesrcBootEFIReadme.txt#l19.html 144
9.4 httpwww.openwall.comlistsoss-security201601111.html 116
9.5 GERMAN GOVERNMENT AUDITS TRUECRYPT.html 126
9.6 IsTrueCryptAuditedYet Yes!.html 94
9.7 Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS.html 174
9.8 Truecrypt 7 Derived CodeWindows Drive Letter Symbolic Link Creation EoP.html 130
9.9 Veracrypt FAQ.html 110
9.10 Veracrypt.html 92
9.11 Nitrokey.com.html 87
9.12 VeraCrypt - Operating Systems Supported for System Encryption.html 154
9. Windows - Disk Encryption - VeraCrypt.mp4 25M
10.1 httpswww.ciphershed.org.html 88
10.2 BestCrypt Volume Encryption.html 136
10.3 Comparison of disk encryption software From Wikipedia.html 129
10.4 httpsdiskcryptor.net.html 99
10.5 Symantec Drive Encryption.html 131
10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4 6.8M
11.1 VeraCrypt - Beginner's Tutorial.html 130
11. Windows, Mac & Linux - Setting up VeraCrypt.mp4 30M
12.1 Use FileVault to encrypt the startup disk on your Mac - Apple.html 101
12.3 OS X Security and Privacy Guide - full disk encryption.html 138
12. Mac - Filevault2.mp4 13M
13.1 Startup key combinations for Mac.html 101
13.2 pmset -- manipulate power management settings - Man Page.html 158
13.4 Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9.html 123
13.5 DeepSleep - Hibernate your Mac.html 97
13.6 Apple Technical White Paper - Best Practices for Deploying FileVault 2.html 108
14.1 LUKS support for storing keys in TPM NVRAM.html 99
14.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 163
14.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 167
14.4 Plain dm-crypt.html 149
14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4 14M
15.1 The Debian Administrator's Handbook.html 132
15.2 Arch - Disk encryption.html 113
15.3 Cryptsetup & LUKS.html 101
15.4 zuluCrypt.html 102
15.5 Arch - dm-cryptEncrypting an entire system.html 134
15. Linux - Setting up DMCryptLUKS.mp4 13M
16.1 Arch - Encrypted boot partition (GRUB).html 170
16.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 163
16.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 167
16. Linux - Encrypting the boot partition with Grub2.mp4 12M
17.1 Report - Ten Reasons to Buy Self-Encrypting Drives.html 201
17. Self Encrypting Drives (SEDs).mp4 3.2M
18.1 Security Requirements and Precautions.html 150
18.2 TRESOR Runs Encryption Securely Outside RAM.html 107
18. Defense Against Disk Decryption Attacks.mp4 21M
19.1 httpwww.kekaosx.comen.html 87
19.2 httpswww.aescrypt.com.html 86
19.3 httpwww.peazip.org.html 84
19.4 httpswww.gnupg.org.html 83
19. File Encryption.mp4 11M
20.1 veracrypt - Plausible Deniability.html 130
20.2 Appeals Court Upholds Constitutional Right Against Forced Decryption.html 164
20.3 httpsxkcd.com538 - Cartoon.html 82
20.4 veracrypt - Hidden Volume.html 122
20.5 Arch - Plain dm-crypt.html 149
20.6 Key disclosure law From Wikipedia.html 109
20. Mandatory Key Disclosure & Plausible Deniability.mp4 21M
21. Nesting Crypto Systems & Obfuscation.mp4 8.9M
22.1 KINGPIN How One Hacker Took Over the Billion-Dollar Cybercrime Underground.html 84
22.2 Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court.html 107
22.3 Darkmarket.html 251
22. Case Studies in Disk Decryption.mp4 5.9M