elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
4. Disk Encryption Attacks - Physical.mp4 2023-10-18 12:47 38M
7. Windows - Disk Encryption - Bitlocker.mp4 2023-10-18 12:45 30M
11. Windows, Mac & Linux - Setting up VeraCrypt.mp4 2023-10-18 12:46 30M
9. Windows - Disk Encryption - VeraCrypt.mp4 2023-10-18 12:48 25M
8. Windows - Setting Up BitLocker.mp4 2023-10-18 12:47 24M
18. Defense Against Disk Decryption Attacks.mp4 2023-10-18 12:46 21M
20. Mandatory Key Disclosure & Plausible Deniability.mp4 2023-10-18 12:47 21M
3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4 2023-10-18 12:47 17M
14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4 2023-10-18 12:45 14M
15. Linux - Setting up DMCryptLUKS.mp4 2023-10-18 12:47 13M
12. Mac - Filevault2.mp4 2023-10-18 12:48 13M
16. Linux - Encrypting the boot partition with Grub2.mp4 2023-10-18 12:45 12M
19. File Encryption.mp4 2023-10-18 12:46 11M
21. Nesting Crypto Systems & Obfuscation.mp4 2023-10-18 12:46 8.9M
6. Windows - Disk Encryption - An Introduction.mp4 2023-10-18 12:47 7.5M
1. Goals and Learning Objectives.mp4 2023-10-18 12:46 7.2M
5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4 2023-10-18 12:45 7.2M
10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4 2023-10-18 12:46 6.8M
22. Case Studies in Disk Decryption.mp4 2023-10-18 12:47 5.9M
17. Self Encrypting Drives (SEDs).mp4 2023-10-18 12:45 3.2M
22.3 Darkmarket.html 2023-10-18 12:46 251
4.3 Windowsscope.html 2023-10-18 12:46 204
17.1 Report - Ten Reasons to Buy Self-Encrypting Drives.html 2023-10-18 12:48 201
9.7 Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS.html 2023-10-18 12:46 174
16.1 Arch - Encrypted boot partition (GRUB).html 2023-10-18 12:48 170
16.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 2023-10-18 12:47 167
14.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 2023-10-18 12:45 167
20.2 Appeals Court Upholds Constitutional Right Against Forced Decryption.html 2023-10-18 12:46 164
16.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 2023-10-18 12:48 163
14.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 2023-10-18 12:46 163
13.2 pmset -- manipulate power management settings - Man Page.html 2023-10-18 12:47 158
7.1 What's new in Windows 10, versions 1507 and 1511.html 2023-10-18 12:46 157
9.12 VeraCrypt - Operating Systems Supported for System Encryption.html 2023-10-18 12:47 154
3.1 N.S.A. Able to Foil Basic Safeguards of Privacy on Web.html 2023-10-18 12:46 152
18.1 Security Requirements and Precautions.html 2023-10-18 12:46 150
20.5 Arch - Plain dm-crypt.html 2023-10-18 12:47 149
14.4 Plain dm-crypt.html 2023-10-18 12:46 149
4.12 Report - Cold Boot Attack on DDR2 and DDR3 RAM.html 2023-10-18 12:45 149
4.10 Evil Maid goes after TrueCrypt!.html 2023-10-18 12:47 145
9.3 httpssourceforge.netpveracryptcodecimastertreesrcBootEFIReadme.txt#l19.html 2023-10-18 12:48 144
6.5 BestCrypt Container Encryption.html 2023-10-18 12:46 139
12.3 OS X Security and Privacy Guide - full disk encryption.html 2023-10-18 12:47 138
10.2 BestCrypt Volume Encryption.html 2023-10-18 12:46 136
5.1 Security Pitfalls in Cryptography.html 2023-10-18 12:47 135
4.9 Security Pitfalls in Cryptography.html 2023-10-18 12:45 135
15.5 Arch - dm-cryptEncrypting an entire system.html 2023-10-18 12:45 134
7.2 Every Windows 10 in-place Upgrade is a SEVERE Security risk.html 2023-10-18 12:47 133
15.1 The Debian Administrator's Handbook.html 2023-10-18 12:47 132
10.5 Symantec Drive Encryption.html 2023-10-18 12:45 131
7.3 Windows BitLocker Drive Encryption Step-by-Step Guide.html 2023-10-18 12:47 131
6.6 Symantec Drive Encryption.html 2023-10-18 12:47 131
6.4 Windows BitLocker.html 2023-10-18 12:46 131
20.1 veracrypt - Plausible Deniability.html 2023-10-18 12:46 130
11.1 VeraCrypt - Beginner's Tutorial.html 2023-10-18 12:47 130
9.8 Truecrypt 7 Derived CodeWindows Drive Letter Symbolic Link Creation EoP.html 2023-10-18 12:48 130
9.2 Truecrypt 7 Derived CodeWindows Incorrect Impersonation Token Handling EoP.html 2023-10-18 12:47 130
10.3 Comparison of disk encryption software From Wikipedia.html 2023-10-18 12:45 129
6.7 Comparison of disk encryption software From Wikipedia.html 2023-10-18 12:47 129
9.5 GERMAN GOVERNMENT AUDITS TRUECRYPT.html 2023-10-18 12:46 126
8.1 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT.html 2023-10-18 12:45 125
13.4 Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9.html 2023-10-18 12:45 123
20.4 veracrypt - Hidden Volume.html 2023-10-18 12:47 122
4.4 Choose the Right BitLocker Countermeasure.html 2023-10-18 12:45 118
9.4 httpwww.openwall.comlistsoss-security201601111.html 2023-10-18 12:46 116
15.2 Arch - Disk encryption.html 2023-10-18 12:46 113
9.1 yubico.com.html 2023-10-18 12:46 113
9.9 Veracrypt FAQ.html 2023-10-18 12:46 110
7.4 YUBIKEYS.html 2023-10-18 12:46 110
20.6 Key disclosure law From Wikipedia.html 2023-10-18 12:47 109
6.3 Truecrpyt v7.2 (latest full version) - Download.html 2023-10-18 12:45 109
13.6 Apple Technical White Paper - Best Practices for Deploying FileVault 2.html 2023-10-18 12:47 108
22.2 Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court.html 2023-10-18 12:47 107
18.2 TRESOR Runs Encryption Securely Outside RAM.html 2023-10-18 12:47 107
4.6 Passware Kit Enterprise - Hard Disk Decryption.html 2023-10-18 12:46 107
4.5 Wikipedia - Disk encryption.html 2023-10-18 12:46 106
4.11 Inception over firewire attack - video.html 2023-10-18 12:47 104
4.8 Cold Boot Attack Demo - Video.html 2023-10-18 12:46 104
4.7 nullcon Goa 2015 Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video.html 2023-10-18 12:46 104
15.4 zuluCrypt.html 2023-10-18 12:48 102
15.3 Cryptsetup & LUKS.html 2023-10-18 12:45 101
13.1 Startup key combinations for Mac.html 2023-10-18 12:48 101
12.1 Use FileVault to encrypt the startup disk on your Mac - Apple.html 2023-10-18 12:45 101
14.1 LUKS support for storing keys in TPM NVRAM.html 2023-10-18 12:46 99
10.4 httpsdiskcryptor.net.html 2023-10-18 12:48 99
6.2 DiskCryptor.html 2023-10-18 12:47 99
13.5 DeepSleep - Hibernate your Mac.html 2023-10-18 12:46 97
4.1 Inception.html 2023-10-18 12:46 96
9.6 IsTrueCryptAuditedYet Yes!.html 2023-10-18 12:46 94
9.10 Veracrypt.html 2023-10-18 12:45 92
6.8 Veracrypt.html 2023-10-18 12:47 92
10.1 httpswww.ciphershed.org.html 2023-10-18 12:46 88
6.1 CipherShed.html 2023-10-18 12:45 88
19.1 httpwww.kekaosx.comen.html 2023-10-18 12:46 87
9.11 Nitrokey.com.html 2023-10-18 12:46 87
19.2 httpswww.aescrypt.com.html 2023-10-18 12:46 86
22.1 KINGPIN How One Hacker Took Over the Billion-Dollar Cybercrime Underground.html 2023-10-18 12:47 84
19.3 httpwww.peazip.org.html 2023-10-18 12:46 84
19.4 httpswww.gnupg.org.html 2023-10-18 12:46 83
20.3 httpsxkcd.com538 - Cartoon.html 2023-10-18 12:48 82