Algorytm GSM A5/2 - dokumentacja, opis, problemy

Algorytm szyfrowania wciąż używany w wielu krajach Azji, został złamany w 1999

1 comment Security akerro cryptome.org 1

Why is the Ukraine s...

Why is the Ukraine so divided?

Imgur is home to the web's most popular image content, curated in real time by a dedicated community through commenting, voting and sharing.

0 comments Ukraina akerro imgur.com 0

Video casty na temat...

Video casty na temat rozwoju aplikacji w RoR

Od początku do końca

0 comments ruby akerro appcasts.io 0

XCOM: Enemy Unknown...

XCOM: Enemy Unknown Looks Close To A Linux Release

The news just keeps flowing, it now looks like XCOM: Enemy Unknown is closing in on a Linux release.

0 comments GryLinuxowe akerro gamingonlinux.com 0

XCOM: Enemy Unknown...

XCOM: Enemy Unknown Looks Close To A Linux Release

The news just keeps flowing, it now looks like XCOM: Enemy Unknown is closing in on a Linux release.

0 comments GryLinuxowe akerro gamingonlinux.com 0

Co się stanie jak uk...

Co się stanie jak ukradniesz laptop hackera?

Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer Having your place broken into and your computer stolen can be a nightmare..

5 comments ScriptKiddie akerro youtube.com 0