HOME
*





Mujahideen Secrets 2
Mujahedeen Secrets (transliterated Arabic: ''Asrar al-Mujahedeen'') is an encryption program for Microsoft Windows. It was publicly offered to supporters of Al-Qaeda as a tool to protect the confidentiality of their electronic messages. The authors of the software are anonymous. Uses The software allows users to encrypt and decrypt text messages and files with a range of encryption techniques. This is primarily to ensure that any parties intercepting the messages during transmission, such as via Internet e-mail or cellphone, cannot easily view the message's contents. Software releases *First release: In 2007, the Global Islamic Media Front, the propaganda Propaganda is communication that is primarily used to influence or persuade an audience to further an agenda, which may not be objective and may be selectively presenting facts to encourage a particular synthesis or perception, or using loaded ... arm of Al Qaeda and other Islamic terrorist groups, announced the release o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Encryption Software
Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet. Classification There are many software products which provide encryption. Software encryption uses a cipher to obscure the content into ciphertext. One way to classify this type of software is the type of cipher used. Ciphers can be divided into two categories: public key ciphers (also known as asymmetric ciphers), and symmetric key ciphers. Encryption software can be based on either public key or symmetric key encryption. Another way to classify software encryption is to categorize its purpose. Using this approach, software encryption may be classified into software which encrypts "data in transit" and software which encrypts " data at rest". Data in transit generally uses public key ciphers, and data at rest generally uses ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microsoft Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for servers, and Windows IoT for embedded systems. Defunct Windows families include Windows 9x, Windows Mobile, and Windows Phone. The first version of Windows was released on November 20, 1985, as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUIs). Windows is the most popular desktop operating system in the world, with 75% market share , according to StatCounter. However, Windows is not the most used operating system when including both mobile and desktop OSes, due to Android's massive growth. , the most recent version of Windows is Windows 11 for consumer PCs and tablets, Windows 11 Enterprise for corporations, and Windows Server 2022 for servers. Genealogy By marketing ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Al-Qaeda
Al-Qaeda (; , ) is an Islamic extremism, Islamic extremist organization composed of Salafist jihadists. Its members are mostly composed of Arab, Arabs, but also include other peoples. Al-Qaeda has mounted attacks on civilian and military targets in various countries, including the 1998 United States embassy bombings, the September 11 attacks, and the 2002 Bali bombings; it has been designated as a List of designated terrorist groups, terrorist group by the United Nations Security Council, the North Atlantic Treaty Organization (NATO), the European Union, India, and Al-Qaeda#Designation as a terrorist group, various other countries. The organization was founded in 1988 by Osama bin Laden and other volunteers during the Soviet–Afghan War. Following the withdrawal of the Soviets in 1989, bin Laden offered ''mujahideen'' support to Saudi Arabia in the Gulf War in 1990–1991. His offer was rebuffed by the Saudi authorities, which instead sought the aid of the United States. Th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Global Islamic Media Front
The Global Islamic Media Front (GIMF) is an Islamist propaganda organization that is associated with the terrorist group, al-Qaeda, and other jihadist groups. The GIMF is known by the U.S. Federal Bureau of Investigation (FBI) as an "underground media" organization. The GIMF specializes in production of jihadist material for distribution. It is one of several organizations that jihadists use to spread information via the Internet, including the well-known As-Sahab. Their slogan that is used on their materials is "Observing Mujahideen News and Inspiring the Believers." There is no indication who the leader of this organization is. The GIMF has a direct precedent in two "sister" propaganda platforms: the Global Islamic Media Group (GIMG) and Global Islamic Media Centre (GIMC). The former was a distribution list set up on June 29, 2001, in one of the virtual groups spaces offered free of charge by Yahoo to its e-mail account users and was followed later by a website. Access to its mat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Propaganda
Propaganda is communication that is primarily used to influence or persuade an audience to further an agenda, which may not be objective and may be selectively presenting facts to encourage a particular synthesis or perception, or using loaded language to produce an emotional rather than a rational response to the information that is being presented. Propaganda can be found in news and journalism, government, advertising, entertainment, education, and activism and is often associated with material which is prepared by governments as part of war efforts, political campaigns, health campaigns, revolutionaries, big businesses, ultra-religious organizations, the media, and certain individuals such as soapboxers. In the 20th century, the English term ''propaganda'' was often associated with a manipulative approach, but historically, propaganda has been a neutral descriptive term of any material that promotes certain opinions or ideologies. Equivalent non-English terms have also la ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptographic Software
Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet. Classification There are many software products which provide encryption. Software encryption uses a cipher to obscure the content into ciphertext. One way to classify this type of software is the type of cipher used. Ciphers can be divided into two categories: public key ciphers (also known as asymmetric ciphers), and symmetric key ciphers. Encryption software can be based on either public key or symmetric key encryption. Another way to classify software encryption is to categorize its purpose. Using this approach, software encryption may be classified into software which encrypts "data in transit" and software which encrypts " data at rest". Data in transit generally uses public key ciphers, and data at rest generally uses ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]