• Main Menu
  • Security

    • What is Tor?

      What is Tor?

      Tor is a program that is able to hide the user’s online activities from third parties and prevent websites from seeing where the user is browsing from by rerouting the user’s sent and recieved data through the Tor Network. The Tor Network is made up of hundreds of volunteers from around the world that specifically

    • Block and Stream Ciphers

      Block and Stream Ciphers

      The two most common types of encryption algorithm used in modern cryptography are the block and stream ciphers. The block cipher uses a deterministic algorithm that conducts operations on fixed-length groupings of bits, or blocks. By using a transformation specified by a symmetric key, a block cipher is able to encrypt bulk data, and is

    • How Do Password Hacking Programs Work?

      How Do Password Hacking Programs Work?

      Password hacking programs work by using a number of approaches to either decrypt or guess a working password. Three of the most common approaches that password hacking programs use are: Known Ciphertext Attacks Dictionary Attacks Brute Force Attacks The specific algorithm that the password hacking program implements depends on the password system’s design. Each password

    • Known Ciphertext Attack

      Known Ciphertext Attack

      The known ciphertext attack, or ciphertext only attack (COA) is an attack method used in cryptanalysis when the attacker has access to a given set of ciphertext(s). The attacker does not have access to corresponding cleartext in this method; however, COA is successful when correspdonding plaintext can be determined from a given set of ciphertext.

    • The History of Computer Viruses

      The History of Computer Viruses

      Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed

    • Certificate Authority

      Certificate Authority

      Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties. It exemplifies a trusted third party. Some certification authorities may charge a fee for their service while some other CAs are free. It is

    • How can I Change my tmnet Password?

      How can I Change my tmnet Password?

      TMNet is the primary broadband provider servicing the country of Malaysia. Depending on the consumer’s location in the country, the available download and upload speeds of the service will vary. The majority of industry, government, academic, and consumer usage in the country uses the TM Net Streamyx service in order to access the Internet, stream

    • GnuPG Shell

      GnuPG Shell

      Everyone likes safety. The safety of confidential information is always of special concern. Therefore, information protection is a necessity and can be useful to companies and individuals who care about their intellectual property’s confidentiality. People who want their e-mails kept confidential and their e-mail attachments readable only to the intended recipient can appreciate information protection.

    • How to Disable LoJack

      How to Disable LoJack

      LoJack refers to a GPS dependent tracking device that allows users to locate devices or vehicles that have been stolen. It is available in both a software version for computers and a hardware version for vehicles and communicates with GPS satellites to show a user where his/her stolen item currently is. LoJack can be activated

    • How a Smart Card Programmer Works

      How a Smart Card Programmer Works

      A smart card is a mini computer which requires programming to run. A smart card doesn’t contain an interface-like display or keyboard, so smart card readers are used to read or update the data tofrom smart cards. Smart cards contain an operating system which provides a platform to run applications. Smart card operating systems can

    security
    473 queries in 0.592 seconds.