How to Protect Your Computer on the Internet

How to Protect Your Computer on the Internet

The Internet is an ever present threat to your computer. Even harmlessly browsing through sites may get your computer affected with a virus or spyware without you even knowing it. As many dangers as there may be out there, you can easily protect yourself by taking a few simple steps. Routers and Firewalls First of all, if you don't already have a router, it is recommended that you go and get one, even if you only have one computer in your home. A Router acts as the best kind of firewall, a har

[ Read How to Protect Your Computer on the Internet ]

SHA-1

SHA-1

SHA stands for Secure Hash Algorithm. It consists of five hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). The five algorithms are SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. SHA-1 is the most commonly used of the SHA series. Hash algorithms are called secure when It is impossible to find a message that corresponds to a given message digest. It is impossible to find two different messages that pr

[ Read SHA-1 ]

What is an Email Spoofing?

What is an Email Spoofing?

Email spoofing occurs when an email is sent from one person or program that makes it appear as though it is legitimately from another. For example, user1@youremail.com creates an email, but when it is sent the “From” field has another person/organization's email address such as fake@somecompany.com. When the person who receives the email clicks the “reply” button their email client will queue a response to the fake email address. Although email spoofing has been around for a long time, s

[ Read What is an Email Spoofing? ]

How to Clear MSN Search History

How to Clear MSN Search History

When using MSN and doing a search, you are using the Bing software which is Microsoft's search engine. However, one of the things that you might want to do is clear your search history. Perhaps you were searching fro something on a computer that you don't want anyone to know. Maybe you just don't want the clutter. Regardless, clearing your MSN search history isn't very difficult. There are two routes. The first route is very straight forward and takes about five seconds. This route has a sub-ro

[ Read How to Clear MSN Search History ]

How to Change Your Streamyx Password

How to Change Your Streamyx Password

TM Net provides the Streamyx broadband Internet service in Malaysia. The service speeds range depending on the consumer’s location in the country and proximity to major network infrastructure; however, a large number of companies, schools, and individual consumers use the service for normal Internet use as well as to host websites and to stream video. Similar to other major service providers, Streamyx allows the end user to change the secure password for the account on registration and when de

[ Read How to Change Your Streamyx Password ]

The Zeus Virus

The Zeus Virus

The Zeus Virus is the popular term for the Zeus banking Trojan virus which was used to steal bank account details and passwords in the U.K. This resulted in a loss of more than $850,000 for those infected. The Zeus virus has been around for a number of years as part of the larger Zeus Crimeware Toolkit. In 2013, the virus became news again when a new version of it resurfaced, and infected a large number of Facebook users. The Zeus Crimware Toolkit was created by the Russian Business Network

[ Read The Zeus Virus ]

PKI Certificate

PKI Certificate

A PKI certificate, which stands for Public Key Infrastructure certificate, allows someone to combine their digital signature with a public key and something that identifies them, an example being their real life name. This certificate is used to allow computer users to show that they do own the public keys they claim to. In other words, it is a security mechanism for public keys. As mentioned before, a digital signature is required for the PKI certificate. This signature can either be made by

[ Read PKI Certificate ]

DES (Data Encryption Standard)

DES (Data Encryption Standard)

DES (Data Encryption Standard) is a commonly used method for encrypting data using a secret or private key. The strength of the DES encryption standard was previously considered to be strong enough that the United States government placed restrictions on the export of the technology to other countries. Conceptually, there are more than 72 quadrillion possible encryption keys that can be used with DES. When encrypting a message or data using the algorithm, the key is chosen at random from the poo

[ Read DES (Data Encryption Standard) ]

AES (Rijndael)

AES (Rijndael)

AES (Advanced Encryption Standard) is the currently employed specification for encrypting electronic data by the United States National Institute of Standards and Technology, or NIST. AES was selected as the U.S. standard for encryption of unclassified information in 2001 supplanting DES which had been the U.S. standards for a number of years (since 1977). AES is based on the Rijndael cipher that was developed by Belgian mathematicians Vincent Rijmen and Joan Daemen. Their proposal was evaluated

[ Read AES (Rijndael) ]

Cisco Routers Default Passwords

Cisco Routers Default Passwords

Cisco routers are routers that Cisco, a leading provider in network devices, produces. Cisco has millions of customers worldwide and produces thousands of products, including routers, modems, and network storage devices that allow the user to connect to the Internet. Cisco also produces USB based Internet cards and distributes service plans that a wide variety of Internet Service Providers offer. Cisco Router Default Passwords Like any other router, all Cisco routers include a built-in con

[ Read Cisco Routers Default Passwords ]

Page 1 of 171234Last »