• Main Menu
  • Security

    • How to Fake Mail

      How to Fake Mail

      Fake mail is e-mail which appears to be from someone other than the actual sender. Fake mail was initially usually used to stage practical jokes, but is now utilized primarily by e-mail spammers. How to Send Fake Mail To send fake mail, first `telnet` to port 25 of the machine you want the fake mail

    • How to Delete Search History

      How to Delete Search History

      For many computer users privacy is important. If you use a computer for searching the web, there may be times when you prefer to not leave a digital trail of the sites you visited. For those looking to delete their search history, you should know it is extremely easy, here are some tips. Deleting Your

    • RC4 (Rivest Cipher 4)

      RC4 (Rivest Cipher 4)

      RC4 is one of the most used software-based stream ciphers in the world. The cipher is included in popular Internet protocols such as SSL (Secure Sockets Layer) and WEP (for wireless network security). The cipher is fairly simplistic when compared to competing algorithms of the same strength and boasts one of the fastest speeds of

    • How Do Password Hacking Programs Work?

      How Do Password Hacking Programs Work?

      Password hacking programs work by using a number of approaches to either decrypt or guess a working password. Three of the most common approaches that password hacking programs use are: Known Ciphertext Attacks Dictionary Attacks Brute Force Attacks The specific algorithm that the password hacking program implements depends on the password system’s design. Each password

    • What is a Strong Password?

      What is a Strong Password?

      Passwords today are becoming increasingly important. They may open something as trivial as a special file to something as important as an online back account. Therefore, it is imperative that you have strong passwords to ensure security. Strong passwords are always lengthy. Usually a length of 14-16 characters is ideal and hard to guess. Strong

    • Certificate Authority

      Certificate Authority

      Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties. It exemplifies a trusted third party. Some certification authorities may charge a fee for their service while some other CAs are free. It is

    • How to Recover a Zip Password

      How to Recover a Zip Password

      PKZip utilizes a proprietary stream cipher that is vulnerable to a known plaintext attack, as Eli Biham and Paul C. Kocher describes in A Known Plaintext Attack on the PKZIP Stream Cipher. In ZIP Attacks with Reduced Known-Plaintext, Michael Stay describes an improved known plaintext attack that works against files that non-PKZip zip programs such

    • How to Clear Your Cache

      How to Clear Your Cache

      Most web browsers store web pages and images that we browse on the Internet. The web browsers cache (meaning, temporarily store) these files for a short time in your computer. If we revisit a pre-visited web page while these files are still in the cache, the web browser retrieves the files from the disk cache

    • How to Remove the “My Web Search” Toolbar

      How to Remove the “My Web Search” Toolbar

      My Web Search is a malware toolbar distributed by Mindspark Interactive Network via their extensive network of spam sites, most of which are targeted towards young people.  This rapidly expanding list of sites includes Zwinky, Zwinky Cuties, GirlSense, Webfetti, Kazula, iWon, SmileyCentral, MyFunCards, CursorMania, and CardBoiled. These sites trick people, mainly children, into installing the

    • Plaintext and Ciphertext

      Plaintext and Ciphertext

      In the study of cryptography the terms plaintext and ciphertext are used to describe the plain language message or information and the resulting encrypted message or data that results from the use of a cipher or encryption algorithm. The resulting ciphertext is not readable by either a human or computer without the correct cipher to

    } 466 queries in 0.427 seconds.