• Main Menu
  • Security

    • Smart Card Software

      Smart Card Software

      A smart card contains an integrated circuit (IC) chip containing a central processing unit (CPU), random access memory (RAM) and non-volatile data storage. Data stored in the smart card’s microchip can be accessed only through the chip operating system (COS). Smart cards provide a secure, portable platform for “any time, anywhere” computing that can contain

    • Why Everyone Should Use a VPN

      Why Everyone Should Use a VPN

      VPN, or a Virtual Private Network, connects computers and other devices using an encrypted connection. This means that all data travelling through such a network is unreadable to anyone who might intercept the data stream, making it as private as it would be if all of the connected devices resided within the walls of a

    • Diffie-Hellman

      Diffie-Hellman

      The Diffie-Hellman key exchange was first published by Whitfield Diffie and Martin Hellman in 1976 and is a popular method for exchanging cryptographic keys. The method is one of the most straight-forward examples of key exchanges implemented in the cryptology field and allows two individuals or parties that have not worked together before to establish

    • How to Track a Stolen Laptop

      How to Track a Stolen Laptop

      More consumers are purchasing laptops for personal and business use. Unfortunately, the number of stolen laptops has increased with this rise in laptop purchases. Most consumers do not plan for the possibility of being robbed, and lose a significant amount of personal and sensitive data as a result. The police never find many of these

    • How to Delete WD SmartWare

      How to Delete WD SmartWare

      Western Digital (WD) Portable Hard Drives are capable of storing quite a bit of information. Modern Western Digital drives come with a firmware called “SmartWare,” which can be useful to some users. The SmartWare can provide backup solutions that may not be available with the operating system in use. WD hard drives with SmartWare also

    • One-Time Pad

      One-Time Pad

      A one-time pad is a form of encryption that is difficult to decipher or crack if one is not the intended recipient. If done correctly, the strength of encryption of plaintext can almost be impossible to break in a useful timeframe. The system takes each character from plaintext and uses modular addition with a character

    • How to Reset a MySQL Password

      How to Reset a MySQL Password

      A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. Start the mysqld daemon process with the –skip-grant-tables option. Start the mysql client with the -u root option. Execute the UPDATE mysql.user SET Password=PASSWORD(‘password’) WHERE User=’root’; Execute the FLUSH PRIVILEGES; command. These steps reset the password for the “root” account

    • How to Delete Search History

      How to Delete Search History

      For many computer users privacy is important. If you use a computer for searching the web, there may be times when you prefer to not leave a digital trail of the sites you visited. For those looking to delete their search history, you should know it is extremely easy, here are some tips. Deleting Your

    • Cisco Password Recovery

      Cisco Password Recovery

      “Physical access to a computer or router usually gives a sophisticated user complete control over the device. Software security measures can often be circumvented when access to the hardware is not controlled.” — Cisco Systems, Inc. Recovering the passwords for most Cisco devices via the console port is very simple. However, Cisco has purchased so

    • Bootable Antivirus

      Bootable Antivirus

      Bootable antivirus software refers to any type of antivirus program that can be booted from a CD, DVD, or removable hard drive and can detect viruses on a user’s computer without having to startup Windows. Bootable antivirus software can be very important when a virus takes over a computer or prevents regular antivirus software from

    security
    459 queries in 0.548 seconds.