• Main Menu
  • Security

    • RC4 (Rivest Cipher 4)

      RC4 (Rivest Cipher 4)

      RC4 is one of the most used software-based stream ciphers in the world. The cipher is included in popular Internet protocols such as SSL (Secure Sockets Layer) and WEP (for wireless network security). The cipher is fairly simplistic when compared to competing algorithms of the same strength and boasts one of the fastest speeds of

    • How to Reset a LinkSys Router Password

      How to Reset a LinkSys Router Password

      LinkSys is the division of the Cisco Company which manufactures some of the most widely used network routers in the world. The WRT54G, WRT160N, and WRT310N series are the most popular with the WRT54G being the first model deployed that supported third-party firmware. The current generation of LinkSys routers support the draft 802.11N wireless standard

    • How to Delete Recent Searches

      How to Delete Recent Searches

      Deleting recent searches–be they from Bing, Google or Yahoo–is an easy thing to do. While the steps vary a little from Internet Explorer to FireFox, for the most part, they take the same amount of time and can be found in the same place. Deleting Recent Searches in Internet Explorer Click on the tools button.

    • Computer Worms

      Computer Worms

      Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can

    • Cryptographic Algorithms

      Cryptographic Algorithms

      Symmetric Cryptographic Algorithms DES (Data Encryption Standard) is perhaps the most widely used cryptographic algorithm. DES is based upon IBM’s Lucifer algorithm. The NBS (National Bureau of Standards) and the NSA (National Security Agency) adopted DES as a federal standard in 1977. DES is a symmetric cipher with an effective key length of 56 bits.

    • How a Magnetic Card Reader Works

      How a Magnetic Card Reader Works

      A magnetic card is a rectangular plastic object (credit/debit card) that contains either a magnetic object embedded within the card or a magnetic stripe on the card’s exterior. A magnetic card can store any form of digital data. The electronic devices designed to read stored information from a magnetic card do so either when someone

    • How a Smart Card Reader Works

      How a Smart Card Reader Works

      Smart Card Readers are also known as card programmers (because they can write to a card), card terminals, card acceptance device (CAD), or an interface device (IFD). There is a slight difference between the card reader and the terminal. The term ‘reader’ is generally used to describe a unit that interfaces with a PC for

    • How Does Yahoo Password Recovery work?

      How Does Yahoo Password Recovery work?

      Yahoo password recovery methods include: Reset your Yahoo password online Recover your Yahoo password from your web browser Recover your stored password from the Windows Registry Reset your Yahoo password The easiest way to recover a Yahoo password is to go to the Yahoo! Sign-in Problems page. To use this page, first enter your Date

    • X.509

      X.509

      X.509 is an ITU-T (ITU Telecommunication Standardization Sector) standard for PKI (Public Key Infrastructure) in cryptography, which, amongst many other things, defines specific formats for PKC (Public Key Certificates) and the algorithm that verifies a given certificate path is valid under a give PKI (called the certification path validation algorithm). X.509 History X.509 began in

    • How to Remove all Personal Files from Windows

      How to Remove all Personal Files from Windows

      Over the last decade, millions of people have kept more and more personal information on their computers. From credit card numbers to sensitive emails and word documents, a vast amount of personal files are on almost any home computer. While keeping personal and sensitive information on a home computer is relatively safe, if you plan

    security
    } 456 queries in 0.614 seconds.