• Main Menu
  • Security

    • Cryptanalysis

      Cryptanalysis

      Cryptanalysis is the study of analyzing information systems in order to “discover” or “crack” the hidden or secret aspects of those systems. More specifically, cryptanalysis is the study of breaching cryptographic security systems in order to obtain access to the information contained within encrypted messages without necessarily knowing the cryptographic key used to encrypt the

    • Bootable Antivirus

      Bootable Antivirus

      Bootable antivirus software refers to any type of antivirus program that can be booted from a CD, DVD, or removable hard drive and can detect viruses on a user’s computer without having to startup Windows. Bootable antivirus software can be very important when a virus takes over a computer or prevents regular antivirus software from

    • How to Uninstall Yahoo! Search Companion

      How to Uninstall Yahoo! Search Companion

      If you installed Yahoo! Search Companion on your machine, this Internet browser add-on can allow you to conveniently access your bookmarked sites since it organizes the web pages. The Yahoo! Search Companion can also enhance your Internet browser by enabling it to provide you with a means to be capable of creating custom buttons. Apart

    • How Do I Change my MSN Password?

      How Do I Change my MSN Password?

      MSN is an ISP (Internet Service Provider) which is owned and operated by Microsoft Corporation. In addition, Microsoft uses the MSN brand on a number of web sites which they operate. How to Change Your MSN Password The way to change your MSN password is to change your Microsoft Passport password. Changing your Microsoft Passport

    • Malware

      Malware

      Malware is a generic term for bad software. The word malware comes from the words malicious and software. Malware (Malicious Software) is software conceived to gain access to a computer without the end user’s knowledge or permission. Malware in general, pertains to a wide range of malicious software that includes computer viruses, Trojan horses, fraudulent

    • Diffie-Hellman

      Diffie-Hellman

      The Diffie-Hellman key exchange was first published by Whitfield Diffie and Martin Hellman in 1976 and is a popular method for exchanging cryptographic keys. The method is one of the most straight-forward examples of key exchanges implemented in the cryptology field and allows two individuals or parties that have not worked together before to establish

    • Mondex Smart Card

      Mondex Smart Card

      Mondex is a specific smart card which was developed by England’s National Westminster Bank in 1990. Its design was intended to serve as electronic cash or a virtual electronic wallet. Any amount of money can be transferred to the Mondex smart card. MasterCard international bought controlling interest in the resulting firm, Mondex International, in 1997

    • Proximity Sensors

      Proximity Sensors

      A proximity sensor is an electronic device that is designed to detect the presence of objects, people, or other living things within a given distance and detection threshold. Proximity sensors are able to detect objects without physically touching them by transmitting a detecting field/beam such as infrared, acoustic, and inductive transmissions. When the sensor receives

    • D-Link Default Password

      D-Link Default Password

      D-Link is a computer equipment brand that specializes in producing networking devices such as routers, modems, and network storage devices. D-Link routers, in particular, are often found in both residential and commercial environments and a wide variety of individuals use them to maximize the potential of their Internet access. D-link routers often contain two or

    • XOR Encryption

      XOR Encryption

      The XOR encryption is a simple symmetric cipher that is used in many applications where security is not a defined requirement. The XOR Operator XOR (Exclusive OR) is a bitwise operator from binary mathematics. The six bitwise operators, as defined in the C programming language, are: Operation Symbol AND & Inclusive OR | Exclusive OR

    security
    } 473 queries in 0.397 seconds.