• Main Menu
  • Security

    • How to Set up a VPN

      How to Set up a VPN

      A Virtual Private Network (VPN) is typically used by companies, schools, and other organizations when they want to allow remote access to their servers, printers, and other network devices without compromising security. A VPN therefore extends a private network across the internet, but protects this connection by encrypting it, thereby creating what many refer to

    • Wordlists

      Wordlists

      A wordlist is a text file containing a collection of words for use in a dictionary attack. Wordlist Usage A dictionary attack using a wordlist relies on the fact that most users choose weak passwords. Very common passwords include password, computer, work, and most of the popular female names. Common Dictionary Attacks Using A Wordlist

    • How to Securely Erase Data

      How to Securely Erase Data

      When you erase a file on your computer, the actual data in the file is not overwritten. The space utilized by that file is simply marked as “free” for use by other data. Once other data is written in that space, the original data becomes unrecoverable — by most people. Those little bits of magnetic

    • SSH (Secure Shell)

      SSH (Secure Shell)

      SSH (Secure Shell) is one of the most widely-used network protocols supporting secure data communication in academia and industry today. The protocol supports remote command execution, command-line login, and other secure network services between two networked computer hosts. The computers make use of a secure channel that is setup over an insecure network and both

    • RSA (Rivest, Shamir, and Adleman)

      RSA (Rivest, Shamir, and Adleman)

      RSA, which stands for Rivest, Shamir, and Adleman, is a security algorithm used in digital cryptography. RSA differs from older symmetric algorithms because it has the ability of allowing digital signing as well as advanced encryption for online commerce systems and high-profile institutions. RSA was one of the first major advancements in digital cryptography but

    • How to Recover a Zip Password

      How to Recover a Zip Password

      PKZip utilizes a proprietary stream cipher that is vulnerable to a known plaintext attack, as Eli Biham and Paul C. Kocher describes in A Known Plaintext Attack on the PKZIP Stream Cipher. In ZIP Attacks with Reduced Known-Plaintext, Michael Stay describes an improved known plaintext attack that works against files that non-PKZip zip programs such

    • Trojan Virus

      Trojan Virus

      A Trojan virus is a piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer. The virus takes its name from the “Trojan Horse” from Greek mythology setup outside of the city of Troy. Trojan horse viruses differ from other

    • How to Change Your Streamyx Password

      How to Change Your Streamyx Password

      TM Net provides the Streamyx broadband Internet service in Malaysia. The service speeds range depending on the consumer’s location in the country and proximity to major network infrastructure; however, a large number of companies, schools, and individual consumers use the service for normal Internet use as well as to host websites and to stream video.

    • How to Pick Locks

      How to Pick Locks

      Learning how to pick locks is almost as much an art as it is a science. Locksmiths describe lock picking as the exploitation of a lock’s machinery to open a lock without a key. To understand the process of picking locks, the prospective picker has to be acquainted with how locks and keys function. The

    • How to Hide an IP

      How to Hide an IP

      Hiding an IP online is necessary for a variety of reasons. Various websites, video games, and miscellaneous connections to the Internet share information about the network’s location and host. The simplest way to prevent sharing this information, while still being able to connect to the Internet is by hiding the individual’s and his/her Internet enabled

    security