• Main Menu
  • Security

    • MD5 (Message Digest 5)

      MD5 (Message Digest 5)

      MD5 is a message digest algorithm. MD5 takes a variable length input and produces a 128-bit message digest. MD5 was designed by Ron Rivest in 1991. MD5 is officially defined in RFC 1321 – The MD5 Message-Digest Algorithm. MD5 Usage MD5 is used in many applications, including GPG, Kerberos, TLS / SSL, Cisco type 5

    • How can I Change my tmnet Password?

      How can I Change my tmnet Password?

      TMNet is the primary broadband provider servicing the country of Malaysia. Depending on the consumer’s location in the country, the available download and upload speeds of the service will vary. The majority of industry, government, academic, and consumer usage in the country uses the TM Net Streamyx service in order to access the Internet, stream

    • lsass.exe

      lsass.exe

      LSASS, or local security authority subsystem service, is a process that functions as part of the Microsoft Windows operating system. Essentially, LSASS is part of the process for maintaining and enforcing the security protocols on the operating system. To this end, LSASS performs several important functions to ensure that the system remains free from unauthorized

    • Brute Force Attack

      Brute Force Attack

      A brute force attack consists of trying every possible code, combination, or password until the right one is found. Determining the Difficulty of a Brute Force Attack The difficulty of a brute force attack depends on several factors, such as: How long can the key be? How many possible values can each key component have?

    • How to Set up a VPN

      How to Set up a VPN

      A Virtual Private Network (VPN) is typically used by companies, schools, and other organizations when they want to allow remote access to their servers, printers, and other network devices without compromising security. A VPN therefore extends a private network across the internet, but protects this connection by encrypting it, thereby creating what many refer to

    • Wordlists

      Wordlists

      A wordlist is a text file containing a collection of words for use in a dictionary attack. Wordlist Usage A dictionary attack using a wordlist relies on the fact that most users choose weak passwords. Very common passwords include password, computer, work, and most of the popular female names. Common Dictionary Attacks Using A Wordlist

    • How to Securely Erase Data

      How to Securely Erase Data

      When you erase a file on your computer, the actual data in the file is not overwritten. The space utilized by that file is simply marked as “free” for use by other data. Once other data is written in that space, the original data becomes unrecoverable — by most people. Those little bits of magnetic

    • SSH (Secure Shell)

      SSH (Secure Shell)

      SSH (Secure Shell) is one of the most widely-used network protocols supporting secure data communication in academia and industry today. The protocol supports remote command execution, command-line login, and other secure network services between two networked computer hosts. The computers make use of a secure channel that is setup over an insecure network and both

    • RSA (Rivest, Shamir, and Adleman)

      RSA (Rivest, Shamir, and Adleman)

      RSA, which stands for Rivest, Shamir, and Adleman, is a security algorithm used in digital cryptography. RSA differs from older symmetric algorithms because it has the ability of allowing digital signing as well as advanced encryption for online commerce systems and high-profile institutions. RSA was one of the first major advancements in digital cryptography but

    • How to Recover a Zip Password

      How to Recover a Zip Password

      PKZip utilizes a proprietary stream cipher that is vulnerable to a known plaintext attack, as Eli Biham and Paul C. Kocher describes in A Known Plaintext Attack on the PKZIP Stream Cipher. In ZIP Attacks with Reduced Known-Plaintext, Michael Stay describes an improved known plaintext attack that works against files that non-PKZip zip programs such

    security