• Main Menu
  • Security

    • How to Determine if a Credit Card Number is Valid

      How to Determine if a Credit Card Number is Valid

      Credit cards use the Luhn Check Digit Algorithm. The main purpose of the Luhn Check Digit Algorithm is to catch data entry errors, but it does double duty here as a weak security tool. The Luhn Check Digit Algorithm For a card with an even number of digits, double every odd numbered digit (1st digit,

    • How a Smart Card Programmer Works

      How a Smart Card Programmer Works

      A smart card is a mini computer which requires programming to run. A smart card doesn’t contain an interface-like display or keyboard, so smart card readers are used to read or update the data tofrom smart cards. Smart cards contain an operating system which provides a platform to run applications. Smart card operating systems can

    • D-Link Default Password

      D-Link Default Password

      D-Link is a computer equipment brand that specializes in producing networking devices such as routers, modems, and network storage devices. D-Link routers, in particular, are often found in both residential and commercial environments and a wide variety of individuals use them to maximize the potential of their Internet access. D-link routers often contain two or

    • How to Find Stored Passwords on a Computer

      How to Find Stored Passwords on a Computer

      There are a large number of websites and programs that prompt end users to save passwords on their personal computer(s). Popular web browsers such as Mozilla Firefox, Internet Explorer, Google Chrome, and instant messaging software like Windows Live Messenger are capable of saving user logins and passwords on the local computer. A common task that

    • Known Plaintext Attack

      Known Plaintext Attack

      In cryptography, the known plaintext attack, or KPA, is an attack based on having samples of both the plaintext and corresponding encrypted or ciphertext for that information available. This information is used to conduct an analysis of the data in order to determine the secret key used to encrypt and decrypt the information. Historical ciphers

    • lsass.exe

      lsass.exe

      LSASS, or local security authority subsystem service, is a process that functions as part of the Microsoft Windows operating system. Essentially, LSASS is part of the process for maintaining and enforcing the security protocols on the operating system. To this end, LSASS performs several important functions to ensure that the system remains free from unauthorized

    • How to Remove all Personal Files from Windows

      How to Remove all Personal Files from Windows

      Over the last decade, millions of people have kept more and more personal information on their computers. From credit card numbers to sensitive emails and word documents, a vast amount of personal files are on almost any home computer. While keeping personal and sensitive information on a home computer is relatively safe, if you plan

    • ISO 7816

      ISO 7816

      ISO 7816 is the internationally accepted standard for smart cards. ISO 7816 is a family of standards primarily dealing with aspects of smart card interoperability regarding communication characteristics, physical properties, and application identifiers of the implanted chip and data. The ISO 7816 family includes eleven parts which are in a constant state of flux as

    • Technologies That Can Help Protect Your Privacy

      Technologies That Can Help Protect Your Privacy

      In a previous article on privacy we’ve established what it is, how does digitally networking our world affect it, and in a nutshell, why should we care. We established that the best way to ensure your privacy is through technological means, and in this article I offer an overview of what such technologies are. What

    • Known Ciphertext Attack

      Known Ciphertext Attack

      The known ciphertext attack, or ciphertext only attack (COA) is an attack method used in cryptanalysis when the attacker has access to a given set of ciphertext(s). The attacker does not have access to corresponding cleartext in this method; however, COA is successful when correspdonding plaintext can be determined from a given set of ciphertext.

    179 queries in 0.791 seconds.