• Main Menu
  • Security

    • Forensic Science

      Forensic Science

      The word forensic comes from the Latin word forensis, which means “before the forum,” and refers to something “of, pertaining to, or used in a court of law.” In this day and age, it almost always refers to a method of obtaining criminal evidence in order to use it in a court of law. Forensic

    • PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy) is a data encryption and decryption program used in e-mail messaging, encrypting/decrypting texts, files, or even disk partitions, in order to provide security of data. The program was created in 1991, by Phil Zimmerman. Pretty Good Privacy encryption is based on using a serial combination of data compression, hashing, public-key cryptography

    • How Do Password Hacking Programs Work?

      How Do Password Hacking Programs Work?

      Password hacking programs work by using a number of approaches to either decrypt or guess a working password. Three of the most common approaches that password hacking programs use are: Known Ciphertext Attacks Dictionary Attacks Brute Force Attacks The specific algorithm that the password hacking program implements depends on the password system’s design. Each password

    • How to Change an AOL Password

      How to Change an AOL Password

      There are two circumstances that can cause someone to want to change his/her AOL password: 1) forgetting the AOL password and needing to recover it and 2)  to change the AOL password. The latter can be because the AOL password has leaked to someone or the user wants to adhere to the good practice of

    • How to Find Stored Passwords on a Computer

      How to Find Stored Passwords on a Computer

      There are a large number of websites and programs that prompt end users to save passwords on their personal computer(s). Popular web browsers such as Mozilla Firefox, Internet Explorer, Google Chrome, and instant messaging software like Windows Live Messenger are capable of saving user logins and passwords on the local computer. A common task that

    • Cryptology

      Cryptology

      The field of cryptology includes both the study of and practice of securing information in the presence of untrusted third parties or adversaries. Specifically, it is focused on creating and analyzing the protocols used to subvert attempts by adversaries to gain access to or interrupt the flow of information between trusted parties. Specific focus areas

    • Substitution and Transposition Ciphers

      Substitution and Transposition Ciphers

      Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. The Caesar Cipher was an early substitution cipher. In the Caesar

    • How to Hide an IP

      How to Hide an IP

      Hiding an IP online is necessary for a variety of reasons. Various websites, video games, and miscellaneous connections to the Internet share information about the network’s location and host. The simplest way to prevent sharing this information, while still being able to connect to the Internet is by hiding the individual’s and his/her Internet enabled

    • How MS Access Encryption Works

      How MS Access Encryption Works

      Microsoft Access had no encryption capability until the release of Microsoft Access 2007. With the MS Access 2007 release, encryption is now available. Encryption Requirements To encrypt your access database you must use a new database format released with MS Access 2007, the ACCDB format. Differences between the original MDB format and the new ACCDB

    • RSA (Rivest, Shamir, and Adleman)

      RSA (Rivest, Shamir, and Adleman)

      RSA, which stands for Rivest, Shamir, and Adleman, is a security algorithm used in digital cryptography. RSA differs from older symmetric algorithms because it has the ability of allowing digital signing as well as advanced encryption for online commerce systems and high-profile institutions. RSA was one of the first major advancements in digital cryptography but

    security
    289 queries in 0.314 seconds.