• Main Menu
  • Security

    • Buffer Overflow

      Buffer Overflow

      A buffer overflow occurs when a computer application attempts to assign data to a data structure past the point that the structure is designed to store information. In the classic case, a buffer is a sequential memory section that is assigned to contain information. The type of information can vary from an array of integers

    • GnuPG Shell

      GnuPG Shell

      Everyone likes safety. The safety of confidential information is always of special concern. Therefore, information protection is a necessity and can be useful to companies and individuals who care about their intellectual property’s confidentiality. People who want their e-mails kept confidential and their e-mail attachments readable only to the intended recipient can appreciate information protection.

    • What is TrueCrypt?

      What is TrueCrypt?

      TrueCrypt is a free, open source disk encryption software that is available for the Windows XP, Windows Vista, Windows 7, Mac, Linux, and Unix operating systems. TrueCrypt provides users with real time encryption/decryption, parallelization and pipelining to read/write to partitions as fast as non-encrypted partitions, and plausible deniability through hidden volumes and hidden operating systems

    • How to Uninstall CyberDefender

      How to Uninstall CyberDefender

      CyberDefender is an example of malicious software that poses as an anti-virus software. CyberDefender runs a fake computer scan, then lists a number of “threats” that are really non-existent files, random files, or files that are essential to the computer’s performance. When the user attempts to remove these threats, CyberDefender asks the user to purchase

    • How to Clear MSN Search History

      How to Clear MSN Search History

      When using MSN and doing a search, you are using the Bing software which is Microsoft’s search engine. However, one of the things that you might want to do is clear your search history. Perhaps you were searching fro something on a computer that you don’t want anyone to know. Maybe you just don’t want

    • How to Disable LoJack

      How to Disable LoJack

      LoJack refers to a GPS dependent tracking device that allows users to locate devices or vehicles that have been stolen. It is available in both a software version for computers and a hardware version for vehicles and communicates with GPS satellites to show a user where his/her stolen item currently is. LoJack can be activated

    • Anonymous Proxy Lists

      Anonymous Proxy Lists

      Anonymous proxies appear on the Internet constantly, often only to disappear rapidly when their owners discover the bandwidth cost. To help users find a current anonymous proxy server, dedicated individuals maintain anonymous proxy lists. Anonymous Proxy Server Lists We maintain our own anonymous proxy list that users can access by clicking the Proxy Sites button

    • Bootable Antivirus

      Bootable Antivirus

      Bootable antivirus software refers to any type of antivirus program that can be booted from a CD, DVD, or removable hard drive and can detect viruses on a user’s computer without having to startup Windows. Bootable antivirus software can be very important when a virus takes over a computer or prevents regular antivirus software from

    • How can I Change my tmnet Password?

      How can I Change my tmnet Password?

      TMNet is the primary broadband provider servicing the country of Malaysia. Depending on the consumer’s location in the country, the available download and upload speeds of the service will vary. The majority of industry, government, academic, and consumer usage in the country uses the TM Net Streamyx service in order to access the Internet, stream

    127 queries in 0.217 seconds.