• Main Menu
  • Security

    • How to Remove a Keylogger

      How to Remove a Keylogger

      In the last few decades, computer science has changed the world. People now use computers to pay their bills, talk to their friends, and virtually everything else. Because of this dependence on computers, the vast majority of computer users have opened a portal into their homes that hackers and cyber thieves can use to steal

    • AES (Rijndael)

      AES (Rijndael)

      AES (Advanced Encryption Standard) is the currently employed specification for encrypting electronic data by the United States National Institute of Standards and Technology, or NIST. AES was selected as the U.S. standard for encryption of unclassified information in 2001 supplanting DES which had been the U.S. standards for a number of years (since 1977). AES

    • XOR Encryption

      XOR Encryption

      The XOR encryption is a simple symmetric cipher that is used in many applications where security is not a defined requirement. The XOR Operator XOR (Exclusive OR) is a bitwise operator from binary mathematics. The six bitwise operators, as defined in the C programming language, are: Operation Symbol AND & Inclusive OR | Exclusive OR

    • How to Decrypt Cisco Passwords

      How to Decrypt Cisco Passwords

      If  ‘service password-encryption’ is not configured on the Cisco device, simply read the plain text passwords from the configuration file. If ‘service password-encryption’ is configured on the Cisco device, most of the passwords are encrypted with a weak encryption algorithm (Type 7) that is easy to decrypt. Once there is access to the Cisco configuration

    • How to Uninstall Hotbar

      How to Uninstall Hotbar

      The HotBar add-on is an add-on program for Internet Explorer that personalizes email, as well as the  functionality and visual appearance of browser applications. While performing the functions noted above, HotBar also makes multiple connections with “hotbar.com” and “reports.shopperreports.com”. Hotbar also monitors phrases the user enters into search engines and reports them to third parties

    • How to Delete Recent Searches

      How to Delete Recent Searches

      Deleting recent searches–be they from Bing, Google or Yahoo–is an easy thing to do. While the steps vary a little from Internet Explorer to FireFox, for the most part, they take the same amount of time and can be found in the same place. Deleting Recent Searches in Internet Explorer Click on the tools button.

    • ISO 7816

      ISO 7816

      ISO 7816 is the internationally accepted standard for smart cards. ISO 7816 is a family of standards primarily dealing with aspects of smart card interoperability regarding communication characteristics, physical properties, and application identifiers of the implanted chip and data. The ISO 7816 family includes eleven parts which are in a constant state of flux as

    • Bump Keys

      Bump Keys

      A bump key is a specially crafted key that is commonly used to open any lock the key blank will fit in. Criminals use bump keys to quickly open key based locks that utilize a cylendar and tumbler design without causing damage or leaving any other indication that the lock was tampered with. Criminal use

    • MD5 (Message Digest 5)

      MD5 (Message Digest 5)

      MD5 is a message digest algorithm. MD5 takes a variable length input and produces a 128-bit message digest. MD5 was designed by Ron Rivest in 1991. MD5 is officially defined in RFC 1321 – The MD5 Message-Digest Algorithm. MD5 Usage MD5 is used in many applications, including GPG, Kerberos, TLS / SSL, Cisco type 5

    } 123 queries in 0.377 seconds.