• Main Menu
  • Security

    • Spyware

      Spyware

      “Spyware” is a term in computer security that is used to refer to a type of malicious program that is capable of infiltrating a user’s computer and spying on his/her activities. Spyware is often used to obtain identity-related or financial information, such as usernames, passwords, social security numbers, and other confidential information.  Spyware programs are

    • How to Delete WD SmartWare

      How to Delete WD SmartWare

      Western Digital (WD) Portable Hard Drives are capable of storing quite a bit of information. Modern Western Digital drives come with a firmware called “SmartWare,” which can be useful to some users. The SmartWare can provide backup solutions that may not be available with the operating system in use. WD hard drives with SmartWare also

    • How a Smart Card Reader Works

      How a Smart Card Reader Works

      Smart Card Readers are also known as card programmers (because they can write to a card), card terminals, card acceptance device (CAD), or an interface device (IFD). There is a slight difference between the card reader and the terminal. The term ‘reader’ is generally used to describe a unit that interfaces with a PC for

    • Trojan Virus

      Trojan Virus

      A Trojan virus is a piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer. The virus takes its name from the “Trojan Horse” from Greek mythology setup outside of the city of Troy. Trojan horse viruses differ from other

    • How to Track a Stolen Laptop

      How to Track a Stolen Laptop

      More consumers are purchasing laptops for personal and business use. Unfortunately, the number of stolen laptops has increased with this rise in laptop purchases. Most consumers do not plan for the possibility of being robbed, and lose a significant amount of personal and sensitive data as a result. The police never find many of these

    • GnuPG Shell

      GnuPG Shell

      Everyone likes safety. The safety of confidential information is always of special concern. Therefore, information protection is a necessity and can be useful to companies and individuals who care about their intellectual property’s confidentiality. People who want their e-mails kept confidential and their e-mail attachments readable only to the intended recipient can appreciate information protection.

    • How to Erase Browser History

      How to Erase Browser History

      Erasing browser history clears the record of what web sites the user visited over a period of time. This can help to protect privacy by preventing others from monitoring what web sites the user has been visiting. Erasing Internet Explorer’s Browser History By default, Internet Explorer keeps browser history for 20 days. To erase browser

    • Cryptology

      Cryptology

      The field of cryptology includes both the study of and practice of securing information in the presence of untrusted third parties or adversaries. Specifically, it is focused on creating and analyzing the protocols used to subvert attempts by adversaries to gain access to or interrupt the flow of information between trusted parties. Specific focus areas

    • X.509

      X.509

      X.509 is an ITU-T (ITU Telecommunication Standardization Sector) standard for PKI (Public Key Infrastructure) in cryptography, which, amongst many other things, defines specific formats for PKC (Public Key Certificates) and the algorithm that verifies a given certificate path is valid under a give PKI (called the certification path validation algorithm). X.509 History X.509 began in

    • How to Find Stored Passwords on a Computer

      How to Find Stored Passwords on a Computer

      There are a large number of websites and programs that prompt end users to save passwords on their personal computer(s). Popular web browsers such as Mozilla Firefox, Internet Explorer, Google Chrome, and instant messaging software like Windows Live Messenger are capable of saving user logins and passwords on the local computer. A common task that

    119 queries in 0.204 seconds.