• Main Menu
  • Security

    • How to Clear MSN Search History

      How to Clear MSN Search History

      When using MSN and doing a search, you are using the Bing software which is Microsoft’s search engine. However, one of the things that you might want to do is clear your search history. Perhaps you were searching fro something on a computer that you don’t want anyone to know. Maybe you just don’t want

    • Personal RFID Tracking Units

      Personal RFID Tracking Units

      Personal RFID tracking units are personal tracking units that depend on RFID or Radio Frequency Identification technology. Personal RFID tracking units allow users to identify and locate objects and individuals within a specific facility or area. Although personal RFID tracking units are not as popular or as common as other forms of personal tracking units

    • Technologies That Can Help Protect Your Privacy

      Technologies That Can Help Protect Your Privacy

      In a previous article on privacy we’ve established what it is, how does digitally networking our world affect it, and in a nutshell, why should we care. We established that the best way to ensure your privacy is through technological means, and in this article I offer an overview of what such technologies are. What

    • SHA-1

      SHA-1

      SHA stands for Secure Hash Algorithm. It consists of five hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). The five algorithms are SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. SHA-1 is the most commonly used of the SHA series. Hash algorithms are called secure

    • Rubber Hose Cryptology

      Rubber Hose Cryptology

      Rubber Hose Cryptography refers to a file system in which multiple archives are encrypted and hidden on the same disk in a way that makes each archive appear to be the size of the entire disk. Rubber Hose Cryptography is often used to hide illegal or confidential information in an attempt to prevent theft or

    • PKI Authorities

      PKI Authorities

      PKI Authorities consists of three different authorities that essentially make up a PKI system. These are the Registration Authority, Certification Authority and Certificate Directory. Registration Authority The jobs of the Registration Authority are to processes user requests, confirm their identities, and induct them into the user database. Certification Authority The tasks of a Certification Authority

    • How to Change a Yahoo Password

      How to Change a Yahoo Password

      To change a Yahoo Password, visit Yahoo: Change Password. Changing a Yahoo password causes all the passwords on Yahoo’s personalized services to change. These personalized services include: Yahoo! Mail Yahoo! Messenger Yahoo! Chat My Yahoo! Yahoo! Finance The instructions to change a Yahoo password will only work if the user knows his/her current Yahoo password.

    • iFrame Injection

      iFrame Injection

      An iFrame injection is a very common cross site scripting (or XSS) attack. It consists of one or more iFrame tags that have been inserted into a page or post’s content and typically downloads an executable program or conducts other actions that compromise the site visitors’ computers. In the best case, Google may label the

    • lsass.exe

      lsass.exe

      LSASS, or local security authority subsystem service, is a process that functions as part of the Microsoft Windows operating system. Essentially, LSASS is part of the process for maintaining and enforcing the security protocols on the operating system. To this end, LSASS performs several important functions to ensure that the system remains free from unauthorized

    • Smart Card Software

      Smart Card Software

      A smart card contains an integrated circuit (IC) chip containing a central processing unit (CPU), random access memory (RAM) and non-volatile data storage. Data stored in the smart card’s microchip can be accessed only through the chip operating system (COS). Smart cards provide a secure, portable platform for “any time, anywhere” computing that can contain

    } 122 queries in 0.350 seconds.