• Main Menu
  • Security

    • How to Delete Recent Searches

      How to Delete Recent Searches

      Deleting recent searches–be they from Bing, Google or Yahoo–is an easy thing to do. While the steps vary a little from Internet Explorer to FireFox, for the most part, they take the same amount of time and can be found in the same place. Deleting Recent Searches in Internet Explorer Click on the tools button.

    • Digital Certificates

      Digital Certificates

      Digital certificates are the equivalent of a driver’s license, a marriage license, or any other form of identity. The only difference is that a digital certificate is used in conjunction with a public key encryption system. Digital certificates are electronic files that simply work as an online passport. Digital certificates are issued by a third

    • Bump Keys

      Bump Keys

      A bump key is a specially crafted key that is commonly used to open any lock the key blank will fit in. Criminals use bump keys to quickly open key based locks that utilize a cylendar and tumbler design without causing damage or leaving any other indication that the lock was tampered with. Criminal use

    • What is an Email Spoofing?

      What is an Email Spoofing?

      Email spoofing occurs when an email is sent from one person or program that makes it appear as though it is legitimately from another. For example, user1@youremail.com creates an email, but when it is sent the “From” field has another person/organization’s email address such as fake@somecompany.com. When the person who receives the email clicks the

    • How to Uninstall Nero Scout

      How to Uninstall Nero Scout

      Nero Scout is a small utility that is bundled with the recent versions of the popular program, Nero. It is a tool used for cataloging various media files and images for easy referencing. Uninstalling Nero Scout Click Start, Run and input the following line: regsvr32 /u “%COMMONPROGRAMFILES%AheadLibMediaLibraryNSE.dll” Restart your computer and check to see if

    • How Do Password Hacking Programs Work?

      How Do Password Hacking Programs Work?

      Password hacking programs work by using a number of approaches to either decrypt or guess a working password. Three of the most common approaches that password hacking programs use are: Known Ciphertext Attacks Dictionary Attacks Brute Force Attacks The specific algorithm that the password hacking program implements depends on the password system’s design. Each password

    • How to Change a Password

      How to Change a Password

      There are various scenarios in which a password needs to be used. A feature that goes hand-in-hand with password use is the ability to change or reset it. The need to change a password arises predominantly for two reasons: 1) as a means of maintaining high security by regularly changing the password so that unauthorized

    • Test Credit Card Numbers

      Test Credit Card Numbers

      A test credit card number is the card number of a fake live credit account provided by a credit card company in order for retailers to verify that their card readers are working properly and that they are compatible with a specific credit card brand. Test credit card numbers are read like real credit card

    • Logic Bomb

      Logic Bomb

      A logic bomb is a program, or portion of a program, which lies dormant until a specific piece of program logic is activated. In this way, a logic bomb is very analagous to a real-world land mine. The most common activator for a logic bomb is a date. The logic bomb checks the system date

    • How to Delete WD SmartWare

      How to Delete WD SmartWare

      Western Digital (WD) Portable Hard Drives are capable of storing quite a bit of information. Modern Western Digital drives come with a firmware called “SmartWare,” which can be useful to some users. The SmartWare can provide backup solutions that may not be available with the operating system in use. WD hard drives with SmartWare also

    119 queries in 0.360 seconds.