• Main Menu
  • Security

    • How to Remove a Virus

      How to Remove a Virus

      A computer virus is designed to infect computer files through self-replication, and is able to infect other computers on its own. Viruses infect computers through boot sectors of portable drives, email attachments, other files, and by exploiting vulnerabilities in instant messaging and other real-time communication systems online. Not all computer viruses harm computers, but many

    • Substitution and Transposition Ciphers

      Substitution and Transposition Ciphers

      Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. The Caesar Cipher was an early substitution cipher. In the Caesar

    • X.509

      X.509

      X.509 is an ITU-T (ITU Telecommunication Standardization Sector) standard for PKI (Public Key Infrastructure) in cryptography, which, amongst many other things, defines specific formats for PKC (Public Key Certificates) and the algorithm that verifies a given certificate path is valid under a give PKI (called the certification path validation algorithm). X.509 History X.509 began in

    • The Zeus Virus

      The Zeus Virus

      The Zeus Virus is the popular term for the Zeus banking Trojan virus which was used to steal bank account details and passwords in the U.K. This resulted in a loss of more than $850,000 for those infected. The Zeus virus has been around for a number of years as part of the larger Zeus

    • How to Change an AOL Password

      How to Change an AOL Password

      There are two circumstances that can cause someone to want to change his/her AOL password: 1) forgetting the AOL password and needing to recover it and 2)  to change the AOL password. The latter can be because the AOL password has leaked to someone or the user wants to adhere to the good practice of

    • How to Remove a Keylogger

      How to Remove a Keylogger

      In the last few decades, computer science has changed the world. People now use computers to pay their bills, talk to their friends, and virtually everything else. Because of this dependence on computers, the vast majority of computer users have opened a portal into their homes that hackers and cyber thieves can use to steal

    • Trojan Virus

      Trojan Virus

      A Trojan virus is a piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer. The virus takes its name from the “Trojan Horse” from Greek mythology setup outside of the city of Troy. Trojan horse viruses differ from other

    • How to Find Stored Passwords on a Computer

      How to Find Stored Passwords on a Computer

      There are a large number of websites and programs that prompt end users to save passwords on their personal computer(s). Popular web browsers such as Mozilla Firefox, Internet Explorer, Google Chrome, and instant messaging software like Windows Live Messenger are capable of saving user logins and passwords on the local computer. A common task that

    • Trendnet Default Password

      Trendnet Default Password

      Trendnet advertises itself as an Ethernet based device manufacturer, but also boasts a large collection of wireless devices as well. Trendnet routers often include dual antennas for maximum coverage, four Ethernet ports, and advanced WPA encryption. Trendnet devices tend to be small, lightweight, and stylish, allowing users to set them up and forget about them.

    • Belkin Router Default Password

      Belkin Router Default Password

      Belkin is a leading manufacturer of networking devices such as modems, wireless routers, and network storage devices. Belkin also produces a number of other wireless access devices and USB based modem cards and markets a number of data plans for some of the largest Internet Service Providers. Belkin Router Default Password As with any other

    security
    471 queries in 0.468 seconds.