• Main Menu
  • Security

    • How to Remove Spyware Manually

      How to Remove Spyware Manually

      Manually removing spyware is not an easy task. Usually the best course of action to remove spyware from your computer is to download and install a free spyware removal tool that will do this job for you. However, sometimes a problem arises in which the spyware removal program is unable to delete the spyware files

    • Buffer Overflow

      Buffer Overflow

      A buffer overflow occurs when a computer application attempts to assign data to a data structure past the point that the structure is designed to store information. In the classic case, a buffer is a sequential memory section that is assigned to contain information. The type of information can vary from an array of integers

    • iFrame Injection

      iFrame Injection

      An iFrame injection is a very common cross site scripting (or XSS) attack. It consists of one or more iFrame tags that have been inserted into a page or post’s content and typically downloads an executable program or conducts other actions that compromise the site visitors’ computers. In the best case, Google may label the

    • How to Delete WD SmartWare

      How to Delete WD SmartWare

      Western Digital (WD) Portable Hard Drives are capable of storing quite a bit of information. Modern Western Digital drives come with a firmware called “SmartWare,” which can be useful to some users. The SmartWare can provide backup solutions that may not be available with the operating system in use. WD hard drives with SmartWare also

    • Sonicwall Default Password

      Sonicwall Default Password

      Sonicwall is a company that produces routers, modems, VPN (Virtual Private Network) hardware, and firewall solutions for both personal and commercial users. Sonicwall routers, in particular, are widely distributed to an array of consumers who access the Internet through high speed secure connections due to the support that Sonicwall products provide. Sonicwall routers generally consist

    • Anonymous Proxy

      Anonymous Proxy

      An anonymous proxy is a piece of software that protects web browsers’ privacy and anonymity from web site operators, Internet snoops, and even unfriendly governments. The anonymous proxy software resides on a proxy server. The web browser connects to the proxy server and the proxy server connects to the web server. The web server does

    • PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy) is a data encryption and decryption program used in e-mail messaging, encrypting/decrypting texts, files, or even disk partitions, in order to provide security of data. The program was created in 1991, by Phil Zimmerman. Pretty Good Privacy encryption is based on using a serial combination of data compression, hashing, public-key cryptography

    • How to Reset a MySQL Password

      How to Reset a MySQL Password

      A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. Start the mysqld daemon process with the –skip-grant-tables option. Start the mysql client with the -u root option. Execute the UPDATE mysql.user SET Password=PASSWORD(‘password’) WHERE User=’root’; Execute the FLUSH PRIVILEGES; command. These steps reset the password for the “root” account

    • How a Smart Card Reader Works

      How a Smart Card Reader Works

      Smart Card Readers are also known as card programmers (because they can write to a card), card terminals, card acceptance device (CAD), or an interface device (IFD). There is a slight difference between the card reader and the terminal. The term ‘reader’ is generally used to describe a unit that interfaces with a PC for

    • TEMPEST

      TEMPEST

      TEMPEST stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission of digital pulses (zeroes and ones)

    security
    642 queries in 0.629 seconds.