• Main Menu
  • Security

    • How to Change Your Streamyx Password

      How to Change Your Streamyx Password

      TM Net provides the Streamyx broadband Internet service in Malaysia. The service speeds range depending on the consumer’s location in the country and proximity to major network infrastructure; however, a large number of companies, schools, and individual consumers use the service for normal Internet use as well as to host websites and to stream video.

    • How to Delete Search History

      How to Delete Search History

      For many computer users privacy is important. If you use a computer for searching the web, there may be times when you prefer to not leave a digital trail of the sites you visited. For those looking to delete their search history, you should know it is extremely easy, here are some tips. Deleting Your

    • SMSS.exe

      SMSS.exe

      There are many processes that run behind the scenes in Windows operating systems. One of these processes that may look suspicious is the SMSS.exe. This is an execution file with the full name Session Management Subsystem. The Session Manager Subsystem is responsible for starting a session. When this process begins, the system thread is responsible

    • How to Remove Spyware Manually

      How to Remove Spyware Manually

      Manually removing spyware is not an easy task. Usually the best course of action to remove spyware from your computer is to download and install a free spyware removal tool that will do this job for you. However, sometimes a problem arises in which the spyware removal program is unable to delete the spyware files

    • Steganography

      Steganography has gained a significant amount of press over the past several years when the technique hit the press as a possible method that many of the terrorists involved with the 9/11 attacks used to plan the operation. Similar to the use of encryption, steganography techniques have become one of the basic methods that organizations

    • PKI Authorities

      PKI Authorities

      PKI Authorities consists of three different authorities that essentially make up a PKI system. These are the Registration Authority, Certification Authority and Certificate Directory. Registration Authority The jobs of the Registration Authority are to processes user requests, confirm their identities, and induct them into the user database. Certification Authority The tasks of a Certification Authority

    • Substitution and Transposition Ciphers

      Substitution and Transposition Ciphers

      Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. The Caesar Cipher was an early substitution cipher. In the Caesar

    • How MS Access Encryption Works

      How MS Access Encryption Works

      Microsoft Access had no encryption capability until the release of Microsoft Access 2007. With the MS Access 2007 release, encryption is now available. Encryption Requirements To encrypt your access database you must use a new database format released with MS Access 2007, the ACCDB format. Differences between the original MDB format and the new ACCDB

    • How to Reset a MySQL Password

      How to Reset a MySQL Password

      A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. Start the mysqld daemon process with the –skip-grant-tables option. Start the mysql client with the -u root option. Execute the UPDATE mysql.user SET Password=PASSWORD(‘password’) WHERE User=’root’; Execute the FLUSH PRIVILEGES; command. These steps reset the password for the “root” account

    • HijackThis

      HijackThis

      Are viruses and malware affecting your computer efficiency? Try HijackThis. HijackThis, popularly known in the computing world as HJT, is one of the most effective spyware and malware removal software tool available for detecting and removing harmful viruses, spyware, worms, Trojans and other pests affecting Microsoft Windows. This program was originally developed by Merijn Bellekom,

    security
    643 queries in 0.856 seconds.