• Main Menu
  • Security

    • Verizon Router Default Password

      Verizon Router Default Password

      In addition to its services as a cellular telephone carrier, Verizon produces a wide variety of products, such as wireless routers. Verizon routers can be used to wirelessly connect to the Internet via home broadband Internet access, Verizon broadcast towers, or through a Verizon USB based modem card. Verizon routers provide the same support as

    • Cryptanalysis


      Cryptanalysis is the study of analyzing information systems in order to “discover” or “crack” the hidden or secret aspects of those systems. More specifically, cryptanalysis is the study of breaching cryptographic security systems in order to obtain access to the information contained within encrypted messages without necessarily knowing the cryptographic key used to encrypt the

    • How to Delete Internet History

      How to Delete Internet History

      Deleting Internet history clears the record of web sites visited. This procedure helps keep Internet browsing private.  Below are steps to manually delete Internet files from the computer: Delete Internet History in Internet Explorer By default, Internet Explorer keeps Internet history for 20 days. To delete Internet history in Internet Explorer, open the Tools menu,

    • What Are Activation Codes?

      What Are Activation Codes?

      Every time you sign up for a new service, change a password, or do anything that has to do with personal information online, there are activation codes. These codes are sent to your email address, and you have to click on them to activate the account or confirm the change. Most websites out there use

    • Logic Bomb

      Logic Bomb

      A logic bomb is a program, or portion of a program, which lies dormant until a specific piece of program logic is activated. In this way, a logic bomb is very analagous to a real-world land mine. The most common activator for a logic bomb is a date. The logic bomb checks the system date

    • Known Plaintext Attack

      Known Plaintext Attack

      In cryptography, the known plaintext attack, or KPA, is an attack based on having samples of both the plaintext and corresponding encrypted or ciphertext for that information available. This information is used to conduct an analysis of the data in order to determine the secret key used to encrypt and decrypt the information. Historical ciphers

    • How to Reset a LinkSys Router Password

      How to Reset a LinkSys Router Password

      LinkSys is the division of the Cisco Company which manufactures some of the most widely used network routers in the world. The WRT54G, WRT160N, and WRT310N series are the most popular with the WRT54G being the first model deployed that supported third-party firmware. The current generation of LinkSys routers support the draft 802.11N wireless standard

    • What is TrueCrypt?

      What is TrueCrypt?

      TrueCrypt is a free, open source disk encryption software that is available for the Windows XP, Windows Vista, Windows 7, Mac, Linux, and Unix operating systems. TrueCrypt provides users with real time encryption/decryption, parallelization and pipelining to read/write to partitions as fast as non-encrypted partitions, and plausible deniability through hidden volumes and hidden operating systems

    • Symmetric and Asymmetric ciphers

      Symmetric and Asymmetric ciphers

      In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers,

    • X.509


      X.509 is an ITU-T (ITU Telecommunication Standardization Sector) standard for PKI (Public Key Infrastructure) in cryptography, which, amongst many other things, defines specific formats for PKC (Public Key Certificates) and the algorithm that verifies a given certificate path is valid under a give PKI (called the certification path validation algorithm). X.509 History X.509 began in

    665 queries in 0.895 seconds.