• Main Menu
  • Security

    • The Zeus Virus

      The Zeus Virus

      The Zeus Virus is the popular term for the Zeus banking Trojan virus which was used to steal bank account details and passwords in the U.K. This resulted in a loss of more than $850,000 for those infected. The Zeus virus has been around for a number of years as part of the larger Zeus

    • Forensic Science

      Forensic Science

      The word forensic comes from the Latin word forensis, which means “before the forum,” and refers to something “of, pertaining to, or used in a court of law.” In this day and age, it almost always refers to a method of obtaining criminal evidence in order to use it in a court of law. Forensic

    • How Do I Get Rid of About Blank?

      How Do I Get Rid of About Blank?

      About: Blank is a homepage hijacker that severely slows down your computer and shows popup advertisements randomly while using one’s Internet browser. While it does not do actual damage to the computer, it does limit what can be done on the computer because, at times, the About: Blank could be using as high as 80%

    • How to Clean Porn from a Computer

      How to Clean Porn from a Computer

      Virtually every computer in the world has some form of adult pornography stored somewhere on its hard drive. This can be due to personal use, viruses, or the fact that pornography seems to be included with every downloaded file, opened webpage, and email attachment. Pornography can also be a concern when many people have access

    • What is an Email Spoofing?

      What is an Email Spoofing?

      Email spoofing occurs when an email is sent from one person or program that makes it appear as though it is legitimately from another. For example, user1@youremail.com creates an email, but when it is sent the “From” field has another person/organization’s email address such as fake@somecompany.com. When the person who receives the email clicks the

    • Logic Bomb

      Logic Bomb

      A logic bomb is a program, or portion of a program, which lies dormant until a specific piece of program logic is activated. In this way, a logic bomb is very analagous to a real-world land mine. The most common activator for a logic bomb is a date. The logic bomb checks the system date

    • ISO 7816

      ISO 7816

      ISO 7816 is the internationally accepted standard for smart cards. ISO 7816 is a family of standards primarily dealing with aspects of smart card interoperability regarding communication characteristics, physical properties, and application identifiers of the implanted chip and data. The ISO 7816 family includes eleven parts which are in a constant state of flux as

    • Why Do I Keep Getting Redirected from Google?

      Why Do I Keep Getting Redirected from Google?

      Google or any other search engine may become abnormal when a researcher attempts to search or click on a query and redirect him/her from the page that he/she intended to visit. This is known as a redirect and a wide variety of malware can cause it. It is important to understand what may be causing

    • How to Change a Password

      How to Change a Password

      There are various scenarios in which a password needs to be used. A feature that goes hand-in-hand with password use is the ability to change or reset it. The need to change a password arises predominantly for two reasons: 1) as a means of maintaining high security by regularly changing the password so that unauthorized

    • How to Bypass Websense

      How to Bypass Websense

      Many businesses and government institutions use a content filtering program such as Websense to keep employees from visiting certain websites while at work. These programs can either prohibit the use of certain websites or monitor all of the sites that employees visit while in the office. Websense blocks several website categories: adult material, entertainment, drugs,

    security
    470 queries in 0.634 seconds.