• Main Menu
  • Security

    • Forensic Science

      Forensic Science

      The word forensic comes from the Latin word forensis, which means “before the forum,” and refers to something “of, pertaining to, or used in a court of law.” In this day and age, it almost always refers to a method of obtaining criminal evidence in order to use it in a court of law. Forensic

    • Logic Bomb

      Logic Bomb

      A logic bomb is a program, or portion of a program, which lies dormant until a specific piece of program logic is activated. In this way, a logic bomb is very analagous to a real-world land mine. The most common activator for a logic bomb is a date. The logic bomb checks the system date

    • ISO 7816

      ISO 7816

      ISO 7816 is the internationally accepted standard for smart cards. ISO 7816 is a family of standards primarily dealing with aspects of smart card interoperability regarding communication characteristics, physical properties, and application identifiers of the implanted chip and data. The ISO 7816 family includes eleven parts which are in a constant state of flux as

    • How to Change a Yahoo Password

      How to Change a Yahoo Password

      To change a Yahoo Password, visit Yahoo: Change Password. Changing a Yahoo password causes all the passwords on Yahoo’s personalized services to change. These personalized services include: Yahoo! Mail Yahoo! Messenger Yahoo! Chat My Yahoo! Yahoo! Finance The instructions to change a Yahoo password will only work if the user knows his/her current Yahoo password.

    • How a Smart Card Reader Works

      How a Smart Card Reader Works

      Smart Card Readers are also known as card programmers (because they can write to a card), card terminals, card acceptance device (CAD), or an interface device (IFD). There is a slight difference between the card reader and the terminal. The term ‘reader’ is generally used to describe a unit that interfaces with a PC for

    • How to Change an AOL Password

      How to Change an AOL Password

      There are two circumstances that can cause someone to want to change his/her AOL password: 1) forgetting the AOL password and needing to recover it and 2)  to change the AOL password. The latter can be because the AOL password has leaked to someone or the user wants to adhere to the good practice of

    • What is Bluejacking?

      What is Bluejacking?

      Bluejacking is a relatively new term that describes the act of sending an anonymous message to other Bluetooth equipped devices such as mobile phones, laptops, printers, cars, and Personal Data Assistants (PDAs). To date, mobile users have primarily Bluejacked others in their general proximity for friendly purposes. Bluejacking is possible because Bluetooth technology is open

    • Digital Certificates

      Digital Certificates

      Digital certificates are the equivalent of a driver’s license, a marriage license, or any other form of identity. The only difference is that a digital certificate is used in conjunction with a public key encryption system. Digital certificates are electronic files that simply work as an online passport. Digital certificates are issued by a third

    • Why People Write Computer Viruses?

      Why People Write Computer Viruses?

      We hear about new computer viruses all the time. What is the motivation behind developing computer viruses and watching them wreak havoc on the Internet? Fact Gathering Many viruses raid your documents including your email address book for information that can be used to make business contacts. This data is assembled into a database that

    • How to Track a Stolen Laptop

      How to Track a Stolen Laptop

      More consumers are purchasing laptops for personal and business use. Unfortunately, the number of stolen laptops has increased with this rise in laptop purchases. Most consumers do not plan for the possibility of being robbed, and lose a significant amount of personal and sensitive data as a result. The police never find many of these

    331 queries in 0.449 seconds.