• Main Menu
  • Security

    • Tools that Hackers Use

      Tools that Hackers Use

      Breaking into secured networks or computers is not an easy job, especially with the level of security some companies employ. Still, the fact remains – anything the mind of man can conjure can be broken into – and this is a challenge that no hacker can resist. Understanding the means by which hackers pursue their

    • Cisco Router Default Passwords

      Cisco Router Default Passwords

      Cisco routers are routers that Cisco, a leading provider in network devices, produces. Cisco has millions of customers worldwide and produces thousands of products, including routers, modems, and network storage devices that allow the user to connect to the Internet. Cisco also produces USB based Internet cards and distributes service plans that a wide variety

    • What is TrueCrypt?

      What is TrueCrypt?

      TrueCrypt is a free, open source disk encryption software that is available for the Windows XP, Windows Vista, Windows 7, Mac, Linux, and Unix operating systems. TrueCrypt provides users with real time encryption/decryption, parallelization and pipelining to read/write to partitions as fast as non-encrypted partitions, and plausible deniability through hidden volumes and hidden operating systems

    • How to Open a Simplex Lock

      How to Open a Simplex Lock

      Simplex locks, now manufactured by Kaba Ilco, are simple push-button combination locks. Simplex locks are used to protect equipment rooms, labs, and FedEx-type boxes. Simplex locks are used whenever having a large number of keys would create logistical problems. Simplex Lock Combinations The Simplex lock would be a normal 5-button combination lock, except for one

    • One-Time Pad

      One-Time Pad

      A one-time pad is a form of encryption that is difficult to decipher or crack if one is not the intended recipient. If done correctly, the strength of encryption of plaintext can almost be impossible to break in a useful timeframe. The system takes each character from plaintext and uses modular addition with a character

    • Kerberos

      Kerberos

      Kerberos is a network authentication protocol which utilizes symmetric cryptography to provide authentication for client-server applications. Kerberos Standard Definition Kerberos is defined in RFC 1510 – The Kerberos Network Authentication Service (V5). Kerberos Architecture The core of  Kerberos architecture is the KDC (Key Distribution Server). The KDC stores authentication information and uses it to securely

    • TP Link Default Password

      TP Link Default Password

      TP Link is large manufacturer of networking products that boasts tens of millions of customers worldwide. TP Link produces thousands of networking products, including modems, routers, and network storage devices. TP Link also markets a number of USB based modem cards, device emulators, and service packages for a variety of cellular and Internet providers. TP

    • How to Decrypt Cisco Passwords

      How to Decrypt Cisco Passwords

      If  ‘service password-encryption’ is not configured on the Cisco device, simply read the plain text passwords from the configuration file. If ‘service password-encryption’ is configured on the Cisco device, most of the passwords are encrypted with a weak encryption algorithm (Type 7) that is easy to decrypt. Once there is access to the Cisco configuration

    • How to Delete Recent Searches

      How to Delete Recent Searches

      Deleting recent searches–be they from Bing, Google or Yahoo–is an easy thing to do. While the steps vary a little from Internet Explorer to FireFox, for the most part, they take the same amount of time and can be found in the same place. Deleting Recent Searches in Internet Explorer Click on the tools button.

    • What Are Default Passwords?

      The following are default usernames and passwords for many systems: AS/400 qsecofr qsecofr /* master security officer */ qsysopr qsysopr /* system operator */ qpgmr also qpgmr /* default programmer */ ibm password ibm 2222 ibm service qsecofr 1111111 qsecofr 2222222 qserv qserv qsvr qsvr secofr secofr qsrv ibmce1 DECserver ACCESS SYSTEM Dynix (The library

    333 queries in 0.515 seconds.