• Main Menu
  • Security

    • PKI Authorities

      PKI Authorities

      PKI Authorities consists of three different authorities that essentially make up a PKI system. These are the Registration Authority, Certification Authority and Certificate Directory. Registration Authority The jobs of the Registration Authority are to processes user requests, confirm their identities, and induct them into the user database. Certification Authority The tasks of a Certification Authority

    • Substitution and Transposition Ciphers

      Substitution and Transposition Ciphers

      Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. The Caesar Cipher was an early substitution cipher. In the Caesar

    • How MS Access Encryption Works

      How MS Access Encryption Works

      Microsoft Access had no encryption capability until the release of Microsoft Access 2007. With the MS Access 2007 release, encryption is now available. Encryption Requirements To encrypt your access database you must use a new database format released with MS Access 2007, the ACCDB format. Differences between the original MDB format and the new ACCDB

    • How to Reset a MySQL Password

      How to Reset a MySQL Password

      A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. Start the mysqld daemon process with the –skip-grant-tables option. Start the mysql client with the -u root option. Execute the UPDATE mysql.user SET Password=PASSWORD(‘password’) WHERE User=’root’; Execute the FLUSH PRIVILEGES; command. These steps reset the password for the “root” account

    • HijackThis

      HijackThis

      Are viruses and malware affecting your computer efficiency? Try HijackThis. HijackThis, popularly known in the computing world as HJT, is one of the most effective spyware and malware removal software tool available for detecting and removing harmful viruses, spyware, worms, Trojans and other pests affecting Microsoft Windows. This program was originally developed by Merijn Bellekom,

    • Cryptanalysis

      Cryptanalysis

      Cryptanalysis is the study of analyzing information systems in order to “discover” or “crack” the hidden or secret aspects of those systems. More specifically, cryptanalysis is the study of breaching cryptographic security systems in order to obtain access to the information contained within encrypted messages without necessarily knowing the cryptographic key used to encrypt the

    • The History of Computer Viruses

      The History of Computer Viruses

      Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed

    • TEMPEST

      TEMPEST

      TEMPEST stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission of digital pulses (zeroes and ones)

    • Symmetric and Asymmetric ciphers

      Symmetric and Asymmetric ciphers

      In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers,

    • Trendnet Default Password

      Trendnet Default Password

      Trendnet advertises itself as an Ethernet based device manufacturer, but also boasts a large collection of wireless devices as well. Trendnet routers often include dual antennas for maximum coverage, four Ethernet ports, and advanced WPA encryption. Trendnet devices tend to be small, lightweight, and stylish, allowing users to set them up and forget about them.

    security
    478 queries in 0.590 seconds.