• Main Menu
  • Security

    • Certificate Authority

      Certificate Authority

      Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties. It exemplifies a trusted third party. Some certification authorities may charge a fee for their service while some other CAs are free. It is

    • How Does RAR Password Recovery work?

      How Does RAR Password Recovery work?

      RAR Password Recovery is a password recovery software that is specifically designed to recover lost passwords for RAR and ZIP files. RAR Password Recovery is available from a number of sources and is available in both trial and full versions, although the trial version only allows users to recover passwords that are three characters long.

    • X.509

      X.509

      X.509 is an ITU-T (ITU Telecommunication Standardization Sector) standard for PKI (Public Key Infrastructure) in cryptography, which, amongst many other things, defines specific formats for PKC (Public Key Certificates) and the algorithm that verifies a given certificate path is valid under a give PKI (called the certification path validation algorithm). X.509 History X.509 began in

    • Netscape Navigator Stored Password Recovery

      Netscape Navigator Stored Password Recovery

      Netscape Navigator stores usernames and passwords for web sites which you have logged in to. Password storage is configured in Netscape Navigator under <Edit>, <Preferences>, <Privacy and Security>, <Passwords>. By default, Netscape Navigator stores all passwords unencrypted. Viewing Netscape Navigator stored passwords The usernames and passwords are stored are part of the Netscape Navigator user

    • How to Delete Search History

      How to Delete Search History

      For many computer users privacy is important. If you use a computer for searching the web, there may be times when you prefer to not leave a digital trail of the sites you visited. For those looking to delete their search history, you should know it is extremely easy, here are some tips. Deleting Your

    • How to Delete Internet History

      How to Delete Internet History

      Deleting Internet history clears the record of web sites visited. This procedure helps keep Internet browsing private.  Below are steps to manually delete Internet files from the computer: Delete Internet History in Internet Explorer By default, Internet Explorer keeps Internet history for 20 days. To delete Internet history in Internet Explorer, open the Tools menu,

    • How to Disable LoJack

      How to Disable LoJack

      LoJack refers to a GPS dependent tracking device that allows users to locate devices or vehicles that have been stolen. It is available in both a software version for computers and a hardware version for vehicles and communicates with GPS satellites to show a user where his/her stolen item currently is. LoJack can be activated

    • How a Magnetic Card Reader Works

      How a Magnetic Card Reader Works

      A magnetic card is a rectangular plastic object (credit/debit card) that contains either a magnetic object embedded within the card or a magnetic stripe on the card’s exterior. A magnetic card can store any form of digital data. The electronic devices designed to read stored information from a magnetic card do so either when someone

    • Brute Force Attack

      Brute Force Attack

      A brute force attack consists of trying every possible code, combination, or password until the right one is found. Determining the Difficulty of a Brute Force Attack The difficulty of a brute force attack depends on several factors, such as: How long can the key be? How many possible values can each key component have?

    • How to Set up a VPN

      How to Set up a VPN

      A Virtual Private Network (VPN) is typically used by companies, schools, and other organizations when they want to allow remote access to their servers, printers, and other network devices without compromising security. A VPN therefore extends a private network across the internet, but protects this connection by encrypting it, thereby creating what many refer to

    security
    178 queries in 0.556 seconds.