• Main Menu
  • Security

    • How to Reset a MySQL Password

      How to Reset a MySQL Password

      A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. Start the mysqld daemon process with the –skip-grant-tables option. Start the mysql client with the -u root option. Execute the UPDATE mysql.user SET Password=PASSWORD(‘password’) WHERE User=’root’; Execute the FLUSH PRIVILEGES; command. These steps reset the password for the “root” account

    • TP Link Default Password

      TP Link Default Password

      TP Link is large manufacturer of networking products that boasts tens of millions of customers worldwide. TP Link produces thousands of networking products, including modems, routers, and network storage devices. TP Link also markets a number of USB based modem cards, device emulators, and service packages for a variety of cellular and Internet providers. TP

    • How to Decrypt Cisco Passwords

      How to Decrypt Cisco Passwords

      If  ‘service password-encryption’ is not configured on the Cisco device, simply read the plain text passwords from the configuration file. If ‘service password-encryption’ is configured on the Cisco device, most of the passwords are encrypted with a weak encryption algorithm (Type 7) that is easy to decrypt. Once there is access to the Cisco configuration

    • Known Ciphertext Attack

      Known Ciphertext Attack

      The known ciphertext attack, or ciphertext only attack (COA) is an attack method used in cryptanalysis when the attacker has access to a given set of ciphertext(s). The attacker does not have access to corresponding cleartext in this method; however, COA is successful when correspdonding plaintext can be determined from a given set of ciphertext.

    • Diffie-Hellman


      The Diffie-Hellman key exchange was first published by Whitfield Diffie and Martin Hellman in 1976 and is a popular method for exchanging cryptographic keys. The method is one of the most straight-forward examples of key exchanges implemented in the cryptology field and allows two individuals or parties that have not worked together before to establish

    • How a Smart Card Programmer Works

      How a Smart Card Programmer Works

      A smart card is a mini computer which requires programming to run. A smart card doesn’t contain an interface-like display or keyboard, so smart card readers are used to read or update the data tofrom smart cards. Smart cards contain an operating system which provides a platform to run applications. Smart card operating systems can

    • Cryptology


      The field of cryptology includes both the study of and practice of securing information in the presence of untrusted third parties or adversaries. Specifically, it is focused on creating and analyzing the protocols used to subvert attempts by adversaries to gain access to or interrupt the flow of information between trusted parties. Specific focus areas

    • Smart Card Software

      Smart Card Software

      A smart card contains an integrated circuit (IC) chip containing a central processing unit (CPU), random access memory (RAM) and non-volatile data storage. Data stored in the smart card’s microchip can be accessed only through the chip operating system (COS). Smart cards provide a secure, portable platform for “any time, anywhere” computing that can contain

    • How to Open a Simplex Lock

      How to Open a Simplex Lock

      Simplex locks, now manufactured by Kaba Ilco, are simple push-button combination locks. Simplex locks are used to protect equipment rooms, labs, and FedEx-type boxes. Simplex locks are used whenever having a large number of keys would create logistical problems. Simplex Lock Combinations The Simplex lock would be a normal 5-button combination lock, except for one

    • Cryptographic Libraries

      Cryptographic Libraries

      Cryptology has quickly grown from a field only used by government and military agencies to being one that impacts the day to day lives of consumers across the globe. Cryptographic libraries are used by individuals in just about any country in the world when conducting secure online transactions, communicating via secure email or video, and

    124 queries in 0.448 seconds.