• Main Menu
  • Security

    • How Do I Change my MSN Password?

      How Do I Change my MSN Password?

      MSN is an ISP (Internet Service Provider) which is owned and operated by Microsoft Corporation. In addition, Microsoft uses the MSN brand on a number of web sites which they operate. How to Change Your MSN Password The way to change your MSN password is to change your Microsoft Passport password. Changing your Microsoft Passport

    • Adware

      Adware

      Adware is a close relative of spyware. Adware is software that is installed on your computer to show you advertisements. Adware can slow your PC by using RAM and CPU cycles. Adware can also slow your Internet connection by using bandwidth to retrieve advertisements. In addition, adware can increase the instability of your system because

    • Chosen Plaintext Attack

      Chosen Plaintext Attack

      A chosen plaintext attack is an attack where the cryptanalyst is able to define his own plaintext, feed it into the cipher, and analyze the resulting ciphertext. Mounting a chosen plaintext attack requires the cryptanalyst to be able to send data of his choice into the device which is doing the encryption, and it requires

    • Computer Worms

      Computer Worms

      Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can

    • SMSS.exe

      SMSS.exe

      There are many processes that run behind the scenes in Windows operating systems. One of these processes that may look suspicious is the SMSS.exe. This is an execution file with the full name Session Management Subsystem. The Session Manager Subsystem is responsible for starting a session. When this process begins, the system thread is responsible

    • How to Remove all Personal Files from Windows

      How to Remove all Personal Files from Windows

      Over the last decade, millions of people have kept more and more personal information on their computers. From credit card numbers to sensitive emails and word documents, a vast amount of personal files are on almost any home computer. While keeping personal and sensitive information on a home computer is relatively safe, if you plan

    • Symmetric and Asymmetric ciphers

      Symmetric and Asymmetric ciphers

      In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers,

    • Substitution and Transposition Ciphers

      Substitution and Transposition Ciphers

      Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. The Caesar Cipher was an early substitution cipher. In the Caesar

    • How to Change a Yahoo Password

      How to Change a Yahoo Password

      To change a Yahoo Password, visit Yahoo: Change Password. Changing a Yahoo password causes all the passwords on Yahoo’s personalized services to change. These personalized services include: Yahoo! Mail Yahoo! Messenger Yahoo! Chat My Yahoo! Yahoo! Finance The instructions to change a Yahoo password will only work if the user knows his/her current Yahoo password.

    • RC4 (Rivest Cipher 4)

      RC4 (Rivest Cipher 4)

      RC4 is one of the most used software-based stream ciphers in the world. The cipher is included in popular Internet protocols such as SSL (Secure Sockets Layer) and WEP (for wireless network security). The cipher is fairly simplistic when compared to competing algorithms of the same strength and boasts one of the fastest speeds of

    318 queries in 0.690 seconds.