• Main Menu
  • Security

    • One-Time Pad

      One-Time Pad

      A one-time pad is a form of encryption that is difficult to decipher or crack if one is not the intended recipient. If done correctly, the strength of encryption of plaintext can almost be impossible to break in a useful timeframe. The system takes each character from plaintext and uses modular addition with a character

    • The Zeus Virus

      The Zeus Virus

      The Zeus Virus is the popular term for the Zeus banking Trojan virus which was used to steal bank account details and passwords in the U.K. This resulted in a loss of more than $850,000 for those infected. The Zeus virus has been around for a number of years as part of the larger Zeus

    • How to Delete Recent Searches

      How to Delete Recent Searches

      Deleting recent searches–be they from Bing, Google or Yahoo–is an easy thing to do. While the steps vary a little from Internet Explorer to FireFox, for the most part, they take the same amount of time and can be found in the same place. Deleting Recent Searches in Internet Explorer Click on the tools button.

    • How to Uninstall Nero Scout

      How to Uninstall Nero Scout

      Nero Scout is a small utility that is bundled with the recent versions of the popular program, Nero. It is a tool used for cataloging various media files and images for easy referencing. Uninstalling Nero Scout Click Start, Run and input the following line: regsvr32 /u “%COMMONPROGRAMFILES%AheadLibMediaLibraryNSE.dll” Restart your computer and check to see if

    • XOR Encryption

      XOR Encryption

      The XOR encryption is a simple symmetric cipher that is used in many applications where security is not a defined requirement. The XOR Operator XOR (Exclusive OR) is a bitwise operator from binary mathematics. The six bitwise operators, as defined in the C programming language, are: Operation Symbol AND & Inclusive OR | Exclusive OR

    • g2mdlhlpx.exe

      g2mdlhlpx.exe

      The original g2mdlhlpx.exe is a part of Citrix GoToMeeting and GoToWebinar. Malware creators have copied this filename in an attempt to “hide” from PC owners and system administrators. Someone who has Citrix GoToMeeting or GoToWebinar installed does not have to worry about this process. However, if he/she does not have either of these Citrix products

    • What is Tor?

      What is Tor?

      Tor is a program that is able to hide the user’s online activities from third parties and prevent websites from seeing where the user is browsing from by rerouting the user’s sent and recieved data through the Tor Network. The Tor Network is made up of hundreds of volunteers from around the world that specifically

    • Cryptographic Algorithms

      Cryptographic Algorithms

      Symmetric Cryptographic Algorithms DES (Data Encryption Standard) is perhaps the most widely used cryptographic algorithm. DES is based upon IBM’s Lucifer algorithm. The NBS (National Bureau of Standards) and the NSA (National Security Agency) adopted DES as a federal standard in 1977. DES is a symmetric cipher with an effective key length of 56 bits.

    • Why People Write Computer Viruses?

      Why People Write Computer Viruses?

      We hear about new computer viruses all the time. What is the motivation behind developing computer viruses and watching them wreak havoc on the Internet? Fact Gathering Many viruses raid your documents including your email address book for information that can be used to make business contacts. This data is assembled into a database that

    • How to Remove a Browser Hijacker

      How to Remove a Browser Hijacker

      Browser hijackers are malicious programs that redirect computer users to websites that the hacker wants and deploy the computer malware. The hijacker may change a computer’s default homepage or redirect computer users trying to visit legitimate websites such as their bank or Google to a maliciously crafted copy of the site to deploy computer malware

    179 queries in 0.637 seconds.