• Main Menu
  • Security

    • Steganography

      Steganography has gained a significant amount of press over the past several years when the technique hit the press as a possible method that many of the terrorists involved with the 9/11 attacks used to plan the operation. Similar to the use of encryption, steganography techniques have become one of the basic methods that organizations

    • How to Reset a MySQL Password

      How to Reset a MySQL Password

      A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. Start the mysqld daemon process with the –skip-grant-tables option. Start the mysql client with the -u root option. Execute the UPDATE mysql.user SET Password=PASSWORD(‘password’) WHERE User=’root’; Execute the FLUSH PRIVILEGES; command. These steps reset the password for the “root” account

    • How to Remove the Generic.dx Trojan

      How to Remove the Generic.dx Trojan

      Generic.dx is a rather common trojan virus that infects the computer and weakens its security in order to allow other viruses and malicious software to infect the computer. It enters the computer via an email that the user opens, a website he/she visits, or a third party software that he/she downloads and installs. Generic.dx trojans

    • How to Remove Malware

      How to Remove Malware

      New computer malware is discovered daily on the Internet. As computer security companies successfully combat emerging threats, computer virus authors grow more creative in designing attacks that take advantage of the many computer users that have not taken appropriate security measures or updated anti-virus software to defend against new attacks. Once a computer is infected,

    • How Does RAR Password Recovery work?

      How Does RAR Password Recovery work?

      RAR Password Recovery is a password recovery software that is specifically designed to recover lost passwords for RAR and ZIP files. RAR Password Recovery is available from a number of sources and is available in both trial and full versions, although the trial version only allows users to recover passwords that are three characters long.

    • How to Clear MSN Search History

      How to Clear MSN Search History

      When using MSN and doing a search, you are using the Bing software which is Microsoft’s search engine. However, one of the things that you might want to do is clear your search history. Perhaps you were searching fro something on a computer that you don’t want anyone to know. Maybe you just don’t want

    • XOR Encryption

      XOR Encryption

      The XOR encryption is a simple symmetric cipher that is used in many applications where security is not a defined requirement. The XOR Operator XOR (Exclusive OR) is a bitwise operator from binary mathematics. The six bitwise operators, as defined in the C programming language, are: Operation Symbol AND & Inclusive OR | Exclusive OR

    • Wordlists

      Wordlists

      A wordlist is a text file containing a collection of words for use in a dictionary attack. Wordlist Usage A dictionary attack using a wordlist relies on the fact that most users choose weak passwords. Very common passwords include password, computer, work, and most of the popular female names. Common Dictionary Attacks Using A Wordlist

    • How to Setup a Proxy Server

      How to Setup a Proxy Server

      A proxy server is one that receives requests intended for another server and that acts on the behalf of the client (as the client proxy) to obtain the requested service. It is often used when the client and the server are incompatible for direct connection. For example, the client may be unable to meet the

    • lsass.exe

      lsass.exe

      LSASS, or local security authority subsystem service, is a process that functions as part of the Microsoft Windows operating system. Essentially, LSASS is part of the process for maintaining and enforcing the security protocols on the operating system. To this end, LSASS performs several important functions to ensure that the system remains free from unauthorized

    339 queries in 0.389 seconds.