• Main Menu
  • Security

    • Cryptographic Algorithms

      Cryptographic Algorithms

      Symmetric Cryptographic Algorithms DES (Data Encryption Standard) is perhaps the most widely used cryptographic algorithm. DES is based upon IBM’s Lucifer algorithm. The NBS (National Bureau of Standards) and the NSA (National Security Agency) adopted DES as a federal standard in 1977. DES is a symmetric cipher with an effective key length of 56 bits.

    • TP Link Default Password

      TP Link Default Password

      TP Link is large manufacturer of networking products that boasts tens of millions of customers worldwide. TP Link produces thousands of networking products, including modems, routers, and network storage devices. TP Link also markets a number of USB based modem cards, device emulators, and service packages for a variety of cellular and Internet providers. TP

    • Rubber Hose Cryptology

      Rubber Hose Cryptology

      Rubber Hose Cryptography refers to a file system in which multiple archives are encrypted and hidden on the same disk in a way that makes each archive appear to be the size of the entire disk. Rubber Hose Cryptography is often used to hide illegal or confidential information in an attempt to prevent theft or

    • How Does Yahoo Password Recovery work?

      How Does Yahoo Password Recovery work?

      Yahoo password recovery methods include: Reset your Yahoo password online Recover your Yahoo password from your web browser Recover your stored password from the Windows Registry Reset your Yahoo password The easiest way to recover a Yahoo password is to go to the Yahoo! Sign-in Problems page. To use this page, first enter your Date

    • How to Determine if a Credit Card Number is Valid

      How to Determine if a Credit Card Number is Valid

      Credit cards use the Luhn Check Digit Algorithm. The main purpose of the Luhn Check Digit Algorithm is to catch data entry errors, but it does double duty here as a weak security tool. The Luhn Check Digit Algorithm For a card with an even number of digits, double every odd numbered digit (1st digit,

    • How to Delete Internet History

      How to Delete Internet History

      Deleting Internet history clears the record of web sites visited. This procedure helps keep Internet browsing private.  Below are steps to manually delete Internet files from the computer: Delete Internet History in Internet Explorer By default, Internet Explorer keeps Internet history for 20 days. To delete Internet history in Internet Explorer, open the Tools menu,

    • How to Open a Simplex Lock

      How to Open a Simplex Lock

      Simplex locks, now manufactured by Kaba Ilco, are simple push-button combination locks. Simplex locks are used to protect equipment rooms, labs, and FedEx-type boxes. Simplex locks are used whenever having a large number of keys would create logistical problems. Simplex Lock Combinations The Simplex lock would be a normal 5-button combination lock, except for one

    • Microsoft Malicious Software Removal Tool

      Microsoft Malicious Software Removal Tool

      The Microsoft Malicious Software Removal Tool is a program designed to remove malicious software from your computer. Before you can understand what this tool does, however, you must first understand what malicious software is. In this article, we will go over what malicious software is, how Microsoft's tool allows you to remove it, the differences

    • How to Reset a LinkSys Router Password

      How to Reset a LinkSys Router Password

      LinkSys is the division of the Cisco Company which manufactures some of the most widely used network routers in the world. The WRT54G, WRT160N, and WRT310N series are the most popular with the WRT54G being the first model deployed that supported third-party firmware. The current generation of LinkSys routers support the draft 802.11N wireless standard

    • Proximity Sensors

      Proximity Sensors

      A proximity sensor is an electronic device that is designed to detect the presence of objects, people, or other living things within a given distance and detection threshold. Proximity sensors are able to detect objects without physically touching them by transmitting a detecting field/beam such as infrared, acoustic, and inductive transmissions. When the sensor receives

    124 queries in 0.314 seconds.