• Main Menu
  • Security

    • Mondex Smart Card

      Mondex Smart Card

      Mondex is a specific smart card which was developed by England’s National Westminster Bank in 1990. Its design was intended to serve as electronic cash or a virtual electronic wallet. Any amount of money can be transferred to the Mondex smart card. MasterCard international bought controlling interest in the resulting firm, Mondex International, in 1997

    • HijackThis

      HijackThis

      Are viruses and malware affecting your computer efficiency? Try HijackThis. HijackThis, popularly known in the computing world as HJT, is one of the most effective spyware and malware removal software tool available for detecting and removing harmful viruses, spyware, worms, Trojans and other pests affecting Microsoft Windows. This program was originally developed by Merijn Bellekom,

    • How to Find Stored Passwords on a Computer

      How to Find Stored Passwords on a Computer

      There are a large number of websites and programs that prompt end users to save passwords on their personal computer(s). Popular web browsers such as Mozilla Firefox, Internet Explorer, Google Chrome, and instant messaging software like Windows Live Messenger are capable of saving user logins and passwords on the local computer. A common task that

    • How to Erase Browser History

      How to Erase Browser History

      Erasing browser history clears the record of what web sites the user visited over a period of time. This can help to protect privacy by preventing others from monitoring what web sites the user has been visiting. Erasing Internet Explorer’s Browser History By default, Internet Explorer keeps browser history for 20 days. To erase browser

    • Bump Keys

      Bump Keys

      A bump key is a specially crafted key that is commonly used to open any lock the key blank will fit in. Criminals use bump keys to quickly open key based locks that utilize a cylendar and tumbler design without causing damage or leaving any other indication that the lock was tampered with. Criminal use

    • How to Remove Spyware Manually

      How to Remove Spyware Manually

      Manually removing spyware is not an easy task. Usually the best course of action to remove spyware from your computer is to download and install a free spyware removal tool that will do this job for you. However, sometimes a problem arises in which the spyware removal program is unable to delete the spyware files

    • What is Bluejacking?

      What is Bluejacking?

      Bluejacking is a relatively new term that describes the act of sending an anonymous message to other Bluetooth equipped devices such as mobile phones, laptops, printers, cars, and Personal Data Assistants (PDAs). To date, mobile users have primarily Bluejacked others in their general proximity for friendly purposes. Bluejacking is possible because Bluetooth technology is open

    • Chosen Plaintext Attack

      Chosen Plaintext Attack

      A chosen plaintext attack is an attack where the cryptanalyst is able to define his own plaintext, feed it into the cipher, and analyze the resulting ciphertext. Mounting a chosen plaintext attack requires the cryptanalyst to be able to send data of his choice into the device which is doing the encryption, and it requires

    • What is an Email Spoofing?

      What is an Email Spoofing?

      Email spoofing occurs when an email is sent from one person or program that makes it appear as though it is legitimately from another. For example, user1@youremail.com creates an email, but when it is sent the “From” field has another person/organization’s email address such as fake@somecompany.com. When the person who receives the email clicks the

    • How to Set up a VPN

      How to Set up a VPN

      A Virtual Private Network (VPN) is typically used by companies, schools, and other organizations when they want to allow remote access to their servers, printers, and other network devices without compromising security. A VPN therefore extends a private network across the internet, but protects this connection by encrypting it, thereby creating what many refer to

    332 queries in 0.558 seconds.