• Main Menu
  • Security

    • Diffie-Hellman

      Diffie-Hellman

      The Diffie-Hellman key exchange was first published by Whitfield Diffie and Martin Hellman in 1976 and is a popular method for exchanging cryptographic keys. The method is one of the most straight-forward examples of key exchanges implemented in the cryptology field and allows two individuals or parties that have not worked together before to establish

    • Spyware

      Spyware

      “Spyware” is a term in computer security that is used to refer to a type of malicious program that is capable of infiltrating a user’s computer and spying on his/her activities. Spyware is often used to obtain identity-related or financial information, such as usernames, passwords, social security numbers, and other confidential information.  Spyware programs are

    • How to Setup a Proxy Server

      How to Setup a Proxy Server

      A proxy server is one that receives requests intended for another server and that acts on the behalf of the client (as the client proxy) to obtain the requested service. It is often used when the client and the server are incompatible for direct connection. For example, the client may be unable to meet the

    • Cisco Password Recovery

      Cisco Password Recovery

      “Physical access to a computer or router usually gives a sophisticated user complete control over the device. Software security measures can often be circumvented when access to the hardware is not controlled.” — Cisco Systems, Inc. Recovering the passwords for most Cisco devices via the console port is very simple. However, Cisco has purchased so

    • Cryptology

      Cryptology

      The field of cryptology includes both the study of and practice of securing information in the presence of untrusted third parties or adversaries. Specifically, it is focused on creating and analyzing the protocols used to subvert attempts by adversaries to gain access to or interrupt the flow of information between trusted parties. Specific focus areas

    • iFrame Injection

      iFrame Injection

      An iFrame injection is a very common cross site scripting (or XSS) attack. It consists of one or more iFrame tags that have been inserted into a page or post’s content and typically downloads an executable program or conducts other actions that compromise the site visitors’ computers. In the best case, Google may label the

    • Plaintext and Ciphertext

      Plaintext and Ciphertext

      In the study of cryptography the terms plaintext and ciphertext are used to describe the plain language message or information and the resulting encrypted message or data that results from the use of a cipher or encryption algorithm. The resulting ciphertext is not readable by either a human or computer without the correct cipher to

    • Bump Keys

      Bump Keys

      A bump key is a specially crafted key that is commonly used to open any lock the key blank will fit in. Criminals use bump keys to quickly open key based locks that utilize a cylendar and tumbler design without causing damage or leaving any other indication that the lock was tampered with. Criminal use

    • Trojan Virus

      Trojan Virus

      A Trojan virus is a piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer. The virus takes its name from the “Trojan Horse” from Greek mythology setup outside of the city of Troy. Trojan horse viruses differ from other

    • How to Remove Malware

      How to Remove Malware

      New computer malware is discovered daily on the Internet. As computer security companies successfully combat emerging threats, computer virus authors grow more creative in designing attacks that take advantage of the many computer users that have not taken appropriate security measures or updated anti-virus software to defend against new attacks. Once a computer is infected,

    176 queries in 0.588 seconds.