• Main Menu
  • Security

    • Why Everyone Should Use a VPN

      Why Everyone Should Use a VPN

      VPN, or a Virtual Private Network, connects computers and other devices using an encrypted connection. This means that all data travelling through such a network is unreadable to anyone who might intercept the data stream, making it as private as it would be if all of the connected devices resided within the walls of a

    • What is an Email Spoofing?

      What is an Email Spoofing?

      Email spoofing occurs when an email is sent from one person or program that makes it appear as though it is legitimately from another. For example, user1@youremail.com creates an email, but when it is sent the “From” field has another person/organization’s email address such as fake@somecompany.com. When the person who receives the email clicks the

    • Rubber Hose Cryptology

      Rubber Hose Cryptology

      Rubber Hose Cryptography refers to a file system in which multiple archives are encrypted and hidden on the same disk in a way that makes each archive appear to be the size of the entire disk. Rubber Hose Cryptography is often used to hide illegal or confidential information in an attempt to prevent theft or

    • Anonymous Proxy Lists

      Anonymous Proxy Lists

      Anonymous proxies appear on the Internet constantly, often only to disappear rapidly when their owners discover the bandwidth cost. To help users find a current anonymous proxy server, dedicated individuals maintain anonymous proxy lists. Anonymous Proxy Server Lists We maintain our own anonymous proxy list that users can access by clicking the Proxy Sites button

    • Sonicwall Default Password

      Sonicwall Default Password

      Sonicwall is a company that produces routers, modems, VPN (Virtual Private Network) hardware, and firewall solutions for both personal and commercial users. Sonicwall routers, in particular, are widely distributed to an array of consumers who access the Internet through high speed secure connections due to the support that Sonicwall products provide. Sonicwall routers generally consist

    • Mondex Smart Card

      Mondex Smart Card

      Mondex is a specific smart card which was developed by England’s National Westminster Bank in 1990. Its design was intended to serve as electronic cash or a virtual electronic wallet. Any amount of money can be transferred to the Mondex smart card. MasterCard international bought controlling interest in the resulting firm, Mondex International, in 1997

    • Smart Card

      Smart Card

      A Smart Card is a plastic card the size of a credit card with an integrated circuit built into it. This integrated circuit may consist only of EEPROM in the case of a memory card, or it may also contain ROM, RAM and even a CPU. Most smart cards have been designed with the look

    • How MS Access Encryption Works

      How MS Access Encryption Works

      Microsoft Access had no encryption capability until the release of Microsoft Access 2007. With the MS Access 2007 release, encryption is now available. Encryption Requirements To encrypt your access database you must use a new database format released with MS Access 2007, the ACCDB format. Differences between the original MDB format and the new ACCDB

    • RC4 (Rivest Cipher 4)

      RC4 (Rivest Cipher 4)

      RC4 is one of the most used software-based stream ciphers in the world. The cipher is included in popular Internet protocols such as SSL (Secure Sockets Layer) and WEP (for wireless network security). The cipher is fairly simplistic when compared to competing algorithms of the same strength and boasts one of the fastest speeds of

    • How to Fake Mail

      How to Fake Mail

      Fake mail is e-mail which appears to be from someone other than the actual sender. Fake mail was initially usually used to stage practical jokes, but is now utilized primarily by e-mail spammers. How to Send Fake Mail To send fake mail, first `telnet` to port 25 of the machine you want the fake mail

    179 queries in 0.473 seconds.