Advert

How to Disable LoJack

Last edited by . Total of 2 comments in the discussion.

LoJack refers to a GPS dependent tracking device that allows users to locate devices or vehicles that have been stolen. It is available in both a software version for computers and a hardware version for vehicles and communicates with GPS satellites to show a user where his/her stolen item currently is. LoJack can be activated at any time via a third party user interface and is often used to track down a thief as well as the user’s stolen property.   How LoJack Works LoJack works in the same way Read More

Share on:

How to Find Stored Passwords on a Computer

Last edited by . Total of 18 comments in the discussion.
Firefox Saved Passwords

There are a large number of websites and programs that prompt end users to save passwords on their personal computer(s). Popular web browsers such as Mozilla Firefox, Internet Explorer, Google Chrome, and instant messaging software like Windows Live Messenger are capable of saving user logins and passwords on the local computer. A common task that arises for the end-user is to find stored passwords on a computer in order to recover lost or forgotten access information. Depending on the application being used, operating system, and specific user permissions, the task Read More

Share on:

Tabjacking

Last edited by . Total of no comments in the discussion.

Tabjacking is a form of Internet threat. The tab feature in common Internet web browsers has paved a way for tabjackers to introduce malicious codes into user computers. Specifically, tabjacking refers to hijacking or an incident where a web browser tab falls under the control of an external party and the new tab is brought to a webpage that the external party is supporting or marketing. The controller of the code could also bombard the user with annoying advertising popups, and even worms, trojans and other parasites. The Tabs Feature Read More

Share on:

Malware

Last edited by . Total of no comments in the discussion.

Malware is a generic term for bad software. The word malware comes from the words malicious and software. Malware (Malicious Software) is software conceived to gain access to a computer without the end user’s knowledge or permission. Malware in general, pertains to a wide range of malicious software that includes computer viruses, Trojan horses, fraudulent adware, spyware, crimeware and so on. According to certain studies, malware is produced at such a high rate that it may even be more than that of genuine software applications. Prior to the advent of Read More

Share on:

XOR (Exclusive-OR)

Last edited by . Total of no comments in the discussion.

XOR is known as ‘Exclusive-OR’ and it is a Boolean operator that returns a TRUE when only one of the operands is TRUE and returns a FALSE when both of the operands are either TRUE or FALSE. It is a logical operation on two logical values. Going by the rules of material implication and material equivalence, the exclusive-or is equivalent to the negation of the logical bi-conditional. Properties XOR is an associative operation i.e. re-arranging the parenthesis in an expression having two or more same associative operators in a row Read More

Share on:

SHA-1

Last edited by . Total of no comments in the discussion.

SHA stands for Secure Hash Algorithm. It consists of five hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). The five algorithms are SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. SHA-1 is the most commonly used of the SHA series. Hash algorithms are called secure when It is impossible to find a message that corresponds to a given message digest. It is impossible to find two different messages that produce the same message digest. If a message is changed even Read More

Share on:

Symmetric and Asymmetric ciphers

Last edited by . Total of 2 comments in the discussion.

In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, Read More

Share on:

Computer Crime Laws

Last edited by . Total of no comments in the discussion.

The trouble with the current legal situation is that we the people are consistently electing moronic legislators who are ruining the country by trying to save it. We now have so many laws, no normal human can know them all — much less follow them all. In 1748, Montesquieu wrote in De L’Esprit des Lois “Useless laws weaken the necessary laws.” Today, we have so many useless laws that the government and police do not have the resources to enforce the necessary laws. The accepted solution, of course, is to Read More

Share on:

How Does RAR Password Recovery work?

Last edited by . Total of 2 comments in the discussion.

RAR Password Recovery is a password recovery software that is specifically designed to recover lost passwords for RAR and ZIP files. RAR Password Recovery is available from a number of sources and is available in both trial and full versions, although the trial version only allows users to recover passwords that are three characters long. RAR Password Recovery does not work with any other type of file, but is ideal for anyone who needs to recover a lost RAR o ZIP password.   How RAR Password Recovery Works RAR Password Read More

Share on:

Defenses to ID Theft

Last edited by . Total of 2 comments in the discussion.

Identity theft occurs when an individual or group of individuals steals one’s identity in order to commit theft or fraud. The most common types of identity theft is when a person steals personal or financial information to either steal money from an already established credit card or bank account or open up a new loan or credit card in order to illegally and fraudulently acquire monetary funds. While ID theft has been growing rapidly in recent years, there are a few ways to reduce the risk and protect yourself from Read More

Share on: