MyWebSearch Toolbar is a toolbar for Internet Explorer that allows users to run searches directly from their browser that all major search engines, including Google, Yahoo, AskJeeves, and Bing index. MyWebSearch Toolbar also includes a significant collection of emoticons, cursors, and screensavers. Additionally, MyWebSearch Toolbar includes a pop-up blocker and has many extensive features for customizing the toolbar. While MyWebSearch Toolbar may seem harmless, it can use a significant amount of CPU and memory as well as track computer usage through cookies that are saved when a user visits a Read More
Netscape Navigator Stored Password Recovery
Netscape Navigator stores usernames and passwords for web sites which you have logged in to. Password storage is configured in Netscape Navigator under <Edit>, <Preferences>, <Privacy and Security>, <Passwords>. By default, Netscape Navigator stores all passwords unencrypted. Viewing Netscape Navigator stored passwords The usernames and passwords are stored are part of the Netscape Navigator user profile. The location of the Netscape Navigator user profile varies between versions and installations. My Netscape Navigator user profile is stored in C:Documents and SettingsWillApplication DataMozillaregistry.dat. Netscapass will help you view stored Netscape Navigator passwords: Read More
Substitution and Transposition Ciphers
Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. The Caesar Cipher was an early substitution cipher. In the Caesar Cipher, each character is shifted three places up. Therefore, A becomes D and B becomes E, etc… This table shows “VOYAGER” being encrypted with the Caesar substitution cipher: Plaintext V O Y A G E Read More
Computer Worms
Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can execute completely independently and spread on its own accord through network connections. The security threat from worms is equivalent to that of viruses. Computer worms are skilled enough to do serious damage such as destroying Read More
What Are Activation Codes?
Every time you sign up for a new service, change a password, or do anything that has to do with personal information online, there are activation codes. These codes are sent to your email address, and you have to click on them to activate the account or confirm the change. Most websites out there use these in some form. Usage These codes are usually http addresses that need to be clicked on – then a new window will be opened. After that, and depending on the website, the user may Read More
Cryptographic Algorithms
Symmetric Cryptographic Algorithms DES (Data Encryption Standard) is perhaps the most widely used cryptographic algorithm. DES is based upon IBM’s Lucifer algorithm. The NBS (National Bureau of Standards) and the NSA (National Security Agency) adopted DES as a federal standard in 1977. DES is a symmetric cipher with an effective key length of 56 bits. Triple-DES is a variant of DES which encrypts the plaintext with the DES algorithm three times. IDEA (International Data Encryption Algorithm) is a commercial symmetric cipher developed in 1990 which uses 128-bit keys. Blowfish is Read More
Anonymous Proxy Lists
Anonymous proxies appear on the Internet constantly, often only to disappear rapidly when their owners discover the bandwidth cost. To help users find a current anonymous proxy server, dedicated individuals maintain anonymous proxy lists. Anonymous Proxy Server Lists We maintain our own anonymous proxy list that users can access by clicking the Proxy Sites button on the top menu. In addition, these other websites also maintain frequently updated lists of anonymous proxy servers on the Internet: Ros Instrument Atom Intersoft Cybersyndrome Multiproxy Proxz Public Proxy Servers.com/ Proxy 4 Free Stay Read More
g2mdlhlpx.exe
The original g2mdlhlpx.exe is a part of Citrix GoToMeeting and GoToWebinar. Malware creators have copied this filename in an attempt to “hide” from PC owners and system administrators. Someone who has Citrix GoToMeeting or GoToWebinar installed does not have to worry about this process. However, if he/she does not have either of these Citrix products installed on his/her PC, he/she will have to clean this malware from the PC. The legitimate g2mdlhlpx.exe executable installs in the C:Documents and Settings%user account% folder. Rogue versions of this executable process are sometimes found Read More
What is Wardriving?
The act of searching for WiFi networks with a laptop or mobile device while driving is referred to as wardriving. The term originated from “wardialing,” which came from the hit movie War Games in which random phone lines that were connected to a modem were searched for. Although wardriving was originally developed in order to search for unprotected Wireless networks, the current practice of mapping unprotected networks with GPS location data was developed in the spring of 2001. What is Wardriving? Wardriving captures information about network and Internet usage. Although Read More
Master Blaster Virus
The Master Blaster virus is a malicious program that was developed from the initial Blaster worm. It was repackaged by Jeffrey Lee Parson during 2003. It was also released to infect computers running on MS Windows OS versions across the globe during the same year. The repackaged or reprogrammed Master Blaster virus was then known as Blaster B or LovSan. This variant of the Master Blaster virus exploited known vulnerabilities of MS Windows OS versions. This activity was similar to other known variants of the Master Blaster Virus. Upon infection, Read More
Share on: