Deleting Internet history clears the record of web sites visited. This procedure helps keep Internet browsing private. Below are steps to manually delete Internet files from the computer: Delete Internet History in Internet Explorer By default, Internet Explorer keeps Internet history for 20 days. To delete Internet history in Internet Explorer, open the Tools menu, select “Internet Options,” click the “Delete…” button under “Browsing history,” make sure that “History” is selected in the dialog that pops up, and click the “Delete” button. Under “Browsing history” it is also possible to Read More
How to Password-Protect Folders
With fast-access computers and interlinking networks that connect many different devices together, many users worry about other people stumbling upon their personal information. With the dangers of the Internet aside, users still have to be concerned about their friends, relatives, and co-workers accessing their computer and seeing things that they would rather keep private. Because of this, there are dozens of programs available that are able to protect users' files and folders with a password and various encryption methods. This article will explain what encryption software is and list a Read More
How to Open a Simplex Lock
Simplex locks, now manufactured by Kaba Ilco, are simple push-button combination locks. Simplex locks are used to protect equipment rooms, labs, and FedEx-type boxes. Simplex locks are used whenever having a large number of keys would create logistical problems. Simplex Lock Combinations The Simplex lock would be a normal 5-button combination lock, except for one weakness. Each button on a Simplex lock may only be used once in a combination. A combination of 1-4-3-2 is acceptable. A combination of 1-4-3-1 will not work. This limits the Simplex lock to only Read More
GnuPG Shell
Everyone likes safety. The safety of confidential information is always of special concern. Therefore, information protection is a necessity and can be useful to companies and individuals who care about their intellectual property’s confidentiality. People who want their e-mails kept confidential and their e-mail attachments readable only to the intended recipient can appreciate information protection. GnuPG Shell is a software tool that keeps information safe by using the strong protection that OpenPGP standard offers (RFC2440). GnuPG Shell is a cross platform graphical front end for GNU Privacy Guard. GnuPG Shell Read More
How to Delete WD SmartWare
Western Digital (WD) Portable Hard Drives are capable of storing quite a bit of information. Modern Western Digital drives come with a firmware called “SmartWare,” which can be useful to some users. The SmartWare can provide backup solutions that may not be available with the operating system in use. WD hard drives with SmartWare also have some utilities that some users will find useful if their computer can support them. The WD SmartWare may also be useless to some users who may want to remove it. The most common reasons Read More
ATM Skimmer
An ATM skimmer is a card reader that is installed on some ATMs by criminals in order to steal the card numbers and PINs of the victims who use them. ATM skimmers vary in sophistication, but may be installed either directly within an ATM or next to it and may either interfere with the ATM’s regular functions or simply trick the victim into swiping his/her card. ATM skimming has been performed since the 1990s, but has recently become much more popular due to smaller computers and other advanced technologies. Read More
Browser Cookie
A browser cookie is a small piece of information sent by a web server to a web browser to be stored for future use. The data in the browser cookie will be sent back to the web server whenever the browser reconnects to the web site. Cookies are commonly used to store user preference information, such as web site options. Cookies are also used to store shopping cart contents. Cookies are also used to store authentication data, such as user names and passwords. How Websites Use Cookies Cookies are extremely Read More
Cryptology
Cryptology Cryptology is the science which incorporates both cryptography and cryptanalysis. Cryptologists Practitioners of cryptology are known as cryptologists. Cryptology in Context A cryptographer will use cryptography to convert plaintext into ciphertext and a cryptanalyst will use cryptanalysis to attempt to turn that ciphertext back into plaintext. Both the cryptographer and the cryptanalyst are cryptologists. Cryptography and cryptanalysis are the two sides of cryptology.
Shoulder Surfing
Shoulder surfing is a security attack that is implemented by observing a victim as he/she enters a PIN, fills out a form, or performs another activity that exposes their confidential information. A shoulder surfer may observe a victim by looking over their shoulder, taking pictures, or using binoculars from a distance. For example, credit card fraud is usually started by taking a picture of a victim’s credit/debit card as he/she is standing in line at a store and then using the numbers on the card to make purchases over the Read More
How a Magnetic Card Reader Works
A magnetic card is a rectangular plastic object (credit/debit card) that contains either a magnetic object embedded within the card or a magnetic stripe on the card’s exterior. A magnetic card can store any form of digital data. The electronic devices designed to read stored information from a magnetic card do so either when someone swipes the card through a slot in the reading device or holds the card next to a magnetic card reader. About a hundred bytes of information can be stored on a magnetic card. Because of Read More
Share on: