Browsing articles in "Information Security"

The Secret Codes that Programmers Hide in Your PC

Nov 20, 2014   //   by Crocmaster   //   Information Security  //  No Comments

Ever since the first person wrote out 5318008 on a calculator, nerds have been hiding secret numbers inside of your PC, and using them to negotiate secret handshakes between applications and files. Today we take a quick look at some of the more entertaining examples.  Read more >>

Your Wi-Fi’s WPA2 Encryption Can Be Cracked Offline

Nov 20, 2014   //   by Crocmaster   //   Information Security  //  No Comments

Wireless Symbol Drawn on a Blackboard

When it comes to securing your Wi-Fi network, we always recommend WPA2-PSK encryption. It’s the only really effective way to restrict access to your home Wi-Fi network. But WPA2 encryption can be cracked, too — here’s how.

As usual, this isn’t a guide to cracking someone’s WPA2 encryption. It’s an explanation of how your encryption could be cracked and what you can do to better protect yourself.  Read more >>

ATM Skimmers: How to Protect Your ATM Card

Aug 4, 2014   //   by Crocmaster   //   Information Security  //  No Comments


An “ATM skimmer” is a malicious device criminals attach to an ATM. When you use an ATM that’s been compromised in such a way, the skimmer will create a copy of your card and capture your PIN.

If you use ATMs, you should be aware of these attacks. It’s often possible to spot ATM skimmers, or at least to protect your PIN so ATM skimmers won’t be able to capture it.  Read more >>

How to Bypass and Reset the Password on Every Operating System

Jul 29, 2014   //   by Crocmaster   //   Information Security  //  No Comments


Passwords can be reset or bypassed on every operating system. On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files.

On other devices where you can’t gain access to the files, you can still reset the device and gain access to it without knowing a password. These tricks all require physical access to the device.  Read more >>

How to Change Your MAC Address on Windows, Linux, and Mac

Jul 28, 2014   //   by Crocmaster   //   Information Security  //  No Comments


Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can change, or “spoof,” MAC addresses in software.

MAC stands for “media access control.” MAC addresses are also commonly referred to as physical addresses or hardware addresses, because they correspond to a hardware adapter.  Read more >>



Protected by Copyscape Online Copyright Protection

Latest Visitor Record

DO NOT try to do anything wrong with our website so that we may have to report to the Feds!