Security

warning: Creating default object from empty value in /home/samaycsa3940/public_html/modules/taxonomy/taxonomy.pages.inc on line 33.
Computer and other Security Related Articles

How to change Firewall Rules using command line in Windows Seven

How to change Firewall Rules using command line in Windows SevenIn this article we will show you how you can change the Advanced Windows Firewall rules using the command line in Windows Seven. Some of you might have already tried this and might ask, why do it using command line when you can use the GUI. That's true, you can do it using the GUI, however, with command line, you can put this functionality in a batch file and if you are in a corporate environment and need to deploy this to multiple computers at the same time, then a batch file can be pushed to the machines as a startup policy via active directory, making your task much easier than visiting each computer individually. In Windows Seven, the Windows Firewall has evolved a lot as compared to earlier versions of Windows. The new Firewall in Windows Seven has an advance interface and much much granular rules. The manipulation commands are also different in Windows Firewall and have depreciated the old syntax

What is Visual Cryptography

What is Visual CryptographyYou have come across pictures and symbols like this, but you have often ignored them because either they don't make sense to you or second, you thought that this some sort of cryptic computer scan code. Well, pictures like these are not just white noise, often a part of visual cryptography. Visual Cryptography is a system by which information such as picture and text can be decrypted without the use of a computer, visually by just human eye. Visual Cryptography often consists of two or more pieces such as pictures or parts of text, which as an individual piece do not make any sense. However, when combined with the second or more pieces of the Visual Cryptogram, reveals a message, picture or another form of sensible information. In this article we will discuss visual cryptography and demonstrate it using some examples.

How to protect any executable file with a password

Password protect any executable file or folderIn the past we have shown you a Windows Seven Hack where In the past we have shown you a Windows Seven Hack on how you can create a folder on your desktop and can only open it when you supply the right password. This time we will introduce something better, we will show you how you can password protect any executable exe file, document or the contents of a folder and have the folder visible to you only when you put the right password. This protection comes in addition to the local security that's offered by the Operating System such as NTFS. This can really be useful when you share a machine with family members, co-workers using the same login but need to keep some things private to yourself. In the past, chat applications, FTP applications, Excel (financial) spreadsheets and Word documents etc can all be protected against accidental deletion or use by unauthorized users.

Verify generate or reverse engineer your MD5 hashes online

Reverse Engineer your MD5 hashes onlineAs some of you might be knowing, MD5 (aka Message Digest 5 algorithm) is a way of checking data integrity. Often used in cryptography, MD5 is used to check the integrity of the data when its compressed, before being encrypted typically with a PKI technique. MD5 is much more reliable and better way of checking data integrity than using traditional methods such as check-sum. It could take a long time to reverse engineer a MD5 hash using brute force methods and that's why we will introduce you today to getting MD5 hashes in a snap.

How to delete hidden EXIF data in pictures

How to delete hidden Exit data from PicturesIn our past article, we have shown you how you can hide data secretly inside jpg files. In this article we will show you how you can delete the EXIF metadata that is stored with jpg files. EXIF stands for Exchangeable Image Format, it contains a lot of information about the picture, the hardware used to capture it. For Example, it can tell you about the exact date and time the picture was taken, the camera brand, the aperture, the focus, metering mode, ISO setting, the GPS cordinates of where the picture was taken and much more. Sometimes, all this data might not be desirable to be included with your pictures. It should be noted that EXIF data is only included by default with JPEG, TIFF and RIFF WAV files. EXIF metadata is not included with GIF, PNG or JPEG 2000 formats