Security +

How To : Use macro security options in Excel 2007

Some times when you upgrade your Microsoft Excel software to Excel 2007 your old macros may stop working. Some times this may be due to the settings and by enabling the macros you can get your old macros to work. Macros are turn off by default in Excel 2007. You can turn this ...more

How To : Security-Oriented C Tutorial 0x06 - Operators

Hello again! In this tutorial, we are going to go over something called "operators" which will help us build upon conditions of control structures and also some variable manipulation. Without further ado, let's dive in! What Is an Operator? Operators are special symbols whic ...more

News : Backtrack 5 Security Essentials

Backtrack 5 is a Security Essentials Backtrack is a suite of tools to help with Penetration of any Network, Unix, Linux, or Microsoft Based. Backtrack 5 is good for WEP & WPA hacking and penetration testing. Penetration testing is a must have for any IT Administrator. With t ...more

How To : Get through airport security quickly

Airport security lines are one of the biggest hassles involved in air travel. Navigating them quickly and successfully can be the difference between making your flight and not. This video offers some tips for how to get through security quickly, including buying airport-securi ...more

How To : Use the Nmap security tool

This hour-long hacking tutorial looks at the Nmap security scanner. In particular, this Nmap tutorial looks at port scanning concepts, TCP three way handshake, stealth scans, idle scans, bounce scans, version detection, OS detection, NSE/LUA scripting and firewall logs. To get ...more

How To : Security-Oriented C Tutorial 0x0A - Man Pages

Okay guys and gals, this will be a quick tutorial on using the incredibly helpful man pages. What Are Man Pages? Man pages are manuals for tools and functions which are provided for the *nix operating systems. These pages detail the syntax, usage and options for the queried ...more

How To : Use the security features on an HP Compaq 2710p PC

The HP 2710p business notebook has a number of innovative security tools to make sure your data stays where you want it. Security starts with a fingerprint reader on the side of the 2710p, boosted with an optional Smartcard slot for a true combined physical barrier. The biom ...more

How To : Remove the Security Tool virus

This video shows you how to easily remove the Security Tool virus. The first thing you have to do is restart you computer. Once restarted, immediately hold down CTRL+ALT+DEL. In the Task Manager you should see: Security Tool. Quickly end it now. The virus is temporarily disabl ...more

How To : Remove Cyber Security from your system

Cyber Security is a horrible computer virus. It mimics a virus protection program and invades your system, making it nearly impossible to remove. In this tutorial, learn how to remove this annoying trojan horse from your PC and save your computer.

How To : Install hurricane security window film

If you live in a hurricane prone area, it is a good idea to protect your windows with security film. This video will teach you how to install hurricane security window film on your own and protect your home and assets. The film will keep your windows sturdy during heavy winds ...more

WTFoto of the Day : Password Security Fail

To decipher my password, you need to know my mother's maiden name, where I was born, and what I had for breakfast on August 12th, 1996 (trick question, I was in a food coma). This was a bit simpler... May God have mercy on his soul. Images by bash.org, icebox500

How To : Use the Ironkey High Security Flash Drive

The Ironkey is a high security thumb drive designed to provide strong AES encryption, tamper resistance and other security services. Some of the topics covered will include: How is the drive mounted without admin privileges in Windows? How is it mounted in Linux? How does the ...more

How To : Install a deadbolt lock for better security

Installing a deadbolt is a relatively quick and simple do-it-yourself project. You can make your home much safer – and less attractive to thieves --- with a little effort and a few simple tools. First, you need to decide between a surface-mount deadbolt, which is easier to in ...more

How To : Fly Through Airport Security

Waiting in line at the airport can be a drag, but here are a few tips for catching your flight hassle-free. See how to get through airport security in a snap from this how-to video. Airport Security Tips - Fly Through Airport Security Video. Waiting in line at the airport can ...more

How To : Fix security mode for nds wifi

In this tutorial, we learn how to fix security mode for nds Wi-Fi. First, open the command prompt in Windows. Next, type in "ipconfig/all" in the black window that appears. After this, copy your default IP the screen just gave you, then type it into your address bar online. Af ...more

How To : Remove Security Tool in less than one minute

In this tutorial, we learn how to remove security tool in less than one minute. First, restart your computer, then press "ctrl+alt+del" when your new window starts up. After this, wait for a few seconds, then if you see the security tools pop up, end the task for it. Then, go ...more

How To : Easily change the security settings to IE 8

Having security setting on your web browser is a pretty important tool. It keeps you safe from potential hackers and makes sure you don't visit unsafe sites that could lead to a virus. But sometimes the security settings on a web browser can be a pain and the best choice would ...more

How To : Remove Security Tool the simple way

In this video, we learn how to remove Security Tool the simple way. Most ways will not remove this from your computer, but this way will. To start, you will need to restart your computer. After this, press ctrl+alt+del the moment Windows shows up. Then, go to the Task Manager ...more

How To : Delete Security Tool from your computer

In this tutorial, we learn how to delete Security Tool from your computer. First, you will need to restart your computer. After this, go to your documents on your computer. Then, type in "Type C:/Documents and Settings\All Users\Application Data". After this, delete the file w ...more

How To : Use the Applocker security feature in MS Windows 7

In this Microsoft Windows 7 users guide, you'll learn how to take advantage of the operating system's new Applocker security feature. It's easy! So easy, in fact, that this home-computing how-to can present a complete, step-by-step overview of the process in about a minute and ...more

News : Toyota Puts Blockchain to the Test for Data Security

Toyota is testing blockchain and distributed ledger technology (BC/DL) for data sharing for driverless cars and other applications. This could eventually reassure buyers of its upcoming high-end cars by making sure their sensitive data is secure. As vehicles modernize, they b ...more

How To : Mount a security chain to a door

Middle-aged man goes through the tools and process to install a security chain to a door. Tools include a door chain, screwgun, hammer, chisel and other listed tools. Step-by-step video explains thoroughly how to accomplish the chain installation. Mount a security chain to a d ...more

News : Homeland Security is watching YOU

The department of Homeland Security released a list of 'words and phrases' it uses to search social media for terrorism, and whatever else they decide they are looking for that day. Read some of these. A few are obvious "bomb, nuke" and some "target, event" are just down right ...more

News : IT Security Model

Hi fellows! I finally decided to join this forum, which I find very interesting and has some great contributions into the tech and security space, appreciate it! I decided that I wanted to share a some of my thoughts. Me and my study team while studying IT security "develope ...more

  • Hot
  • Latest