Home » Archive

Articles in the Security Category

Google, Humor, Security »

[8 Dec 2009 | No Comment]

I’m human, Google !

I was googling something and google suddenly said sorry to me. It says my computer is sending automated queries. I was just googling “magento programmer developer nepal” by changing the word position at each time. I just googled this way for at most 5 times.
Google help says the following thing about this issue:

Security »

[10 Oct 2007 | 2 Comments]


When you start your Windows Operating System, a popup appears related to updatemgr.exe stating that “The NTDVM CPU has encountered an illegal instruction”. This should be closed or ignored. I mean to say that there are two options with this error at a glance. Either you can close it or you can ignore it.
After you close it or ignore it, nothing happens. It’s all fine with your computer and your system. But the main problem is that it appears all the time when you start your computer. And nobody …

Security »

[6 Sep 2007 | One Comment]

Platform: Windows
Computer slows down showing hardware interrupt to 80% and even more. If no application is run, it is still around 40% and when any application is run, say media-player is run, then the hardware interrupt rises to 80% and even more. Computer starts slowly and the sound appears to be so unclear. “Sound” means, when we play some songs or the computer startup sound.

Security »

[4 Sep 2007 | No Comment]

I got attacked by this frustrating and irritating worm called “Trojan.W32.Looksky”. Once you get this worm in your computer, you will surely be eager to kill and delete this coz’ it’s so… irritating, always getting pop-up with the following message:
Security Warning!

Security »

[8 Apr 2007 | 3 Comments]

Public-key encryption makes key-management much easier. It was invented in 1976 by two Stanford mathematicians, Whitfield Diffie and Martin Hellman. Their discovery can be phrased simply: enciphering schemes should be asymmetric. For thousands of years all ciphers were symmetric—the key for encrypting a message was identical to the key for decrypting it, but used, so to speak, in reverse. To change “5 100 100 5 15 55″ or “6 120 120 6 18 66″ back into “attack,” for instance, one simply reverses the encryption by dividing the numbers with the …