Privacy & Security
Internet security & privacy articles and tutorials on how to protect yourself from viruses, phishing emails and other scams, the latest security threats and new developments in online security,
SHA-256, SHA-384 and SHA-512 XML signatures require the Microsoft Enhanced RSA and AES Cryptographic Provider. When trying to sign data using SHA-256 on another provider type you may encounter the exception System.Security.Cryptography.CryptographicException: Invalid algorithm specified.
Derived from two Greek words, krypto meaning "hidden" and grafo "to write", cryptography is a mechanism to hide information from unauthorised viewing.
In this tutorial we will look at how cryptography, encryption and SSL certificates actually work to secure the internet and how the public/private key exchange system works.
A password is a number of symbols that protect your account. Most people have trouble creating a unique password. This random password generator will allow you to generate a random password using letters, numbers and symbols.
Each and every day I have to clear out well over 200 junk emails from my inboxes. It is theoretically just a case of selecting the junk emails, right clicking on them and marking them as junk - but it doesn't always work!
Today is the start of the fourth annual Get Safe Online week; a campaign founded by the British Government, HSBC, SOCA and Microsoft, with the aim to raise awareness of internet safety issues.
I get countless numbers of scam emails in my inbox each day and quite frankly I am astounded that people actually fall for them. Maybe I just get the really badly done scams or have my many years as a techie have actually paid off?
When the German physicists Otto Hahn and Fritz Strassmann discovered nuclear fission in 1939 they unleashed a genie that changed the world forever. With the ever increasing risk of global thermonuclear war, this guide should help prepare and survive a nuclear bomb blast.