Hash

The Wonders of Hashing

Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
toolbar

Getting Rid of Shady Toolbars

Perhaps it has happened to you. One day you open your Internet browser and instead of going to your usual homepage, you go to the landing page of a search engine you’ve never hear...
tor

Demystifying Tor

Learn the ins and outs of TOR and what kind of sites this technology makes available in your system.
locker_title

CryptoLocker is Bad News

Ransomware in general is not exactly the nastiest malware out there, but a new variant – called CryptoLocker – is particularly worrisome because it actually does what most ransomw...
morris

Morris Worm Turns 25

This weekend we had a memorable date. It marked 25 years since the publication of the first computer malware that was widespread enough to be featured in the news. The famous Morr...