What is XP 64 Bit Edition?
Microsoft is making a version of this operating system for those running x86-64 processors. Currently, that means anyone running the AMD Athlon64/FX/Opteron (hence the "extended" wording in the name). The…
Strength of Cryptographic Algorithms
Good cryptographic systems should always be designed so that they are as difficult to break as possible. It is possible to build systems that cannot be broken in practice (though…
Mighty mouse – computer mouses – Buyers Guide
WITH TODAY's computers, inputting, accessing, retrieving and printing information are often handled by means of a mouse. Recently, a spate of new technology has spawned hands-free mice, square mice, oval…
Alagus Print Admin 3.0 Pro
Alagus Print Admin is a client-server program for monitoring and management of network printers and print jobs. The program offers you an opportunity to reduce your printer related expenses. It…
Iomega External Hard Drive FireWire 800/FireWire 400/USB (250GB) Review
Iomega's External Hard Drive FireWire 800/FireWire 400/USB impressed us with its large capacity, speedy FireWire 400/800 performance, and nice array of backup software. The unit is great for gigabyte-hungry Mac…
Opening Ports in XP Service Pack 2
If you're getting ready to update to the Windows XP Service Pack 2, Microsoft has just released a guide on application compatibility. If you're concerned about which applications you might…
A Brief History of Cryptography – compiled by Shireen Hebert
Cryptography, the science of encrypting and decrypting information, dates as far back as 1900 BC when a scribe in Egypt first used a derivation of the standard hieroglyphics of the…
Cryptanalysis and Attacks on Cryptosystems
Cryptanalysis is the art of deciphering encrypted communications without knowing the proper keys. There are many cryptanalytic techniques. Some of the more important ones for a system implementor are described…
Cryptographic Hash Functions
Cryptographic hash functions are used in various contexts, for example, to compute the message digest when making a digital signature. A hash function compresses the bits of a message to…
Introduction to Cryptosystems
Cryptology is the hiding of information so that it is unintelligable to those we do not wish to read it and intelligable to those we do. In this section we…
Free Software Profile: PHP
General OverviewPHP is an HTML-embedded scripting language. Like Microsoft's ASP technology, it is designed to be processed on the server side and produce dynamic Web is the third version of…
Have You Considered an Epson Printer?
An Epson printer may be just what you are looking for in the line of quality computer printing equipment. Everyone needs a printer they can rely on to produce clear,…
Why Buy an HP Printer?
Many office equipment gurus believe that Hewlett Packard is the best name in computer technology. With a longstanding reputation of quality and dependability, HP has become a trademark for technological…
How to print photography by laser printer!
The installation of color laser printer is growing every year. More and more people use laser printer to print photography and complain about poor printing quality or paper jam. What…
Printer Ink or Toner Cartridge?
When shopping for a new printer, keep in mind the fact that you will need to buy replacement ink cartridges when the current supply runs out. For many models, the…
Qualities of a Cost-Effective Printer
If you are in the market for a computer printer, you obviously want to get the best piece of equipment for your money. Here are some tips that can help…
Remote-management package delivers Web-based help desk
3am Labs extended its line of remote management products on Monday, delivering a Web-based help desk platform that allows administrators to gain control of a remote system to resolve problems…
Real-Time and Embedded Linux
For years, there has been a sentiment throughout the industry that the desktop is where products should be targeted and that the home system is the center of personal computing.…
Cryptography: History
"It was the amateurs of cryptology who created the species. The professionals, who almost certainly surpassed them in cryptanalytic expertise, concentrated on down-to-earth problems of the systems that were then…
Cryptographic Random Number Generators
Cryptographic random number generators generate random numbers for use in cryptographic applications, such as for keys. Conventional random number generators available in most programming languages or programming environments are not…