Tag: Security

Phishing Scams: How Phishing Scams Work

Phishing scams are just another attempt to get valuable information. Scammers send a mass email to every address they can find. Typically the message will appear to come from a legitimate institution or company. The email states that you should update or enter your information for one reason or another, and they usually provide a Read More

Generate QR code from RSA SDTID file

How to generate a QR code using TokenConverter.jar with a standards software Token in the .SDTID file format. Some android and iphone devices are unable to import a .sdtid file emailed to the users device. a quick workaround to this is to generate and scan a QR Code. Download the TokenConverter app from here Once downloaded browse Read More

Steel Keylogger Record Computer Keystrokes

Steel Keylogger is a keylogger that is virtually invisible to all the common anti-virus software today, helping you keep it running stealthily. Also, it does not connect to the Internet so your data is safe. This program is a simple one and has no Web site, but the file is widely available on most torrent Read More