![](https://web.archive.org/web/20060421062305im_/http://static.howstuffworks.com/gif/spacer.gif) |
Today on Security: |
![](https://web.archive.org/web/20060421062305im_/http://static.howstuffworks.com/gif/spacer.gif) |
![](https://web.archive.org/web/20060421062305im_/http://static.howstuffworks.com/gif/spacer.gif) | | How Fingerprint Scanners Work - Your fingerprints are not only unique; they're also very hard to fake and even harder to misplace. What better ID to use in a security system? Learn how fingerprint scanners know it's you.
| | How Identity Theft Works - The idea that someone can "steal" your identity is very, very unsettling, but it happens every day. A lot of damage can be done in this situation. Learn all about identity theft and what steps you can take to avoid it.
| | How Encryption Works - How secure is the Internet for sending sensitive information? Learn all about encryption, authentication, hash algorithms and more.
|
|
|
|
![](https://web.archive.org/web/20060421062305im_/http://static.howstuffworks.com/gif/spacer.gif) |
The Security Library: |
![](https://web.archive.org/web/20060421062305im_/http://static.howstuffworks.com/gif/spacer.gif) |
![](https://web.archive.org/web/20060421062305im_/http://static.howstuffworks.com/gif/spacer.gif) |
|