This article discusses various techniques for deciphering messages in IT and Information Technology, including monoalphabetic substitution, Caesar shift cipher, probable word attack, polyalphabetic substitution, and transposition based ciphers. It also estimates the time it would take to decipher a message on current high-end consumer hardware and explores techniques that senders can use to make the decryption process harder. Finally, it examines factors that make the decryption process easier/faster.