Search results

  1. P

    Random Key Generator Make it Haard For Hacker to Hack Your Stuff By Encryption Keys.

    Random Key Generator Make it Haard For Hacker to Hack Your Stuff :whistling: Here you will find a variety of random keys that can be used for passwords, encryption keys, etc. - all randomly generated, just for you! Simply refresh this page for a completly new set of keys :>: Random Key...
  2. P

    Another step toward quantum computers: Using photons for memory

    Another step toward quantum computers: Using photons for memory Scientists at Yale University have found a new way to manipulate microwave signals that could aid the long-term effort to develop a quantum computer, a powerful tool that would revolutionize information processing through...
  3. P

    Feds Studying How to Use Twitter For Depression Surveillance

    Feds Studying How to Use Twitter For ‘Depression Surveillance’ $82,800 study will examine social media to study depression The federal government is studying how to use Twitter for surveillance on depressed people. The University of California, San Diego (UCSD) began a study financed by...
  4. P

    MI5 chief defends spying on web traffic as vital for national security

    MI5 chief defends spying on web traffic as vital for national security The head of the UK’s spy agencies has said the monitoring of internet traffic is vital for stopping terrorist threats. Andrew Parker Security Service Director General speaking at the Royal United Services...
  5. P

    Windows Commands: Think You Know It All !?

    Windows Commands: Think You Know It All !? Windows "keyboard" commands Accessibility Controls access.cpl Add Hardware Wizard hdwwiz.cpl Add/Remove Programs appwiz.cpl Administrative Tools control admintools Automatic Updates wuaucpl.cpl Bluetooth Transfer Wizard fsquirt...
  6. P

    12 True Tales of Creepy NSA Cyberstalking

    12 True Tales of Creepy NSA Cyberstalking The NSA has released some details of 12 incidents in which analysts used their access to America’s high-tech surveillance infrastructure to spy on girlfriends, boyfriends, and random people they met in social settings. It’s a fascinating look at what...
  7. P

    iPhone, iPad users report iOS 7-related ILLNESS

    iPhone, iPad users report iOS 7-related ILLNESS Some people have complained of headaches, dizziness and motion sickness after using the updated operating system, and they say the zooming animation is to blame. You may be sick of trying to figure out how to navigate your phone after Apple's...
  8. P

    Bill Gates calls the awkward Control-Alt-Delete command a mistake

    Bill Gates calls the awkward Control-Alt-Delete command a mistake Ever thought the key combination of Ctrl-Alt-Delete was a little awkward for every time you want to restart your computer? Well the former head of M*crosoft, Bill Gates, says that it wasn’t meant to be like that, and blames...
  9. P

    Damn i have forget alot by using Photoshop lol Were i have to go soon.

    Damn i have forget alot by using Photoshop lol Were i have to go soon :139: Btw better next time see Y A need sleep :O)
  10. P

    iOS 7 Bug Lets Anyone Bypass iPhone's Lockscreen To Hijack Photos, Email, Or Twitter

    iOS 7 Bug Lets Anyone Bypass iPhone's Lockscreen To Hijack Photos, Email, Or Twitter Andy Greenberg Forbes Staff Forget the debate around the security or insecurity of the iPhone 5ss fingerprint reader. The latest version of the iPhones operating system currently offers a gaping hole in its...
  11. P

    Y2K All Over Again as Windows XP Approaches End of Support

    Y2K All Over Again as Windows XP Approaches End of Support September 9, 2013 Richard Hay All Posts, Windows 62 comments The last few weeks have really felt like déjà vu. If you were around in the waning years of the 1990’s you will remember the discussion, hype, fear and general confusion...
  12. P

    Tracing A Hacker

    Tracing A Hacker Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there. By enumerating the attacker in the same way that they have enumerated...
  13. P

    How to make yourself unhackable (well maybe)

    How to make yourself unhackable (well maybe) Computer and online security is a game of cat and mouse. Stay one step ahead of the cat by protecting yourself with these helpful tips. Ok, so maybe “unhackable” is a bit strong. It’s impossible to ever truly be bulletproof online. But don’t let...
  14. P

    How to fool a keylogger Easy

    How to fool a keylogger :fly: some of you may already know this tip/trick but for those who don't... These days Agents spy on u everywhere, in college, at work, maybe a trojan virus on your home PC which keylogs your paswords and mails it to someone else. If u think u r being logged, try...
  15. P

    How to remove (all) Windows 8 apps using PowerShell

    How to remove (all) Windows 8 apps using PowerShell By Martin Brinkmann on August 20, 2013 in Windows Apps are clearly a focus on Windows 8, not only because the operating system boots into the "apps-interface" on startup by default, but because most of the marketing for the operating system...
  16. P

    Google rushing to encrypt data before NSA snoops can snatch it

    Google rushing to encrypt data before NSA snoops can snatch it :-= Google is rushing to encrypt information stored and passing through its data centres in a bid to protect its customers from snooping government agencies, according to The Washington Post. The Washington Post reported that a...
  17. P

    iSpy How the NSA Accesses Smartphone Data

    iSpy How the NSA Accesses Smartphone Data The US intelligence agency NSA has been taking advantage of the smartphone boom. It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure. By Marcel Rosenbach, Laura...
  18. P

    101 Short Cuts in Maths Any One Can Do – Tutorial eBook

    101 Short Cuts in Maths Any One Can Do – Tutorial eBook 101 Short Cuts in Math Anyone Can Do will unlock the secrets of the art of calculation. It will increase your power of computation and thereby enable you to get more out of the mathematic you now know. You will soon be amazed at your...
  19. P

    US and UK crack online encryption

    US and UK 'crack online encryption' US and UK intelligence have reportedly cracked the encryption codes protecting the emails, banking and medical records of hundreds of millions of people. Disclosures by leaker Edward Snowden allege the US National Security Agency (NSA) and the UK's...
  20. P

    Whom can you now trust in tech ??

    Whom can you now trust in tech ?? SAN FRANCISCO -- Big Data, meet Big Brother -- and that could mean big trouble for tech. Fairly or not, the reputation of the tech world has been besmirched with a broad brushstroke by reports in Pro Publica, the New York Times and The Guardian of cracks...
Back
Top