0 164  0 Comment on Hiroshima – Remembering Evil human’s stupidity

Hiroshima – Remembering Evil human’s stupidity

0 356  0 Comment on What is Penetration Testing?… And Tools

What is Penetration Testing?… And Tools

0 222  0 Comment on Five free pen-testing tools

Five free pen-testing tools

0 322  0 Comment on Top 7 firewall for windows

Top 7 firewall for windows

0 256  0 Comment on Microsoft Security Essentials and Windows Defender

Microsoft Security Essentials and Windows Defender

0 308  0 Comment on Stop Sharing Folders Without a Password

Stop Sharing Folders Without a Password

0 224  0 Comment on 5 Tips to Reduce Risk from Web Threats

5 Tips to Reduce Risk from Web Threats

0 162  0 Comment on Is Your Windows 8 Computer Having Trouble Keeping the Correct Time?

Is Your Windows 8 Computer Having Trouble Keeping the Correct Time?

0 201  0 Comment on BIOS Tip – Securing Your BIOS

BIOS Tip – Securing Your BIOS

0 203  0 Comment on Lock The Screen Image

Lock The Screen Image

0 260  0 Comment on Phone Spy Resources and prevention

Phone Spy Resources and prevention

0 146  0 Comment on 5 Smart Watches Better Than Apple Watch

5 Smart Watches Better Than Apple Watch

0 220  0 Comment on Multiple Ethernet profiles

Multiple Ethernet profiles

0 227  0 Comment on Process Explorer v16.05

Process Explorer v16.05

0 263  0 Comment on Europeans most at risk from surge in Dyre malware attacks June2015

Europeans most at risk from surge in Dyre malware attacks June2015

0 225  0 Comment on Apple Mac persistent rootkit malware june 2015

Apple Mac persistent rootkit malware june 2015

0 230  0 Comment on Best recovery CD

Best recovery CD

0 190  0 Comment on Password Establishment Protocol

Password Establishment Protocol

0 606  0 Comment on DataGridViewHTMLCell – Displaying HTML markup in a DataGridView

DataGridViewHTMLCell – Displaying HTML markup in a DataGridView

0 1290  0 Comment on New Onion List May 2015

New Onion List May 2015

0 139  0 Comment on Apple IOS 8 exploit 2

Apple IOS 8 exploit 2

0 161  0 Comment on Apple IOS 8 exploit 1

Apple IOS 8 exploit 1

0 220  0 Comment on Denial of Service Tools

Denial of Service Tools

0 173  0 Comment on Robots Text Generator

Robots Text Generator

0 171  0 Comment on Counters in Javascript

Counters in Javascript

0 200  0 Comment on How To Make Your Own Sandbox: An Introduction to Virtualization Techniques

How To Make Your Own Sandbox: An Introduction to Virtualization Techniques

0 191  0 Comment on How to Install Windows Store Apps to an SD Card or Another Drive

How to Install Windows Store Apps to an SD Card or Another Drive

0 167  0 Comment on Top 5 Wearable Technology Trending Now

Top 5 Wearable Technology Trending Now

0 137  0 Comment on Huawei’s P8 – Metallic Beast

Huawei’s P8 – Metallic Beast

0 160  0 Comment on Running the show!

Running the show!

0 186  0 Comment on Python tools If you are involved in vulnerability research

Python tools If you are involved in vulnerability research

0 189  0 Comment on 11 Benefits of Video Gaming

11 Benefits of Video Gaming

0 621  0 Comment on How to Hack Databases: Hacking MySQL Online Databases with Sqlmap

How to Hack Databases: Hacking MySQL Online Databases with Sqlmap

0 200  0 Comment on Problems with religions?

Problems with religions?

0 222  0 Comment on Make sure WordPress it’s patched to last version as ISIS it’s targeting un-patched installation

Make sure WordPress it’s patched to last version as ISIS it’s targeting un-patched installation

0 264  0 Comment on Simple use of keypad, password and LCD

Simple use of keypad, password and LCD

0 183  0 Comment on Sorting IP addresses

Sorting IP addresses

0 198  0 Comment on collection of some useful shortcuts

collection of some useful shortcuts

0 509  0 Comment on Check if a file exists in a directory

Check if a file exists in a directory

0 167  0 Comment on A simple HTTP Server

A simple HTTP Server

0 140  0 Comment on Video footage of the F-35B hovering for the first time

Video footage of the F-35B hovering for the first time

0 164  0 Comment on Ion Hall Thrusters – Pushing the Boundaries of Propelling Deep Space Missions

Ion Hall Thrusters – Pushing the Boundaries of Propelling Deep Space Missions

0 166  0 Comment on The Hacker’s Creed

The Hacker’s Creed

0 217  0 Comment on suicide hotlines

suicide hotlines

0 198  0 Comment on Advanced CSS3 Styling of HTML5 SELECT Element

Advanced CSS3 Styling of HTML5 SELECT Element

0 226  0 Comment on We, the Web Kids.

We, the Web Kids.

0 246  0 Comment on Google opens first physical Google Shop and an online hardware store

Google opens first physical Google Shop and an online hardware store

0 246  0 Comment on Amazon wants to use mobile 3D printers for orders

Amazon wants to use mobile 3D printers for orders

0 172  0 Comment on Solve/Fix No Sim Card Installed Error- iPhone 4,5,5s,5c

Solve/Fix No Sim Card Installed Error- iPhone 4,5,5s,5c

0 282  0 Comment on Updated Onion List Feb 2015

Updated Onion List Feb 2015

0 197  0 Comment on Promologic.com- Possible SCAM

Promologic.com- Possible SCAM

0 223  0 Comment on LLT Consulting company – Possible SCAM!

LLT Consulting company – Possible SCAM!

0 155  0 Comment on 10 Must Have WordPress Plugins

10 Must Have WordPress Plugins

0 208  0 Comment on Apple’s SmartWatch to be launched at Spring Forward Event on March 9th

Apple’s SmartWatch to be launched at Spring Forward Event on March 9th

0 231  0 Comment on HTC ONE M9 – Power Packed Smartphone

HTC ONE M9 – Power Packed Smartphone

0 191  0 Comment on HTML5 and CSS3 Responsive Web Design Cookbook

HTML5 and CSS3 Responsive Web Design Cookbook

0 225  0 Comment on Build a LAMP Server on Ubuntu 14.04 Desktop

Build a LAMP Server on Ubuntu 14.04 Desktop

0 211  0 Comment on The Secret To Social Network Marketing

The Secret To Social Network Marketing

0 640  0 Comment on Bugzilla Tutorial

Bugzilla Tutorial

0 175  0 Comment on Features of Object Oriented Programming

Features of Object Oriented Programming

0 198  0 Comment on Wireless Sensor Network

Wireless Sensor Network

0 177  0 Comment on 5G Networks

5G Networks

0 168  0 Comment on 4G Networks

4G Networks

0 173  0 Comment on 3G Networks

3G Networks

0 237  0 Comment on Recover SHIFT+DELETED files once accidentally deleted from your hard disk .

Recover SHIFT+DELETED files once accidentally deleted from your hard disk .

0 163  0 Comment on Facebook Status update trick

Facebook Status update trick

0 203  0 Comment on Denial Of Service Attacks : Explained for Beginners and Dummies

Denial Of Service Attacks : Explained for Beginners and Dummies

0 272  0 Comment on McAfee Free Tools

McAfee Free Tools

0 222  0 Comment on Get better with your photography

Get better with your photography

0 183  0 Comment on Seamless Textures in Photoshop

Seamless Textures in Photoshop

0 163  0 Comment on A full list of free textures websites

A full list of free textures websites

0 198  0 Comment on Windows 10 to Weave Microsoft-Powered Devices Together

Windows 10 to Weave Microsoft-Powered Devices Together

0 181  0 Comment on Chrome’s Plug-Ins and What They Actually Do

Chrome’s Plug-Ins and What They Actually Do

0 149  0 Comment on Five Best File Encryption Tools

Five Best File Encryption Tools

0 245  0 Comment on The 3 Intel Tablet Apps I Can’t Live Without

The 3 Intel Tablet Apps I Can’t Live Without

0 169  0 Comment on

0 546  0 Comment on Give Me 2 hours and I’ll Make you SEO Pro!

Give Me 2 hours and I’ll Make you SEO Pro!

0 196  0 Comment on HOWTO Fetch Internet Resources Using urllib2

HOWTO Fetch Internet Resources Using urllib2

0 306  0 Comment on TCP server demo in Python

TCP server demo in Python

0 242  0 Comment on Download Images From Web Page

Download Images From Web Page

0 206  0 Comment on Tech upgrades of 2015

Tech upgrades of 2015

0 269  0 Comment on Inside Scoop: What to expect from Microsoft’s Windows 10

Inside Scoop: What to expect from Microsoft’s Windows 10

0 167  0 Comment on 19 online comics(black ones!)

19 online comics(black ones!)

0 187  0 Comment on 7 seven Worse stealth attacks in IT

7 seven Worse stealth attacks in IT

0 159  0 Comment on Splash Data report on Bad Passwords

Splash Data report on Bad Passwords

0 167  0 Comment on Man Ape Brain

Man Ape Brain

0 258  0 Comment on SQL INJECTION STRINGS LIST

SQL INJECTION STRINGS LIST

0 432  0 Comment on List of Dorks to find Admin Panel of a Website.

List of Dorks to find Admin Panel of a Website.

0 212  0 Comment on Skeleton Key Malware Analysis

Skeleton Key Malware Analysis

0 323  0 Comment on MYSQL Scroll LIST IN PHP

MYSQL Scroll LIST IN PHP

0 160  0 Comment on Simple file uploader written in PHP

Simple file uploader written in PHP

0 195  0 Comment on The Gentleman’s Guide To Forum Spies (spooks, feds, etc.)

The Gentleman’s Guide To Forum Spies (spooks, feds, etc.)

0 272  0 Comment on Drone chart

Drone chart

0 135  0 Comment on DO-NOT-REPLY Datasharp UK Ltd – Monthly Invoice & Report – Word doc malware

DO-NOT-REPLY Datasharp UK Ltd – Monthly Invoice & Report – Word doc malware

0 359  0 Comment on Stored Procedure From Excel Sheet

Stored Procedure From Excel Sheet

0 185  0 Comment on Why Do People Get Computer Viruses

Why Do People Get Computer Viruses

0 181  0 Comment on Alureon Virus – Stopping The Google Redirect

Alureon Virus – Stopping The Google Redirect

0 221  0 Comment on The Most Notorious Computer Viruses

The Most Notorious Computer Viruses

0 244  0 Comment on How to create Ajax based PHP application

How to create Ajax based PHP application

0 128  0 Comment on Printing Images Quickly and Efficiently to a A4 Page [VB.NET]

Printing Images Quickly and Efficiently to a A4 Page [VB.NET]