Skip to content
Latest ideas
2026-01-16
The Modern Usenet Starter Guide (2026 Edition)
2026-01-14
The Viral Black Box: Why We’re Joining Mozilla’s Call for Social Media Transparency
2026-01-11
Escaping the “Nanny Filter”: Why You Aren’t Seeing Global Viral Trends in the UK (And How to Fix It)
2025-12-29
a step-by-step guide on how to “debloat” Windows 11 and disable the constant telemetry/ads
2025-12-29
Windows 11: The “Framework for Milking” That Left 400 Million Users Behind
Area-6 – Security and Code Snippets ༼ຈل͜ຈ༽
Info, security, Coding, tricks blog
Search for:
Home
Cyber Attack Threat Map
Reciperium( food recipes) – BETA
Freedom? The Era of Frustration
Web Development
How to create a business – complete guide
Business Niche – Mobile Pet Grooming Service
Business niche -Personalized Fitness and Wellness Coaching:
Business Niche – Home Organisation and Decluttering Services
Contact me
Search for:
×
0
184
0
Comment on SMS Gateway using Android Phone
SMS Gateway using Android Phone
0
258
0
Comment on ICREACH
ICREACH
0
222
0
Comment on Interesting posts about EBOLA
Interesting posts about EBOLA
0
153
0
Comment on Traffic generator via tor (educational)
Traffic generator via tor (educational)
0
175
0
Comment on hack into emails
hack into emails
0
194
0
Comment on 4 Ways to Crack a Facebook Password and protect yourself
4 Ways to Crack a Facebook Password and protect yourself
0
306
0
Comment on Crack WI-FI methods
Crack WI-FI methods
0
164
0
Comment on Possible upcoming attempts to disable the Tor network
Possible upcoming attempts to disable the Tor network
0
227
0
Comment on Onion List October-November 2014
Onion List October-November 2014
0
225
0
Comment on South Korean Malware Attack
South Korean Malware Attack
0
247
0
Comment on Using Google Maps Service and GPS in Android
Using Google Maps Service and GPS in Android
0
276
0
Comment on Upgrade the iMac 2006 to 64bit
Upgrade the iMac 2006 to 64bit
0
256
0
Comment on Installation Guide for Ubuntu/Linux Mint/Debian on a Mac mini
Installation Guide for Ubuntu/Linux Mint/Debian on a Mac mini
0
273
0
Comment on Choosing a Hosting Environment – Linux vs Windows
Choosing a Hosting Environment – Linux vs Windows
0
340
0
Comment on Universal ADB Utility Simplifies Common Android Command Line Tasks
Universal ADB Utility Simplifies Common Android Command Line Tasks
0
288
0
Comment on Complete Beginner’s Guide For Arduino Hardware Platform
Complete Beginner’s Guide For Arduino Hardware Platform
0
202
0
Comment on Install SQLite on Windows
Install SQLite on Windows
0
228
0
Comment on Getting the Local Traffic Report
Getting the Local Traffic Report
0
197
0
Comment on Release Android App Using Eclipse
Release Android App Using Eclipse
0
324
0
Comment on PHP to feed a video list from a particular channel without Oauth
PHP to feed a video list from a particular channel without Oauth
0
200
0
Comment on Galileo Smart Fan Example
Galileo Smart Fan Example
0
262
0
Comment on What is Galileo
What is Galileo
0
169
0
Comment on Apple Swift
Apple Swift
0
258
0
Comment on Python Quickstart: Creating a template and deployment
Python Quickstart: Creating a template and deployment
0
284
0
Comment on Customize WordPress Login Page
Customize WordPress Login Page
0
200
0
Comment on Getting Started With ArdOS for Arduino
Getting Started With ArdOS for Arduino
0
210
0
Comment on Turn your IPod Iphone or soon to be Ipad into a hacker system
Turn your IPod Iphone or soon to be Ipad into a hacker system
0
178
0
Comment on Semi-Restore tool for IOS
Semi-Restore tool for IOS
0
181
0
Comment on Using forensic software to recover your iPad or iPhone
Using forensic software to recover your iPad or iPhone
0
329
0
Comment on 10 Android hacking tools
10 Android hacking tools
0
202
0
Comment on Perfect OS for hacking.
Perfect OS for hacking.
0
239
0
Comment on BASIC TUTORIAL ON ANONIMITY AND USAGE OF PROXY’S
BASIC TUTORIAL ON ANONIMITY AND USAGE OF PROXY’S
0
161
0
Comment on Browser security
Browser security
0
195
0
Comment on Anonymous Tips
Anonymous Tips
0
238
0
Comment on Intrusive Surveillance
Intrusive Surveillance
0
206
0
Comment on Network Attributes of your computer
Network Attributes of your computer
0
150
0
Comment on Android Distribution data for October 2014
Android Distribution data for October 2014
0
193
0
Comment on CERT-In alerts online banking customers to be aware of Dyreza Trojan
CERT-In alerts online banking customers to be aware of Dyreza Trojan
0
178
0
Comment on The Secret Powers of Chrome’s Address Bar
The Secret Powers of Chrome’s Address Bar
0
264
0
Comment on 6 Social Media Sites You’ve Never Heard Of (But Should Check Out)
6 Social Media Sites You’ve Never Heard Of (But Should Check Out)
0
247
0
Comment on How to Hack Your Own Network and Beef Up Its Security with Kali Linux
How to Hack Your Own Network and Beef Up Its Security with Kali Linux
0
203
0
Comment on T-Mobile’s CEO just unleashed a tweetstorm about the Apple SIM
T-Mobile’s CEO just unleashed a tweetstorm about the Apple SIM
0
301
0
Comment on Create a USB Password Stealer to See How Secure Your Info Really Is
Create a USB Password Stealer to See How Secure Your Info Really Is
0
363
0
Comment on The Apple Timeline [VIDEO] – KnowTechie
The Apple Timeline [VIDEO] – KnowTechie
0
400
0
Comment on The Daily Read – Apple Pay Edition – 10/20/2014
The Daily Read – Apple Pay Edition – 10/20/2014
0
151
0
Comment on Video of racing drones looks like a scene right out of Star Wars
Video of racing drones looks like a scene right out of Star Wars
0
187
0
Comment on Passwords/ Passwords (Thanks anonimous)
Passwords/ Passwords (Thanks anonimous)
0
180
0
Comment on Account Password Security: Advanced Edition
Account Password Security: Advanced Edition
0
168
0
Comment on Account Password Security: Basic Edition
Account Password Security: Basic Edition
0
405
0
Comment on Windows NT 6.X OLE package manager remote code execution through MS Office Powerpoint XYZ slideshow (ppts, pptxs).
Windows NT 6.X OLE package manager remote code execution through MS Office Powerpoint XYZ slideshow (ppts, pptxs).
0
221
0
Comment on The algorithm of the Trojan
The algorithm of the Trojan
0
210
0
Comment on List of Trojan Creation Programs or Software
List of Trojan Creation Programs or Software
0
293
0
Comment on How to Create Your Own Android Trojan in 5 Easy Steps
How to Create Your Own Android Trojan in 5 Easy Steps
0
165
0
Comment on How Do Your Devices Learn To Talk To You
How Do Your Devices Learn To Talk To You
0
209
0
Comment on Minecraft: Pocket Edition is coming
Minecraft: Pocket Edition is coming
0
223
0
Comment on New Zealand Launched Mass Surveillance Project While Publicly Denying It
New Zealand Launched Mass Surveillance Project While Publicly Denying It
0
160
0
Comment on NSA spying: What’s the best phone encryption & IMEI random number generator?
NSA spying: What’s the best phone encryption & IMEI random number generator?
0
171
0
Comment on Hackers discover gaping major security flaw in USB sticks
Hackers discover gaping major security flaw in USB sticks
0
209
0
Comment on PHP Useful Extensions, Utilities and Classes
PHP Useful Extensions, Utilities and Classes
0
160
0
Comment on PHP Image Manipulation and Graphs
PHP Image Manipulation and Graphs
0
210
0
Comment on PHP Security Tools
PHP Security Tools
0
195
0
Comment on PHP Testing and Optimization Tools
PHP Testing and Optimization Tools
0
248
0
Comment on PHP Debugging Tools
PHP Debugging Tools
0
390
0
Comment on CLOUDFARE BYPASSER
CLOUDFARE BYPASSER
0
159
0
Comment on Bye PlayStation Home!
Bye PlayStation Home!
0
140
0
Comment on Other forensic software old!
Other forensic software old!
0
163
0
Comment on Application analysis
Application analysis
0
225
0
Comment on Registry analysis
Registry analysis
0
153
0
Comment on Internet analysis
Internet analysis
0
176
0
Comment on File viewers
File viewers
0
189
0
Comment on Data analysis suites
Data analysis suites
0
159
0
Comment on Mobile devices
Mobile devices
0
225
0
Comment on Mac OS tools
Mac OS tools
0
255
0
Comment on File and data analysis
File and data analysis
0
222
0
Comment on General Forensic utilities
General Forensic utilities
0
189
0
Comment on Email analysis
Email analysis
0
2990
0
Comment on Disk tools and data capture
Disk tools and data capture
0
306
0
Comment on 20 forensic tools
20 forensic tools
0
167
0
Comment on Inside the building where Apple tortures the iPhone 6
Inside the building where Apple tortures the iPhone 6
0
222
0
Comment on Snow Leopard bash vulnerability
Snow Leopard bash vulnerability
0
250
0
Comment on How to patch your vulnerable OS X to latest bash issue
How to patch your vulnerable OS X to latest bash issue
0
169
0
Comment on CVE-2014-6271 cgi-bin reverse shell (shellshock)
CVE-2014-6271 cgi-bin reverse shell (shellshock)
0
203
0
Comment on ShellShock CVE-2014-6271
ShellShock CVE-2014-6271
0
293
0
Comment on Check vulnerable reverse shell CGI (shellshock)
Check vulnerable reverse shell CGI (shellshock)
0
2917
0
Comment on New Onion List updated on the 24th september
New Onion List updated on the 24th september
0
195
0
Comment on Unix/Linux Bash: Critical security hole uncovered
Unix/Linux Bash: Critical security hole uncovered
0
270
0
Comment on International Day of Peace
International Day of Peace
0
158
0
Comment on Google’s Android One Platform About More Than Just Phones
Google’s Android One Platform About More Than Just Phones
0
248
0
Comment on Cloud Based App Development: A Strategy to Build Better Apps
Cloud Based App Development: A Strategy to Build Better Apps
0
169
0
Comment on This iPhone 6 Plus is put to the bend test
This iPhone 6 Plus is put to the bend test
0
294
0
Comment on 3D Printing: Not a toy … anymore.
3D Printing: Not a toy … anymore.
0
163
0
Comment on Hackers secret’s revealed – They’re not who you think they are
Hackers secret’s revealed – They’re not who you think they are
0
152
0
Comment on Facebook not going to charge users any fee
Facebook not going to charge users any fee
0
204
0
Comment on USA bans Techies Preventing Terrorism Training
USA bans Techies Preventing Terrorism Training
0
217
0
Comment on Some Thoughts
Some Thoughts
0
199
0
Comment on Snowden, Assange, Greenwald to speak at Kim Dotcom’s
Snowden, Assange, Greenwald to speak at Kim Dotcom’s
0
144
0
Comment on Android Distribution Data For the month of August 2014
Android Distribution Data For the month of August 2014
0
218
0
Comment on Want to stop the cable companies and help net neutrality?
Want to stop the cable companies and help net neutrality?
0
230
0
Comment on Arson attack tonite (thursday 11th sept) on a Manchester Dogs
Arson attack tonite (thursday 11th sept) on a Manchester Dogs
0
194
0
Comment on Hack into someone’s Facebook account
Hack into someone’s Facebook account
Posts pagination
← Newer posts
1
…
6
7
8
9
10
Older posts →
Search
Search
Search for:
Advertising wall
Choose your interest
Choose your interest
Select Category
algorithm (1)
Android (21)
ANONIMITY (5)
Apple (31)
Swift (1)
Arduino (4)
Art (4)
Artificial Intelligence (2)
Artificial Stupidity (1)
AWS (1)
BIOS (1)
Bitcoin (7)
Browsers (4)
business ideas (1)
C/C++ (1)
cards (2)
Comics (1)
Communications (9)
Community (18)
Conspiracy (16)
courses (2)
Crafting (3)
Creative Strategy (2)
CSS (2)
CSS tools (1)
css/html (3)
Culture (35)
Database (8)
Debug (1)
DeepWeb (10)
Delphi (3)
Design (3)
Developing (6)
digital forensic (15)
easy fitness (1)
Email (1)
Encryption (1)
Energy (1)
environment (2)
Facebook (4)
food (11)
Free Stuff (9)
Game (24)
Gaming (6)
Gears (3)
guns (1)
Hardware (9)
Recovery (1)
Health (6)
Human Tech (25)
Idols (4)
Innovation (4)
java (1)
javascript (3)
Learning (2)
Linux (8)
Microsoft Galileo (2)
Microsoft news (2)
Mobile (6)
monitoring (1)
Navigation (1)
news around (387)
PEN testing (3)
photography (4)
PHP (24)
Poems (2)
Politics (10)
Programming General (6)
Python (20)
Ransomware (3)
Rants (17)
Security (115)
DoS (3)
Hacks (46)
NSA (5)
Phishing (6)
Safety (33)
Software scan (9)
Seo (5)
Server (17)
hacks (13)
Hosting (1)
Social (23)
SQLlite (1)
Streams (3)
The Brand (2)
Top (4)
Travel tools (4)
Trojan (8)
UK Listing (2)
unity (1)
Usability (2)
Usenet (1)
Vintage computing (4)
Virtual reality (1)
Visualbasic / NET (1)
Web Coding Training (5)
Webmaster tools (2)
Graphic Editor (1)
Wikipedia (1)
Windows 10 (18)
Windows 11 (2)
Windows 8 (5)
Windows tricks (35)
Excel (2)
Fix (14)
Outlook (1)
Shell (2)
Software (6)
Wordpress (10)
World War 3 (6)
WYSIWYG Web Builder (2)
Geo Location Client
Geo Location Map
BBC News
ChatGPT to carry adverts for some users
January 16, 2026
Mother of Elon Musk's child sues xAI over Grok deepfakes
January 16, 2026
Ant and Dec launch their first podcast - a smart move or late to the party?
January 16, 2026
Use film-style age ratings to limit teens' social media, say Lib Dems
January 16, 2026
'They are essential': How smoke detectors are evolving
January 16, 2026
Blog Stats
16,196 hits
Latest from TechRadar UK
Man United vs Man City Free Streams: How to Watch Manchester Derby online as Michael Carrick takes charge of his opening game
January 17, 2026
A 3D printed drone is probably the world's fastest DIY plane ever, quicker than even the legendary P38 Lightning — but at 408mph, it has some way to go to catch up with the 575mph TU-95
January 17, 2026
Data sovereignty: an existential issue for nations and enterprises
January 17, 2026
Got a new Apple Watch? Here are 3 hidden features you're probably not using (but should be)
January 17, 2026
More than messages! Here are 7 hidden features that make Apple Messages an essential app
January 17, 2026
Recent Posts
The Modern Usenet Starter Guide (2026 Edition)
The Viral Black Box: Why We’re Joining Mozilla’s Call for Social Media Transparency
Escaping the “Nanny Filter”: Why You Aren’t Seeing Global Viral Trends in the UK (And How to Fix It)
a step-by-step guide on how to “debloat” Windows 11 and disable the constant telemetry/ads
Windows 11: The “Framework for Milking” That Left 400 Million Users Behind
Menu
CSS
CSS tools
Database
Delphi
Recovery
Mobile
Security
Hardware
Navigation
Server
Social
UK Listing
news around
Usability
Web Coding Training
Webmaster tools
Graphic Editor
Optimisation
Windows tricks
Fix
Outlook
Software
Scroll to Top