Skip to content
Latest ideas
2025-11-17
Future Review: The Steam Machine (2026) – A Console Killer or a Niche PC?
2025-11-17
Embracing Life After 50 in the UK: A New Chapter of Adventure
2025-10-04
Impersonation Scam Guide
2025-09-27
UK digital ID debate
2025-08-25
🛡️ What Is the Data Protection Act 2018?
Area-6 – Security and Code Snippets ༼ຈل͜ຈ༽
Info, security, Coding, tricks blog
Search for:
Home
Cyber Attack Threat Map
Reciperium( food recipes) – BETA
Freedom? The Era of Frustration
Web Development
How to create a business – complete guide
Business Niche – Mobile Pet Grooming Service
Business niche -Personalized Fitness and Wellness Coaching:
Business Niche – Home Organisation and Decluttering Services
Contact me
Search for:
×
0
177
0
Comment on South Korean Malware Attack
South Korean Malware Attack
0
193
0
Comment on Using Google Maps Service and GPS in Android
Using Google Maps Service and GPS in Android
0
202
0
Comment on Upgrade the iMac 2006 to 64bit
Upgrade the iMac 2006 to 64bit
0
181
0
Comment on Installation Guide for Ubuntu/Linux Mint/Debian on a Mac mini
Installation Guide for Ubuntu/Linux Mint/Debian on a Mac mini
0
207
0
Comment on Choosing a Hosting Environment – Linux vs Windows
Choosing a Hosting Environment – Linux vs Windows
0
254
0
Comment on Universal ADB Utility Simplifies Common Android Command Line Tasks
Universal ADB Utility Simplifies Common Android Command Line Tasks
0
215
0
Comment on Complete Beginner’s Guide For Arduino Hardware Platform
Complete Beginner’s Guide For Arduino Hardware Platform
0
152
0
Comment on Install SQLite on Windows
Install SQLite on Windows
0
174
0
Comment on Getting the Local Traffic Report
Getting the Local Traffic Report
0
149
0
Comment on Release Android App Using Eclipse
Release Android App Using Eclipse
0
250
0
Comment on PHP to feed a video list from a particular channel without Oauth
PHP to feed a video list from a particular channel without Oauth
0
132
0
Comment on Galileo Smart Fan Example
Galileo Smart Fan Example
0
200
0
Comment on What is Galileo
What is Galileo
0
129
0
Comment on Apple Swift
Apple Swift
0
203
0
Comment on Python Quickstart: Creating a template and deployment
Python Quickstart: Creating a template and deployment
0
193
0
Comment on Customize WordPress Login Page
Customize WordPress Login Page
0
147
0
Comment on Getting Started With ArdOS for Arduino
Getting Started With ArdOS for Arduino
0
147
0
Comment on Turn your IPod Iphone or soon to be Ipad into a hacker system
Turn your IPod Iphone or soon to be Ipad into a hacker system
0
129
0
Comment on Semi-Restore tool for IOS
Semi-Restore tool for IOS
0
122
0
Comment on Using forensic software to recover your iPad or iPhone
Using forensic software to recover your iPad or iPhone
0
245
0
Comment on 10 Android hacking tools
10 Android hacking tools
0
154
0
Comment on Perfect OS for hacking.
Perfect OS for hacking.
0
159
0
Comment on BASIC TUTORIAL ON ANONIMITY AND USAGE OF PROXY’S
BASIC TUTORIAL ON ANONIMITY AND USAGE OF PROXY’S
0
116
0
Comment on Browser security
Browser security
0
153
0
Comment on Anonymous Tips
Anonymous Tips
0
177
0
Comment on Intrusive Surveillance
Intrusive Surveillance
0
158
0
Comment on Network Attributes of your computer
Network Attributes of your computer
0
106
0
Comment on Android Distribution data for October 2014
Android Distribution data for October 2014
0
147
0
Comment on CERT-In alerts online banking customers to be aware of Dyreza Trojan
CERT-In alerts online banking customers to be aware of Dyreza Trojan
0
136
0
Comment on The Secret Powers of Chrome’s Address Bar
The Secret Powers of Chrome’s Address Bar
0
195
0
Comment on 6 Social Media Sites You’ve Never Heard Of (But Should Check Out)
6 Social Media Sites You’ve Never Heard Of (But Should Check Out)
0
164
0
Comment on How to Hack Your Own Network and Beef Up Its Security with Kali Linux
How to Hack Your Own Network and Beef Up Its Security with Kali Linux
0
141
0
Comment on T-Mobile’s CEO just unleashed a tweetstorm about the Apple SIM
T-Mobile’s CEO just unleashed a tweetstorm about the Apple SIM
0
222
0
Comment on Create a USB Password Stealer to See How Secure Your Info Really Is
Create a USB Password Stealer to See How Secure Your Info Really Is
0
278
0
Comment on The Apple Timeline [VIDEO] – KnowTechie
The Apple Timeline [VIDEO] – KnowTechie
0
323
0
Comment on The Daily Read – Apple Pay Edition – 10/20/2014
The Daily Read – Apple Pay Edition – 10/20/2014
0
112
0
Comment on Video of racing drones looks like a scene right out of Star Wars
Video of racing drones looks like a scene right out of Star Wars
0
146
0
Comment on Passwords/ Passwords (Thanks anonimous)
Passwords/ Passwords (Thanks anonimous)
0
139
0
Comment on Account Password Security: Advanced Edition
Account Password Security: Advanced Edition
0
128
0
Comment on Account Password Security: Basic Edition
Account Password Security: Basic Edition
0
296
0
Comment on Windows NT 6.X OLE package manager remote code execution through MS Office Powerpoint XYZ slideshow (ppts, pptxs).
Windows NT 6.X OLE package manager remote code execution through MS Office Powerpoint XYZ slideshow (ppts, pptxs).
0
160
0
Comment on The algorithm of the Trojan
The algorithm of the Trojan
0
150
0
Comment on List of Trojan Creation Programs or Software
List of Trojan Creation Programs or Software
0
217
0
Comment on How to Create Your Own Android Trojan in 5 Easy Steps
How to Create Your Own Android Trojan in 5 Easy Steps
0
124
0
Comment on How Do Your Devices Learn To Talk To You
How Do Your Devices Learn To Talk To You
0
148
0
Comment on Minecraft: Pocket Edition is coming
Minecraft: Pocket Edition is coming
0
164
0
Comment on New Zealand Launched Mass Surveillance Project While Publicly Denying It
New Zealand Launched Mass Surveillance Project While Publicly Denying It
0
120
0
Comment on NSA spying: What’s the best phone encryption & IMEI random number generator?
NSA spying: What’s the best phone encryption & IMEI random number generator?
0
130
0
Comment on Hackers discover gaping major security flaw in USB sticks
Hackers discover gaping major security flaw in USB sticks
0
156
0
Comment on PHP Useful Extensions, Utilities and Classes
PHP Useful Extensions, Utilities and Classes
0
118
0
Comment on PHP Image Manipulation and Graphs
PHP Image Manipulation and Graphs
0
132
0
Comment on PHP Security Tools
PHP Security Tools
0
138
0
Comment on PHP Testing and Optimization Tools
PHP Testing and Optimization Tools
0
176
0
Comment on PHP Debugging Tools
PHP Debugging Tools
0
228
0
Comment on CLOUDFARE BYPASSER
CLOUDFARE BYPASSER
0
119
0
Comment on Bye PlayStation Home!
Bye PlayStation Home!
0
105
0
Comment on Other forensic software old!
Other forensic software old!
0
124
0
Comment on Application analysis
Application analysis
0
171
0
Comment on Registry analysis
Registry analysis
0
110
0
Comment on Internet analysis
Internet analysis
0
124
0
Comment on File viewers
File viewers
0
133
0
Comment on Data analysis suites
Data analysis suites
0
112
0
Comment on Mobile devices
Mobile devices
0
149
0
Comment on Mac OS tools
Mac OS tools
0
202
0
Comment on File and data analysis
File and data analysis
0
176
0
Comment on General Forensic utilities
General Forensic utilities
0
137
0
Comment on Email analysis
Email analysis
0
2573
0
Comment on Disk tools and data capture
Disk tools and data capture
0
237
0
Comment on 20 forensic tools
20 forensic tools
0
122
0
Comment on Inside the building where Apple tortures the iPhone 6
Inside the building where Apple tortures the iPhone 6
0
174
0
Comment on Snow Leopard bash vulnerability
Snow Leopard bash vulnerability
0
185
0
Comment on How to patch your vulnerable OS X to latest bash issue
How to patch your vulnerable OS X to latest bash issue
0
140
0
Comment on CVE-2014-6271 cgi-bin reverse shell (shellshock)
CVE-2014-6271 cgi-bin reverse shell (shellshock)
0
139
0
Comment on ShellShock CVE-2014-6271
ShellShock CVE-2014-6271
0
229
0
Comment on Check vulnerable reverse shell CGI (shellshock)
Check vulnerable reverse shell CGI (shellshock)
0
2310
0
Comment on New Onion List updated on the 24th september
New Onion List updated on the 24th september
0
145
0
Comment on Unix/Linux Bash: Critical security hole uncovered
Unix/Linux Bash: Critical security hole uncovered
0
190
0
Comment on International Day of Peace
International Day of Peace
0
117
0
Comment on Google’s Android One Platform About More Than Just Phones
Google’s Android One Platform About More Than Just Phones
0
194
0
Comment on Cloud Based App Development: A Strategy to Build Better Apps
Cloud Based App Development: A Strategy to Build Better Apps
0
128
0
Comment on This iPhone 6 Plus is put to the bend test
This iPhone 6 Plus is put to the bend test
0
232
0
Comment on 3D Printing: Not a toy … anymore.
3D Printing: Not a toy … anymore.
0
120
0
Comment on Hackers secret’s revealed – They’re not who you think they are
Hackers secret’s revealed – They’re not who you think they are
0
108
0
Comment on Facebook not going to charge users any fee
Facebook not going to charge users any fee
0
141
0
Comment on USA bans Techies Preventing Terrorism Training
USA bans Techies Preventing Terrorism Training
0
171
0
Comment on Some Thoughts
Some Thoughts
0
168
0
Comment on Snowden, Assange, Greenwald to speak at Kim Dotcom’s
Snowden, Assange, Greenwald to speak at Kim Dotcom’s
0
107
0
Comment on Android Distribution Data For the month of August 2014
Android Distribution Data For the month of August 2014
0
153
0
Comment on Want to stop the cable companies and help net neutrality?
Want to stop the cable companies and help net neutrality?
0
147
0
Comment on Arson attack tonite (thursday 11th sept) on a Manchester Dogs
Arson attack tonite (thursday 11th sept) on a Manchester Dogs
0
144
0
Comment on Hack into someone’s Facebook account
Hack into someone’s Facebook account
0
139
0
Comment on Why writing for your audience is the best SEO advice
Why writing for your audience is the best SEO advice
0
118
0
Comment on Apple ID: Security and your Apple ID
Apple ID: Security and your Apple ID
0
115
0
Comment on Ibrute Apple password brute force
Ibrute Apple password brute force
0
114
0
Comment on Destiny – Launch Trailer
Destiny – Launch Trailer
0
160
0
Comment on Shell a website
Shell a website
0
332
0
Comment on Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
0
184
0
Comment on How Big is Google
How Big is Google
0
120
0
Comment on App security flaw makes your iPhone call without asking
App security flaw makes your iPhone call without asking
0
130
0
Comment on You can steal data from a computer by touching it
You can steal data from a computer by touching it
Posts pagination
← Newer posts
1
…
6
7
8
9
10
Older posts →
Search for:
Advertising wall
Choose your interest
Choose your interest
Select Category
algorithm (1)
Android (21)
ANONIMITY (5)
Apple (31)
Swift (1)
Arduino (4)
Art (4)
Artificial Intelligence (2)
Artificial Stupidity (1)
AWS (1)
BIOS (1)
Bitcoin (9)
Browsers (4)
business ideas (1)
C/C++ (1)
cards (2)
Comics (1)
Communications (9)
Community (18)
Conspiracy (16)
courses (2)
Crafting (3)
Creative Strategy (2)
CSS (5)
CSS tools (2)
css/html (3)
Culture (35)
Database (9)
Debug (1)
DeepWeb (10)
Delphi (6)
Design (3)
Developing (6)
digital forensic (15)
easy fitness (1)
Email (1)
Encryption (1)
Energy (1)
environment (2)
Facebook (4)
food (11)
Free Stuff (9)
Game (23)
Gaming (6)
Gears (3)
guns (1)
Hardware (11)
Recovery (2)
TV – Monitors (1)
Health (6)
Human Tech (23)
Idols (4)
Innovation (4)
java (1)
javascript (3)
Learning (2)
Linux (8)
Microsoft Galileo (2)
Microsoft news (2)
Mobile (7)
monitoring (1)
Navigation (2)
news around (384)
PEN testing (3)
photography (4)
PHP (24)
Poems (2)
Politics (7)
Programming General (6)
Python (20)
Ransomware (3)
Rants (17)
Security (115)
DoS (3)
Hacks (46)
NSA (5)
Phishing (6)
Safety (33)
Software scan (9)
Seo (5)
Server (19)
hacks (13)
Hosting (1)
Social (22)
SQLlite (1)
Streams (3)
The Brand (2)
Top (4)
Travel tools (4)
Trojan (8)
UK Listing (3)
unity (1)
Usability (3)
Vintage computing (4)
Virtual reality (1)
Visualbasic / NET (1)
Web Coding Training (7)
Webmaster tools (10)
Graphic Editor (2)
Optimisation (3)
Wikipedia (1)
Windows 10 (18)
Windows 8 (5)
Windows tricks (39)
Excel (2)
Fix (15)
Outlook (2)
Shell (3)
Software (7)
Wordpress (12)
World War 3 (6)
WYSIWYG Web Builder (2)
Geo Location Client
Geo Location Map
BBC News
YouTuber Marques Brownlee shutting down phone wallpaper app
December 2, 2025
'First of its kind' scanner to study blast trauma
December 2, 2025
Fashion house Valentino criticised over 'disturbing' AI handbag ads
December 2, 2025
Jorja Smith's record label hits out at 'AI clone' song
December 1, 2025
Virgin Media fined £24m for leaving vulnerable customers 'at risk of harm'
December 1, 2025
Unknown Feed
Menu
CSS
CSS tools
Database
Delphi
Recovery
Mobile
Security
Hardware
Navigation
Server
Social
UK Listing
news around
Usability
Web Coding Training
Webmaster tools
Graphic Editor
Optimisation
Windows tricks
Fix
Outlook
Software
Scroll to Top