0 177  0 Comment on South Korean Malware Attack

South Korean Malware Attack

0 193  0 Comment on Using Google Maps Service and GPS in Android

Using Google Maps Service and GPS in Android

0 202  0 Comment on Upgrade the iMac 2006 to 64bit

Upgrade the iMac 2006 to 64bit

0 181  0 Comment on Installation Guide for Ubuntu/Linux Mint/Debian on a Mac mini

Installation Guide for Ubuntu/Linux Mint/Debian on a Mac mini

0 207  0 Comment on Choosing a Hosting Environment – Linux vs Windows

Choosing a Hosting Environment – Linux vs Windows

0 254  0 Comment on Universal ADB Utility Simplifies Common Android Command Line Tasks

Universal ADB Utility Simplifies Common Android Command Line Tasks

0 215  0 Comment on Complete Beginner’s Guide For Arduino Hardware Platform

Complete Beginner’s Guide For Arduino Hardware Platform

0 152  0 Comment on Install SQLite on Windows

Install SQLite on Windows

0 174  0 Comment on Getting the Local Traffic Report

Getting the Local Traffic Report

0 149  0 Comment on Release Android App Using Eclipse

Release Android App Using Eclipse

0 250  0 Comment on PHP to feed a video list from a particular channel without Oauth

PHP to feed a video list from a particular channel without Oauth

0 132  0 Comment on Galileo Smart Fan Example

Galileo Smart Fan Example

0 200  0 Comment on What is Galileo

What is Galileo

0 129  0 Comment on Apple Swift

Apple Swift

0 203  0 Comment on Python Quickstart: Creating a template and deployment

Python Quickstart: Creating a template and deployment

0 193  0 Comment on Customize WordPress Login Page

Customize WordPress Login Page

0 147  0 Comment on Getting Started With ArdOS for Arduino

Getting Started With ArdOS for Arduino

0 147  0 Comment on Turn your IPod Iphone or soon to be Ipad into a hacker system

Turn your IPod Iphone or soon to be Ipad into a hacker system

0 129  0 Comment on Semi-Restore tool for IOS

Semi-Restore tool for IOS

0 122  0 Comment on Using forensic software to recover your iPad or iPhone

Using forensic software to recover your iPad or iPhone

0 245  0 Comment on 10 Android hacking tools

10 Android hacking tools

0 154  0 Comment on Perfect OS for hacking.

Perfect OS for hacking.

0 159  0 Comment on BASIC TUTORIAL ON ANONIMITY AND USAGE OF PROXY’S

BASIC TUTORIAL ON ANONIMITY AND USAGE OF PROXY’S

0 116  0 Comment on Browser security

Browser security

0 153  0 Comment on Anonymous Tips

Anonymous Tips

0 177  0 Comment on Intrusive Surveillance

Intrusive Surveillance

0 158  0 Comment on Network Attributes of your computer

Network Attributes of your computer

0 106  0 Comment on Android Distribution data for October 2014

Android Distribution data for October 2014

0 147  0 Comment on CERT-In alerts online banking customers to be aware of Dyreza Trojan

CERT-In alerts online banking customers to be aware of Dyreza Trojan

0 136  0 Comment on The Secret Powers of Chrome’s Address Bar

The Secret Powers of Chrome’s Address Bar

0 195  0 Comment on 6 Social Media Sites You’ve Never Heard Of (But Should Check Out)

6 Social Media Sites You’ve Never Heard Of (But Should Check Out)

0 164  0 Comment on How to Hack Your Own Network and Beef Up Its Security with Kali Linux

How to Hack Your Own Network and Beef Up Its Security with Kali Linux

0 141  0 Comment on T-Mobile’s CEO just unleashed a tweetstorm about the Apple SIM

T-Mobile’s CEO just unleashed a tweetstorm about the Apple SIM

0 222  0 Comment on Create a USB Password Stealer to See How Secure Your Info Really Is

Create a USB Password Stealer to See How Secure Your Info Really Is

0 278  0 Comment on The Apple Timeline [VIDEO] – KnowTechie

The Apple Timeline [VIDEO] – KnowTechie

0 323  0 Comment on The Daily Read – Apple Pay Edition – 10/20/2014

The Daily Read – Apple Pay Edition – 10/20/2014

0 112  0 Comment on Video of racing drones looks like a scene right out of Star Wars

Video of racing drones looks like a scene right out of Star Wars

0 146  0 Comment on Passwords/ Passwords (Thanks anonimous)

Passwords/ Passwords (Thanks anonimous)

0 139  0 Comment on Account Password Security: Advanced Edition

Account Password Security: Advanced Edition

0 128  0 Comment on Account Password Security: Basic Edition

Account Password Security: Basic Edition

0 296  0 Comment on Windows NT 6.X OLE package manager remote code execution through MS Office Powerpoint XYZ slideshow (ppts, pptxs).

Windows NT 6.X OLE package manager remote code execution through MS Office Powerpoint XYZ slideshow (ppts, pptxs).

0 160  0 Comment on The algorithm of the Trojan

The algorithm of the Trojan

0 150  0 Comment on List of Trojan Creation Programs or Software

List of Trojan Creation Programs or Software

0 217  0 Comment on How to Create Your Own Android Trojan in 5 Easy Steps

How to Create Your Own Android Trojan in 5 Easy Steps

0 124  0 Comment on How Do Your Devices Learn To Talk To You

How Do Your Devices Learn To Talk To You

0 148  0 Comment on Minecraft: Pocket Edition is coming

Minecraft: Pocket Edition is coming

0 164  0 Comment on New Zealand Launched Mass Surveillance Project While Publicly Denying It

New Zealand Launched Mass Surveillance Project While Publicly Denying It

0 120  0 Comment on NSA spying: What’s the best phone encryption & IMEI random number generator?

NSA spying: What’s the best phone encryption & IMEI random number generator?

0 130  0 Comment on Hackers discover gaping major security flaw in USB sticks

Hackers discover gaping major security flaw in USB sticks

0 156  0 Comment on PHP Useful Extensions, Utilities and Classes

PHP Useful Extensions, Utilities and Classes

0 118  0 Comment on PHP Image Manipulation and Graphs

PHP Image Manipulation and Graphs

0 132  0 Comment on PHP Security Tools

PHP Security Tools

0 138  0 Comment on PHP Testing and Optimization Tools

PHP Testing and Optimization Tools

0 176  0 Comment on PHP Debugging Tools

PHP Debugging Tools

0 228  0 Comment on CLOUDFARE BYPASSER

CLOUDFARE BYPASSER

0 119  0 Comment on Bye PlayStation Home!

Bye PlayStation Home!

0 105  0 Comment on Other forensic software old!

Other forensic software old!

0 124  0 Comment on Application analysis

Application analysis

0 171  0 Comment on Registry analysis

Registry analysis

0 110  0 Comment on Internet analysis

Internet analysis

0 124  0 Comment on File viewers

File viewers

0 133  0 Comment on Data analysis suites

Data analysis suites

0 112  0 Comment on Mobile devices

Mobile devices

0 149  0 Comment on Mac OS tools

Mac OS tools

0 202  0 Comment on File and data analysis

File and data analysis

0 176  0 Comment on General Forensic utilities

General Forensic utilities

0 137  0 Comment on Email analysis

Email analysis

0 2573  0 Comment on Disk tools and data capture

Disk tools and data capture

0 237  0 Comment on 20 forensic tools

20 forensic tools

0 122  0 Comment on Inside the building where Apple tortures the iPhone 6

Inside the building where Apple tortures the iPhone 6

0 174  0 Comment on Snow Leopard bash vulnerability

Snow Leopard bash vulnerability

0 185  0 Comment on How to patch your vulnerable OS X to latest bash issue

How to patch your vulnerable OS X to latest bash issue

0 140  0 Comment on CVE-2014-6271 cgi-bin reverse shell (shellshock)

CVE-2014-6271 cgi-bin reverse shell (shellshock)

0 139  0 Comment on ShellShock CVE-2014-6271

ShellShock CVE-2014-6271

0 229  0 Comment on Check vulnerable reverse shell CGI (shellshock)

Check vulnerable reverse shell CGI (shellshock)

0 2310  0 Comment on New Onion List updated on the 24th september

New Onion List updated on the 24th september

0 145  0 Comment on Unix/Linux Bash: Critical security hole uncovered

Unix/Linux Bash: Critical security hole uncovered

0 190  0 Comment on International Day of Peace

International Day of Peace

0 117  0 Comment on Google’s Android One Platform About More Than Just Phones

Google’s Android One Platform About More Than Just Phones

0 194  0 Comment on Cloud Based App Development: A Strategy to Build Better Apps

Cloud Based App Development: A Strategy to Build Better Apps

0 128  0 Comment on This iPhone 6 Plus is put to the bend test

This iPhone 6 Plus is put to the bend test

0 232  0 Comment on 3D Printing: Not a toy … anymore.

3D Printing: Not a toy … anymore.

0 120  0 Comment on Hackers secret’s revealed – They’re not who you think they are

Hackers secret’s revealed – They’re not who you think they are

0 108  0 Comment on Facebook not going to charge users any fee

Facebook not going to charge users any fee

0 141  0 Comment on USA bans Techies Preventing Terrorism Training

USA bans Techies Preventing Terrorism Training

0 171  0 Comment on Some Thoughts

Some Thoughts

0 168  0 Comment on Snowden, Assange, Greenwald to speak at Kim Dotcom’s

Snowden, Assange, Greenwald to speak at Kim Dotcom’s

0 107  0 Comment on Android Distribution Data For the month of August 2014

Android Distribution Data For the month of August 2014

0 153  0 Comment on Want to stop the cable companies and help net neutrality?

Want to stop the cable companies and help net neutrality?

0 147  0 Comment on Arson attack tonite (thursday 11th sept) on a Manchester Dogs

Arson attack tonite (thursday 11th sept) on a Manchester Dogs

0 144  0 Comment on Hack into someone’s Facebook account

Hack into someone’s Facebook account

0 139  0 Comment on Why writing for your audience is the best SEO advice

Why writing for your audience is the best SEO advice

0 118  0 Comment on Apple ID: Security and your Apple ID

Apple ID: Security and your Apple ID

0 115  0 Comment on Ibrute Apple password brute force

Ibrute Apple password brute force

0 114  0 Comment on Destiny – Launch Trailer

Destiny – Launch Trailer

0 160  0 Comment on Shell a website

Shell a website

0 332  0 Comment on Offline bruteforce attack on WiFi Protected Setup

Offline bruteforce attack on WiFi Protected Setup

0 184  0 Comment on How Big is Google

How Big is Google

0 120  0 Comment on App security flaw makes your iPhone call without asking

App security flaw makes your iPhone call without asking

0 130  0 Comment on You can steal data from a computer by touching it

You can steal data from a computer by touching it