Calendar
« September 2024 » | Su | Mo | Tu | We | Th | Fr | Sa | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 |
|
Main » Entries archive
- Sometimes you read about a criminal who is so
much of a small-minded pervert and borderline mutant you almost can’t help but admire him. George Bronk is
just such a criminal: the 23-year old has just pleased guilty to hacking into
the email accounts of 3,200 girls, looking for nude photographs, then posting
the pictures to their public Facebook profiles. That’s some single-minded
skeeviness.
- Bronk was arrested in late October after he used the same
technique that was popularized by hacker David Kernell to break into Sarah
Palin’s email. Namely, Bronk scoured his victims’ Facebook accounts looking for
the answers to security questions used for password recovery by services like
Gmail and Yahoo Mail.
- Onc
...
Read more »
|
Here In the title i have mentioned that "Man Tunnels" It means that he literally tunneled into the system.
Game Piracy is the business all over the world.But there are some guys
who don't need to do piracy.They are digging into the system of the
local game shop sites and making stocks as much as then can in no time.
This man has stolen games like Greeneville & Tennesse , After that
he got arrested in last week for being tunneling into the local game
shop.Steven Archer, 33, making off with almost $300 in cash and around
$5,400 in games.
But truth always wins.He could not enjoy his his gotten gains ( The
games which are stolen By this man )and he got arrested last we
...
Read more »
|
Make All
Images On Facebook To Revolve This is a really cool trick by
using simple Javascipt,Its really cool and its working.I have tested it.There
was a fake Virus Spreading a Website that just scams you and automatically sends
it to all your friends.But this script which i found is really
working.
So this is
you have to do:- paste below code in your address bar of your browser
javascript:R=0; x1=.1; y1=.05; x2=.25;
y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;
DI=document.getElementsByTagName("img"); D
...
Read more »
|
1. Be aware that threats aimed at mobile phones are growing
2. Keep in mind
that gaming and entertainment devices are now Internet-connected
3. Use technologies to protect information on USBs
4. Make
sure that you are using a comprehensive security software platform for your
PC
5. Free anti-virus
software doesn’t provide complete protection
6. Make sure to transfer your PC best practices to all of
your Internet-connected devices
7. Pay attention to your children’s online
activities
8. Search and shop safely
9. Back up
critical information
|
Hyper V monitors physical, logical, and virtual performance information that is available when running virtual machines under Microsoft Hyper-V.
The graphical display is organized to help easily understand the CPU performaces being experienced.
|
1. Click on "Start" in the bottom left hand corner of screen 2. Click on "Run" 3. Type in "command" and hit ok
1. Click on "Start" in the bottom left hand corner of screen 2. Click on "Run" 3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter" 5. Type "exit" and leave the prompt 6. Right-click on "Network Places" or "My Network Places" on your desktop. 7. Click on "properties"
You should now be on a screen with something titled "Local Area Conn
...
Read more »
|
Feature-packed tool for manipulating processes and services on your computer Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful proc
...
Read more »
|
Geinimi originated in China, and is being distributed inside applications and games downloadable in third-party Android app stores. Once the application is launched on the user's smartphone, the trojan collects location data, as well as the device's IMEI and IMSI numbers, and a list of all the apps the user has installed on his device. It then attempts to contact a remote server every five minutes to send this infor
...
Read more »
|
Windows 7 RT Fire Edition x86 No Viruses, Malwares and Backdoors. Tested with NOD32. 100% clean.
Platform: Windows Version: Based on Windows 7 Professional (x86) Category: Operating System Activation: Use Crack or Loader (Including) CD-Key: No Size: (32-bit : 3.06GB) Number of Rar parts: N/A No of DVD's: 1 Image Format: ISO Image File Installation Time: 10 Mins Author: Benjamin (Rockers Team)
Minimum
...
Read more »
|
How to Add apps to the Start screen In the world of long application list its evident that you may be having certain important applications which you use more often and which can be pulled on to the start screen itself so that instantly you can open the application. So when you press on the application icon a contextual menu will be popping up in which just select Pin
...
Read more »
|
|