Man In The Middle Attack

Middle man Attack   The mere title of this type of hack almost appears humerus almost reminiscent of the childhood game ( Monkey in the middle ) . Although this is very serous and deals with many issues from the business sector to our judicial systems as well as the privacy of every individual . […]
Continue reading…

 

Injection SQL For Hackers And Security Teams

Injection hack or hole sometimes noted Back-Door The term injection will most likely cause some to cringe because of the mere image placed in there head of a needle some medical official is about to inject into your body . Although this may or may not be true this is not the type of injection […]
Continue reading…

 

Cookies And Milk For The Hacker

Milk and Cookies     You just have to love them they go hand in hand but wen you have one without the other one can not help but feel if you will ( odd ) . In this article there will be some key features of representation so let this first part serve as […]
Continue reading…

 

Tools Of Hackers Hardware Software Wars

Hacking tools and silent Wars Hacker tools who are they for ? Obviously those of a notorious nature use them and those of security teams use them each one for different reasons . But there are others that need to know the lingo and terms and by others I mean you and yes I said […]
Continue reading…

 

Two Thousand Seventeen It Begins

What will two thousand seventeen Bring     As the new year begins many are wondering what will occur ? Where are the big dollars who will make them and how can you be part of the process ? These are all good questions for the new year especially if you are not following the […]
Continue reading…

 

Computer Language Of The Forgotten

Computer language in broad Terms     In this article and using the term computer language and the use thereof is to represent all computer devices as it relates to the functionality and build . Also included are any items that hook up to any given computer device ( Software , USB , WI/FI antenna […]
Continue reading…

 

Coding Binary To Babel

Babel and Coding Babel and coding seem like an odd mix for those whom know the term Babel and for those whom may not have caught on yet I am referring to ( The Tower of Babel ) straight out of the Bible . Before you think here we go another faith based conversion article […]
Continue reading…

 

Permafrost Melting Concerns

Permafrost the odd melt Down     As winter approaches some might think it is odd to bring up the subject of permafrost melting . But even though it is getting colder it dose not appear to be getting cold enough long enough to stop the most needed permafrost . So why should we be […]
Continue reading…

 

Cyber Attack With Hacking Or Hunting In Mind

Cyber attack DDOS Well I am sure everyone has heard about the biggest cyber attack that has happened either by being denied access to the NET or some service there in . As the supposed attack swung threw the east coast bounced up to the west coast round a bouts Cali and then run a […]
Continue reading…

 

Quality Control Testing To No Testing

What is quality Control through Testing Quality control is one of the things Americans prided themselves on for years while making there products . Strong durable and tested items knowing ware the breakable points were to the point of actually stating the estimated life span of a said product . So one must have to […]
Continue reading…