Top Secrets From The Presidents Men

Top secret from our Governments     The term top secret really dose not need to be defined I am almost sure that most from the age of five has some understanding of the term . Although being in the currant set of affairs there are some that might find offense at the mere title […]
Continue reading…

 

Power Through Solar Reaches New Levels

Imagine receiving a zero dollar power Bill That is right you read it correctly although I can not see that happening here do to storage capacity and usage but it has happened in certain parts of the world . One could only think of the shivers it sent up the spins of both manufactures of […]
Continue reading…

 

Man In The Middle Attack

Middle man Attack   The mere title of this type of hack almost appears humerus almost reminiscent of the childhood game ( Monkey in the middle ) . Although this is very serous and deals with many issues from the business sector to our judicial systems as well as the privacy of every individual . […]
Continue reading…

 

Injection SQL For Hackers And Security Teams

Injection hack or hole sometimes noted Back-Door The term injection will most likely cause some to cringe because of the mere image placed in there head of a needle some medical official is about to inject into your body . Although this may or may not be true this is not the type of injection […]
Continue reading…

 

Cookies And Milk For The Hacker

Milk and Cookies     You just have to love them they go hand in hand but wen you have one without the other one can not help but feel if you will ( odd ) . In this article there will be some key features of representation so let this first part serve as […]
Continue reading…

 

Technology Algorithm To Quantum Computing

Technology and Algorithms     For some the title of this article maybe a mere oxymoron statement but for others they maybe thinking I keep hearing this term algorithm . Well there are a few good reasons why you keep hearing the term and why the term will keep appearing as long as you continue […]
Continue reading…

 

Tools Of Hackers Hardware Software Wars

Hacking tools and silent Wars Hacker tools who are they for ? Obviously those of a notorious nature use them and those of security teams use them each one for different reasons . But there are others that need to know the lingo and terms and by others I mean you and yes I said […]
Continue reading…

 

Two Thousand Seventeen It Begins

What will two thousand seventeen Bring     As the new year begins many are wondering what will occur ? Where are the big dollars who will make them and how can you be part of the process ? These are all good questions for the new year especially if you are not following the […]
Continue reading…

 

Zika Virus Mosquito Control Or Kill Them All

Zika Virus needs no Introduction The Zika virus needs no introduction but what dose need plenty of consideration is what is everyone saying about Zika and the spread thereof . Who do we trust whom is telling the truth and is anyone out to make a profit by covering up the truth ? These are […]
Continue reading…

 

New Year New Investments

New investments remember the Dream Investment means different things to different people but the term is generally known whether from a business prospective or that of a personnel nature . New investment dose not necessarily mean running out and finding some where else to put your time and money because your dream has not payed […]
Continue reading…