Cookies And Milk For The Hacker

Milk and Cookies     You just have to love them they go hand in hand but wen you have one without the other one can not help but feel if you will ( odd ) . In this article there will be some key features of representation so let this first part serve as […]
Continue reading…

 

Computer Language Of The Forgotten

Computer language in broad Terms     In this article and using the term computer language and the use thereof is to represent all computer devices as it relates to the functionality and build . Also included are any items that hook up to any given computer device ( Software , USB , WI/FI antenna […]
Continue reading…

 

DEFCON Secrets Past And Present

Secrets you need to know before going to DEFCON     DEFCON 2016 soon approaches and is scheduled for August . If your not familiar with DEFCON it is a Hackers convention for all colored hats but before you get all excited and think your off to save the world ( think Again ) . […]
Continue reading…

 

Prevailing Hackers Looking At Cloud Crypto Keys

Where the prevailing hacker Starts   In a nut shell the prevailing hacker must start somewhere but most do not think of the obvious . Beginner Hackers start at the first stroke of a keyboard for example . Hacking is the manipulation of any given software like wen you reach out and turn any given […]
Continue reading…

 

Hackers Paradise In The 21 Century

Buffer overflow and Hackers   Buffer overflow has Ben around for quit some time but it was most notably noticed in 1972 according to wikipedia .
Continue reading…

 

Back-door Hacking

Back-door hacking is your Back-door Open   Is your back-door open do you live in a barn ? But wait take into consideration how many back-doors you have within one system . Dare I say the number of back-doors is phenomenal .
Continue reading…

 

Hacking Vulnerability

Whom is at Risk Dare I say the whole world and or anyone that uses a device known to man to deliver and understand computed algorithms . For years major scientists have worked two keep us secure by developing new security algorithms and then hackers of every colored hat community have worked hard in order […]
Continue reading…

 

Snowden 2

  Hope X I first heard of Hope X on Google + and what intrigued me was Edward Snowden getting together with other whistle blowers / hackers of the past to discus many important things and would be the conference of the century to which hopefully will bring about the proper changes in the world […]
Continue reading…

 

Hackers Conference

  Def con hackers conference Recently on my Google + page I seen a post saying the USA was considering visa restrictions to the Chinese in order to stop them from attending the Def Con Hackers Conference and other white and black hat conventions geared for this summer do to the supposed alleged hacking attacks […]
Continue reading…