Milk and Cookies You just have to love them they go hand in hand but wen you have one without the other one can not help but feel if you will ( odd ) . In this article there will be some key features of representation so let this first part serve as […]
Continue reading…
Posts tagged with 'hackers'
Computer Language Of The Forgotten
Computer language in broad Terms In this article and using the term computer language and the use thereof is to represent all computer devices as it relates to the functionality and build . Also included are any items that hook up to any given computer device ( Software , USB , WI/FI antenna […]
Continue reading…
DEFCON Secrets Past And Present
Secrets you need to know before going to DEFCON DEFCON 2016 soon approaches and is scheduled for August . If your not familiar with DEFCON it is a Hackers convention for all colored hats but before you get all excited and think your off to save the world ( think Again ) . […]
Continue reading…
Prevailing Hackers Looking At Cloud Crypto Keys
Where the prevailing hacker Starts In a nut shell the prevailing hacker must start somewhere but most do not think of the obvious . Beginner Hackers start at the first stroke of a keyboard for example . Hacking is the manipulation of any given software like wen you reach out and turn any given […]
Continue reading…
Hackers Paradise In The 21 Century
Buffer overflow and Hackers Buffer overflow has Ben around for quit some time but it was most notably noticed in 1972 according to wikipedia .
Continue reading…
Back-door Hacking
Back-door hacking is your Back-door Open Is your back-door open do you live in a barn ? But wait take into consideration how many back-doors you have within one system . Dare I say the number of back-doors is phenomenal .
Continue reading…
Hacking Vulnerability
Whom is at Risk Dare I say the whole world and or anyone that uses a device known to man to deliver and understand computed algorithms . For years major scientists have worked two keep us secure by developing new security algorithms and then hackers of every colored hat community have worked hard in order […]
Continue reading…
Snowden 2
Hope X I first heard of Hope X on Google + and what intrigued me was Edward Snowden getting together with other whistle blowers / hackers of the past to discus many important things and would be the conference of the century to which hopefully will bring about the proper changes in the world […]
Continue reading…
Security Holes Improvements
Security Holes Security holes what are they were do the come from ? These are good question and they deserve good and prudent answers although for the most part I don’t have all the answers I do have some.
Continue reading…
Hackers Conference
Def con hackers conference Recently on my Google + page I seen a post saying the USA was considering visa restrictions to the Chinese in order to stop them from attending the Def Con Hackers Conference and other white and black hat conventions geared for this summer do to the supposed alleged hacking attacks […]
Continue reading…