Hacking tools and silent Wars Hacker tools who are they for ? Obviously those of a notorious nature use them and those of security teams use them each one for different reasons . But there are others that need to know the lingo and terms and by others I mean you and yes I said […]
Continue reading…
Posts tagged with 'Hacking'
Secure Safe Online Security
Being secure while OnLine OnLine security what dose it really mean ? Could we possibly be being lead onto an eggshell platform or is there more to it ? There is one thing for sure in the midst of OnLine security there is more than one fold . Some may be thinking well […]
Continue reading…
Video Editing And Youtube
How are video progressed on Youtube We here at grephaxs had progressed a long way in three years posting this article and that from current affairs to are main goals Technology and hacking .
Continue reading…
Best USB WI/FI Adapter For Linux
WI/FI the best USB dongle for Linux Ubuntu Just to let everyone know right up front I am running a 1504 distribution of Ubuntu on Linux on a Laptop . The type of laptop is not important but wen most see it they look side ways and are like you do your work from […]
Continue reading…
Prevailing Hackers Looking At Cloud Crypto Keys
Where the prevailing hacker Starts In a nut shell the prevailing hacker must start somewhere but most do not think of the obvious . Beginner Hackers start at the first stroke of a keyboard for example . Hacking is the manipulation of any given software like wen you reach out and turn any given […]
Continue reading…
Flash Technology Improvements
Flash Apparently INTEL and a few other companies that produce devices using flash are working on a substantial increase in memory size . This method brings it into a 3 – D stature using the capabilities of a staking method . They will be jumping to 3.5 TB and 10 TB . Flash Memory So […]
Continue reading…
Hacking The Hackers
Two catch a Thief Since the earliest I can tell around 2006 a gentlemen by the name of Dixon has Ben mining data from virustotal in a Revelation that hackers were using the site to test there malicious ware ( malware ) and hacking programs . You must Be A Thief Remember […]
Continue reading…
Hacking Your Own Power
Body Heat Yup thats right use your own body heat to create power . Juice it up in order to charge your cell phone . This new technique uses a felt material and carbon nanotubes . So check it out straight out of the archives of jamshardware I give you power felt . […]
Continue reading…
Hacking The Medical Field
Miracle powder Imagine you get your finger tip cut off and the Doctor says here apply this powder and it over time just regrows the whole finger back including all finger prints . This is all possible and may work with many other organs such as but not limited to legs , heart and […]
Continue reading…
Gamer
Hacked Way before the xbox was thought of I have Ben a gamer way before the I phone came about I used cell phones I have always Ben careful for the most part keeping my ear to the ground. When the first xbox became available I purchased one and therefore all the way up […]
Continue reading…