2010-05-25 09:46
Computer scientists observe that the people most at
risk for the loss of private information and other computer problems are those
who create easily guessed passwords and user names. They advise creating and
regularly updating complicated passwords that contain upper- and lower-case
letters as...
2010-05-25 03:23
There's a potential threat lurking in your internet
café, say University of Calgary computer science researchers. It's called
Typhoid adware and works in similar fashion to Typhoid Mary, the first
identified healthy carrier of typhoid fever who spread the disease to dozens of
people in the New...
2010-05-23 07:35
Mouseover Alert This script will bring up a JavaScript
alert when someone moves the mouse over the link. Script Code Grab a copy of the
file below and place it in the same directory as the Web page on which you will
use the script (if you wish to place the script file in a different...
2010-05-23 07:29
Hosting is where you put your website and all the Web
pages. While it's possible to build a website on your personal computer and
never move it online, it's somewhat pointless. No one but you will ever be able
to see it. So the first thing you'll want to do is find a Web hosting provider.
There...
2010-05-23 06:59
Today, I m gonna a list of some very cool JavaScript
hacks and tricks that you can use creatively or just have plain fun. To make
each one of these codes work, all you have to do is copy and paste it into the
address bar of your browser window and hit "Enter”. So here they are :- 1-
This...
2010-05-22 11:24
Earlier, in August 2009, AT&T Labs and Worcester
Polytechnic Institute had pointed out in a paper that 12 social networking
sites, including Facebook, Twitter and MySpace, send out user information to
outside companies. Nine months on, these sites still haven't learned their
lessons....
2010-05-22 11:19
Step 1 Learn about .rar files. .Rar files are
popular with Windows users (the main .rar expander being WinRar), but you can
also open .rar files on your Mac. Step 2 Use StuffIt Expander if your computer
runs mac os xThis program is built in to the system....
2010-05-22 11:13
If you want to upgrade your computer to make it
faster, the best thing that you can do is upgrade the processor. Upgrading the
processor itself is not hard, but you need to do some research first and make
sure that you choose the right upgrade and meet the new processor requirements.
...
2010-05-22 11:07
nowdays so many ways to enjoy your favorite movies and
television shows over a broadband internet connection on your computer for a
small amount of money, or even for free. Unfortunately, watching such media in
the confines of your home office does not make for the most enjoyable
experience. If...
2010-05-21
18:31
As you can probably guess by now, all memory is not
created equal. Your system memory typically resides on your computer's
motherboard, and uses a very high speed interface to connect to your computer's
CPU. In fact, as fast as that interface is, it's still not as fast as we would
like it (so...
2010-05-21 18:19
Playing DVDs with your CD-ROM can be as easy as
snapping your fingers. Because most modern computers are made with CD-ROM's that
also play DVDs, it's likely that minimal effort is required to play DVDs on your
computer. However there are a few computers out there that cannot play DVDs
using the...
2010-05-21 18:09
So you’ve got your compatible card and you’ve burned
your BackTrack 2 ISO to disk. Now boot Backtrack 2 (alternatively you could
install BackTrack 2 in VMWare fusion; use the VMWare image here). You should be
prompted with ‘boot:’, hit enter. Once BackTrack has booted you should login...
2010-05-21 18:02
The Global Positioning System (GPS) is a U.S.-owned
utility that provides users with positioning, navigation, and timing (PNT)
services. This system consists of three segments: the space segment, the control
segment, and the user segment. The U.S. Air Force develops, maintains, and
operates...
2010-05-20 20:20
As we all know, Windows stores most of the passwords
which are used on a daily basis, including instant messenger passwords such as
MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores
passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete...
2010-05-20 20:15
Step 1: Download Facebook fake login page and extract
the contents into a folder Step 2: Create your free account at www.110mb.com and
upload the extract files here Step 3: Go to file manager and upload all the
files. Step 4: Open you fake page, enter user name and password and try...
2010-05-20 19:57
When You send an email to any of your friends or
others could be your Girl friends Never mind. But When you send the email
through any email client like Gmail , Yahoo Mail , Hotmail, AOL, Outlook
Express, etc it also sends the Email Header which contains Some important
information for Us...
2010-05-20 19:55
1- ok now, what you need to do is to run compmgmt.msc
2- and click on local users and groups. 3- once you've gotten here you need to
open up the 'users' folder. at this point i am walking along with you and notice
that there are several major security holes dealing specifically with the...
2010-05-20 19:53
This tutorial is aimed at school servers running
Windows underneath (most of them do). It works definitely with Windows 98, 2000,
Me, and XP. never tried it with 95, but it should work anyway. However, schools
can stop Batch files from working, but it is very uncommon for them to be...
2010-05-20 19:50
For those of you that work in Information Technology
and started in the last 20 years or so, chances are you were inspired by movies
such as War Games, Sneakers or even Hackers. Remember that 80’s T.V. show Whiz
Kids? That was cool too. I so wanted to be one of those kids. Of course,...
2010-05-20 19:48
Have you suddenly encountered with the problem that
when you plug in your USB drive, the Removable media shows up but when you try
to open it, it returns with the message "Please insert a disk in to drive H:”.
If yes then you have been on right tutorial page. By applying this simple...
2010-05-20 19:45
First of all,why you want to hack a webpage?Is it a
certain webpage or any site at all? There are many reasons to hack a website, or
a webmaster.Maybe you want to take a revenge or maybe you want to have fun or
just learn how to do it ! You can deface the website which means replace...
2010-05-20 19:43
you must understand that there is no 1-2-3 process to
anything. I will give you options to consider when persuing such a task, but it
will ultimately be up to you to do this. This is what you want to do, and no
matter what sort of offers you throw up at anybody, nobody is going to do...
2010-05-20 19:41
If you have a conventional mail box you have from time
to time been faced with the prospect of fishing out pieces of mail from the back
of the box. Especially if you like to get you mail from the comfort of your car.
I got fed up with looking around for something to fish an obstinate...
2010-05-20 19:39
Like any decent self-proclaimed music discovery slaker
should be, I'm a sucker for free services that help me expand my audio horizons.
Even better when it's an attractive Web site adorned with bubbles and
represented by a pink tuna with a giant googly eye. Naturally, this means I
was...
2010-05-20 19:30
Phishing continues to be one of the most significant
security threats facing Internet users. During 2007, scammers distributed
millions of phishing scam emails that targeted many different entities. Phishing
attacks are sure to continue in 2008 and scammers will use such attacks to...
2010-05-20 19:27
One of the most common techniques used by hackers to
penetrate your network, is just plain-old password guessing. This goes for
external hacking attempts as well as internal hacking attempts. In this article
I will discuss how hackers can use tools to perform brute force password ...
2010-03-01 11:08
Windows Movie Maker is video creating/editing
software, included in Microsoft Windows Me, XP, and Vista. It contains features
such as effects, transitions, titles/credits, audio track, timeline narration,
and Auto Movie. New effects and transitions can be made and existing ones can
be...
2010-02-25
09:50
As most internet users know, it is often hard to
remember or keep apart all the passwords and login names for one's different
online accounts. Dr. Bernd Borchert, together with students at the Computer
Science Department of Tübingen University, has tackled this issue. They
developed a new method
|