h1 a:hover {background-color:#888;color:#fff ! important;} div#emailbody table#itemcontentlist tr td div ul { list-style-type:square; padding-left:1em; } div#emailbody table#itemcontentlist tr td div blockquote { padding-left:6px;.....
Monday, September 17, 2012
Cyber Crime Cost $8 Billion Loss For India in Last 12 Months
Cyber Crime Cost $8 Billion Loss For India in Last 12 Months While Affecting 42 Million People In its annual cybercrime report, security firm Norton has estimated that India has lost more than $8.....
WEP Cracker Using fern wifi cracker
h1 a:hover {color:#fff ! important;} div#emailbody table#itemcontentlist tr td div ul { list-style-type:square; padding-left:1em; } div#emailbody table#itemcontentlist tr td div blockquote { padding-left:6px;.....
Sunday, September 16, 2012
Computer Storage Memory From Bit To CoperByte
1 Bit = Binary Digit 8 Bits = 1 Byte 1024 Bytes = 1 Kilobyte 1024 Kilobytes = 1 Megabyte 1024 Megabytes =.....
About BlueStacks
BlueStacks runs Android OS and apps on Windows PCs with instant switch between Android and Windows - no reboot is required. End consumers.....
DNS Changer Facts And Precautions
85.255.112.0 through 85.255.127.255 67.210.0.0 through 67.210.15.255 93.188.160.0 through 93.188.167.255 77.67.83.0 through 77.67.83.255 213.109.64.0 through 213.109.79.255 64.28.176.0 through 64.28.191.255 ReInstallation Of Computer Computer If.....
Artificial Intelligence
In artificial intelligence, an intelligent agent (IA) is an autonomous entity which observes through sensors and acts upon an environment using actuators (i.e......
About Goosh: Google Shell
Goosh goosh.org 0.5.0-beta #1 Mon, 23 Jun 08 12:32:53 UTC Google/Ajax Welcome to goosh.org - the unofficial google shell. This google-interface behaves similar.....
GPU C Programming
#include <stdio.h> #include <stdlib.h> #include <string.h> size_t foo_len (const char *s) { return strlen (s); } int main (int argc, char *argv[]) {.....
Secrecy of source code and other implementation details
Secrecy of source code and other implementation details is a very weak approach to security. In fact, the secrecy of your source code.....
Advantages And Disadvantages Of Manual And Automated Fuzzing Testing
Advantages Automated Testing and Manual Testing • If you have to run a set of tests repeatedly automation is a huge gain • If.....
The shell: command
The shell: command can be used to open a special folder directly from the Start, Search menu or from the Run dialog. For.....
The Silva Method: Focused Thinking
The Silva Method is a comprehensive program designed to train you to make better use of your mental processes. When your thought processes.....
Forward Engineering
Forward engineering is the set of engineering activities that consume the products and artifacts derived from legacy software and new requirements to produce.....