4. Robert Tappan Morris
INTERNATIONAL COMPUTER SCIENCE LABORATORY and the focus is computer and network architectures.
Read more >>
Labels:
Hacker Legend
3. Jonatan James
Read more >>
Labels:
Hacker Legend
2. Adrian Lamo
Read more >>
Labels:
Hacker Legend
1. Kevin Mitnick
Read more >>
Labels:
Hacker Legend
To Change Windows 7 Icons
Microsoft has always been successful in changing the way we look at our operating systems. Right from the time of the Disk Operating System, it has been instrumental in enhancing operating systems and enhancing the user experience when it comes to Operating System. With Windows 7, it has taken the concept of Operating Systems to a whole new level.
Read more >>
Labels:
Computer
Tricks to Help You Keep Your Laptop Functioning Normal
Laptop or computer viruses are spreading widespread among online consumers as of late mainly because it's very easy for the cyberpunk to wind up in your personal machine. Such different spy ware ailments enter the particular computer systems which enables it to truly slow your pc down or perhaps ruin it completely. Some malware are used against you that will steal your private data that you distribute on different sites.
Read more >>
Labels:
Laptop Security
New USB Flash Drive
USB flash drives have been a popular device by the time it is available in the market with all good demand. An USB flash drive is a storage device of small size used to transfer files from one system to other. They are compact in size and quite easy in use. It is similar to computer hard drives which can easily keep in pocket and movable from one place to other.
Read more >>
Labels:
Hardware
Keylogger
Our lives, study, and working are making a closely knit with it. Nevertheless it' s also a place where is full of both danger and predator. Stealing personal information by means varying from social security number, credit card number, and passwords to just about everything, This reality resulted in the development of many utilities. Amongst them there are the key loggers.
Read more >>
Labels:
Application
Protecting Your PC From Internet Dangers
If you buy items online, surf the internet or use email then here are several tips to keeping your computer and your personal information secure.
Many people find it very easy to safeguard themselves by installing antivirus protection. Most antivirus protection software protects your computer from known viruses and Trojan horses. If a new virus is detected, your virus software will automatically download the new definition so that your computer will be safe.
Many people find it very easy to safeguard themselves by installing antivirus protection. Most antivirus protection software protects your computer from known viruses and Trojan horses. If a new virus is detected, your virus software will automatically download the new definition so that your computer will be safe.
Read more >>
Labels:
Computer
Safe Surfing
If you’re going to connect to the internet, you need to protect your computer, otherwise it’s like leaving your front door wide open with a big ‘Robbers Welcome’ doormat on your front step. You’ve probably heard all the terms – such as virus, hacker, firewall, spyware and a million more – but perhaps think that the anti-virus programme that came with the computer, or that your PC-savvy mate downloaded for you is enough to keep you safe, right? Wrong …
Read more >>
Labels:
Internet
Hardware
A personal computer is made up of multiple physical components of computer hardware, upon which can be installed an operating system and a multitude of software to perform the operator's desired functions.
Though a PC comes in many different forms, a typical personal computer consists of a case or chassis in a tower shape (desktop) and the following parts:
Though a PC comes in many different forms, a typical personal computer consists of a case or chassis in a tower shape (desktop) and the following parts:
Preventing Password Hackers
PC security and safety is always an issue nowadays thanks to the advent of computer technology and the Internet. More computer intruders are boldly coming forward and are looking for ways to attack helpless computer users with valuable information stored in their PCs. Intruders are getting their hands on the latest security measures brought out by various developers and are looking for ways to get through them.
Read more >>
Labels:
Hacker
Overcoming Program Not Responding
When using the computer, some programs that have been opened often experienced not responding. This, to slow down other programs, waiting for the program is closed. If the process fails, you have to open the Task Manager with Ctrl + Alt + Del. Will surely annoy you. It would be better if the program is not responding quickly closed automatically. Here are the steps:
1. Open Regitry Editor
2. In the Registry Editor window, click the HKEY_USERS> DEFAULT> ControlPanel> Desktop.
3. See the entry on the window right AutoEndTasks If entry is missing, then you must make the first step right-click with your mouse to the right, select New> DWORD Value and give name AutoEndTasks.
4. Double-click the entry, give the value 1 in Value Data.
5. Click Ok, refresh (F5), and close the registry and restart the computer.
Not at all easy and you will not be disappointed if your computer error
1. Open Regitry Editor
2. In the Registry Editor window, click the HKEY_USERS> DEFAULT> ControlPanel> Desktop.
3. See the entry on the window right AutoEndTasks If entry is missing, then you must make the first step right-click with your mouse to the right, select New> DWORD Value and give name AutoEndTasks.
4. Double-click the entry, give the value 1 in Value Data.
5. Click Ok, refresh (F5), and close the registry and restart the computer.
Not at all easy and you will not be disappointed if your computer error