Busy box pro download free
Self camera pro download
Maps coordinates pro
Organizy pro
Perfectly clear pro
Photo gallery premium
File manager premium
Megacast pro
Colourform pro Hd widgets
4Shared pro
HD widgets pro
Premium widgets pro
Automatic call recorder pro
Officesuite pro-7
Facelck-pro
Xposed installer v3.0 Modified
Learn about bitcoins
Satoshimines bot script
2 May 2014
02
May
Steps
1
Set up password protection.
Enable password protection on your computer if it is not already set
up. Make sure you are using a personal password you have chosen versus
the default password.
When creating your password, be sure to incorporate numbers or special characters to make it difficult for others to guess.
Change your password...
Posted by Waseemgarra on Friday, May 02, 2014 in Anti Hacking
02
May
Computer hacking can occur
in a number of ways. Your computer system itself can be hacked and mined
for personal information. Your blog or website can be compromised if a
hacker obtains your password. Your email can be hacked if you click on a
fraudulent link and you may not be able to retrieve your email and
other information you've registered...
Posted by Waseemgarra on Friday, May 02, 2014 in Anti Hacking
02
May
Hackers and crackers are
people who make unauthorized access to a network, a computer, or data
belonging to someone else. Sometimes they may cause damage to
information, remove it or may even cause distress to the real owner of
the information. The following are some steps, tips, and warnings that
you should be aware of, in order to prevent network...
Posted by Waseemgarra on Friday, May 02, 2014 in Anti Hacking
02
May
Unethical hackers (in bad
sense of this word) are always looking for weaker points in a network
system to hack the security system of your company and get a hold of
confidential and new information.
Some "black-hat hackers" derive a vicarious pleasure from
wreaking havoc on security systems and some hackers do it for money.
Whatever may be the...
Posted by Waseemgarra on Friday, May 02, 2014 in Anti Hacking
02
May
Poor security in computer systems can be very harmful for any
business, no matter what is the size of the company. The information
about your business and its processes is too valuable to get in the hand
of some illegal hacker. However by incorporating the right security
infrastructure you can minimize the chances of viruses entering your
network...
Posted by Waseemgarra on Friday, May 02, 2014 in Anti Hacking
02
May
I remember the first time a friend of mine introduced me to
Linux and showed me how I didn't need to type commands
and path names fully—I could just start typing and use the Tab key to
complete the rest. That was so cool. I think everybody loves
Tab completion because it's something you use pretty much
every minute you spend in the shell. Over time,
I discovered many more shortcuts and time-saving tricks,
many of which I have come to use almost as frequently as Tab
completion.
In this article, I highlight a set of tricks for
common situations...
Posted by Waseemgarra on Friday, May 02, 2014 in Linux Tricks & Helps
02
May
I’m using Linux shell (Bash) on daily basis, but I often forgot some
useful command or shell tip. Yes, I can remember commands, but I can’t
say that if I used it just once for specific task. Then I started to
write Linux shell tips in text file on my Dropbox account and now I
decided to share that. This list will be updated over time. Also keep in
mind that for some tips you will need to install additional software on
your Linux distribution.
UPDATE: November 25, 2013
Check if remote port is open with bash:
echo >/dev/tcp/8.8.8.8/53 &&...
Posted by Waseemgarra on Friday, May 02, 2014 in Linux Tricks & Helps
02
May
Everybody says that Linux is secure by default and
agreed to some extend (It’s debatable topics). However, Linux has
in-built security model in place by default. Need to tune it up and
customize as per your need which may help to make more secure system.
Linux is harder to manage but offers more flexibility and configuration
options.
25...
Posted by Waseemgarra on Friday, May 02, 2014 in Linux Tricks & Helps
02
May
The cat (short for “concatenate“) command is one of the most frequently used command in Linux/Unix like operating systems. cat
command allows us to create single or multiple files, view contain of
file, concatenate files and redirect output in terminal or files. In
this article, we are going to find out handy use of cat commands with their examples...
Posted by Waseemgarra on Friday, May 02, 2014 in Linux Tricks & Helps
Subscribe to:
Posts (Atom)