twitterfacebookgoogle pluslinkedinrss feedemail

This is default featured slide 1 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 2 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 3 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 4 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 5 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

Thursday, September 10, 2015

Cyber Warfare vids

Cyber Warfare Cyberwarfare has been defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption," but other definitions also include non-state actors, such as terrorist groups, companies, political or ideological extremist groups, hacktivists and transnational criminal organizations Some governments have made it an integral part of their overall military strategy, with some having invested heavily in cyber warfare capability. Facts Explain the Threat of Cyber Warfare Here we will update on major videos showing powerful nations decisions towards cyber ware fare and how its prevalent. If you like this you can share or buy me a cup of tea.. ;) UnFilter Vids See the awesome.. ;)


Tuesday, August 19, 2014

Introduction to hacking ..

this is by Eli the Computer Guy..

IDN can also be perceived as the label displayed in a software application, in an alphabet or language-specific script. IDNs are stored in the DNS as ASCII strings. The DNS performs look-up services to ensure the translation of user-friendly names to locate the Internet resources, and it is restricted to using ASCII characters for acceptable domains. IDNs ensure the names written by means of non-ASCII scripts are translated into ASCII text compatible with the DNS.