A Nigerian national has been charged in connection with a hack of Los Angeles County emails that might have exposed personal data from more than 750,000 people who had business with county departments, officials said. Kelvin Onaghinor, 37, faces nine counts, including unauthorized computer access and identity theft, according […] Click here to view original… Read more Nigerian man charged in hacking of Los Angeles county emails
At least, that is how long it would take me to hack into any Microsoft Windows account – 2 minutes! Very worrisome, isn’t it? Goes to show that anyone that thinks his data is safe just because it is tucked away in his passworded Windows account would really need to have a rethink. I will… Read more Hack Windows Password in 2 Minutes
I have held back from rooting my Samsung S3 phone for this long because of the new feature samsung has introduced into its devices called Flash Count. The flash count feature is available on the Samsung Galaxy “S” and “Note” series and basically records the number of times your device has been rooted or flashed… Read more Should I Say Yes … Should I Say No?
Oh yes, I do believe, unreservedly, that Jesus saves. But like a “doubting Thomas”, I seriously doubt if he would do much to help you when it comes to protecting you from having your online identities hijacked – that is, if you use his name as your password. Splashdata, a leading provider of password management… Read more Jesus Saves?
The arguments for or against hacking your mobile device to gain elevated access have been raging on for a decade or so now. Things probably became more heated up with the advent of the Apple IOS and, especially, the Android platforms where most consider rooting your android device as unsafe and unnecessary. I think it… Read more To Root, Or Not To Root, That Is The Question!
Experts believe that the best way to secure your WordPress installation is by writing your own codes and not with the use of off-the-shelf codes, known as plugins. While this may be true, not many possess the skills of writing codes for WordPress. Chances are, you may even be barely capable of finding your way… Read more How To Secure Your WordPress Blog – Part 2
21st May 2012 – Status Update Dear All, It may be a little early for this post since at this time, our web hosting provider are still investigating and looking into exactly what happened, and why, and are yet to report back to us. But here is what we know at this point in time.… Read more WHMCS.com Compromised
The invention of the computer brought much good and innovation; however, there are always those that like to go against the grain – cue the computer hacker! Below is a list of some of the most notorious computer hacks and hackers in history; men that have used the power of the computer to wreak havoc… Read more The Most Infamous Computer Hackers in History
While no website on the Internet can be deemed 100% safe from hackers, lately, sites based on the WordPress platform have received more than their fare share of such intrusions. WordPress is the most widely adopted Content Management platform, with millions of blogs and websites based on this platform. The relative ease of setup and… Read more TimThumb – Hacker’s Delight
December 25, 2011 was a Christmas day like no other. While most of you fine folks were enjoying the spirit of the festive season and probably, also waiting for the next juicy post on your favourite blog, Diary of a Geek, some low-life, never-do-well, anti-social, society-reject scumbag, nincompoop, scallywag script kiddie was hacking away at… Read more Scumbags!
At least half of the people that click on this post would expect to find some hacking tips on how to browse the internet for free. Sorry, no hacking tips here. However, for those that subscribe to Globacom’s cheaper internet bundles, ever tried dialling 124 to know if you are a beneficiary of Glo’s free… Read more Free Internet Browsing
With the recent hiring of Steve Kondik, popularly known as Cyanogen, as a software developer for Samsung, choosing a career path in hacking may just have its rewards after-all. For those that indulge in unauthorized Android Operating System modification (Cooked Roms), the name Cyanogen should be very familiar. He has now joined the league of… Read more Hacking, A Career Path?