Combating Robocalls with Robo-Bouncer
We hate Robocalls, so we developed RoboBouncer, a bot to defend against unknown callers and Robocalls. We have a commercial version available and made the source code available for those that would like to DIY
Read MoreProof, hardware is on its way out
A video about foxconn the worlds largest electronics manufacturer is struggling to stay relative as technology is shifting away from hardware to software based technologies
Read MoreComplete Business Start-up
We take a close look into how we applied internet technology to Native West a start-up landscape company with multiple offsite departments that need to coordinate
Read MoreIs your account info compromised?
Let us show you we know how to handle large data sets, by searching our HUGE database of over 1.5 billion hacked (40 Gigs+) username and passwords to see if your personal accounts have been compromised.
Read More8 Tips for picking a better domain name
Not only do these tips coincide with easier search engine indexing, They take into consideration human psychology, human memory is vital because if your end user doesn’t recall the proper address they are a lot less likely to reach there intended destination Choose a .com extension Use your brand…
Read MoreShared Hosting
Sharing Address with many others – In shared hosting 1 address could be shared by thousands of other domains. Shared hosting is like sharing a large building, and you have a room and share all the remaining amenities with everyone else. Increased Hack Vulnerability – If criminal breaks into the…
Read More5 Ways to help ensure your websites secure
These days web sites can expect to be attacked by web bots as soon as a search engine index’s there site. The more advanced web bots will launch every known attack in order to find a vulnerability to exploit, and report back to its attacker, whom can conduct various nefarious…
Read MoreReal world example of unintentional consequences
Some people, best stay away from technology, rather than tell you, go see for yourself and Google “inurl:main.cgi linksys” (minus the “)….click on a few links and fulfill that inner “peeping tom” in you (don’t worry your secrets safe with me)
Read MoreWe now know for sure, encryption wont ensure privacy.
In the hours since the documents were made available by WikiLeaks, a misconception was developed, making people believe the CIA “cracked” the encryption used by popular secure messaging software including Signal and WhatsApp. WikiLeaks asserted that: “These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo,…
Read More- « Previous
- 1
- 2
- 3
- Next »