Ibm

News : SCORE With Tron-a-Sutra (NSFW)

Whoa. Look what we found in the mainframe. Let's say you're a 15-year-old boy nerd looking to SCORE. Real life experience has been... limited. (Ok, you're a virgin.) Lara Croft was inspired (nine years ago when you were six-years-old!). So, where are the sex-ed tutorials that ...more

Classic Commodore 64 Reborn : Get a 2011 PC in Retro Skin

Back in 1982, the Commodore 64 home computer was released by Commodore International for $595 (which would now be close to $1,300). It featured an 8-bit microprocessor, 16-color video microchip, awesome sound chip, parallel and serial capabilities, and a whopping 64 kilobytes ...more

How To : Use SpiderFoot for OSINT Gathering

During a penetration test, one of the most important aspects of engaging a target is information gathering. The more information you have coming into an attack, the more likely the attack is to succeed. In this article, I'll be looking at SpiderFoot, a modular cross-platform O ...more

How To : Break down IP and TCP header with Wireshark

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to break dow ...more

How To : How Businesses Can Prepare for Google+

WonderHowTo welcomes guest contributor, +Ryan Crowe - formerly the man behind GPlusTips. Crowe will be providing tips and tricks on how to use Google+ in interesting and innovative ways, and the self-proclaimed Google+ User Experience Enthusiast is nearly ready to launch a web ...more

News : Steve Wozniak Presents 9 Revolutionary Gadgets

How did we get to the age of smartphones, ereaders, laptops, and crazy touchscreen displays? Gizmodo covers Steve Wozniak's recent presentation of nine key gadgets that have deeply influenced the tech God's work. A few highlights below; click through for the full survey. Stibi ...more

News : A Brief History of Hacking

Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use ...more

How To : Restore your PC to factory settings by rebooting

Greg French talks to us about the different ways to reboot a computer to resolve issues in the computer. The first way is by pressing F8 key while startup after rebooting the system. When you insert a wrong driver for video card or something, sometimes when you boot the comput ...more

NR50 : The People to Watch in Mobile Augmented Reality

While the world is only recently becoming aware of its existence, augmented reality has been around in some form or another since the '90s. In the last decade, with the advancement and miniaturization of computer technology — specifically smartphones and tablets — AR has becom ...more

How To : Use NTFS

NTFS? What is it? It stands for New Technology File System, but what does that mean? Well, it's the standard system for filing in Windows NT, including all later versions, up to the current Windows 7, but Mac users can take advantage of this file system, too. If you’re confuse ...more

How To : Have Lotus Notes remember the sorting of emails

Need some IBM Lotus Notes help? Well, check out this video tutorial to learn how to have Lotus Notes remember the sorting of emails. This is a very quick and easy way of getting Lotus Notes to remember the sorting of emails. Easy to follow.

News : What Is Technology?

What is Technology? Technology is all around us. Some technology we take for granted while other technology we allow ourselves to be amazed and baffled by. Technology is more than modern technology companies like Cisco Systems, IBM, and Google. Technology exists in our every ...more

Next Page
Prev Page
  • Hot
  • Latest