Category: Computer

Cookies on square white ceramic plate

Web Cookies

A web cookie, also known as an internet cookie or a browser cookie, is a text file that contains information that the website needs to store relating to a particular visit or visitor. The file is stored on the user’s machine, can be deleted by the user, and can only be read by the user or the website that created… Read more →

Internet technology computer display

Penetration Testing

Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix. Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters:… Read more →

Increase your Virtual RAM to Make Your System Faster

Steps Press and Hold down the ‘Windows’ Key and Press the ‘Pause/Break’ button at the top right of your keyboard. Or simply Right-Clicking ‘My Computer’ and then select ‘Properties’. Click on the ‘Advanced’ tab. Under ‘Performance’, click ‘Settings’. Then click the ‘Advanced’ tab on the button that pops up. Under ‘Virtual Memory’ at the bottom, click ‘Change’. Click the ‘Custom… Read more →

Server racks in modern data center

Data Centre

Data Centres are simply centralised locations where computing and networking equipment is concentrated for the purpose of collecting, storing, processing, distributing, or allowing access to large amounts of data. They have existed in one form or another since the advent of computers. In the days of the room-sized behemoths that were our early computers, a data center might have had… Read more →

apple business computer connection

People Search Links

The information provided in or through this Website is for educational and informational purposes only and solely as a self-help tool for your own use. I shall not be held responsible for any misuse of the tools below. http://www.123people.com http://webmii.com http://www.yasni.com http://www.skipease.com http://www.ussearch.com http://radaris.com http://com.lullar.com http://www.peoplelookup.co.uk/dob http://illmob.org/bookmark.html http://www.mooseroots.com http://www.peekyou.com http://www.spock.com http://www.inteligator.com http://www.192.com https://vinelink.com/#/map http://thatsthem.com http://www.anywho.com/whitepages http://www.everify.com http://www.netronline.com http://www.archives.com/search/vital https://www.mylife.com http://radaris.com… Read more →

Four women chatting while sitting on bench

20 of Interesting Facts

We forget 80% of what we learn every day (Now I know why….). It is normal to have an urge to jump off a cliff. (DON’T JUMP HAHA) Sometimes you’ve got to shut up, swallow your pride and accept that you’re wrong. It’s not giving up. It’s called growing up (WORD!) Adding salt to a pineapple actually causes it to… Read more →

Zero-Day Attack

A zero-day attack (also referred to as Day Zero) is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of. The software developer must rush to resolve the weakness as soon as it is discovered in order to limit the threat to software users. The solution is called a software patch.… Read more →

Protect your Computer from Bots

It’s very possible to protect your computer from bots, but it takes diligence and knowing what to look for. Use the following tips to keep your computer safe: Install firewalls to block malicious attacks and never turn them off. Use a long and complicated password that contains numbers and symbols. Never use the same password for multiple programs. Install quality… Read more →

Office working app computer

Dark Web

The sites are not only accessible through Google. Currently, it’s just a very small part of the internet. However, the Web can be divided into three main components, namely the Surface Web, the Deep Web and the Dark Web. Most people believe the web is the Surface Web. Particularly in online content, search engines or links can be easily accessed.… Read more →