Latest Posts

Google attracts the best talent

Google attracts the best talent
Insider secrets on hiring from the world’s top employer

If you asked managers at large companies “What is the single most important thing you do at work?” most would reflexively answer “Go to meetings.” Now imagine asking the same question of the top sports coaches or general managers. They go to meetings all day too, yet they would probably say that the most important thing they do is draft, recruit, or trade for the best players they can.



You manifest what you believe, not what you want

Believe that success, miracles, wealth and happiness comes to you easily and effortlessly. When you belief in something, it also means that you have very strong feelings about having it in the future. Notice how you feel and allow the positive energy comes to you. This changes your neurological pathway in your mind and thus creating new fresh opportunities and miracles around you.

Firewall,Why Do I need

 Firewall,Why Do I need?

Without a firewall, your computer is operating with an "open door" policy. Bank account information, passwords, credit card numbers, virtually any sensitive information on your computer becomes available to hackers.

What is a Keylogger?


Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download and conversation.


An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack.


Not a lot of people get to work at Google, much less before entering college.

But for Larry Gadea, founder of visitor-registration software Envoy, a job at Google just kind of came naturally right after high school, at the age of 18.


When Microsoft first awoke to the wide area network (WAN) Internet, its local area network (LAN) NetBIOS file sharing technology was using a "transport protocol" known as NetBEUI.


Port 135 is certainly not a port that needs to be, or should be, exposed to the Internet. Hacker tools such as "epdump" (Endpoint Dump) are able to immediately identify every DCOM-related server/service running on the user's hosting computer and match them up with known exploits against those services.

port scan

Port scanner is an application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify services running on a host and exploit vulnerabilities.


In computer networking, a port is an endpoint of communication in an operating system. While the term is also used for hardware devices, in software it is a logical construct that identifies a specific process or a type of service.