Valentin Denny
Member's groups
-
Comments & Suggestions
-
tools and programs please post your favorites
-
Discussion about particular books and papers
-
For all your hacking of electronics like radios, circuitry, alarms, radar detectors, cameras, remote controls or robots you can participate in this forum. Great area for DIY projects. Topics include Raspberry Pi and Arduino.
-
Gain help on compiling, objects, classes, and functions Tutorials and coding .
-
Intel or AMD? nVidia or ATI? android or Iphone ? All things computing hardware
-
For great discussions on various subjects and to have some fun relaxed topics
-
Feel free to ask all questions you got in this place…We love to answer
-
If you have a hacking tutorial please post it here
-
wireless networks, wep/wpa encryption, sniffers, backtrack, setup, connection problems, aircrack and other wireless related discussions
-
Got something to share about your favorite games? Strategies? Game codes? Discuss gaming topics here!
-
Linux / Open Source
Latest Activity
-
CNN wrote a new post, Cyber crime is now top U.S. threat 11 years, 3 months ago
Top intelligence officials say cyber crime is now the top security threat facing the U.S.
video, sharing, camera phone, video phone, free, upload
2013-03-12 21:23:47
source -
ControlEngTV wrote a new post, Cyber Security Training #4 11 years, 3 months ago
Cyber Security training video #4: Control System security.
To find more training videos on Cyber Security, just click the link below to visit2013-03-12 19:39:30
source -
Google Webmasters wrote a new post, Help for hacked sites: SQL injection 11 years, 3 months ago
Help for hacked sites: http://www.google.com/webmasters/hacked
This video discusses the malware infection type “SQL injection.” Owners of sites affected by this malware infection type may see sample URLs in […]
-
Google Webmasters wrote a new post, Help for hacked sites: Identify the vulnerability 11 years, 3 months ago
Help for hacked sites: http://www.google.com/webmasters/hacked
In this sixth step in Help for hacked sites, we discuss determining the root-cause vulnerability that allowed the cybercriminal to hack your […]
Gloss