This is a nice beginners tutorial that tells you how to trace people who try to break into your computer. It covers lots of explanations to questions like "How do these people find their victim?" and "What the phrases TCP/UDP actually mean".
This is our web-based news category. We post news, reviews, tips and tricks, and tutorials about Internet services in here. This includes news about popular Internet companies and services such as Twitter, Dropbox, Yahoo or Evernote, reviews of Internet services that let you do “things” online, and tutorials and tools that provide you with the knowledge and means to make the most out of the Internet.
The majority of articles listed here are Internet service news, announcements of changes for instance, or new services that have just been released and are ready for use.
But Internet also covers P2P and file sharing and hosting news, reviews, and tutorials. Here you find Bittorrent news for instance, information about the place no one talks about, the Usenet, or news about file hosts such as Rapidshare or Mega.
Many of you told me that I should create a new list of websites that are running webproxies. Today I finally had the time to compile this new list, hope everyone is satisfied with the result. Maybe it´s a good start to explain why someone would need a webproxy ( or a proxy ). Some […]
Fix my XP is a site that has lots of windows tips that are especially useful for beginners. Tips that explain how to remove unused dlls from memory, fine tune your lcd display or how to open large folders faster can be found on the site. Take a look, you might be suprised what you […]
I was not sure how to name the article appropriately. You can convert any image on your computer into a text image at text-image.com. The result looks great, just take a look at the sample image that I reduced in size. The normal size looks much clearer and brighter.
I would like to give you the links to two great wallpaper sites that have almost no advertisment on their sites, unlike many other wallpaper sites that seem to bombard you with ads and popups. The first is joejoe.biz, a nice site if you are looking for nature wallpapers. He has some pretty interesting close-ups […]
Now this one is huge. The attack cruiser was build by Erik Varszegi exclusively for display at Star Wars Celebration III. It even got a framed certificate of authenticity by George Lucas himself. Stem to stern the model is 97 inches long and 47 inches wide, weighs over 150 pounds and is created using over […]
Those crazy japanese again. I´am not sure why I love them that much but it probably has something to do with the fact that they are always good for a suprise (or two). I never thought they would use different smileys until I found this japanese smileys website.
I published a large file host list last month and good lots of positive and some negative feedback concerning the list. The list contained a lot of sites that allow users to upload free files to their website and share it with others. A negative aspect was that it only featured a few categories that […]
Everyone who has to work with different computers has enountered a problem like this. The bookmarks are different because you have no possiblity to synchronise them. It could be that you have a desktop pc and a laptop and want to use the same bookmarks wether you are using the notebook or the desktop computer.
WinHTTrack is an easy-to-use offline browser utility. It allows you to download a World Wide website from the Internet to a local directory, building recursively all directories, getting html, images, and other files from the server to your computer.
No matter which internet page you open this days you are guaranteed to find at least one article mentioning the Sony rootkit affair. Instead of providing you with the latest news on the case customer vs. Sony BMG I´d like to analyse an interesting aspect of it. In the beginning, there was one guy, who […]
Everything you do on the net transmitts your Ip Address. If you chat with someone he could easily find it out, if you write an email the information will be transmitted with the email. The article describes what the IP reveals about the user behind.
This article describes how search engines work, how the data is processed, how search results are generated. It also describes most of the advanced search operators available today.