Skip to main content

Posts

WHAT IS HACKING

  Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on networks and computers over the internet. Origins of Hacking M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the hacks perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the internet became popular, for example, several hackers in the U.S. experimented with methods to illeg...

WHAT IS HACKING

  Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on networks and computers over the internet. Origins of Hacking M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the hacks perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the internet became popular, for example, several hackers in the U.S. experimented with methods to illegally modify tel...

THE TWO HEADED SNAKES

Its really rare, but not completely uncommon that a snake is born with two heads.  It’s called Polycephaly, a condition of having more than one head.    The most commonly observed two-headed animals are turtles and snakes.  Snake heads may attack and even attempt to swallow each other. Thus, polycephalic animals survive poorly in the wild compared to normal monocephalic animals. Most two-headed snakes only live for a few months, though some have been reported to live a full life and even reproduced with the offspring born normal.A two-headed black rat snake with separate throats and stomachs survived for 20 years.   A two-headed albino rat snake named “We” survived in captivity for 8 years. A two-headed Boa constrictor was born in a pet shop in Hayward, California, in May 2009. Owner Aaron Dickey decided to sell the snake to the Venice Beach Freakshow.A two-headed king snake lived for nearly 17 years at the Arizona State University. ...

iOS -iPHONE

  Apple's mobile operating system — iOS — runs the iPhone, iPad, and iPod Touch devices. Originally known as the iPhone OS, the name was changed with the introduction of the iPad. It uses a multi-touch interface in which simple gestures operate the device, such as swiping your finger across the screen to move to the next page or pinching your fingers to zoom out. There are more than 2 million iOS apps available for download in the Apple App Store, the most popular app store of any mobile device.  It uses a multi-touch interface in which simple gestures operate the device, such as swiping your finger across the screen to move to the next page or pinching your fingers to zoom out. There are more than 2 million iOS apps available for download in the Apple App Store, the most popular app store of any mobile device. What Is an Operating System? In the simplest terms, an operating system is what lies between you and the physical ...

FREE GIF MAKERS

free GIF makers let you create an animated GIF from images or videos that you can then share with everyone you know.It's a series of still images that are cycled through to create an animation, much like a video clip. Creating one using a free GIF maker is a fun and quick project that you can use for dozens of applications.   The free GIF makers  are downloadable and others are online programs. They   are absolutely free and will create an animated GIF in a matter of minutes.. Make A GIF.   Make A GIF lets you create a GIF from multiple images, a video from your computer, a YouTube or Facebook video, or directly from your webcam. If making a GIF from images, it’s really easy to customize the order of the photos because you can simply rearrange them via drag-and-drop. You can also resize all of the images at once and set a custom animation speed.  Once created, you can save the GIF to your computer and ...

PROTECTING ENVIRONMENT

OUR   ENVIRONMENT  IS  IN  DANGER.Man  made   Catastrophe  ,for  which   human  being  are   responsible  .Man  made  disasters  pollute  huge  areas  and  cause extensive  damage to  animals ,plants, and  even  to  human  beings.like  ,Oil   and  chemical  spills,accidents  in  nuclear power  plants  ,over fishing  in  seas. and  large  scales  destruction  of  forests.Besides, increased    green  house  effect .all   are  man  made   environmental   catastrophe.  OIL  AND  CHEMICAL  SPILLS .-Chemical  accidents  are  caused  by  human  negligence,technical  problems, and are  committed by  the people ...

HOW TO PROTECT YOU ONLINE

Your personal privacy on the Web might be not  secure. Web browsing habits are tracked via cookies, search engines routinely change their privacy policies, and there are always challenges to Web privacy by both private and public organizations. Here are a few common sense tips that can help you guard your Web privacy and stay safe online.  /> Avoid Unnecessary Forms Online - Don't Give Out Too Much Information  A good Web safety rule of thumb is to avoid filling out forms that require personal information in order to keep anything from being entered into public, searchable record, aka Web results. One of the best ways to get around companies getting your personal information is to use a disposable email account c - one that you don't use for personal or professional contacts - and let that be the one that filters things such as contest entries, websites that require registrations, etc. That way, when you get the ine...