Search This Blog
Profile
Subscribe to:
Post Comments (Atom)
Recent
What to do after hacking.
FIVE RULES OF HACKER(White hat/Black hat) Originally, to “hack” meant to possess extraordinary computer skills to extend ...
-
Invention of first computer One of the earliest machines designed to assist people in calculation was the Abacus which is still ...
-
Protocol :- In information technology, a protocol is the special set of rules that end points in a telecommunication connection us...
-
What is Dark Net ? Dark net is a overlay network that can be only accessed using specific software, configuration, or authenticatio...








No comments:
Post a Comment