Text to Search... About Author Email address... Submit Name Email Adress Message About Me page ##1## of ##2## Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec



8/bigslider1/news/recent

4/newsticker/Business

404

Sorry, this page is not avalable
Home

3/block1/Gadgets

Latest Articles

WikiLeaks leaks DNC emails, setting off political firestorm

On Friday, just days before the Democratic Convention in Philadelphia, WikiLeaks released nearly 20,000 emails that, it says, come from t...

How to convert PDF to eBook

Do you like read book but travel with many books seem upset? Don't worry, you can convert your favorites PDF's files to eBook f...

MattDevo: ChromeOS Firmware Utility Script

The ChromeOS Firmware Utility Script simplifies the most common functions most users need when interacting with the firmware on their Chr...

How to cypher/encrypt files with GPG

The cloud is an important part of our lifes now, and allow us save space. But there is a problem... How can you be so convinced that yo...

How to Encrypt Your DNS for More Secure Browsing

DNSCrypt is a protocol that authenticates communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses crypt...

Shellcode Injection

Introduction Here I am going to demonstrate how to gain shell access by overflowing a vulnerable buffer. I shall show it with both ASLR...

How to Crack Android Full Disk Encryption on Qualcomm Devices

The heated battle between Apple and the FBI provoked a lot of talk about Encryption – the technology that has been used to keep all your ...

unixlegion.com uses cookies to improve your experience. I agree