Category: Featured

April 9 2012

It’s no surprise Facebook has become quite an annoying experience to use, especially when you consider how slow the image lightbox is. You know, the little popup that happens when you click on an image. It has to load the[…]

March 27 2012

Not so long ago a method was released to sync or manually manage/transfer your music to your iPhone/iPod between two computers, this method was grabbing the iTunes persistent ID from the master library and inserting it into the secondary computers[…]

February 8 2012

Introduction Welcome, over the next few weeks I will be guiding you through some basic and advanced client-side Internet security (Things you can do to protect yourself). The Internet is a wonderful place and a great invention. It has drastically[…]

December 15 2011

You’ve probably noticed a lot of fake and malicious posts on Facebook telling you “Click here to find out who has un-friended you on Facebook”, well truth is most of these are indeed fake and malicious websites trying to steal[…]

November 12 2011

You may have noticed a few tweets around here and there or even on chatrooms and Skype with people typing out  “#NP SongName Artist” to quickly share what they are listening to, you even may be one of these people[…]

August 11 2011

Have you ever wanted to just sit back and choose what you wanted to watch easily? Well now you can! Everyone should know about NetFlix and Hulu, however we all know it’s a US service only (meaning it’s restricted to[…]

July 18 2011

How to post from almost anything: Use this link template to write on a friends wall, replace the “123456789” for target_id with your friends id number, and replace the “123456789” for api_key with a number from the list below.[…]

May 30 2011

Use this simple tutorial along with our favorite search engine Google to find unprotected security camera’s around the world. You can view and even control them! Make them move around, zoom into things and even take pictures on some! For[…]

December 13 2010

Everyday that goes by, the bad hackers are always trying to find ways to break into systems, corrupt computers, steal your data, sell your personal accounts to strangers, finding exploits and bringing down websites, or even just to freak you[…]