This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

Blog

Home/Blog
Blog 2018-01-05T22:04:04+00:00

LG’s ThinQ Smart Fridge

LG’s latest ThinQ smart fridge has a transparent 29-inch touch screen and runs webOS (Operating System) LG tried the last two previous year with a version called Smar InstaView Door-in-Door that ran a full version of windows 10. This present and latest version uses the touchscreen to manage your food using LG’s webOS (Web Operating System) software and Amazon’s Alexa [...]

By | January 8th, 2018|Categories: News, Technology|Comments Off on

LG’s ThinQ Smart Fridge

BotNet

A BotNet is a number of devices connected to the internet each which is running one or more bots. BotNet can be used to perform distributed denial of service attack (DDoS) which can be in form of stealing data, send spams and allow the attacker to remote access to the devices which it has attacked. The attacker can control the [...]

By | January 5th, 2018|Categories: Computer Security, Technology|Tags: , , |Comments Off on

BotNet

P2P (Peer to Peer)

P2P Network P2P Network known as Peer-to-Peer Network is a type of network connection where two or more PCs are connected to each other in order to share resource (e.g. printer) and or data (file transfer). PSP network can share data or resources without connecting or going through a separate server.   The initial use of P2P network was in [...]

By | January 5th, 2018|Categories: Technology|Tags: , , |Comments Off on P2P (Peer to Peer)

Scamming and Scammers

Scamming and Scammers: Scamming and Scammers (also known as con artist) is a way of defrauding others by providing fake, forged or misleading information about their selves, what they do or who they are, in an attempt to provide you with a service, information and or documentation you might need in return for payment. They can use your social media [...]

By | January 5th, 2018|Categories: Computer Security|Tags: , , |Comments Off on Scamming and Scammers

Social Engineering

Social Engineering: Social Engineering is a way of gaining someone’s sensitive private or personal information by asking them to provide it, instances are when you have to Login to a website using your Facebook (or any social media) credentials in order to gain access to some certain features, some of these website store people’s information and use it against them [...]

By | January 5th, 2018|Categories: Computer Security|Comments Off on Social Engineering