Skip to main content

Posts

Showing posts from January, 2012

Tablet Buying Guide for 2012

So you’re looking to buy a tablet. The good news is that this is the most exciting time yet for the form factor, with exciting and competitive products available or coming soon from Google, Amazon, Microsoft, and Apple. The bad news, of course, is that all this choice makes buying decisions that much harder. Let’s take a closer look at each of the major players. Here’s our tablet buying guide for summer 2012. iPad No need to describe this one for you. For the time being, the iPad still dominate the tablet field. It commands the most apps and, in its newest generation, an absurdly high-resolution display. Bluetooth and software like Pages, GarageBand, and iMovie make it a device for both creation and consumption (though it’s still a bit awkward to pair with a keyboard). If you know someone with a tablet, it’s probably an iPad. Here are the three most important questions, then: Do you enjoy or prefer iOS? Are you willing to pay at least $400? And do you want a 10-inch ta...

How to hack a computer with IP address

There are plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I’m not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In other words online. Now at the bottom of this document I have included some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to “hack” the box. Port Scanners are used to identify the open ports on a machine that’s running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network. 1) Blues Port Scanner   This program will scan the IP address that you chose and identify open ports that are on the target box. ...