Botnets Working Techniques And its Commands

A botnet is a collection of compromised computers, each of which is known as a 'bot', connected to the Internet. When a computer...
NCC

Nigerian Communications Commission Equip Police IT Unit oyo

(VON) The Nigerian Communications Commission (NCC) in Ibadan has donated computer accessories to the Nigeria Police Force, Oyo, to strengthen the command’s intelligence and...

Beasts of 2017,Nokia rivals: 6GB RAM, 2K screen, Hasselblad sensor

With 6GB RAM, Hasselblad sensor and more, 5 smartphones below would be tough Nokia 2017 rivals. Let’s read on and have a look at...
Dr Isa Ali Ibrahim (Pantami)

NITDA To Facilitate eLearning in French Language Village

The Director General National Information Technology Development Agency (NITDA), Dr Isa Ali Ibrahim (Pantami) reaffirms his support for the facilitation of eLearning, and project...

Nigerian Refineries To Work Full Blast In 2017 – NNPC Confirms

The Nigerian National Petroleum Corporation, NNPC, said it would embark on a comprehensive rehabilitation of the country’s three refineries located in Port Harcourt, Warri...

Basic Website Hacking Tutorial for beginners

Note: I believe you have some basic knowledge of HTML and PHP :) Intended for educational purpose only... SQL Injection SQL injection is the act of injection...
battery

AMAZING! SCIENTIST CREATES BATTERY THAT CAN POWER SMARTPHONES FOR 12 YEARS WITHOUT RECHARGING

A scientist has allegedly designed a stunning new kind of batteries that can unbelievably power smartphones for several years at a time. Vladislav Kiselev and...

How to prevent your website from SQL Injection vulnerability

MySQL Injection is a type of attack where an end user may hack your database from his browser itself. Comprehending this article might require...

A to Z linux commands

Here are some linux commands for you so you can make your hands more and more dirty with ubuntu terminal. mkisofs Create an hybrid ISO9660/JOLIET/HFS...

SIX Ways to Protect Your Blog from being Hacked

Six ways compiled to help protect your blog from being hacked. 1. Have Strong Passwords, and Change them Regularly- The first step you should take to...

Computer acronyms and full names

Hi guys, i want to launch this Technology sub-category with this post. Before we get on discussing about computer tricks here its very important...

How to Crack Wi-Fi WPA and WPA2 and PSK passwords

NOTE: THIS TUTORIAL IS ON NEED TO KNOW BASIS, STATEREPORTERS NEWS INC DOES NOT IN ANYWAY PROMOTE CYBERCRIME! The wireless networks are being deployed extensively...