robot

China To Replace 90% Of Human Workers With Robots

Businesses in China have reported seeing a 250% increase in productivity after replacing over 90% of the workforce with robots. Following a factory in Dongguan...

READ SCRATCHED CD USING BADCOPY WITH KEY

Having problem with scratch cd Computer Getting hanged when a scratch CD is inserted Having important data on CD which become unreadable due to...

Botnets Working Techniques And its Commands

A botnet is a collection of compromised computers, each of which is known as a 'bot', connected to the Internet. When a computer...
NCC

Nigerian Communications Commission Equip Police IT Unit oyo

(VON) The Nigerian Communications Commission (NCC) in Ibadan has donated computer accessories to the Nigeria Police Force, Oyo, to strengthen the command’s intelligence and...

Beasts of 2017,Nokia rivals: 6GB RAM, 2K screen, Hasselblad sensor

With 6GB RAM, Hasselblad sensor and more, 5 smartphones below would be tough Nokia 2017 rivals. Let’s read on and have a look at...
Dr Isa Ali Ibrahim (Pantami)

NITDA To Facilitate eLearning in French Language Village

The Director General National Information Technology Development Agency (NITDA), Dr Isa Ali Ibrahim (Pantami) reaffirms his support for the facilitation of eLearning, and project...

Nigerian Refineries To Work Full Blast In 2017 – NNPC Confirms

The Nigerian National Petroleum Corporation, NNPC, said it would embark on a comprehensive rehabilitation of the country’s three refineries located in Port Harcourt, Warri...

Basic Website Hacking Tutorial for beginners

Note: I believe you have some basic knowledge of HTML and PHP :) Intended for educational purpose only... SQL Injection SQL injection is the act of injection...
battery

AMAZING! SCIENTIST CREATES BATTERY THAT CAN POWER SMARTPHONES FOR 12 YEARS WITHOUT RECHARGING

A scientist has allegedly designed a stunning new kind of batteries that can unbelievably power smartphones for several years at a time. Vladislav Kiselev and...

How to prevent your website from SQL Injection vulnerability

MySQL Injection is a type of attack where an end user may hack your database from his browser itself. Comprehending this article might require...

A to Z linux commands

Here are some linux commands for you so you can make your hands more and more dirty with ubuntu terminal. mkisofs Create an hybrid ISO9660/JOLIET/HFS...

SIX Ways to Protect Your Blog from being Hacked

Six ways compiled to help protect your blog from being hacked. 1. Have Strong Passwords, and Change them Regularly- The first step you should take to...