NSA CODED MESSAGES THROUGH TWITTER

>NSA.GOV used Twitter to send coded messages to determined receivers in the year 2017. These messages were used to communicate with a wannabe Russian Agent that promised them to provide information and data about..
Continue reading “NSA CODED MESSAGES THROUGH TWITTER”

THAT’S WHY VIDEO GAMES WERE/ARE SO IMPORTANT

There Is A Possibility That We Are Living In A Computer Simulation?
Yes, there is. Therefore Video gaming matters like philosophy or even religion itself.

Continue reading “THAT’S WHY VIDEO GAMES WERE/ARE SO IMPORTANT”

CYBERPUNK WATCH DOGS

CYBERPUNK WATCH DOGS

>SOURCE.

Ubisoft has just rounded off its E3 press conference with the announcement of Watch Dogs, a cyberpunk third-person action game which focuses on controlling connected networks and personal data. The reveal resulted in whoops and cheers, along with a standing ovation and a worldwide trending on Twitter.

The game focuses on a chap called Aiden Pearce, who goes hunting for one Joseph Demarco in a crowded city nightclub. To muscle his way in, he uses technological weapons rather than traditional firearms – signal jammers to knacker metal detectors, traffic signal blockers to cause traffic jams in the street, and social networking scanners to read personal data from NPCs.

Continue reading “CYBERPUNK WATCH DOGS”

ENIGMA MACHINE RESOURCES

ENIGMA MACHINE RESOURCES :

ENIGMA PRO :

(with PASSWORD support!)
EnigmaInside

You can find description and other
technical information about ENIGMA machine here:

  Source

==============================================================

 How to encrypt the message using this machine:

  1. Press “Reset Enigma” button.
  2. Make sure “Encrypt” option is selected.
  3. Type a message using the Virtual Keyboard.

4. Write down the result string (use paper & pencil).

Continue reading “ENIGMA MACHINE RESOURCES”

CyberCrimes without ID (X – 2008)

at

CyberCrimes without ID (X – 2008)

SOURCE-Full article.

[..] The best criminal hacker is the one that isn’t caught—or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about).

The most nefarious and crafty criminals are the ones who operate completely under the radar. In the computing world security breaches happen all the time, and in the best cases the offenders get tracked down by the FBI or some other law enforcement agency.
But it’s the ones who go uncaught and unidentified (those who we didn’t highlight in our Cyber Crime Hall Fame that are actually the best. Attempting to cover your tracks is Law-Breaking 101; being able to effectively do so, that’s another story altogether.
When a major cyber crime remains unsolved, though, it probably also means that those of us outside the world of tech crime solving may never even know the crime occurred.
These are some of the top headline-worthy highlights in the world of unsolved computing crime—cases in which the only information available is the ruin left in their wake.

Continue reading “CyberCrimes without ID (X – 2008)”

Do NOT follow this link or you will be banned from the site!
%d bloggers like this: