Hacker (computer security)

From Wikipedia, the free encyclopedia.

Pages

Sunday, April 28, 2013

.I.T history

A history of information technology The history of information technology can be dated back to as early as 2600 BC when the Egyptians would write on the papyrus plant. It also thought that religious leaders in Mesopotamia kept the first books at this time, which is now southern Iraq. In more recent years the very first apple mac was released in 1984, IBM released the very first pc in 1981 and the then tiny company Microsoft produced...

HackYM4Multiple Account

Hacking Yahoo Messenger For Multiple Account Login: a) Open Registry Editor (regedit.exe) Click Start > Run and then type 'regedit' press enter. b) Then Look For- HKEY_CURRENT_ USER\Software\yahoo\ pager\Test. c) Then change this value of plural to like this- ―Plural‖=dword: 000000...

Delete An undeletable File

Delete An undeletable File: Open a Command Prompt window and leave it open. Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the Processes tab and End Process on Explorer.exe. Leave Task Manager open. Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in. At the command prompt type DEL <filename> where <filename> is the file you wish to delete. Go...

5Reasons WhyPCCrash

5 Reasons Why PC Crash: Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications." You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening? 1. Hardware...