Got a tip? Let us know


How to permanently delete files

May 13,2017

“Delete does not mean delete!” And if the aforementioned statement leaves you in a self-quagmire, upon reading this article, you will unanimously join me in hallowing the quoted stateme....

Read More

Email marketing

May 08,2017

Businesses do marketing campaigns in order to advertise themselves. In the golden age of telephony, businesses had to call customers (be it prospective or existing) one on one just to market themse....

Read More

Phishing attacks part2-Web spoofing

May 06,2017

A complete phishing attack involves three roles of phishers. To begin with, as discussed in the first article, mailers send out a large number of scam emails (usually through infected computers con....

Read More

Cloud computing part2-Inside the cloud

May 03,2017

I would begin this part two by giving you a recap of what cloud computing is. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing....

Read More

Phishing attacks-part 1

May 01,2017

General introduction

If you appreciate that a humble human can become a hot-blooded witch, then you know the dangers of humble appeals. Often soothing by nature simply because, most of them a....

Read More