8 Characteristics Of A Good Programmer
Monday, 22 December 2014
Finding a talented and experienced programmer is a tough task. With the constraint budgets, it becomes even tougher to find a decent programming staff that meets your expectations. The hiring process becomes more complex because screening the programmer by his skill set involves computer tests. Big companies offer large paycheques to lure talented programmers, it
- Published in Article, Programming
No Comments
5 Free Keyloggers to Record all your Keystrokes
Monday, 22 December 2014
Keylogger is basically a surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted. Sophistication may vary from one to another, however, keyloggers are an important part of ethical hacking domain and must be known for security specific reasons. 1. Kidlogger Kidlogger.net is a new generation of
- Published in Tricks & Hacks
Hacking a User’s Gmail Account
Sunday, 21 December 2014
While we don’t necessarily endorse hacking, it’s important that you know everything that goes along the hacking world to stay a step ahead of miscreants who clearly outnumber you in numbers as well as technology. Hacking a Gmail account is not something new these days, it’s readily achievable. Here’s how you can do it. 1.Using
- Published in Article
4 Secrets Wireless Hackers Don’t Want You to Know
Saturday, 20 December 2014
You’re using a wireless access point that has encryption so you’re safe, right? Wrong! Hackers want you to believe that you are protected so you will remain vulnerable to their attacks. Here are 4 things that wireless hackers hope you won’t find out, otherwise they might not be able to break into your network and/or
- Published in Networking
Connect Two Home Computers for File Sharing
Saturday, 20 December 2014
The simplest kind of home network contains exactly two computers. You can use this kind of network to share files, a printer or another peripheral device, and even an Internet connection. To connect two computers for sharing these and other network resources, consider the options described below. Connecting Two Computers Directly With Cable The traditional
- Published in Networking
What is Networking?
Saturday, 20 December 2014
What is (Computer) Networking? In the world of computers,networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. Area Networks> Networks can be categorized in several different ways. One approach defines the type of network
- Published in Networking
Top 10 Tools To Make Coding Simpler With Java
Saturday, 20 December 2014
ava is synonymous to a web developer’s professional life as this is such a programming language which any programmer can hardly avoid. Some people say Java is one of the most simple and powerful programming languages, being a pretty tough one too for some other people. But Java mistakes is something what no developer can
- Published in Programming
6 Hottest IT Skills For 2015
Friday, 19 December 2014
With the fast growing IT industry, the skill set required to get the job or promotion is changing too. Some IT skills are being outdated while some are still required. Today we have listed six such IT skills that you need to have to get the job in IT industry in 2015. 1. Cloud All
- Published in Article
Nigerian Government sets up ICT content development office
Friday, 19 December 2014
The Nigerian Government has revealed that it has concluded plans to establish the Office of Nigerian Content Development in ICT. According to the Government, the office is expected to promote local IT products and services in Nigeria as well as across the globe. President Goodluck Jonathan explained to media that the Office would ensure judicious
- Published in ICT News
NIGERIA PLANNING TO PROTECT ICT INFRASTRUCTURE
Friday, 19 December 2014
Nigeria’s ICT minister Omobola Johnson, who spoke during an appraisal of her ministry’s 2014 score card in Abuja, has stated that a draft legislation, which will help protect critical national ICT infrastructure from wanton destruction by vandals will soon be presented to the National Assembly. According to Johnson, critical ICT infrastructure requires huge resources to procure,
- Published in ICT News