Hack Like a Pro: How to Remotely Grab Encrypted Passwords from a Compromised Computer « Null Byte
How Hackers Hack - Passwords, WiFi and Computer from Android Phone
10 Unternehmen, die aus dem Internet of things Geld machen
[DastardlyLabs] saw a video about converting a PS/2 keyboard to Bluetooth and realized he didn't have any PS/2 keyboards anymore. So he pulled the same trick with a USB keyboard. Along the way, he mad...
FREE GUIDE-->Really Private Browsing: An Unofficial User’s Guide to Tor Really Private Browsing by Andre Infante @ MakeUseOf @ http://www.makeuseof.com/pages/really-private-browsing-an-unofficial-users-guide-to-tor?utm_campaign=newsletter&utm_source=2012-11-06
Computer Repair Tools That I Can’t Live Without (Part 10.4: Utilities On My USB Flash Drive)