AlHaddad Dana

12 Flips | 1 Magazine | 19 Likes | 1 Following | 1 Follower | @DAlHaddad | Stay true, stay you.

Researchers build new Tor client called 'Astoria' to evade NSA snooping

Astoria, a new Tor anonymiser network client built by Researchers specifically to evade NSA snooping<p>It has become very hard to keep internet …

Tessel 2, A $35 Linux Computer That’s Truly Open Source

We’ve seen the first version of the Tessel a few years ago, and it’s still an interesting board: an ARM Cortex-M3 running at 180MHz, WiFi, 32 Megs of …

Linux

How to Remove Trojan.Win32.Cosmu.aigh

<b>How to Uninstall Trojan.Win32.Cosmu.aigh of windows computer actually:</b><p><b>Trojan.Win32.Cosmu.aigh is one of the Trojan horse program that nasty install a</b> …

How to Quickly Transfer Your Files and Settings to a New PC (or Mac)

Migrating your files, settings, and programs to a new PC can be a little intimidating, especially if you’re not completely organized. These tools and …

Software Update Home: Trojan Killer 2.2.6.6 For Windows

<b>Trojan Killer 2.2.6.6 For Windows</b><p><b>Trojan Killer 2.2.6.6 For Windows Latest Version Free Download</b><p><b>March 08, 2015-</b> Trojan Killer Additionally, alas, …

How to Build Your Own Computer

Introduction: How to Build Your Own Computer<p>About: I'm a really open person so ask away if you wanna know anything :) More About michael.horjus »<p>The …

Raspberry Pi

How to install Jenkins in Ubuntu and Centos

About Jenkins<p>From <b>Wikipedia</b>,<p><b>Jenkins</b> is an open source continuous integration tool written in Java. The project was forked from Hudson after a dispute …

DevOps

Which VPN Providers Take Your Anonymity Seriously?

By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored.<p>To prevent their …

Privacy

6 Ways You Can Protect Yourself From Hacking | Inc.com

Technology has infiltrated lives as never imagined, and the more you interact on the web and through mobile, the more at risk you are for some sort of data hacking intrusion. There are lots of products and services that will offer some sort of protection but it does feel like an ongoing game of …

Information Systems

'I'm A Boxer' Video Is A Powerful Response To Sexism In Sports

"Don't call me a female boxer. I'm a boxer."<p>These are the words spoken by a young athlete, who, like many girls, wants an equal playing field when it comes to sports.<p>In a powerful commercial made by Everlast, "I'm a Boxer" addresses the sexism faced by women in athletics every day. "I imagine a …

Why the UFC is treating its female fighters better than (almost) any other sport

It’s not just the money – Ultimate Fighting Championship has appreciated that women aren’t good fighters considering their gender. They’re simply …