How to Find an Invisible User on Yahoo! Messenger
Visit Invisible-scanner.com type in a Yahoo! ID and their status will be revealed. Even if the user has chosen to be invisible
Share Videos in IM...
Many times you face this situation; you want to hide some personal data from the other person using your computer. However most of the person uses any software for that which can be troublesome...
Mi ni mtumiaji wa huduma ya interneti kwa kutumia mitandao kama celtel na voda. nime observe madhara ya virusi vinavyopatikana kwenye windows jinsi gani vinaweza vikakuathiri katika kukumalizia...
Nchi nyingi za afrika ikiwemo tanzania hazijawahi kupita katika information age wala industrial age ya viwanda yaani kuunda viwanda vyake na mambo yake ya technologia vitu vyote tunavyovitumia...
'The Grid' Could Soon Make the Internet Obsolete
The Internet could soon be made obsolete. The scientists who pioneered it have now built a lightning-fast replacement capable of downloading...
This time, Microsofts opponent is Google, a familiar foe.
Today, Google will release a free Web browser called Chrome that the company said would challenge Microsofts Internet Explorer, as...
Once a hacker does gain access to your computer, he will purposefully leave a little file or two, that will give him easy access in the future. These files are usually referred to as "trojans."...
I am a huge Google advocate. I love their products so much that I use almost every one of them on a fairly regular basis. Much of my computer based productivity is performed online via Googles...
Using Google for searching ebooks
Google has some fantastic potential for you to find whatever you are after on the internet.
To search for a book / program / file perhaps try the following...
There are many software downloads available from all around the internet. What you want to watch for when downloading software from the internet is that your are being safe, getting the right...
What Japan lacks in geographic size, it more than makes up for in Internet attack traffic.
Japan accounted for 30% of all attack traffic monitored worldwide for the second quarter of 2008...
Folks, this' an interesting article I thought we've to share. Read below:
Tuesday, September 09, 2008
Our brains are littered with passwords and alphanumeric combinations that span all levels...
Something dodgy happening,
Seems peeps are mailing me and I dont get those mails to my hotmail account. Or when I send mails, they dont reach other peeps accounts or will take days to reach...
'Titan Rain' came from Chinese servers, says security expert
28 Jul 2008
China has been accused of sponsoring cyber-terrorism at a conference organised by the UK Home Office...
Jamani kama kuna mtu aliye fanikisha zoezi la ku-upgrade from 1.5.x to 1.5.6 naomba anisaidie maana nimekwama nilivyo soma documents zao hao joomla ni process moja ambayo ngumu alafu...
Habari za kazi wote kwa ujumla jamani....Nilikuwa naombeni mtu yoyote mwenye kufahamu kama anaweza kunielewesha nifanye nini ili niweze kusolve hii problem....Juzi nilikuwa nataka niinstall...
JamiiForums uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.