The Future of Ultra-Fast Internet Speeds

Internet speeds have come a long ways over the years. The days of using unreliable (and annoyingly loud) dial-up modems with a max speed of just 44.8 kbit/s are a distant memory. Now, families can enjoy broadband speeds with cable modems, DSL and even satellites. But there's a world of possibilities on the horizon, with Internet technology continuing to evolve with each passing year. Google Fiber Google is currently working on a new fiber-optics broadband system. Rightfully called Google Fiber, it delivers top speeds of 1 Gbit/s, which is about 100 times faster than current broadband technology. Assuming these numbers...


Continue reading...

2 Theoretical Ways To Travel In Time

The concept of time travel is something that's intrigued scientists, astronomers, philosophers, and cultures from across the world for centuries. From H.G. Wells' classic novel The Time Machine to modern-day shows like Dr. Who, it's human nature to dream of traveling in time. While some people may disregard it as science fiction, there are actually two sound theories for traveling in time. 2 Ways To Theoretically Travel In Time Method #1) Velocity Time Travel The first method we're going to discuss is velocity time travel, which states that a person's internal clock ticks slower when he or she travels at...


Continue reading...

Apple Spying on it's Customers; Is Nothing Sacred?

Privacy is one of the lead growing concerns in our society today. Apple doesn't seem to be helping (not surprised on that one). With the release of Apple's OSX Yosemite comes the deceptive "Spotlight". What is this? Well why not take Apple's answer for what it is: When you use Spotlight, your search queries, the Spotlight Suggestions you select, and related usage data will be sent to Apple. Search results found on your Mac will not be sent. If you have Location Services on your Mac turned on, when you make a search query to Spotlight the location of your Mac...


Continue reading...

Hacking and the Power of Social Engineering

You may think of a hacker as some social reject sitting behind a computer screen with green numbers against a black background flying through a Terminal. That's the stereotype, which as usual is as far from the truth as ever could be. On the contrary, actually conversing with human beings is far from subjecting oneself to no contact. One of the most useful and effective tools for hackers is Social Engineering; human manipulation. Essentially, it is getting a human psyche to get them to do what you want them to. Ever get an email from a Nigerian Prince? Won an...


Continue reading...

How does TOR Work?

So now you know what TOR can be used for, and how you can use it. But how, exactly, does TOR work? Well, it's complicated. At the beginning, TOR was not meant for widespread consumer use. Instead, it was created as an onion routing project for the U.S Naval Research Laboratory. Designed for he U.S Navy, it was meant for keeping government communication anonymous. Did it stay that way? Definitely not. Today, TOR is used by many different people. Anyone looking for anonymization of their internet identity. This includes the Military, Journalists, Law Enforcement, Activists, Hackers, Crackers, Script Kiddies, Criminals, and...


Continue reading...