Monday, June 25, 2007

The Dissection of a Rootkit


Security analysts have been predicting that kernel rootkits, which cloak their activity by replacing a portion of a program's software kernel with modified code, are expected to continue to grow in frequency in 2007...Story Here

How to Make a Killer Photo using 8 Simple Composition Rules



















Tutorial Here

Dr Quantum - Double Slit Experiment

Have you heard of Credit Triggers? You should.


They constantly monitor your
credit activity and if you start
to pay off your credit and are
getting back on your feet, they
notify the collection hounds and
let them have at you..Story Here

Lightning kills man beneath cloudless sky


A Dade landscaper died after
being struck by an unusual type
of lightning that's stronger, hotter,
lasts longer and strikes from clear
skies....Story Here

When Computers Attack


ANYONE who follows technology or military affairs has heard the predictions for more than a decade. Cyberwar is coming. Although the long-announced, long-awaited computer-based conflict has yet to occur, the forecast grows more ominous with every telling: an onslaught is brought by a warring nation, backed by its brains and computing resources; banks and other businesses in the enemy states are destroyed; governments grind to a halt; telephones disconnect; the microchip-controlled Tickle Me Elmos will be transformed into unstoppable killing machines...Story Here