tech
-
The Dark Web and The Deep Web: The Nether Regions of The Internet
by: COMMANDER ENTERPRISE There are two types of Internet users they say: the typical user who grazes what seems to be just the mainstream, superficial (read: safe, above-level) surfaces of…
-
Top Ten ANCIENT Computer Tech from the 90s! Part 2
Phased out and for good, or not? (Part II) by COMMANDER ENTERPRISE (part 1 here) It’s easy to just take for granted all the awesome technology and everyday gadgets that…
-
Top Ten ANCIENT Computer Tech from the 90s! Part 1
by COMMANDER ENTERPRISE It’s easy to just take for granted all the awesome technology and everyday gadgets that we have today, with smartphones, broadband internet, fibre internet, NBN and the…
-
The Anatomy of a Malware Infection
by: COMMANDER ENTERPRISEgraphics by: dixiewhiskey design studios Any random smartphone, tablet or personal computer can become malware-infected through different, unassuming backdoors and forced entrances to the device. This anomalous, malicious…
-
Without A Trace: Going Incognito on Old Phones
by COMMANDER ENTERPRISE Smartphones and surveillance are two common paired themes we all find in movies, pop culture and even the news sometimes; anytime the bad guys mistakenly use their…
-
U2 and Bloatware: Get off my phone!
by: COMMANDER ENTERPRISE Pre-installed apps, bloatware and uh, U2 It’s always an exciting time when one gets a new smartphone, phablet or tablet, because aside from being a great looking,…











