COMPUTER SCIENCE

Computer Science

Howdy! 🙂

This is a section of the blog to comment on hardware, firmware, mid-ware, freeware, shareware, malware, spyware, exploits, rootkits, keyloggers, screencapturers, code injection, physing, zombies, drones, DOS atacks, forcebrute atacks, man-in-the-middle, mirroring, redirection, proxies, TOR net type sites, password stealing… open-code, proprietary code, software, low-level, assembly, interpreters, compilers, high level programming, object-oriented programming, static, dynamic, structured, unstructured, hierarchical, non-hierarchical, managed, unmanaged, CMSs, SEO, PPC, SEM, RISC, CISC, fault tolerant, optimized, unoptimized, syntax restricted, syntax unrestricted, try catch, (no, no, don’t try, don’t catch), decode, functions, procedures, methods, members, values, variables, constants, databases, vulnerabilities…

Hijackthis!!!!!!

image

Abacus Central Process Unit powered model with antivirus included.

I have found some useful links :

Reverse DNS Lookup & Other Network Tools.
KLOTH.NET
myiptest IP Address Lookup
tcpiputils Online Investigation Tool

Check the ‘computer science’ categories and tags to see related posts.

Break;

EOF;

Home

Click below (you can make a comment also through Google +)

Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s