You might be curious about what new gadgets are coming out in the future. Here are some predictions concerning the state of mobile technology in the year 2015.
Articles by Miguel Leiva-Gomez
In-app purchases has become a popular way for developers to more money from their apps, and is easy for kids to do so with a single click. Here is how you can prevent your kids from making in-app purchases.
Wonder how those “fake” cellphone towers that were spying on all the information we send and receive work? It’s time we answered these questions!
Do you know exactly the specification of the hardware used in your tablet? Here are some examples of the lack of information on certain hardware modules.
Every device seems to have a set of cryptic symbols on them. In this piece, you will learn about the hieroglyphs on the device and what they mean.
Between backing up your files physically in external hard disk and the cloud, which one is better? Let’s find out in this article.
The growing presence of screens in our lives has transformed their safety into an issue that some are taking so seriously, they are calling it a crisis.
Read this first if you are getting a new mouse and wonder if laser mice is worth the extra cost.
The general impression of Windows 10 is mostly good. What makes Windows 10 so special that it’s starting to change the public’s opinion of Microsoft, if ever so slightly?
Here are some questions (and answers) about video card specifications that don’t seem to be fully explained in terms everyone can understand on the web.
YouTube has added for videos to stream at 60 frames per second as opposed to its usual 30. Is this something we should be excited about?
Do you have difficulties understanding the specifications on a graphic card data sheet? Learn about the obscure GPU specification here.
If you really want to be anonymous on the web, here are a few things you got to know and also learn a couple of tenets.
Google has just discovered a POODLE exploit that can affect millions of browsers worldwide at this moment. Let’s see how you can protect yourself from POODLE exploit.
You may understand what social engineering is, but are not sure how to properly defence against it. Here are a couple of advices for you.
Other than WPA, MAC filtering is another feature to enhance the security of your WiFi router. Learn why this little setting is insurmountably powerful.
There were news that the FBI was able to spy on people’s webcams without them knowing. How is this possible? Let find out how this hack was done.
In the world of gaming, there has been a recent move by major publishers to release their games with 64-bit support. Why is this so? Let check it out.
One way to encrypt your files is via the public/private key. Let’s take a look at the public key encryption concept to understand how it can protect you.
Nowadays, many devices come with an IP code and can withstand harsh conditions. Let’s see how the IP code system works and what you can do with your device.