Skip to content
Home » Archives for 2020 » Page 2

2020

My experience with 4 free mainstream linux distros for newbs

(Warning, lots of personal experience and rant, all images came from wikimedia/wikipedia except for ubuntu which as usual relies on the individual websites for resources – seeklogo) Here i’ll discuss my experience of years of using different linux distros specifically for newbs who want to start using linux and which one to pick. My main… Read More »My experience with 4 free mainstream linux distros for newbs

Cryptocurrency is usually a new investment opportunity for many.

Where to get Cryptocurrency Cryptocurrency is usually a new investment opportunity for many. On-line users, changelly review particularly, can make use of the Internet to purchase and sell virtual currencies like Bitcoin. Despite the fact that the majority of Bitcoin exchanges are legitimate, you may still would like to study on just before you buy… Read More »Cryptocurrency is usually a new investment opportunity for many.

How to optimise your network/webste/application during these high traffic pandemic times

Many ISPs dont have much access to international bandwidths too, wifi and mobile shared architectureWith the pandemic, most people are staying at home and using the internet more. During these times, backbones get taxed a lot more and exposes a lot of ISP’s bad infrastructure and setup. There are many ways to optimise traffic but… Read More »How to optimise your network/webste/application during these high traffic pandemic times

To a new year 2020

Although late I would like to wish happy new year. Ive recently started a new job with really bad hours so my time to write is severely limited. I would like to wish happy new year and thank the Indonesians for hacking us a few times last year. They provided us an invaluable service for… Read More »To a new year 2020

How hackers cheat (analysis)

How they cheat (analysis) Memory manipulation and library injection – reading and writing to a memory Common base Dedicated application / driver Direct memory manipulation Abusing gameplay script Patching the data and executable Gameplay exploits Bypassing the protection Finding the right offsets Finding execution methods for gameplay script Combination with exploits and gameplay logic What… Read More »How hackers cheat (analysis)