Skip to content

Security and tech news with Xploiter.com

Be Safe, Be Secure

Month: December 2009

Posted on December 9, 2009

Getting ready to release iqdes…

Getting ready to release iqdesign.co.uk – new iphone, iTouch, iPod, Blackberry etc designer cases – watch this space….

Posted on December 9, 2009

Getting ready for last day a P…

Getting ready for last day a Photolink, been a good experience, now onto my next role which is erm, dur, hmm ???

Posted on December 8, 2009

Ooops – SimonAntony.co.uk serv…

Ooops – SimonAntony.co.uk server just run out of disk space, silly me forgot to delete old backups!!!!

Posted on December 7, 2009

After 24 hours of a severe foo…

After 24 hours of a severe food poisoning outbreak, I’m now starting to recover enough to get some work done!

Posted on December 6, 2009

I just got Voice Candy for Mac…

I just got Voice Candy for Mac for free from tap tap tap. They’re celebrating launching Voices on the iPhone http://bit.ly/i56Un

Posted on December 2, 2009

#Google Wave – seems i'm not t…

#Google Wave – seems i’m not the only one that doesnt know what to use it for – how do you use yours? Clean answers please 🙂

Posted on December 2, 2009

is now looking for job opportu…

is now looking for job opportunities – Available immed for interview – dotnet development, photography, photoshop, interim management etc

Posted on December 2, 2009

That is i'm available from nex…

That is i’m available from next week 🙂

Posted on December 2, 2009

I'll be available for any free…

I’ll be available for any freelance dotnet, development, design, infrastructure work etc on freelance/contract basis – anyone need anything?

Posts navigation

Previous page Page 1 Page 2

Recent Posts

  • Health trust rapped on illegal use of patient data in Google AI deal
  • GDPR: who needs to hire a data protection officer?
  • News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online
  • Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools
  • Court Blocks EPA Effort To Suspend Obama-Era Methane Rule

Recent Comments

  • Eric Plambeck on An Assembly Language Primer(C) 1983 by David Whitman
  • Frank van Bommel on Delphi Tips
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • sen on URL Rewriting in Asp.net using URLRewriter

Archives

  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • September 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • October 2010
  • September 2010
  • August 2010
  • March 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008

Categories

  • 2FA
  • angler
  • car hacking
  • certificate authorities
  • chrome
  • Cisco systems
  • Cisco Telepresence
  • Cloud Security
  • Critical Infrastructure
  • Cryptography
  • DDoS
  • DMCA
  • exploit kit
  • Facebook
  • Gmail
  • google
  • Google Transparency Report
  • Government
  • HackerOne
  • Hacks
  • HTTPS
  • ICS
  • IoT
  • IoT botnet
  • IoT devices
  • IoT security
  • IT
  • Javascript
  • Kevin Beaumont
  • Locky
  • malicious JavaScript
  • Malware
  • Microsoft
  • Mirai
  • Mirai botnet
  • Mirai malware
  • Mobile Security
  • mobile spyware
  • Neutrino
  • Nuclear
  • open source software
  • Pegasus
  • Privacy
  • ransomware
  • RIG Exploit Kit
  • SCADA
  • Schneider Electric
  • Science
  • Spyware
  • SSL
  • Uncategorised
  • Uncategorized
  • Vulnerabilities
  • Web Security
  • zero day vulnerability

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino ffortino@svn.net Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino ffortino@svn.net Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Privacy Policy
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)
Privacy Policy Proudly powered by WordPress
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]