Latest Posts

</TECHNOLOGY.MADE.EASY>

CEO/Executive Contact List

This is a continuously updated list compiled of emails belonging to the Chief Executive Officers and executive members of some of the most popular consumer-based businesses in the U.S.

WordPress vs Joomla vs Drupal

When it comes to website hosting or building, there are countless options. I’d imagine anyone reading this article would know this. There are almost an estimated 2 billion websites online today (Indexed by search engines). Content Management Systems also known for short as CMS are the reason this is possible. As the number of websites…
Read more

cover photo

How to Hack Security Cameras with Google

Gaining access to security and public cams may seem like a daunting task. In normal cases it would be and breaking in to a high end, strongly secured cam network is very difficult. However, because of the all mighty Google most people don’t have to do any hard work at all. Step 1 Many online…
Read more

cover photo

WordPress vs Weebly vs Wix vs Squarespace

Everyone needs a website these days… the question is who to make your website with? I’ll be going over the four top builders in the world to help you do this. WordPress Features Integrated Blogging WordPress undoubtedly has the most integrated and fully featured blogging system to date. That is how the CMS started after…
Read more

featured image

The Top 12 Things to Ask Siri In 2019

While the battle between the top AI assistants Siri, Google Now, and Cortana is without a doubt becoming less necessary due to the innovative yet similar features being introduced on our platforms, there is still no doubt that when it comes to humor, Siri has the upper hand. Most iPhone and iPad owners are well…
Read more

featured image

How to Spoof a DNS

A Domain Name System is a service which translates IP address to domain name and domain name to IP address. DNS spoofing is when a hacker redirects a website user to a malicious website. In this tutorial I will be showing you how to perform one of these attacks and redirect a Facebook user to a fake website.

featured image

How to Hack an FTP Login

FTP open ports are very interesting targets for hackers. Even though very little are actually seen open today there are still quite a few unsecured on the net and if you are one of those admins, you may find yourself in a world of trouble.

featured image

How to Hack Home Routers

In this quick tutorial we are going to see how black hats can hack random routers over the Internet and access remote desktop connections using default credentials.

featured image

How to Hijack a Session

Session Hijacking, also known as cookie hijacking is the exploitation of a valid computer session. Sometimes also called a session key, the purpose is to gain unauthorized access to information or services in a computer system.

featured image

The Most Useful Sites for Browser Testing

Here is a list of the most useful and trusted websites for browser security testing.