Guide to Mechanical Keyboards and Switches

Awesome guide I found on mechanical keyboards by Lifehacker and wanted to show you guys, it’s pretty dope if you know the difference, and if you play games, type a lot you should def know the difference between keyboards.

Mechanical keyboards, or keyboards with full, individual switches under every key, have exploded in popularity recently, although the technology inside is as old as the keyboard itself. There’s really no substitute for that solid, clicking sensation under your fingers as you type, and the satisfying sound each key makes when you press it. However, choosing the best mechanical keyboard can be tricky, since there are dozens of models, different switch types, and more popping up every day. Here’s how to tell them all apart and pick the right one for you.

Read more

9 Epic computer tricks that are awesome

1. Don’t use Ctrl+Alt+Del!

Use control+shift+escape instead! It goes directly to the task manager!


2. Tired of that boring GIF?

Are you feeling really sick of watching that boring GIF go again and again? Worry not! Press Escape to halt animated GIFs that are distracting. Yeah, Graphic designers hate me!

3. A site that has right-click disabled? and you can’t steal stuff?

You have a major project to submit tomorrow and you finally found the site you dreamed of! But It has it’s right-click disabled and you can’t copy stuff from there? Don’t you worry child!


Putting the following into a favorite/shortcut on the toolbar re-enables browser right click.

4. A simple way to clear your cache?

CTRL + SHIFT + R = Clear cache and refresh the page. Child’s play! Isn’t it?

Read more

I want to browse anonymously and leave no trace online..

Want to browse a computer/network/internet without leaving a trace? Well get like James Bond and become elite, check out this post by


In this post, we’ll walk through how to use a USB stick or DVD to anonymize, encrypt, and hide everything you do on a computer no matter where you are. When we say “browse without leaving a trace”, we truly mean it. Using the Linux-based, live-boot operating system Tails (The Amnesiac Incognito Live System), you can use any computer anywhere without anyone knowing you were ever on it. Tails is a portable operating system with all the security bells and whistles you’ll ever need already installed on it. You can install Tails on one of your many dust-gathering USB drives or a DVD. We’ll show you how to set up your own portable boot disc in the second section, but let’s start by taking a look at what you get with Tails. Hit Read More

Read more

Favorite Network Tools

My favorite LIVE CD which utilizes most of the tools needed to perform network pennetration testing.

Favorite Android IP/network scanner. Quickly maps out a networks assigned IP addresses including MAC Addresses. If you have Android, I have used this tool countless times to discover local IP’s, phillips hue, network camera, etc.

If you want to know if you’ve been hacked, or currently have a remote host connected this is the tool to leave up on a seperate monitor. Will be sure to tell you active/passive connections and highlights then green red when connecting etc.

Want to watch your local traffic passing through the nodes? Wireshark will do it for ya! This tool is POWERFUL and very hard learning curve. If you want to watch your traffic down to the 1’s and 0’s this will do it. Check it out and read the guide!

Router Hardware 101

This is a great guide by on Router Hardware, check it out here and for more of the guide hit their site up.

Know Your Network, Lesson 1: Router Hardware 101

 Router Basics

Your router is the glue that holds your home network together. It connects all your computers to one another, either through Ethernet cables or a wireless connection. A router is different than a modem: your modem connects you to the internet, while your router connects your computers to one another. When you hook up your router to the modem, however, you’re then able to share that internet connection with all of the computers on your network. Sometimes modems will come with routers built-in, but this isn’t always the case.

Devices that connect to your router—that is, the computers, tablets, smartphones, DVRs, game systems, and so on—are called clients. Each client on the network is given an IP address, which helps your router direct traffic. Clients within the network get a local IP address, while your modem gets a global IP address. Global IP addresses are like street addresses, while local IP addresses are like apartment numbers: one lets you find the building in relation to the rest of the world, while the other lets you find the specific location within the complex. These addresses make sure the right information from the outside world gets to the right computer on your network.

Read more

How to PING a site, and test if it’s alive or responds.

To test a TCP/IP configuration by using the ping command

1. To quickly obtain the TCP/IP configuration of a computer, open Command Prompt, and then type ipconfig. From the display of the ipconfig command, ensure that the network adapter for the TCP/IP configuration you are testing is not in a Media disconnected state.

2. At the command prompt, ping the loopback address by typing ping

3. Ping the IP address of the computer.

4. Ping the IP address of the default gateway.

If the ping command fails, verify that the default gateway IP address is correct and that the gateway (router) is operational.

5. Ping the IP address of a remote host (a host that is on a different subnet).

If the ping command fails, verify that the remote host IP address is correct, that the remote host is operational, and that all of the gateways (routers) between this computer and the remote host are operational.

This is very useful to know when troubleshooting networks, one of the most basic procedures.


What is a VPN? Why should you use one

article by:

What Is a VPN?

Put simply, a Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together over a public network—namely, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.

When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.

The most important thing you need to know about a VPN: It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes.

Whether the VPNs you’re familiar with are the ones offered by your school or business to help you work or stay connected when you’re traveling or the ones you pay to get you watch your favorite shows in another country as they air, they’re all doing the same thing. For much more detail on what VPNs are, how they work, and how they’re used.

Bitcoin FAQ

article by:

Some things you need to know about Bitcoin

If you are about to explore Bitcoin, there are a few things you should know. Bitcoin lets you exchange money in a different way than with usual banks. As such, you should take time to inform yourself before using Bitcoin for any serious transaction. Bitcoin should be treated with the same care as your regular wallet, or even more in some cases!
IconSecuring your wallet

Securing your wallet
Like in real life, your wallet must be secured. Bitcoin makes it possible to transfer value anywhere in a very easy way and it allows you to be in control of your money. Such great features also come with great security concerns. At the same time, Bitcoin can provide very high levels of security if used correctly. Always remember that it is your responsibility to adopt good practices in order to protect your money.
IconBitcoin price is volatile

Bitcoin price is volatile
The price of a bitcoin can unpredictably increase or decrease over a short period of time due to its young economy, novel nature, and sometimes illiquid markets. Consequently, keeping your savings with Bitcoin is not recommended at this point. Bitcoin should be seen like a high risk asset, and you should never store money that you cannot afford to lose with Bitcoin.

Model of how it works:


Blue Stacks Android Emulator

Cool Android Emulator program I discovered, if you get tired of checking your phone while your on the PC you can pull up Bluestacks and run all your apps/programs/pokemon/instagram you name it while you surf the web. You can use Kies to respond to texts as well if you wish.

You can download it here.

Just download & run it, then login with your normal gmail account and BAM your ready for android emulation action. You can also search google for android APK’s and run them if you want that are not locally sourced or use the own android search function. It runs 4.4 kitkat in Tablet form.


What is HTTP/2?


HTTP, or Hypertext Transfer Protocol, is one of the web standards familiar to most as the http:// at the beginning of a web address. HTTP protocol governs the connections between a user’s browser and the server hosting a website, invented by the father of the web Sir Tim Berners-Lee.

HTTP/2 is simply an update to the protocol, but is really a huge deal because the last time the HTTP specification was updated back in 1999. This means the HTTP/2 will be the first major update to the HTTP standard over the last 16 years, marking the largest change since 1999 when HTTP 1.1 was adopted that underpins the World Wide Web as we know it today.
Read more

1 2