Wayward Pines (Sci-Fi)

n2vfit4pooxhbctkqdqiA new TV show that is almost as good as LOST is Wayward Pines. Every episode makes you go wow and keeps your brain spinning. If you haven’t seen it, seriously this is a show that is epic and awesome and futuristic Hunger Gameish. Go to Amazon and watch it now! It’s currently on episode 7 and they come out every week. The year is also 4020 and normal humans no longer exist. Reminds me of The Truman Show.


Synology DS214play Server

So my hard drive had over 100GB of movie backups, and tv backups and I was slowly going.. I need a backup drive. After months of researching, testing, reading, and watching countless YouTube videos I discovered the Synology Ds214play. I use to have to leave my computer on and had an HDMI ran to my television and a wireless keyboard, now I can use my Roku 3 to connect to DSVIdeo and watch all my tv shows and movies with no problem. This version is for a lot of different video formats and does video trans-coding on the fly. If you don’t have a Roku player you can use a XMBC box, Raspberry PI, or simple DLNA then broadcast to television (smart tv) way. I learned this is def the way to go.. the only downside is there is no default encryption and you have to download third-party crap and it makes everything lag out. Hopefully a new version will support this and be just as fast.


You can buy it on amazon here for $359.99 and over a hundred 4-1/2 star reviews.

Favorite Network Tools

My favorite LIVE CD which utilizes most of the tools needed to perform network pennetration testing.

Favorite Android IP/network scanner. Quickly maps out a networks assigned IP addresses including MAC Addresses. If you have Android, I have used this tool countless times to discover local IP’s, phillips hue, network camera, etc.

If you want to know if you’ve been hacked, or currently have a remote host connected this is the tool to leave up on a seperate monitor. Will be sure to tell you active/passive connections and highlights then green red when connecting etc.

Want to watch your local traffic passing through the nodes? Wireshark will do it for ya! This tool is POWERFUL and very hard learning curve. If you want to watch your traffic down to the 1’s and 0’s this will do it. Check it out and read the guide!

Router Hardware 101

This is a great guide by lifehacker.com on Router Hardware, check it out here and for more of the guide hit their site up.

Know Your Network, Lesson 1: Router Hardware 101

 Router Basics

Your router is the glue that holds your home network together. It connects all your computers to one another, either through Ethernet cables or a wireless connection. A router is different than a modem: your modem connects you to the internet, while your router connects your computers to one another. When you hook up your router to the modem, however, you’re then able to share that internet connection with all of the computers on your network. Sometimes modems will come with routers built-in, but this isn’t always the case.

Devices that connect to your router—that is, the computers, tablets, smartphones, DVRs, game systems, and so on—are called clients. Each client on the network is given an IP address, which helps your router direct traffic. Clients within the network get a local IP address, while your modem gets a global IP address. Global IP addresses are like street addresses, while local IP addresses are like apartment numbers: one lets you find the building in relation to the rest of the world, while the other lets you find the specific location within the complex. These addresses make sure the right information from the outside world gets to the right computer on your network.

Read more

Galaxy Gear VR

Recently bought this to try out and take back but ended up keeping it. This is the future of technology no doubt. If you get the chance grab one of these. The possibilities are endless. Only cons of the first version are phone gets real hot and lenses get fogged. Other than that this thing is dope.

imageCost is around $199.99 but you can find em for around 150 used on eBay. You can also purchase defogger for the lenses and it will fix it for awhile.

Imagine the Magic School bus shrinking down and going through the blood vessels and your actually on board the bus. This will be the future of technology and education no doubt in my mind. INVEST.

Texas Rising (Tv Show)


Started watching this mini-series, while slow at some points it’s pretty legit and to know where all the Texas cities got their names is cool. Brenden Frasier and his Indian son is epic haha. Mummy! “He’s got 3 stexas-rising-cast-tcawinter15calps already, damn!”

If you haven’t seen it check it out, it’s intense and it’s FACT. It’s actually quite funny as well besides the fact they all got murdered at the Alamo and Goliad there are parts that are comic relieving. It would be sweet to have a house in the middle of the mountains.


How to Know if You’ve Been Hacked

Awesome guide/article from http://null-byte.wonderhowto.com by user:occupytheweb.

Why Hackers Want the Use of Your Computer

Although we are familiar with the idea that hackers might be seeking our credit card numbers, bank accounts, and identity, some hackers are simply seeking the use of your computer. By infecting thousands, even millions, of computers around the world, they can create what is called a “botnet.”

A botnet is simply a network of compromised computers controlled by a single command and control center. I estimate that 30 to 50% of all consumer-level computers are part of one botnet or another.

This botnet can be used for many seemingly innocuous activities and many more malicious ones. Botnets can be used to send spam, crack passwords, conduct distributed denial of service (DDoS) attacks, etc. In all cases, they are using system resources that are not available to you. You will likely detect your own system running sluggishly or erratically.

Let’s take a look at how we can detect if such a security breach has taken place on YOUR system.

Read more

How to PING a site, and test if it’s alive or responds.

To test a TCP/IP configuration by using the ping command

1. To quickly obtain the TCP/IP configuration of a computer, open Command Prompt, and then type ipconfig. From the display of the ipconfig command, ensure that the network adapter for the TCP/IP configuration you are testing is not in a Media disconnected state.

2. At the command prompt, ping the loopback address by typing ping

3. Ping the IP address of the computer.

4. Ping the IP address of the default gateway.

If the ping command fails, verify that the default gateway IP address is correct and that the gateway (router) is operational.

5. Ping the IP address of a remote host (a host that is on a different subnet).

If the ping command fails, verify that the remote host IP address is correct, that the remote host is operational, and that all of the gateways (routers) between this computer and the remote host are operational.

This is very useful to know when troubleshooting networks, one of the most basic procedures.


What is a VPN? Why should you use one

article by: lifehacker.com

What Is a VPN?

Put simply, a Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together over a public network—namely, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.

When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.

The most important thing you need to know about a VPN: It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes.

Whether the VPNs you’re familiar with are the ones offered by your school or business to help you work or stay connected when you’re traveling or the ones you pay to get you watch your favorite shows in another country as they air, they’re all doing the same thing. For much more detail on what VPNs are, how they work, and how they’re used.

Bitcoin FAQ

article by: bitcoin.org

Some things you need to know about Bitcoin

If you are about to explore Bitcoin, there are a few things you should know. Bitcoin lets you exchange money in a different way than with usual banks. As such, you should take time to inform yourself before using Bitcoin for any serious transaction. Bitcoin should be treated with the same care as your regular wallet, or even more in some cases!
IconSecuring your wallet

Securing your wallet
Like in real life, your wallet must be secured. Bitcoin makes it possible to transfer value anywhere in a very easy way and it allows you to be in control of your money. Such great features also come with great security concerns. At the same time, Bitcoin can provide very high levels of security if used correctly. Always remember that it is your responsibility to adopt good practices in order to protect your money.
IconBitcoin price is volatile

Bitcoin price is volatile
The price of a bitcoin can unpredictably increase or decrease over a short period of time due to its young economy, novel nature, and sometimes illiquid markets. Consequently, keeping your savings with Bitcoin is not recommended at this point. Bitcoin should be seen like a high risk asset, and you should never store money that you cannot afford to lose with Bitcoin.

Model of how it works:


1 2 3 4 5 6 8