Jump to content

Stanvard

Member
  • Posts

    530
  • Joined

  • Last visited

Awards

Contact Methods

  • Twitter
    @Stanvard1

Profile Information

  • Gender
    Not Telling
  • Location
    The United States of Canadia
  • Interests
    Many Things
  • Biography
    Probably the only person on earth who owns 3 battery banks
  • Occupation
    Do-er of Many Things
  • Member title
    Friends? WHAT ARE THOSE?!?!

System

  • CPU
    i5 4690k
  • Motherboard
    Asus Z97-A (slightly Plasti Dipped)
  • RAM
    HyperX Fury 16GB (Blue)
  • GPU
    LMG Edition Gigabyte G1 GTX 980
  • Case
    NZXT H440 (slightly Plasti Dipped)
  • Storage
    Crucial MX100 128GB - WD Red 1TB
  • PSU
    EVGA G2 850W
  • Display(s)
    Asus PB278Q
  • Cooling
    Be Quiet Dark Rock 3
  • Keyboard
    Filco Majestouch 2 Cherry MX Blue
  • Mouse
    Corsair M65 (White)
  • Sound
    Audio Technica ATH-M50 | Jaybird Bluebuds X
  • Operating System
    Windows 8.1

Recent Profile Visitors

10,571 profile views
  1. I must be doing some fantastically terrible thinking today... Thanks for your help.
  2. Sorry mate, I'm an idiot. Thanks for telling me...
  3. Hello Forum! Welcome to the thread. I'm upgrading this pre-built for a friend. (http://www.bestbuy.ca/en-CA/product/acer-acer-aspire-tc-desktop-pc-black-intel-ci5-6400-1tb-hdd-8gb-ram-windows-10-atc-710-eb51/10407069.aspx) Putting in a new GPU and PSU. This has support for standard size ATX PSUs right? Also, there's an open PCIE slot for a GPU right? Thank you so much!
  4. Thanks for the help. You guys are right. I shall update if I remember what the balls I'm talking about.
  5. Yeah I got that. My example is probably terrible. Phishing is what that is. I'm just confusing myself now...
  6. Phishing is correct but there's another term I'm thinking of. I'm pretty sure Linus says it sometimes.
  7. Well... Phishing is correct. But there's a more specific term isn't there?
  8. No that's not it... Umm... It's when you send an email pretending to be apple asking for an update and requiring the user to email back their username and password. Or something like that. I can't remember what it's called. There's a more specific name than that though... Edit: Okay that's correct but not what I was thinking of.
  9. I need help... I'm writing an essay and my brain is failing to remember what the type of cyber security attack is called. It's the one where the hacker spoofs an email or something and asks the victim for their information. It was used for the celebrity icloud hacks. Thanks for your help guys!!!
  10. I need help... I'm writing an essay and my brain is failing to remember what the type of cyber security attack is called. It's the one where the hacker spoofs an email or something and asks the victim for their information. It was used for the celebrity icloud hacks. Thanks for your help guys!!!

    1. werto165
    2. Nup

      Nup

      Social engineering? 

  11. Got a job at a mobile device and computer repair place! :-D

    1. Tech_Dreamer

      Tech_Dreamer

      Nice , Congrats bro

    2. Stanvard
  12. Exactly what I was thinking. Thanks!
  13. Okay thanks. What about storage? Or do you have any other recommendations?
  14. It's not for fun, they belong to a local non-profit and they want me to fix them up a bit.
×