Jump to content
Search In
  • More options...
Find results that contain...
Find results in...


  • Content Count

  • Joined

  • Last visited


This user doesn't have any awards



  • Title
    Junior Member
  • Birthday 1992-05-07

Contact Methods

Profile Information

  • Gender
  • Location
  • Interests
    Computer,gaming,hardware,3d modeling,3d animation,ANIME


  • CPU
  • RAM
  • GPU
  • Case
    HP p7-1215
  • Storage
    seagate 1 tb and 500 WD
  • PSU
    default hp power supply
  • Display(s)
    DELL u2410
  • Cooling
    default intel cooler
  • Keyboard
    logitech k120
  • Operating System
    windows 8
  1. TALHA

    FinalMouse Giveaway

    i need that mouse because i cannot afford to buy a nice mouse
  2. TALHA

    Platform Launch and MASSIVE GIVEAWAY

    Vessel User Name: TALHA Favorite Videos: https://www.vessel.c...ideos/JYZEYDYx0 https://www.vessel.c...ideos/G-DUjgUyY
  3. The NSA contacted Linus Torvalds, the father of Linux/GNU, to ask about injecting surreptitious backdoors into the popular open-source operating system, his father has disclosed to the European Parliament. In yet another embarrassing revelation of the NSA’s astonishing malpractice, Nils Torvalds — Member of the European Parliament (MEP) for Finland and more famously the father of Linus Torvalds — disclosed in a European Parliament hearing this week that the intelligence agency had contacted his son with regards to the injection of clandestine “backdoors” into the widely-used Linux/GNU operating system. Christian Engström, MEP for the Swedish Pirate Party, explained to the inquiry panel that in open-source development, such backdoors cannot exist without being reviewed on multiple levels by developers around the world as the entirety of the system source code is freely available for all to read and examine. He continued to put to Microsoft’s representative on the panel that ‘In Microsoft’s systems, this possibility is absent, since the source code is secret to outsiders source link:http://vr-zone.com/articles/nsa-asked-linus-torvalds-inject-backdoors-linuxgnu/64174.html#
  4. So said IBM’s Chief Technology Officer of Java, John Duimovich, in a keynote address at the JavaOne conference today. Duimovich noted that GPU accelerators pack incredible compute power, and leveraging their 10x speedups for Java workloads can accelerate complex computations that process lots of data. Java and GPUs open up a world of new opportunities for GPU accelerators and Java programmers alike. Millions of developers rely on the Java programming language for web 2.0, big data analytics and scientific computing. It’s widely used in large-scale distributed frameworks, like Apache Hadoop, due to its ease of programmability, modularity and multiplatform support. READ MORE: http://blogs.nvidia.com/blog/2013/09/22/gpu-coming-to-java/#
  5. The use of printers in space to make everything from food and tools to rocket parts aims to reduce costs and improve safety. READ MORE: http://news.cnet.com/8301-11386_3-57600325-76/nasa-successfully-tests-3d-printed-rocket-components/?ttag=fbwp
  6. i search before posting the top but didn't see so i post
  7. Whenever you have access to almost unlimited information, abuse of this power becomes a very tempting prospect. It seems that some National Security Agency officers have not been immune to that temptation. Recent reports coming out of Washington, D.C. indicate that officers have used their access to powerful spying equipment to stalk on their romantic partners. NSA officials claim that it is not a common practice. However, a large enough number of agents have been discovered doing it that some people in the spying industry are calling the practice LOVEINT. The “INT” stands for “intelligence” and is often put at the end of other words describing a spying target. In fact, most incidences of intentional misconduct on the job at the NSA involve LOVEINT, according to government officials. read more:http://realitypod.com/2013/08/the-spy-who-stalked-me-nsa-agents-use-their-powers-to-target-love-interests/
  8. Apple has updated its voice-driven personal assistant, Siri, to make playful comments disparaging Google's head-worn accessory, Glass, calling it "half empty" and telling users they've "got the wrong assistant." read more: http://appleinsider.com/articles/13/08/26/apples-siri-now-takes-swipes-at-googles-half-empty-glass
  9. As if a sexy electric car; a sideways-flying, reusable rocket ship; an 800 mph subway; and a Martian metropolis weren't enough, mad scientist Elon Musk now wants to build an "Iron Man" suit. Well, not exactly. But the film was apparently the inspiration for Musk's latest foray into science nonfiction. The Tesla Motors and SpaceX CEO tweeted on Friday that he and his people have "figured out how to design rocket parts just w hand movements through the air" and that next week he'll be posting a video that demonstrates the process. read more: http://news.cnet.com/8301-11386_3-57599981-76/teslas-elon-musk-goes-iron-man-with-in-thin-air-gestural-design-process/
  10. A security researcher has reportedly used a JavaScript code in order to turn Google's wearable computing eyegear Google Glass into a drone controller. Blaine Bublitz experimented with a JavaScript program called node.js. to create a program to tweak for different controllers and vehicles. Bublitz was successful in his experiment and is now able to control a drone softly floating in the air before him with just a slight tilt of the head, Sydney Morning Herald reports. Although, he was able to control the AR drone via Google Glass, there were a few glitches as Bublitz said that he couldn't see where the bot was while he was controlling it adding that something that could be of about eye height would have been better. He said that he would like to add the ability to rotate the drone left and right based on Google Glass' azimuth value but that will take time to realize. source: http://news.yahoo.com/hacker-turns-google-glass-drone-controller-053534837.html
  11. According to the U.S. Department of Homeland Security report, 44% of Android devices can not be upgraded because vulnerable to security threats. According to the U.S. Department of Homeland Security's internal reports that millions of Android device users vulnerable to viruses or malware threats. According to the U.S. Department of Homeland Security on July 23 of the internal report , the most popular mobile platform, due to its market share and open-source architecture is still the main objective of the mobile network attacks. The report noted: "44% of Android users are still using Android 2.3.3 to 2.3.7 version, which is released in 2011 Gingerbread, this version has multiple versions at a later patched vulnerabilities." read more: http://chinese.vr-zone.com/80350/DHS-report-says-44-percent-of-Android-device-is-not-safe-08262013/
  12. Microsoft Corp takes on Google's Motorola Mobility unit this week in the second of two landmark trials between the companies that delve into hot disputes over the patents behind smartphone and Internet technology. The jury trial, starting Monday in federal court in Seattle, is set to resolve whether Motorola breached its contract with Microsoft to license on reasonable terms its so-called standard essential patents, covering wireless and video technology used in the Xbox game console Read more: http://www.businessinsider.com/microsoft-and-motorola-patent-trial-2013-8#ixzz2czPtBPiP