The Words, Achievements, Honors and Legacies of Frederick Douglass Remain Indelibly Printed in Us
Cyber Attack
- 27 Jul
- brainiac
- 0 Comments
Frederick Douglass was perhaps the first black man who had such a long and arduous climb which took him from slavery to some of the highest positions in the land wielding considerable influence on not only the minds of many ordinary folks but also having much influence on Presidents. His name and legacies remain unforgettable Read More
Gene Smith, The Ohio State University (OSU) Buckeyes Athletic Director (AD) – Bio
Cyber Attack
- 27 Jul
- brainiac
- 0 Comments
Gene Smith is the athletic director (or AD for short) of the Ohio State University (OSU) Buckeyes athletic program. Mr. Smith oversees a diverse assortment of both men’s and women’s sports for a school that has the unique distinction of being one of just four colleges to have won national championships in men’s football, basketball, Read More
How to Hack Your iPod: Six Great iPod hacks
Cyber Attack
- 27 Jul
- brainiac
- 0 Comments
The iPod is a deeply personal device. The music, contacts, calendars and notes you store on it reveal a lot about your personality. From playcounts to playlists, our iPods can tell others what we enjoy, how we think and even who we are. But if you truly want to transform your iPod into an engine Read More
How to Find Someone’s Gmail Email Address Fast & Easy
Cyber Attack
- 27 Jul
- brainiac
- 0 Comments
Gmail is the email service created by Google. The good thing about Gmail is that it has a large storage capacity and it can be used on most cell phones. Due to the growing popularity of Gmail a lot of people want to know how to find someones Gmail email address. Although a lot of Read More
Pepper Spray Laws – State by State Regulations
Cyber Attack
- 26 Jul
- brainiac
- 0 Comments
Are you aware of the pepper spray laws in your state? In most areas, buying a can of pepper spray for protection is easy enough when you turn 18. In others, however, laws are in place that regulate who can purchase the substance and how much of capsaicin – the pepper chemical – can be Read More
A Short Article on Technology
Cyber Attack
- 26 Jul
- brainiac
- 0 Comments
The world has undergone enormous changes over the past decade. We now live in a world where communication is paramount. It seems that everyone and everything is connected in some way. For school students this has made things much more efficient. Research papers that used to involve hours of laborious effort, can now be researched Read More
Take Your Gaming Experience To The Next Level
Cyber Attack
- 26 Jul
- brainiac
- 0 Comments
The online gaming world is growing at an impressive rate. There are thousands of games that can be accessed from any given location by game maniacs to make their experiences more rewarding. Apart from serving as exciting leisure activities, online games can be challenging enough to keep the mind working and this sharpens the mind Read More
How to Get Rid of Malware – What is Malware and How Do I Get Rid of It?
Malware
- 07 May
- brainiac
- 0 Comments
Malware is becoming more and more of a problem these days as we shift more of our lives online, so knowing how to get rid of malware and how to avoid it in the first place will stand you in good stead for the future and help you to enjoy more of your online experience. Read More
What is the Difference Between Malware and a Virus?
Malware
- 04 May
- brainiac
- 0 Comments
Malware, spyware and viruses are used interchangeably when discussing general computer infections. In the last few years, being able to identify for the purpose of removal of a virus or malware requires the correct removal program. Additionally, malware comes in many and varied forms, although slightly different to one another, do the following, damage, corruption Read More
What Is a Rootkit Virus?
Malware
- 02 May
- brainiac
- 0 Comments
Sometimes it’s not just running your anti-virus program to get rid of a terrible virus such as a rootkit. What a rootkit does is hack its way through allowing itself to have master privileges on a computer. Then it disguises itself so that most antivirus software won’t be able to recognize it. Then, once it Read More