Article on the subject of "technique"
-
2007: Super sophisticated Trojan will be raging
the extremely sophisticated technique that this trojan uses will become popular in 2007, a security expert warns. named 'rustock', the later trojan family first appeared nearly a year ago.
-
The new Trojan bypasses the virtual keyboard face
security researchers have discovered a new type of trojan keylogger that captures not only keyboard operations but also mouse operations.
-
Analysis of Memory Dump file (* .dmp)
when trying to open any * .dmp file created by windows debugging tools, you will find the language used in it extremely strange. sometimes you are curious to know exactly what information inside it is?
-
How to fix keyboard errors
the design has a movable joint that makes the phone slide and fold less durable than a bar phone. but this does not mean that simple bar phones are hard to break down. typically, the problem is related to the phone's keyboard in general.
-
Learn and distinguish the concept of CAM, DVDRIP, R5, DVDSCR ...
the following general article can be very helpful for those who download movies online, giving a better view of the versions of telesync, cam, screener, ..
-
How to use Photoshop CS5 - Part 19: Create an Out of bound image
in the next article of the tutorial series on photoshop, we will present some basic steps to create the effect of out-of-bound photos.
-
5 Surprising Disadvantages of Using the Pomodor Technique
the pomodoro technique may seem like a golden ticket to productivity. however, while many people find it effective, the technique does have its drawbacks.
-
New technique can hack even computers completely isolated from the internet
security researchers at the department of software engineering and information systems, ben-gurion university in the negev, israel, have just discovered a new hacking technique and they named it satan.
-
What is the Clean Room technique?
the clean room technique is a process in which a new product is developed by applying reverse engineering to an existing product, so as to avoid patent or copyright infringement.
-
AVL tree in data structure and algorithm
what happens if the data entered into the binary search tree (bst) is in ordered form (ascending or descending). it will look like the following.
-
Few-Shot Learning Technique
teach the ai new patterns by providing examples. mastering the technique makes prompts significantly more reliable.
-
Learn about the Whaling network attack technique
you may have heard about the phishing network attack technique, but do you know about its more advanced 'brother'? that's the whaling technique.
-
PrintListener technique: Steal fingerprints just by listening to the sound of swiping the screen
a research team from the us and china has discovered a new technique that can recreate a person's fingerprint just from the sound they make when swiping a touch screen.
-
How to use Morphing morphing techniques in Photoshop
one of the editing features that you can perform on your photos in adobe photoshop is morphing. this tool allows you to deform the image into whatever shape you want.
-
How Task Batching Technique Helps Improve Concentration
task batching is a scientifically proven and easy-to-use productivity technique. it's a visual way to plan your day and get more tasks done in less time.
-
Cold boot, an attack technique 10 years ago can crack the encryption of most PCs today
a decade-old attack technique that works on most computers that are currently cold boot can find security keys on your computer and allow hackers to decrypt that data.
-
Is it possible to perform the 'bend curve' technique?
can humans actually perform the 'bend curve' technique in real life?
-
New Wi-Fi chips increase performance by 10 times
a new type of radio chip, when used for cell phones and wi-fi / bluetooth devices, will be able to cut power consumption by up to 10 times. developed at the university of rochester, new york, this type of chipset uses a technique called locked frequency division (ilfd). this technique for
-
Web8: XSS Exploits - Part 2: Stored XSS
in this article, tipsmake.com invites you to learn about stored xss, another popular xss mining method.
-
2007: Super sophisticated Trojan will be raging
the extremely sophisticated technique that this trojan uses will become popular in 2007, a security expert warns. named 'rustock', the later trojan family first appeared nearly a year ago.
-
What is Deepfake?
deepfake is a technique for synthesizing human images based on artificial intelligence. it is used to combine and stack existing images and videos onto source images or videos using a machine learning technique.
-
New 3D printing techniques especially for stainless steel materials
the international team of researchers has developed a new 3d printing technique for stainless steel materials with exceptional durability and ductility.
-
Phishing attack: The most common techniques used to attack your PC
phishing attack is probably a term that is not unfamiliar to most internet users. in fact, it is also one of the most common forms of cyberattacks.
-
The standard and safest Tig welding technique
to use tig welding machine to ensure safety and bring high efficiency when welding stainless steel, you need to follow the 6 basic steps below.
-
Macromedia Flash - Create photo album using mask technique
in this tutorial, we will show you how to create a stylish photo album display using a mask technique in the flash program. you will not have to use any action script fragment in this tutorial. this article can be applied to create photo albums, website banners, advertising galleries ...
-
Learn about caching, a popular technique to increase computer performance?
in this article, i would like to introduce you to caching, a very popular technique to increase computer performance. this is a 2-part series of articles, part 1 will explain the basic principles of cache, and common ways to apply cache in practice. part 2, i will explain the cpu