What are you looking for?
Learn how defeat the mighty router log file just in case someone else is spying on your web traffic.
An explanation of the differences between hack and social engineering; and learn why social engineering is extremely important to many hacks!
I tell three real stories that happened at the computer store I used to work at.
Learn why water is bad for your system, why thermal paste is important and why a surge bar may not be enough.
Imagine yourself becoming a victim to flawed facial recognition and becoming a suspect to a crime you did not commit, were not in the vicinity of, and could not prove otherwise.