Category: Computers

Behind The N-Gage PDA

If you’re old enough you may remember the Nokia N-Gage which was a very different mobile phone at that time as opposed to mobiles manufactured by other companies, the N-Gage was a PDA combined with a telephone and was developed from 2003-2005 and as you can see it only lasted 2 years before Nokia discontinued it.

The original N-Gage ran on the Symbian OS v6.1, but was a very different phone considering its competition and gained the nickname “Taco Phone” as according to most people it resembled a Taco (We can’t see why!).

The Symbian OS that it ran on is itself now discontinued, the N-Gage could not live up to its rival the Nintendo and was noted as a commercial failure.

It was one of the weirdest looking mobile phones and was quite something to own for the time it was developed, image is below.

Google And Blogger

As you may know already, blogger is a free blogging platform which is owned by Google, but what do actually know about the platform? If you’re like us, not much…. So lets try and explain.


Blogger is a blog-publishing service that allows multi-user blogs with time-stamped entries. It was developed by Pyra Labs, which was bought by Google in 2003. The blogs are hosted by Google and generally accessed from a subdomain of blogspot.com. Blogs can also be served from a custom domain owned by the user (like www.example.com) by using DNS facilities to direct a domain to Google’s servers. A user can have up to 100 blogs per account.

Up until May 1, 2010, Blogger also allowed users to publish blogs to their own web hosting server, via FTP. All such blogs had to be changed to either use a blogspot.com subdomain, or point their own domain to Google’s servers through DNS.

As you may know, even after reading this, well not much is know.

Facebook Live And Verification

As we all know many disturbing things have been seen live using Facebook, such as murders and if you search “Is there verification needed to use Facebook Live?” many of the answers are the same and state that only people with verified Facebook pages can use the service, but as I just found out this answer isn’t actually true as many people can use Facebook Live without issue on their Facebook account, so why isn’t there enforced verification needed to use Facebook Live services first? Surely the answer to many of the questions like “how can murders be shown live using Facebook” is because NO verification is actually needed to use Facebook live, surely verification like official government ID can be added so that people whom have gone through the verification process successfully can use the services which would in most if not all cases would make Facebook live a sought after and more safe service to use? Today 31/03/2019 Mark Zuckerberg stated that Facebook has too much power and that government’s need to step in to help, but wouldn’t Facebook making a start on this make government want to and be happy to assist? Facebook need to take the first steps to tackle the surge of violence being shown through their platform.

What Does My IP Address Show?

Many people think that every separate computer or mobile device have got their very own IP address, but that’s not quite true nor is saying it tells people what you’re called because it doesn’t, but it does list some of the following that maybe you didn’t expect it to show people that have got your IP.

and it even shows more than that however they are some of the things your IP shows, so once someone has your IP they can find out certain things but even more can be accessed by the police and other law enforcement agencies.

We hope that by reading this short post, you learnt a lot.

By-Passing Website Blocks

We all know what it’s like when your at work or college and you get 5 minutes free, thinking you can quickly check social media but they’ve been blocked by college or work… Its bad, and your thinking to yourself well I’ve not got anything to do right at this minute so why can’t I check my Facebook, right? Well no longer, follow the quick and simple instructions to by-pass the blocks put in place.


  1. Open a new tab and go to KProxy.
  2. Type the website address you want into KProxy, so Facebook.com (For example).
  3. Enter your login details.
  4. Enjoy using social media, by-passing all blocks.

Its that easy, but the organisation wishes it wasn’t!

Enjoy ūüôā

Behind The Inner Working’s Of Blogger

We have all heard of Blogger and most of us know that it is currently owner and developed by Google however, blogger was originally owned and operated by a company called Pyra Labs before the service was purchased by Google way back in 2003.

Blogger is used not just by consumers but some companies too and you may also find blogs ran using the service but under the domain name blogspot.com although the service using this domain is exactly the same.

Blogger is written in the Python language and was first launched on 23/08/1999. Although Blogger is still active its use is slowly dwindling and may therefore soon be shut down for good, unless Google do something drastic that is.


We hope you have learnt something by reading this post.

About The Product Serial Number

Nearly everyone has heard of and have seen a product serial number and most of us know that it is basically a product finger print that identifies them specifically however most don’t really know much about them, so in this post we’re going to tell you a bit about them.


A serial number is a unique, identifying number or group of numbers and letters given to an individual piece of hardware or software, passports, bank notes and other documents.

We’ll give you an example… A model number for a Samsung Galaxy S8 will always be Samsung Galaxy S8¬†and that’s true for every Samsung Galaxy S8 mobile phone therefore the model numbers are identical whilst each of their serial numbers is unique to a specific device.

If your item is stolen but you have got the serial number of that item it means that the police can log the serial number and they happen to come across the exact model as yours and they have reason to check it then they can take a look at the serial number and see if it matches the serial number that you provided them with when you reported that item lost or stolen, they are guaranteed that the item in their possession is yours meaning they can return it to you. So you can understand that even if it seems pointless it is in fact absolutely worth it.


You can see why the product serial number was a brilliant idea and is still used millions if not billions of times globally everyday.

Is This A Piece Of The Oldest Computer?

Is this the piece of the worlds oldest computer? Lets give you some insight into the computer this is from.

The world’s oldest analog computer is the Antikythera mechanism, an ancient Greek device designed to calculate astronomical positions. Media outlets are now reporting that a lost piece, which somehow survived looters, has been discovered on the Aegean Seabed.

The Antikythera Mechanism was lost over 2,200 years ago when the cargo ship carrying it was shipwrecked off the coast of the small Greek Island of Antikythera (which is located between Kythera and Crete). The Mechanism was initially discovered in 1901, when Greek sponge divers found an encrusted greenish lump.

They brought the mechanism, which they believed to be a rock, to archaeologist Valerios Stais at the National Archaeological Museum in Athens. Over the ensuing decades the site was looted, trampled on by explorers, and, in 1976, the famous French explorer Jean-Jacques Cousteau inadvertently destroyed much of what remained of the ship’s hull.

Initially, no one knew what the lump was. Two millennia had eaten away at the ship and its cargo. Stais’ cousin, Spyridon Stais, a former mathematician, was the first to identify the gears in the mechanism.


We hope that helps but will this be confirmed as that missing piece? Time will tell.

32-Bit VS 64-Bit

In the computer world, 32-bit and 64-bit refer to the type of central processing unit (CPU), operating system, driver, and more that utilizes that particular architecture.

You will have seen the option to download a piece of software as a 32 or 64 Bit version and the difference does in fact matter because the two were programmed for completely separate systems.

32-bit systems utilize data in 32-bit pieces while 64-bit systems utilize data in 64-bit pieces. In general, the more data that can be processed at once, the faster the system can operate.

There are several other reasons to use a 64-bit system as well, most practically the ability to use significantly greater amounts of physical memory (more than the 4 GB allowed by a 32-bit machine).


We hope that helped if you was asking that certain question.

Truth Behind TOR

Anyone that is tech savvy will have heard of the TOR browser, but what do we actually know about the browser itself and what it is used for? Time to find out maybe.....

History

The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997.

The alpha version of Tor, developed by Syverson and computer scientists Roger Dingledine and Nick Mathewson and then called The Onion Routing project, or Tor project, launched on 20 September 2002. The first public release occurred a year later. On 13 August 2004, Syverson, Dingledine, and Mathewson presented "Tor: The Second-Generation Onion Router" at the 13th USENIX Security Symposium. In 2004, the Naval Research Laboratory released the code for Tor under a free license, and the Electronic Frontier Foundation (EFF) began funding Dingledine and Mathewson to continue its development.

In December 2006, Dingledine, Mathewson, and five others founded The Tor Project, a Massachusetts-based research-education nonprofit organization responsible for maintaining Tor. The EFF acted as The Tor Project's fiscal sponsor in its early years, and early financial supporters of The Tor Project included the U.S. International Broadcasting Bureau, Internews, Human Rights Watch, the University of Cambridge, Google, and Netherlands-based Stichting NLnet.

From this period onward, the majority of funding sources came from the U.S. government.

In November 2014 there was speculation in the aftermath of Operation Onymous that a Tor weakness had been exploited. A BBC source cited a "technical breakthrough" that allowed the tracking of the physical locations of servers. In November 2015 court documents on the matter, besides generating serious concerns about security research ethics and the right of not being unreasonably searched guaranteed by the US Fourth Amendment, may also link the law enforcement operation with an attack on Tor earlier in the year.

In December 2015, The Tor Project announced that it had hired Shari Steele as its new executive director. Steele had previously led the Electronic Frontier Foundation for 15 years, and in 2004 spearheaded EFF's decision to fund Tor's early development. One of her key stated aims is to make Tor more user-friendly in order to bring wider access to anonymous web browsing.

In July 2016 the complete board of the Tor Project resigned, and announced a new board, made up of Matt Blaze, Cindy Cohn, Gabriella Coleman, Linus Nordberg, Megan Price, and Bruce Schneier.

What Is TOR Used For

Tor enables its users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both licit and illicit purposes.¬†Tor has, for example, been used by criminal enterprises,¬†hacktivism¬†groups, and law enforcement agencies at cross purposes, sometimes simultaneously;¬†likewise, agencies within the U.S. government variously fund Tor (the U.S. State Department, the National Science Foundation, and ‚Äď through the Broadcasting Board of Governors, which itself partially funded Tor until October 2012 ‚ÄstRadio Free Asia) and seek to subvert it.

Tor is not meant to completely solve the issue of anonymity on the web. Tor is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user.

Tor is also used for illegal activities, e.g., to gain access to censored information, to organize political activities, or to circumvent laws against criticism of heads of state.

Operation TOR

Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe. These onion routers employ encryption in a multi-layered manner (hence the onion metaphor) to ensure perfect forward secrecy between relays, thereby providing users with anonymity in network location. That anonymity extends to the hosting of censorship-resistant content by Tor's anonymous hidden service feature. Furthermore, by keeping some of the entry relays (bridge relays) secret, users can evade Internet censorship that relies upon blocking public Tor relays.

Because the IP address of the sender and the recipient are not both in cleartext at any hop along the way, anyone eavesdropping at any point along the communication channel cannot directly identify both ends. Furthermore, to the recipient it appears that the last Tor node (called the exit node), rather than the sender, is the originator of the communication.

There is loads more you can learn about TOR.... We may expand on this soon.