1. My Surprising Career as an Amazon.com "Fake" Reviewer | Anonymous
  2. Why France and Germany fear Facebook’s cryptocurrency – and plan to block it
  3. Millions of medical records exposed online | SC Media
  4. In cybersecurity speed kills, but faster saves | SC Media
  5. Gamification: A winning strategy for cybersecurity training | SC Media
  6. Top 10 file-sharing options: Dropbox, Box, Google Drive, OneDrive and more
  7. How to freeze and lock your Linux system (and why you would want to)
  8. Redesigning business processes for digital success
  9. Ransomware: 11 steps you should take to protect against disaster | ZDNet
  10. The ransomware crisis is going to get a lot worse | ZDNet
  11. Hands on with Apple Arcade in iOS 13
  12. Researchers: AI surveillance is expanding worldwide
  13. How Much Would You Spend on Streaming Services Per Month?
  14. Bill Gates Says Big Tech Companies Shouldn’t Be Broken Up
  15. Amazon Music rolls out a lossless streaming tier that Spotify and Apple can’t match
  16. The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite
  17. The Shift to Electric Vehicles Propels a Strike Against GM
  18. Google Fi now offers an unlimited plan
  19. The 11 Best New TV Shows Coming This Fall—From 'Watchmen' to 'Mandalorian'
  20. 6 Reasons to Ditch Google's Chrome Browser for Vivaldi on Android
  21. 'Simjacker' Attack Can Track Phones Just by Sending a Text
  22. Apple Arcade Is One Big, Beautiful Trap
  23. Apple as a service: One day you'll rent it all...
  24. LastPass bug leaks credentials from previous site | ZDNet
  25. Will Samsung kill the Galaxy Note series next year? - SamMobile
  26. Sidewalk Labs' controversial data collection project is now a company
  27. Amazon is hosting its big new hardware event on Sept. 25
  28. Google collects face data now. Here's what it means and how to opt out
  29. Amazon.com: kevin mitnick
  30. Gartner sees blockchain as ‘transformational’ across industries – in 5 to 10 years
  31. Gartner: Get ready for more AI in the workplace
  32. Artificial intelligence today: What’s hype and what’s real?
  33. 'They wanted me gone': Edward Snowden tells of whistleblowing, his AI fears and six years in Russia
  34. Google faces a new antitrust probe by 50 attorneys general
  35. Adobe Premiere Pro will use AI to reframe videos for all of your social apps
  36. systemd.index
  37. systemd
  38. How to Set up a Used Mac When You Don't Know the User Name or Password
  39. Revisit Happy Memories With the New Google Photos Feature
  40. How to check if you've been hacked
  41. Crypto-Gram: September 15, 2019 - Schneier on Security
  42. How to safely open any USB device
  43. Apple Is Scared Of Your Dangerous New MacBook Pro
  44. https://apple.news/AJGzSR7MpT2SjmO-2QKlOOQ
  45. Facebook expands new tool aiming to shrink 'news deserts'
  46. Three words for a faster emergency response | what3words
  47. The irrelevant iPhone 11: Apple will crush Android with services, bundling, and cheap devices | ZDNet
  48. Walmart takes its $98 Delivery Unlimited service nationwide
  49. You need to delete these 24 malware-infested Android apps right now
  50. How Technology Is Being Used By Students To Cheat On Tests
  51. linux cyber security videos - Google Search
  52. 21 Best Kali Linux Tools for Hacking and Penetration Testing
  53. Creating and using a live installation image :: Fedora Docs Site
  54. 5 signs your security culture is toxic (and 5 ways to fix it)
  55. All your IoT devices are doomed | ZDNet
  56. NSLOOKUP and How It Works With DNS Records
  57. Cybercrime: Ransomware attacks have more than doubled this year | ZDNet
  58. Move over VPN, SDP has arrived
  59. The Myth of Consumer-Grade Security - Schneier on Security
  60. Azure for Education | Microsoft Azure
  61. More than 400 police forces working with Ring to view doorbell cam footage
  62. American Cyber Command hamstrung Iran’s paramilitary force
  63. Microsoft wants to bring exFAT to the Linux kernel – TechCrunch
  64. Galaxy Note 10's best hidden features
  65. How to Perfectly Customize Every Setting on the New Galaxy Note 10
  66. How To Get the Most Out of Your Smartphone Battery
  67. Large Telecoms, State Enforcers Make Pact to Combat Robocalls
  68. Ransomware Attacks Are Testing Resolve of Cities Across America
  69. Get the most out of the Note 10's camera
  70. Facebook’s First Newsroom Imploded. Now It’s Trying Again.
  71. What Happened to Evasi0n.com? - Picozip
  72. Best electric mountain bike 2019: uphill made easy with E-MTB. Downhill is up to you…
  73. 5 ways Amazon Alexa can entertain your bored self
  74. Kaspersky Antivirus Software Exposed Millions to Web Tracking
  75. Why Letting Red Hat Do Its Thing Was Wise Choice by IBM
  76. Apple Card Review: The Credit Card of the Future Is No Card At All
  77. The Amazon Publishing Juggernaut
  78. Apple reveals special new iPhones for security researchers
  79. The 50 Best TV Shows on Netflix Right Now
  80. College Still Pays Off, but Not for Everyone
  81. We keep falling for phishing emails, and Google just revealed why
  82. Map reveals which cities use Ring's surveillance network to spy on you
  83. Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware
  84. Getting the best Wi-Fi speeds at home? Check the fine print
  85. Unsubscribe
  86. Three useful, yet neglected, SQL statements
  87. 35 Cheap Things That’ll Help Fix The Small Annoyances In Your Life
  88. Domino’s Pizza delivers a game-changing case to the US Supreme Court
  89. How the Accused Capital One Hacker Stole Reams of Data From the Cloud
  90. A dismal industry: The unsustainable burden of cybersecurity | ZDNet
  91. This hacker will trick you, and you'll be glad she did
  92. FBI, ICE find state driver’s license photos are a gold mine for facial-recognition searches
  93. Wi-Fi 6 is fast enough to download 22 Marvel movies in 3 hours
  94. Capital One looked to the cloud for security. But its own firewall couldn’t stop a hacker.
  95. Google's New Gesture Controls Aren't Just for the Pixel
  96. Apple put an iPhone in everybody's pocket — now its growth depends on putting devices all over our bodies
  97. The Alleged Capital One Hacker Didn't Cover Her Tracks
  98. Seattle woman charged in Capital One breach may have data from other companies
  99. An Operating System Bug Exposes 200 Million Critical Devices
  100. Researchers to launch intentionally ‘vulnerable’ blockchain at Black Hat
  101. What's a smart contract (and how does it work)?
  102. Websites using Facebook 'Like' button liable for data, Europe's top court decides
  103. Upcoming iPhone update will change how you browse online
  104. Should You Use a VPN for Internet Privacy? That Depends, Experts Say
  105. How To Make Sure Websites Aren’t Spying On You: Guide To Three Popular Browsers | Def Pen
  106. Plex makes piracy just another streaming service
  107. The Amazon dilemma: how a tech powerhouse that fulfills our every consumer need still lets us down
  108. 5 Ways Reading Can Change Your Life (and Best Practices)
  109. IT’s soft skills shortage — and how to train up for success
  110. Getting help for Linux shell built-ins
  111. Banner vulnerability allows remote access to records of more than 60 colleges | SC Media
  112. No More Ransom project has prevented ransomware profits of at least $108 million | ZDNet
  113. 15 extremely useful Gmail shortcuts you'll want to know
  114. How to efficiently charge your devices
  115. Fix your phone's horrible signal strength
  116. Electronic Recycling Guide
  117. Watch Out for This Amazon Prime Day Scam
  118. Why are people so hostile towards President Donald Trump? - Quora
  119. Facebook now shows you who uploaded and shared your information for other advertisers to target you
  120. Which smart speaker is perfect for you?
  121. More than 1,000 Android apps harvest data even after you deny permissions
  122. How to Protect Our Kids' Data and Privacy
  123. Sunday Night Is the New Monday Morning, and Workers Are Miserable
  124. Trick those #!@% spam calls with a fake phone number
  125. Perspective | All eight Spider-Man movies, ranked from worst to best
  126. A Costly Reminder That You Don't Own Those Ebooks
  127. How a trivial cell phone hack is ruining lives
  128. If you can only buy one, should it be the MacBook Pro or the iPad Pro?
  129. A hacker assault left mobile carriers open to network shutdown
  130. Quantum computers will break today's internet security. This work could help fix it
  131. The best programming language to learn
  132. EU-US Privacy Shield legal showdown now set for July 9 – TechCrunch
  133. Samsung’s deepfake technology is getting scary
  134. This Reddit Thread Of "Guy Secrets" Is Equal Parts Hilarious And Heartfelt
  135. Review | Google Chrome has become surveillance software. It’s time to switch.
  136. Warning Issued For Apple's 1.4 Billion iPad And iPhone Users
  137. Samsung Galaxy Note 10 could have a new laptop-thrashing trick up its sleeve
  138. The best and worst of smart home tech for one injured vet
  139. International Dark Sky Places
  140. You're Probably Doing 2FA Wrong: Here's the Right Way
  141. Robin Williams hilarious interview
  142. AWS chief says facial recognition should be regulated
  143. You can now use your Android phone as a 2FA security key for Google accounts on iOS
  144. Apple: iPad's now the best PC for more people
  145. Inside the farm of the future
  146. What’s the best iPad Pro keyboard?
  147. How one romance scammer built an international phishing operation | ZDNet
  148. Much @Stake: The Band of Hackers That Defined an Era
  149. Apple finally kills off iTunes
  150. If China Really Wants to Retaliate, It Will Target Apple
  151. This ID Scanner Company is Collecting Sensitive Data on Millions of Bargoers
  152. All the Ways Google Tracks You—And How to Stop It
  153. Newly Released Amazon Patent Shows Just How Much Creepier Alexa Can Get
  154. Perspective | It’s the middle of the night. Do you know who your iPhone is talking to?
  155. Why I (Still) Love Tech: In Defense of a Difficult Industry — WIRED
  156. Google Is Making Android As Difficult To Hack As iPhone—And Cops Are Suffering
  157. Amazon Prime Video Channels: Everything you need to know
  158. Samsung deepfake AI could fabricate a video clip of you from a single photo
  159. Political Parties Still Have Cybersecurity Hygiene Problems
  160. Remember Google keeps a list of everything you buy – and here's how to find it
  161. How Tech Companies Are Shaping the Rules Governing AI
  162. How to use Google Maps to help someone find you
  163. Want one of the best paid entry-level jobs? Learn this 20-year-old programming language | ZDNet
  164. Perspectives: We're getting closer to stopping tech giants like Apple from abusing their power
  165. The One Password Tip Everyone Needs to Know
  166. San Francisco becomes first city to bar police from using facial recognition
  167. What is phishing? How this cyber attack works and how to prevent it
  168. Keanu Reeves Leaves Colbert Speechless With An Incredible Reflection On Death
  169. How to ditch your iPhone for Android—and take your files with you
  170. Wi-Fi 6: Better, faster and... kind of like Goro from Mortal Kombat?
  171. Limit How Long Google Keeps Your Data With This Overdue Setting
  172. Hands On With Google's Nest Hub Max Smart Display
  173. Hey, Google, let's drive: How you'll use the new Assistant Driving Mode for Android phones
  174. Google brings AR and Lens closer to the future of search
  175. Google’s next-gen Assistant is 10x faster and knows where your mom lives
  176. 9 Apps You Should Have on Your iPhone
  177. What Amazon knows about you
  178. When Coding Is Criminal
  179. Chinese humanoid robot turns on the charm in Shanghai
  180. Facebook has told federal investigators it’s open to heightened oversight of its privacy practices
  181. Facebook Building Cryptocurrency-Based Payments System
  182. Facebook
  183. The stupid reason Apple is using to try to stop you from fixing your own iPhone | ZDNet
  184. Google Pixel 3 owners are still facing problems 6 months later, here’s the list
  185. Google adds way to auto-delete your location history, web activity
  186. Pickup-bicycle collision on UT road raises broad liability issues
  187. NSA asks to end mass phone surveillance
  188. There's nothing funny about today's marijuana. It killed my son
  189. Amazon Prime two-day shipping will go down to one day
  190. The WIRED Guide to Open Source Software
  191. Coming to store shelves: cameras that guess your age and sex
  192. How Nest, designed to keep intruders out of people’s homes, effectively allowed hackers to get in
  193. Apple 'plotted' to hurt Qualcomm years before it sued the company
  194. Facebook’s privacy woes have a price tag: $3 billion or more
  195. Assume breach is for losers: These steps will stop data breaches
  196. NY Cyber Fellowship | NYU Tandon School of Engineering
  197. How New York City plans to become a cybersecurity hub
  198. 3 things about cloud and IoT you need to consider
  199. The 9 Best Macintosh WYSIWYG Editors
  200. AT&T’s 5G E marketing ploy is turning out to be a disaster
  201. Don't Praise the Sri Lankan Government for Blocking Facebook
  202. A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions
  203. Amazon opens Key delivery to garages – TechCrunch
  204. Opinion | The Only Answer Is Less Internet
  205. Facebook leaks: Zuckerberg turned data into dollars in ruthless battle with competitors
  206. Samsung Delays Launch Of $2,000 Folding Phone After Reviewers Find Broken Screens
  207. Galaxy Note 10: Rumors, price, release date, specs and everything else
  208. How to Maximize Your Kindle’s Battery (and Really Get a Month of Reading)
  209. Facebook really doesn't seem to understand privacy or security
  210. Cyberspies Hijacked the Internet Domains of Entire Countries
  211. Walmart and Google forge voice order alliance to battle Amazon | ZDNet
  212. End of an era: Soon smart speakers will outnumber tablets | ZDNet
  213. People Wearing AirPods Are Making Things Awkward For Everyone Else
  214. How to remap Bixby to Google Assistant on the Samsung Galaxy S10, Note 9, and other One UI devices
  215. Samsung's Galaxy Fold Phones Are Already Breaking
  216. The Coming Obsolescence of Animal Meat
  217. j.mp/drippler_app
  218. Google’s hybrid cloud platform is coming to AWS and Azure
  219. In a world of Google and Amazon, libraries rethink their role
  220. Report: Samsung will release four Galaxy Note 10 models, both 4G and 5G options
  221. Robots, VR and 3D printers are served up at this high-tech library
  222. Einstein's theory was put to the test. Guess what happened
  223. Review | Die, robocalls, die: A how-to guide to stop spammers and exact revenge
  224. Is More Knowledge Making Us Less Reasonable?
  225. The Day the Dinosaurs Died
  226. Change is not difficult. We make it difficult
  227. Old, Online, And Fed On Lies: How An Aging Population Will Reshape The Internet
  228. Profiting Off The Explosive Growth In Artificial Intelligence And Robotic Automation
  229. Amazon’s Rise in Ad Searches Dents Google’s Dominance
  230. Tenants worry smart-home tech could be abused by landlords
  231. r/cvsreceipts
  232. Reap the Promise of One and Done Authentication With SSO
  233. Trends in the Information Technology sector
  234. 38 Gmail Tips That Will Help You Conquer Email
  235. One week with Apple News Plus: a messy but good-enough Netflix for magazines
  236. Mark Zuckerberg says Facebook may pay publishers to put their stuff in a dedicated news section
  237. South Korean websites hit with rare waterhole phishing scheme | SC Media
  238. Watch every Marvel movie *and* show in the perfect order
  239. 4 obstacles to ethical AI (and how to address them)
  240. Read the latest headlines in the Apple News app
  241. The secret tricks Apple store staff use to push certain products | ZDNet
  242. Steven Spielberg's push against Netflix at Oscars hits nerve
  243. 3 things you must include in an IoT security plan
  244. Verizon Pledges Home Internet on Its 5G Rollout
  245. Why are TVs so cheap now? Well, your smart TV is watching you and making extra money, too
  246. Samsung’s One UI is the best software it’s ever put on a smartphone
  247. Apple just made it easier to find and manage subscriptions in iOS
  248. Here's the One Gmail Setting You Should Activate Now
  249. How to stay as private as possible on Apple's iPad and iPhone
  250. With Magic Leap, your entertainment may get real weird real quick
  251. The Linux command-line cheat sheet
  252. The Next 7 Steps in Convergence of Technology, Business—and Humanity
  253. Google's Making It Easier to Encrypt Even Cheap Android Phones
  254. Phishing emails imitate American banks to infect victims with TrickBot
  255. Tech Is Splitting the U.S. Work Force in Two
  256. Why cloud computing suddenly seems so hard and expensive
  257. Coming soon: On-premises 5G gear for enterprises
  258. Prepping the Enterprise for the AI Apocalypse - InformationWeek
  259. Amazon Eases Into Self-Driving Tech By Joining Aurora's $530 Million Funding Surge
  260. iPhone 7, iPhone 8 being modified for German market following Qualcomm patent trial win
  261. How to get more from Terminal and use it to control your Mac
  262. Why CAPTCHAs have gotten so difficult
  263. Microsoft CEO Says Privacy a Basic Human Right, Calls for Global GDPR
  264. Tesla to buy energy tech company Maxwell Technologies for about $218 million
  265. A New Google Chrome Extension Will Detect Your Unsafe Passwords
  266. Apple, the iPhone, and the Innovator’s Dilemma
  267. Google’s new Android apps listen to the world for the hard of hearing
  268. Why is Java programming popular for businesses?
  269. Top Tech Trends In 2019: 11 Experts Detail What You Need To Watch
  270. 10 cybersecurity trends to watch for 2019
  271. Abstinence-Only Sex Education Has A Big Unintended Consequence In Conservative States
  272. $145 million funds frozen after death of cryptocurrency exchange admin | ZDNet
  273. This password-stealing phishing attack comes disguised as a fake meeting request from the boss | ZDNet
  274. The Ten Most Ridiculous Things "On the Blockchain"
  275. Met Police deploys live facial recognition technology for ninth time
  276. Six Trends for 2019 That Will Redefine Enterprise Tech
  277. Where’s Apple’s collaboration service?
  278. How to run a successful IT internship program
  279. Opinion | Unless You’re Oprah, ‘Be Yourself’ Is Terrible Advice.
  280. How to Rearrange the Menu Bar on the Mac - TekRevue
  281. The autonomous vehicle parking problem
  282. What to expect from tomorrow’s big net neutrality court hearing
  283. Inside the Pentagon’s race against deepfake videos
  284. Google Takes Its First Steps Toward Killing the URL
  285. Is My Cell Phone Carrier Throttling My Speed?
  286. Samsung Starts Making First 1TB Flash Storage for Phones
  287. AMD turns to TSMC after GlobalFoundries turns back on 7nm chips
  288. Could fingerprint scanners replace check-in lines at airports, baseball games and hospitals?
  289. AT&T Wants to Be Big in Entertainment. First, It Has a $49 Billion Problem to Fix
  290. Expect more requests to subscribe from Apple on iPhones and iPads
  291. New Mac Malware Uses Steganography to Sneak Into Computers - ExtremeTech
  292. Commands to help you monitor activity on your Linux server
  293. Have Phones Become Boring? Well, They’re About to Get Weird
  294. Other apps will be able to use Brave's privacy-focused ads starting later this year
  295. Getting Started with Java 9 Module System - Help | IntelliJ IDEA
  296. What is the program modules in java?
  297. Understanding Java 9 Modules
  298. What is digital forensics? And how to land a job in this hot field
  299. Zuckerberg Plans to Integrate WhatsApp, Instagram and Facebook Messenger
  300. Apple is bringing "Hey Siri" to second generation AirPods
  301. World Economic Forum warns of AI’s potential to worsen global inequality
  302. Amazon-owned Ring has reportedly been spying on customer camera feeds
  303. As the Government Shutdown Drags on, Security Risks Intensify
  304. Major security flaw found in popular ES File Explorer Android app
  305. How to choose a photo storage service
  306. The foldable smartphone revolution will be awkward, but essential
  307. The World’s Worst Passwords List: How Many Do You Have?
  308. U.S. proposes to allow drone operation at night, over people
  309. Feds Can't Force You To Unlock Your iPhone With Finger Or Face, Judge Rules
  310. The Strange History of One of the Internet's First Viral Videos
  311. T-Mobile starts verifying callers to fight spam
  312. IBM Unveils Latest System in Its Quantum Computing Lineup
  313. A Worldwide Hacking Spree Uses DNS Trickery to Nab Data
  314. A neural network can learn to organize the world it sees into concepts—just like we do
  315. New Linux Systemd security holes uncovered | ZDNet
  316. Germany Decides Amazon Dash Buttons Break the Law
  317. Get a Password Manager. No More Excuses
  318. Check out all the smart home products at CES 2019
  319. Biometric Security Can Be Hacked, but It's Really Hard to Do
  320. Best security software, 2019: Lab-tested reviews of today's top tools
  321. Cybersecurity trends in 2018 | SC Media
  322. What Enterprises Can Expect for Cybersecurity in 2019
  323. Best Cloud Backup Services 2019
  324. Blockchain Can Wrest the Internet From Corporations' Grasp
  325. 11 Meditation Apps to Help You Relax, De-Stress
  326. Chrome Remote Desktop: The easy way to access a remote computer
  327. 24 hidden iPhone settings you should know about
  328. Why It's Hard to Escape Amazon's Long Reach
  329. Q&A: Experian exec says biometrics won’t save you from mobile hacks
  330. Tor Is Easier Than Ever. Time to Give It a Try
  331. 24 hidden Android settings you should know about
  332. Android file transfer: The no-fuss way to connect your phone and computer
  333. How to back up everything on Android | AndroidPIT
  334. Transform your phone with the best Android lock screen apps | AndroidPIT
  335. Facebook's and social media's fight against fake news may get tougher
  336. 'Secret sharing' system keeps your personal data safe - Futurity
  337. Is Buddhism a Philosophy or a Religion?
  338. AT&T Plans to Put 5G Labels On Non-5G Phones
  339. We've Got the Screen Time Debate All Wrong. Let's Fix It
  340. RDP Man-in-the-Middle - Smile! You're on Camera - GoSecure
  341. 12 'best practices' IT should avoid at all costs
  342. How to Stop Apps From Tracking Your Location
  343. Ambient computing is in the air
  344. Inside the world of AI that forges beautiful art and terrifying deepfakes
  345. The Best iPad Cases
  346. ‘Donald’ Was One of the Worst Passwords You Used in 2018
  347. ​MS-Linux? Lindows? Could Microsoft release a desktop Linux? | ZDNet
  348. How You Hold the Steering Wheel Could Seriously Injure You in a Crash
  349. The WIRED Guide to Data Breaches
  350. Nest Hello vs. Ring Video Doorbell Pro: Why Nest Wins
  351. The Race Is On to Protect Data From the Next Leap in Computers. And China Has the Lead.
  352. How to get VPN protection for your laptop while using a smartphone Wi-Fi hotspot | ZDNet
  353. The best VPN services: Our 10 favorite vendors for protecting your privacy 2 - Page 2 | ZDNet
  354. Social Security calling? Nope, it's just scammers out to grab your cash
  355. Quantum computers pose a security threat that we’re still totally unprepared for
  356. Inside Chronicle, Alphabet’s cybersecurity moonshot
  357. The best streaming video player to buy right now
  358. What to Do After a Data Breach: A Step-by-Step Guide
  359. How to Download Anything on the Web for Free: 12 Tips and Tools | Drippler - Apps, Games, News, Updates & Accessories
  360. Three challenges facing blockchain technology
  361. Here’s a controversial view: 5 reasons why the Internet of Things is doomed
  362. This guy found a way to run Apple's Mac software on an iPad — and it works surprisingly well
  363. Hackers are opening SMB ports on routers so they can infect PCs with NSA malware | ZDNet
  364. The 1996 law that made the web is in the crosshairs
  365. How to protect yourself from cell phone phishing attacks | Drippler - Apps, Games, News, Updates & Accessories
  366. 'Amazon will fail. Amazon will go bankrupt': Jeff Bezos makes surprise admission about Amazon’s lifespan
  367. The Best Android Tablets of 2018
  368. How to reach that person who will click on anything
  369. The Hail Mary Plan to Restart a Hacked US Electric Grid
  370. If You Drive in Los Angeles, Police Can Track Your Every Move
  371. More malicious cryptocurrency apps found on the Play Store
  372. Google Home and Amazon Echo Can Store Your Voice Recordings. Here's When They Could Be Used Against You.
  373. How to Safely and Securely Dispose of Your Old Gadgets
  374. IBM opens up its blockchain dev platform to AWS (and other cloud services)
  375. Gartner Lists Top 10 Strategic IoT Technologies, Trends Through 2023
  376. What is Transport Layer Security (TLS)?
  377. 9 rules for working with headhunters and IT recruiters
  378. Group FaceTime for iOS exposes users' full contact info | SC Media
  379. Cloudflare’s speedy DNS service now available on iOS and Android
  380. Use this one simple trick to speed up your old iPhone or iPad | ZDNet
  381. Linux cryptocurrency miners are installing rootkits to hide themselves | ZDNet
  382. Deserialization issues also affect Ruby, not just Java, PHP, and .NET | ZDNet
  383. Project Ubuntu: Getting Linux Running on Your Mac
  384. Email aliases are the easiest path to privacy—and an organized inbox
  385. Hackers have found a new way to break into ATMs and steal your cash
  386. My Father Says He’s a ‘Targeted Individual.’ Maybe We All Are
  387. North Korea-linked hackers stole tens of millions from ATMs across the world
  388. VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
  389. Samsung's foldable phone is real and extends into a tablet
  390. Security Lessons Companies Can Learn From the U.S. Elections
  391. Under Pressure: Developers Struggle With Dependencies, Security
  392. New ransomware spotted using DiskCryptor | SC Media
  393. Experts Divulge Memorable IT/Information Security Nightmares
  394. 11 Missing Android Features You Can Get Right Now | Drippler - Apps, Games, News, Updates & Accessories
  395. What you need to know about the iPhone's new dual-sim feature | ZDNet
  396. FCC pushes carriers to implement caller ID authentication by 2019
  397. No, blockchain isn't the answer to our voting system woes
  398. This couple invented a clever piece of luggage so you'll never have to check your bags again — here's how it works
  399. Pinpointing risky employee behaviors enables IT leaders to reduce risk | SC Media
  400. What’s new in Fedora Linux
  401. Why IoT Investment is Up, Sharing of Enterprise Data Increasing
  402. Sextortion plot uses public breach data to trick victims into thinking they were hacked | SC Media
  403. wizard zines
  404. Signal's new 'Sealed Sender' feature makes conversations anonymous
  405. Principles of Security: Human, Cyber and Biological | NECSI
  406. In-Security: See what it's like to constantly monitor cybersecurity threats
  407. If Brains are Computers, Who Designs the Software? With Daniel Dennett
  408. How the cloud wars forced IBM to buy Red Hat for $34 billion | ZDNet
  409. China has been 'hijacking the vital internet backbone of western countries' | ZDNet
  410. Giant ransomware bundle threatens to make malware attacks easier for crooks | ZDNet
  411. Deepfake-busting apps can spot even a single pixel out of place
  412. T-Mobile Name ID | Identify Calls & Texts from Unknown Phone Numbers
  413. Family traumatized after home monitoring system hacked by stranger
  414. How your data is used to create the perfect midterm election ad
  415. What is a firewall? How they work and all about next-generation firewalls
  416. systemd unit file basics - Fedora Magazine
  417. How to Use LastPass for More Than Just Managing Passwords
  418. Common myths about private browsing debunked
  419. The midterms are already hacked. You just don’t know it yet.
  420. Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis
  421. In CyberSecurity, the A.I. Debate Is “How”, not “If” | SC Media
  422. What is Shodan? The search engine for everything on the internet
  423. How to download your data from Apple
  424. These New Tricks Can Outsmart Deepfake Videos—for Now
  425. Cybersecurity job gap grows to 3 million, report | SC Media
  426. An A.I. Glossary
  427. An A.I. Glossary
  428. Facebook enlists 'war room' to combat fake election news
  429. Take a deep dive into the pioneering camera tech in Google's Pixel 3 smartphone
  430. Google Tests of a Censored Chinese Search Engine Went Well
  431. The New Kindle Isn't Innovative at All. That's a Good Thing
  432. Amazon Reportedly Preparing ‘Secret Weapon’ Against Smart Device-Making Rivals
  433. SkyBell HD
  434. Welcome to Voldemorting, the Ultimate SEO Dis
  435. 3 ways to customize your Mac's lock screen
  436. How Jamal Khashoggi's Apple Watch Could Solve His Disappearance
  437. Alexa’s Most Dangerous Feature Can’t Be Undone
  438. 3 Ridiculous Easy Way to Open Downloads on Android in Just 37 Seconds | Drippler - Apps, Games, News, Updates & Accessories
  439. Hungry For a Little More WIRED? Turn On Your TV
  440. Set Up Your Financial Accounts Like You're Going to Be Hacked
  441. How to Enable Developers to Build Secure Software
  442. 7 best practices for working with cybersecurity startups
  443. New Evidence of Hacked Supermicro Hardware Found in U.S. Telecom
  444. New Rules for Facebook Business Use
  445. IBM launches blockchain-based, global food tracking network
  446. Justice Department announces indictments of 7 Russians in hacking plot tied to Olympics doping scandal
  447. Has your Facebook account really been cloned? Probably not, but here’s how to check
  448. National Cybersecurity Awareness Month kicks off | SC Media
  449. SQL injection explained: How these attacks work and how to prevent them
  450. How to Make Your Mac as Secure as Possible
  451. These 9 Apps Will Make Your Android Phone Smarter | Drippler - Apps, Games, News, Updates & Accessories
  452. How Russian Spies Infiltrated Hotel Wi-Fi to Hack Their Victims Up Close
  453. What an Audacious Hoax Reveals About Academia
  454. Malware Has a New Way to Hide on Your Mac
  455. Why Organizations Should Embrace Friendly Hackers
  456. Election security is a mess, and the cleanup won't arrive by the midterms
  457. To stay ahead of Google, Amazon amps up competition against its Alexa partners
  458. The LG V40 ThinQ is a savvy Note 9 rival with 5 versatile cameras
  459. Midterm elections, social media and hacking: What you need to know
  460. Twitter rules, detection methods and enforcement against fake accounts all boosted
  461. New Russian Malware Can Embed Itself in PC Firmware
  462. /etc/group [System Files]
  463. Voting Machines Are Still Absurdly Vulnerable to Attacks
  464. Russia’s Elite Hackers Have a Clever New Trick That's Very Hard to Fix
  465. Pair of surveys underscore importance of secure PKI in government, IoT | SC Media
  466. VMware Knowledge Base
  467. Keyboard and Mouse not working in VMWare Fusion... |VMware Communities
  468. Master Your Android Notifications With These 11 Apps and Tricks | Drippler - Apps, Games, News, Updates & Accessories
  469. Cities Are Teaming Up to Offer Broadband, and the FCC Is Mad
  470. How to Hide Your IP Address (and Why You Might Want To)
  471. Delta’s fully biometric terminal is the first in the US
  472. Google's 20th anniversary: Breakthroughs but also controversy
  473. Walmart Requires Lettuce, Spinach Suppliers to Join Blockchain
  474. USB malware and cryptominers are threat to emerging markets | SC Media
  475. SHEIN breach exposes emails, encrypted passwords of 6.42M customers | SC Media
  476. Five major features your Android phone sorely needs
  477. This Is the Number 1 Sign of High Intelligence, According to Jeff Bezos
  478. Why you should install macOS Mojave and how to use it
  479. Google ends cryptocurrency ad ban
  480. The Sony hacker indictment: 5 lessons for IT security
  481. 5G will bring cloud computing to everyone
  482. Why Linux users should try Rust
  483. SiriusXM to Acquire Pandora for $3.5 Billion
  484. The New YubiKey Will Help Kill the Password
  485. Hackers stole customer credit cards in Newegg data breach
  486. How to Autofill Passwords Using Lastpass or 1Password in iOS 12
  487. How to list repositories on Linux
  488. The Mirai Botnet Architects Are Now Fighting Crime With the FBI
  489. Movies With 100% On Rotten Tomatoes, Ranked By How Good They Really Are
  490. Do you still need a firewall?
  491. Unpatched routers being used to build vast proxy army, spy on networks
  492. Windows Task Scheduler Zero Day Exploited by Malware
  493. How Spam Filtering Works: From SPF to DKIM to Blacklists
  494. Justice Department charges North Korean over WannaCry, Sony hack
  495. Forget your Mac login? Here's a quick way to find your user account
  496. What Developers Can Do to Improve Cyber-Security
  497. How Canonical Is Improving Ubuntu Linux Security
  498. How to retrofit the cloud for security: 2 essential steps
  499. Top web browsers 2018: Chrome edges toward supermajority share
  500. The Untold Story of NotPetya, the Most Devastating Cyberattack in History
  501. The expert's guide to Instapaper
  502. 10 Tricks to Make Yourself an Instapaper Master
  503. Torvalds Says Open Source Is the Way to Combat Software Complexity
  504. The Linux Foundation Set to Improve Open-Source Code Security
  505. Fedora 28 Released! Here are the New Features | It's FOSS
  506. After 10 years of growth, what does Chrome do for an encore? Dominate the web even more?
  507. Can You Spot the Deceptive Facebook Post?
  508. Blockchain: The end of banking as we know it? | ZDNet
  509. Amazon is quietly doubling down on cryptographic security
  510. Firefox's New Browser Will Keep Brands From Stalking You
  511. Why Forgetting Something Actually Helps You Learn, According to a Cognitive Psychologist
  512. These are the reasons you can never make a decision
  513. How to Access Control Center and Home Screen in iOS 12 With the iPad's New Gestures
  514. Linux iptables Firewall Simplified Examples - Like Geeks
  515. How to Set Up Two-Step Authentication on Your Microsoft Account
  516. Moving from Android to iOS—or Vice Versa? Bring Your Texts With You
  517. Stream Sounds From a National Park if You Can't Get Away This Weekend
  518. Google Reportedly Bought Your Banking Data in Secret, and That's Not Even the Bad News
  519. 5 apps that are way better on Android than they are on the iPhone | Drippler - Apps, Games, News, Updates & Accessories
  520. Changing Our Approach to Anti-tracking – Future Releases
  521. A Fish Has Passed The Benchmark Test Of Self-Awareness
  522. Being Passionate About Music Says Something Interesting About Your Brain
  523. 7 iPhone-Only Features You Can Get on Android Right Now | Drippler - Apps, Games, News, Updates & Accessories
  524. Google's Hacker-Thwarting Titan Is Now On Sale for $50
  525. How to Get the Most Out of Gmail’s New Features
  526. Beginner's Guide: How To Install Ubuntu Linux 18.04
  527. Try This Military Meditation Routine to Fall Asleep Fast
  528. Exploiting Decades-Old Telephone Tech to Break Into Android Devices
  529. Why Washington is so angry with Facebook, Twitter and YouTube
  530. 'It's a recipe for dominance that should drive fear into Silicon Valley': Here's why experts say China has an edge over the US when it comes to making money from smartphone users
  531. Phone Numbers Were Never Meant as ID. Now We’re All At Risk
  532. Multiple vulnerabilities cause compromised AT&T and T-Mobile account PINs
  533. Why Python Continues to Be the Swiss Army Knife of Programming
  534. The Untold Story of NotPetya, the Most Devastating Cyberattack in History
  535. Congress to Hold Hearings on Social Media, Big Tech Regulation Issues
  536. Stay hidden on the web: Best secure browsers
  537. The Cognitive Biases Tricking Your Brain
  538. Huge T-Mobile Breach Affects 3 Million: What to Do Now
  539. Russian Trolls Used Vaccine Debate to Sow Discord, Study Finds
  540. How Microsoft spotted another Russian hacking attempt
  541. Severe vulnerability exposes WordPress websites to attack | ZDNet
  542. Meet the Man With a Radical Plan for Blockchain Voting
  543. How to Protect Yourself Against a SIM Swap Attack
  544. Here’s the Right Way to Rescue a Soaking Wet Smartphone
  545. The state of cybersecurity at small organizations
  546. What is Nmap? Why you need this network mapper
  547. California firefighters use Augmented Reality in battle against record infernos | ZDNet
  548. The Cognitive Biases Tricking Your Brain
  549. The 25 Most In-Demand Job Skills Right Now, According to LinkedIn
  550. How to Use Amazon Echo as Your Home Security System
  551. Hackers are preparing an ‘unlimited’ ATM cash heist. Here’s how to protect yourself
  552. How We Read: A Survey of the Ever-Shifting Landscape
  553. Simple Steps to Protect Yourself on Public Wi-Fi
  554. How to display data in a human-friendly way on Linux
  555. Election Officials Discuss Efforts to Bolster Voting System Security
  556. Crypto-Gram: August 15, 2018 - Schneier on Security
  557. Hundreds of Netflix, HBO, DirecTV and Hulu credentials for sale on dark web
  558. How to query your Linux system kernel
  559. How External Storage Puts Android Phones at Risk
  560. How to Stop Google from Tracking Your Location
  561. Certified Information Systems Security Professional - Wikipedia
  562. Black Hat Talk Reveals How Embedded Systems Expose Airlines to Risk
  563. How Your Brain Tricks You Into Believing Fake News
  564. Smartphones or pen and paper? Cybersecurity experts split on tech in voting
  565. These Are Some of the Best Book Reviews We’ve Ever Read. A Sing Sing Prisoner Wrote Them Over a Century Ago.
  566. The Galaxy Note 9 is one step closer to the smartphone-computer dream
  567. How Hacked Water Heaters Could Trigger Mass Blackouts
  568. The Creative Ways Your Boss Is Spying on You
  569. Fax Machines Are Still Everywhere, and Wildly Insecure
  570. AI for cybersecurity is a hot new thing—and a dangerous gamble
  571. Why carriers only seem to sell iPhone, Samsung and LG
  572. Solve 10 Big Android Issues and Annoyances With These Apps | Drippler - Apps, Games, News, Updates & Accessories
  573. Hacking a Brand New Mac Remotely, Right Out of the Box
  574. [1808.02131] Piping Botnet - Turning Green Technology into a Water Disaster
  575. 6 Amazing Truecaller Features You Need to Use Regularly | Drippler - Apps, Games, News, Updates & Accessories
  576. Turn Off Your Fitbit, Garmin, Apple Watch GPS NOW!
  577. FCC net neutrality cyberattack wasn't real, says internal report
  578. Inside the boot camp reforming teenage hackers
  579. Security Lessons to Learn From Tactics of Indicted Russian Hackers
  580. Phishing Attack Volume Growing at Most Organizations, Mimecast Reports
  581. How to Measure and Boost Wi-Fi Signal Strength | Drippler - Apps, Games, News, Updates & Accessories
  582. Pentagon reveals a Do Not Buy software list as a cybersecurity measure
  583. ​Spam is getting smarter and we're still falling for it | ZDNet
  584. Here are the Android apps you should check out this week | Drippler - Apps, Games, News, Updates & Accessories
  585. How Sellers Trick Amazon to Boost Sales
  586. How to Tell Whether Expired Food Is Safe to Eat
  587. Password Manager Vulnerability - Dashlane - Laconic Wolf
  588. Google Lens is a student's best friend: How to copy-paste text from the real world | Drippler - Apps, Games, News, Updates & Accessories
  589. Best Android Apps 2018 - Fun, Secret and Unique Apps You're Not Using
  590. Motherfucking Website
  591. Here’s how hackers could cause chaos in this year’s US midterm elections
  592. How to Secure Your Accounts With Better Two-Factor Authentication
  593. Best Midwest Road Trips in the U.S.
  594. 5 Reasons You Should Switch From Windows To Linux Right Now
  595. This map shows the US really has 11 separate 'nations' with entirely different cultures
  596. Social Security Issues Warning About Scams Similar To Those IRS Phone Scams
  597. How to Make Your Wifi Router as Secure as Possible
  598. How to Protect Yourself From SIM Swapping Hacks
  599. The SIM Hijackers
  600. The 6 Fundamental Differences Between Religion and Spirituality
  601. Best Toffee Ever - Super Easy Recipe
  602. Top 30 Eclipse Keyboard Shortcuts for Java Programmers - DZone Java
  603. best pebble replacement - Google Search
  604. How Russian Spies Hid Behind Bitcoin in Hacking Campaign
  605. Delaware to test blockchain-based business filing system
  606. The Worst Cybersecurity Breaches of 2018 So Far
  607. Apple's new USB security feature has a major loophole
  608. Understanding How IBM And Others Use Blockchain Technology To Track Global Food Supply Chain
  609. Five Ways Digital Assistants Pose Security Threats in Home, Office
  610. The Worst Cybersecurity Breaches of 2018 So Far
  611. All the Ways iOS 12 Will Make Your iPhone More Secure
  612. 5 reasons Amazon Key in-home delivery shouldn't freak you out
  613. 5 Best Alternatives to Gboard for Android | Drippler - Apps, Games, News, Updates & Accessories
  614. Hackers use phoney invoice email to trick you into downloading malware | ZDNet
  615. 10 technologies leading digital transformation in retail | ZDNet
  616. Gmail and other services let third parties read users' emails
  617. Google's Gmail controversy is everything people hate about Silicon Valley
  618. How to WPA3 Can Boost Your Organization's Wireless Security
  619. California Unanimously Passes Historic Privacy Bill
  620. Demystifying the Blockchain
  621. The Next Generation of Wi-Fi Security Will Save You From Yourself
  622. Distracted Driving Is Out of Control, and There's No Single Cure
  623. Customize Your Mac's Touch Bar with BetterTouchTool
  624. Secret settings hidden in your Android phone will make it feel twice as fast
  625. Is your favorite novel on this PBS list of 100 popular books? Get ready to vote
  626. A hacker figured out how to brute force an iPhone passcode
  627. 5 iOS 12 Features That Will Make Your Life Easier
  628. Use an Index Card to Learn How to Speed Read


  1. How to take full advantage of Android 10's privacy-reclaiming powers
  2. Take These Steps Before Installing Android 10 on Your Phone
  3. Linux on your laptop: Here's what you need to know about UEFI firmware | ZDNet
  4. The best Android file manager apps
  5. Working with variables on Linux
  6. The best Android keyboard apps for on-the-go productivity
  7. Two thirds of Android antivirus apps don't work properly
  8. Know When Malware Tries to Access Your Mac's Camera or Mic With This App
  9. What is Linux? Everything you need to know about the open-source operating system
  10. How to identify shell builtins, aliases and exe files on Linux systems
  11. Command-Line Tip: Put Down the Pipe | Linux Journal
  12. Testing openSUSE, Manjaro, Debian, Fedora, and Mint Linux distributions on my new laptop | ZDNet
  13. How to Speed up Your Mac | Digital Trends
  14. Android security: Analysis, advice, and next-level knowledge
  15. 13 Best File Managers for Linux Systems
  16. systemd-analyze plot - Google Search
  17. Microsoft Pledges to Protect Linux and Open Source With Its Patents
  18. Understanding Bash: Elements of Programming | Linux Journal
  19. 10.6. Creating and Modifying systemd Unit Files - Red Hat Customer Portal
  20. systemd file locations fedora - Google Search
  21. With Linux’s founder stepping back, will the community change its culture?
  22. bash howto - Google Search
  23. The Best New Features to Try in iOS 12
  24. 10 best email apps for Android
  25. Microsoft’s bid to secure the Internet of Things: Custom Linux, custom chips, Azure
  26. The best Android file manager apps
  27. Fedora 28 Set to Deliver New GNOME Linux Desktop for Workstations
  28. Why not the best? Why not Linux Mint?
  29. 21 keyboard shortcuts Mac users need to know
  30. 10 Ways KDE Is a Better Linux Desktop Than GNOME
  31. How to Install Software on Linux
  32. 7 Useful macOS Tricks You Might Not Know
  33. How to mount an ISO image/file under Linux - nixCraft
  34. Five hidden features of Android 8.0 Oreo you should be using
  35. Home - FUSE for macOS
  36. Mingis on Tech: All about Android 8.0 'Oreo'
  37. 24 Things You Can Do in iOS 11 That You Couldn't Before
  38. iOS 10 Tips and Tricks for iPad - Apple Support
  39. iOS 11 improvements that Apple wants to tell you about
  40. Apple shows you how to use iOS 11 on iPad Pro
  41. Linux Operating Systems for The Paranoid: What Are The Most Secure Options?
  42. How to run multiple commands in sudo under Linux or Unix
  43. OpenSnitch: The Little Snitch application like firewall tool for Linux
  44. The 10 Best Launchers for Android | Drippler - Apps, Games, News, Updates & Accessories
  45. The Best Email Client for MacOS
  46. How to Use Your Bash History in the Linux or macOS Terminal
  47. Apple Clips (for iPhone)
  48. Mac Users Should Ditch Google Chrome for Safari
  49. Bixby Brings Samsung Smartphones Into the Personal Assistant Era
  50. Linux Commands - Overview and Examples
  51. Parrot Security OS 3.5 Improves Linux Security Tools Distribution
  52. All the Folders You Can Probably Exclude From Your Mac's Backups
  53. What’s the Difference Between Bash, Zsh, and Other Linux Shells?
  54. How to create Kali Linux bootable USB live in windows 10
  55. WiFi Pineapple NANO: Kali Linux 2.0 Internet Connection Sharing
  56. Which Linux File System Should You Use?
  57. How to find all hard links in a directory on Linux
  58. How to setup a Linux server on Amazon AWS,
  59. 5 Interesting New Photo Viewing and Editing Apps to Download
  60. The Most Used Linux Terminal Commands and What They Do
  61. Five Tools for Beginners that Power Up the Command Line
  62. Linux command line navigation tips/tricks 3 - the CDPATH environment variable
  63. How to Copy Multiple Things to Your Mac’s Clipboard at Once
  64. Advanced Bash-Scripting Guide
  65. My First 10 Minutes On a Server - Primer for Securing Ubuntu
  66. How to split a large archive file into multiple small files using Split command in Linux
  67. GNU GRUB Manual 2.00
  68. Android 7.1's Keyboard Is Hiding a Handy New GIF Search Tool
  69. Pixel Phones Bought From Google Will Have Unlockable Bootloaders
  70. 7 Reasons Why You Should (and Shouldn’t) Dual Boot Linux
  71. Systemd - FedoraProject
  72. SysVinit explained: starting and stopping of services | linuxvoodoo.com
  73. Boot process, Init and shutdown
  74. Meet systemd, the controversial project taking over a Linux distro near you
  75. systemd - Wikipedia, the free encyclopedia
  76. The Story Behind 'init' and 'systemd': Why 'init' Needed to be Replaced with 'systemd' in Linux
  77. linux startup systemd vs systemv - Google Search
  78. 10 Most Valuable Features in Apple's macOS Sierra
  79. Apple to fix backup security vulnerability in iOS 10
  80. Top 10 iOS 10 Features for iPad
  81. 12 hidden features in iOS 10
  82. Top 10 Terminal Tricks in macOS
  83. Kali Linux 2016.2 Delivers New Security Testing Options
  84. linux distro comparison - Google Search
  85. Bash Guide for Beginners, Free Machtelt Garrels Guide
  86. 5 of the Best Antivirus Programs for Ubuntu - Make Tech Easier
  87. Linux Took Over the Web. Now, It’s Taking Over the World
  88. LinuxCon: Tracing Linux's Roots, Mapping Its Future
  89. Linux at 25: What's Behind Its Success and Where It's Going
  90. How To Create ISO Files In Linux
  91. How Net Neutrality Works, And How It Affects You
  92. What You Must Know About Linux Rootkits
  93. How to Install Encfs and Encrypt Files in Mac OS X - Make Tech Easier
  94. Three Ways to Password Protect Folder on Mac OS X(El Capitan Included)
  95. How to Lock A Folder on Mac for Free without Software(El Capitan Included)
  96. Run Android Apps on Linux with Shashlik
  97. Cyborg Hawk Linux - Penetration Testing Linux Distro - Darknet - The Darkside
  98. Parallels, VMware, VirtualBox & Boot Camp face off
  99. Fedora 23 Improves Security, Desktop and Cloud
  100. 11 Hidden OS X El Capitan Features You Might Not Know About
  101. How to Use OS X’s New Split Windows View
  102. How to Enable Android 6.0’s Experimental Multi-Window Mode
  103. How to Easily Select Your Default Apps in Android 6.0
  104. How to Use Android 6.0’s Built-in File Manager
  105. How to speed up your internet connection on Linux
  106. 14 Things You Can Do in Android Marshmallow That You Couldn't Do in Lollipop
  107. How to Install and Configure CSF (Config Server Firewall) on CentOS 7
  108. How to Change a USER and GROUP ID on Linux For All Owned Files
  109. The Beginner’s Guide to Shell Scripting: The Basics
  110. systemd
  111. How To SSH Run Multiple Command On Remote Machine And Exit Safely
  112. Howtoforge Linux Tutorials.
  113. BackBox Linux - Penetration Testing LiveCD - Darknet - The Darkside
  114. Top 3 Online Resources For Learning The Command Line
  115. Debugging Bash scripts
  116. Bash Shell PS1: 10 Examples to Make Your Linux Prompt like Angelina Jolie
  117. Intel's New Processors Bring 'Most Significant Advancements in Computing'
  118. Linus Torvalds Talks Linux Security at LinuxCon
  119. 5 YouTube Videos to Help You Get Started with Linux
  120. 4 of the Best Markdown Editors for Linux
  121. 5 Cool Android Camera Tricks with Camera360 Ultimate
  122. VirtualBox error "VT-x is disabled in the BIOS. (VERR_VMX_MSR_VMXON_DISABLED)"
  123. 22.9. Enabling Intel VT-x and AMD-V virtualization hardware extensions in BIOS
  124. virtualbox.org • View topic - Error after upgrade:VT-x is not available. (VERR_VMX_NO_VMX)
  125. Pentoo - Gentoo Based Penetration Testing Linux LiveCD - Darknet - The Darkside
  126. Rosetta Stone for Unix
  127. Linux Vs Unix: The Crucial Differences That Matter To Linux Professionals
  128. What Really Happens When You Delete Something from Your PC
  129. Android Lollipop: Taking mobile security to a new level
  130. Linux File Systems: Ext2 vs Ext3 vs Ext4
  131. General overview of the Linux file system
  132. Comparison of Linux distributions - Wikipedia, the free encyclopedia
  133. Linux Journal | The Original Magazine of the Linux Community
  134. How To Easily Enable Silverlight, And Watch Netflix, on Linux
  135. netfilter/iptables project homepage - The netfilter.org project
  136. I have a SysV init script on Fedora 18. How can I make it start after the network is ready? - Stack Overflow
  137. KDE System Administration/Startup - KDE TechBase
  138. Glx-Dock / Cairo-Dock - Home
  139. LibreOffice Review & Rating | PCMag.com
  140. Using Linux in a Windows world
  141. The Best Navigation App for iOS
  142. Demystifying Android 4.2 Jelly Bean | ExtremeTech
  143. Buzzblog: EXCLUSIVE: Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  144. Bartender Cleans Up Your Mac’s Menubar
  145. Opening the OS X Firewall for your Server
  146. Top 10 Downloads That Enhance Mac OS X's Built-In Tools | Digg Technology
  147. NTFS-3G for Mac OS X: NTFS-3G 2009.4.4
  148. Mounting remote filesystems on OSX Leopard using sshfs, MacFuse and Macfusion
  149. Mac Os X: Mount NFS Share / Set an NFS Client
  150. 10.6: Mount remote Linux sshfs disks in 64-bit 10.6 - Mac OS X Hints
  151. The MacPorts Project -- Home
  152. The Best News Reader Application for Linux
  153. Eight tips for OS X's Quick Look | Macworld
  154. The Best Virtual Assistant for Android
  155. SlingPlayer (Kindle Fire Edition) Review & Rating | PCMag.com
  156. 15 Apps and Tweaks That May Convince You to Jailbreak Your iPhone
  157. OSXFUSE for Mac
  158. The best tidbits from the Steve Jobs bio - CNN.com
  159. Linux Desktop Faceoff: GNOME 3 Shell vs Ubuntu Unity
  160. 15 Free Apps for Personalizing Your Android Phone
  161. Systemd - FedoraProject
  162. 18 ways to view the ~/Library folder in Lion | Operating Systems | Macworld
  163. MacBook Air and OS X Lion synergy: A big hurdle for Windows 8 | ZDNet
  164. Virtualboxes.org Helps You Discover Your New Favorite Linux Flavor with Tons of Virtualbox Images
  165. Top 10 Secret Features in Mac OS X Lion
  166. Linux 3.0 a Steady Step Forward | PCWorld
  167. Oracle VM VirtualBox
  168. Get the Linux Mint GNOME Menu in Ubuntu [Linux Tip]


  1. The evolution of Apple's iPhone
  2. 11 reasons I'm buying an Apple iPhone 11 Pro instead of a Samsung Galaxy Note 10 Plus | ZDNet
  3. iPhone 11, 11 Pro and 11 Pro Max specs vs. iPhone XR, XS and XS Max: What's new and different
  4. Apple will release iOS 13 and watchOS 6 on September 19, macOS Catalina in October
  5. Apple iPhone event 2019
  6. Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks
  7. European regulators to Microsoft: We’re watching you
  8. Apple, Foxconn Broke a Chinese Labor Law to Build Latest iPhones
  9. Samsung Just Announced Its Most Astonishing Product Yet, and It's a Great Example of How to Recover From Failure
  10. McDonald's Just Made a Truly Stunning Change to Its Menu. (There's Only 1 Little Problem)
  11. Unprecedented Cyberattack Hit the US Power Grid
  12. Lime brings electric scooter Group Ride option to US so you'll stop riding tandem - Electrek
  13. Google can’t fix the Android update problem
  14. How to Access Google's Secret Easter Eggs in Android 9 and Android 10
  15. 14 easy ways to cut back on data use in Android
  16. Millions of Android phones vulnerable to phishing attacks | SC Media
  17. Roku Debuts a Soundbar, and It Comes With a Roku Built In
  18. USB4 gets final approval, offers Ethernet-like speed
  19. Hackers Ask for $5.3 Million Ransom, Turn Down $400k, Get Nothing
  20. Here's every way Samsung fixed the Galaxy Fold
  21. https://www.wired.com/story/android-10-best-new-features/
  22. A Mass Cyberattack on more that 100,000 iPhones Just Reported. Here's How To Protect Yourself.
  23. What You Need To Know About U.S. Election Security And Voting Machines
  24. 5G won't replace 4G: Debunking all the 5G myths
  25. Airlines Are Banning MacBooks in Checked Luggage Regardless of Recall Status
  26. Video, reports of machines automatically changing votes in Mississippi GOP Governor runoff
  27. WSJ News Exclusive | National-Security Concerns Threaten Undersea Data Link Backed by Google, Facebook
  28. Instagram phishing scam uses fake 2FA code to appear trustworthy
  29. Disney Plus: Disney's streaming service opens preorders at a big discount
  30. Downloads – Oracle VM VirtualBox
  31. How Amazon convinces police to sign up with Ring
  32. Rockville Center School District pays $88,000 ransom | SC Media
  33. YouTube adds labels to videos w/ public, government funding - 9to5Google
  34. Employees connect nuclear plant to the internet so they can mine cryptocurrency | ZDNet
  35. Amazon's Ring wants police to keep these surveillance details from you
  36. Anti-surveillance clothes foil cameras by making you look like a car
  37. Google Nest cameras won't let you turn off light that shows you're recording
  38. U.S. Carried Out Cyberattacks on Iran
  39. A Guide to Using Tor on Android: Apps, Privacy, and More | Drippler - Apps, Games, News, Updates & Accessories
  40. Exclusive: Google Is Banning A Play Store Developer With More Than Half A Billion App Installs
  41. I consistently recommend smartphones from a company that few in the US have ever heard of over Apple's iPhones or Samsung's Galaxy phones — this is why
  42. Best Android antivirus? The top 12 tools
  43. Ransomware ravages municipalities nationwide this week | SC Media
  44. 13 signs your software project may be doomed
  45. Galaxy Fold loss could help other foldable phones
  46. Essential traits of business-driven IT leaders
  47. Thousands of leaked Facebook documents show Mark Zuckerberg as ‘master of leverage’ in plan to trade user data
  48. Microsoft Email Hack Shows the Lurking Danger of Customer Support
  49. Hands-on with the Samsung Galaxy Fold: more than just a concept
  50. Apple’s latest iMacs are fast and familiar
  51. 15 Months of Fresh Hell Inside Facebook
  52. Amazon’s Alexa isn’t just AI — thousands of humans are listening
  53. How AI Data Actually Moves from Collection to Algorithm
  54. Your next car may not allow you to speed on the highway
  55. 'Exodus' Spyware Posed as a Legit iOS App
  56. Facebook is still tracking you after you deactivate your account
  57. Larry Sanger wants Everipedia to be a post-truth Wikipedia
  58. Massive bank app security holes: You might want to go back to that money under the mattress tactic
  59. 74 Facebook groups for cybercriminals found | SC Media
  60. Airbnb Guests Find Hidden Camera Live-Streaming Their Stay
  61. Verizon flips on 5G for phones in parts of Chicago and Minneapolis
  62. Elizabeth Warren introduces bill that could hold tech execs responsible for data breaches
  63. These Chinese hackers tricked Tesla's Autopilot into suddenly switching lanes
  64. Google begins shutting down its failed Google+ social network
  65. Why did Apple kill its AirPower wireless charger?
  66. WhatsApp launches fact-check service to fight fake news during...
  67. This free team collaboration app is changing how teams work together
  68. Georgia Tech stung with 1.3 million-person data breach | SC Media
  69. New Intel Chip Bug Can Expose All Data on a Computer to Hackers
  70. Facebook Had an Incredibly Busy Weekend
  71. Android security report confirms the two best ways to stay safe
  72. usaa-pilots-iot-technology-to-detect-need-forhome.html
  73. HTTPS Isn't Always As Secure As It Seems
  74. Apple News
  75. Apple Launches TV App, Credit Card, Subscription Services
  76. 6 secrets to CISO job longevity
  77. How Cloud Environments Will Evolve During Next Few Years
  78. Safety-Obsessed Volvo Goes After Distracted, Speedy Drivers
  79. Just Wait Until Cars and Cities Start Talking Amongst Themselves
  80. Facebook’s blockchain cryptocurrency could mean big money – and kill 'fake news'
  81. The death of the VPN - It’s time to say goodbye | SC Media
  82. New York Times CEO warns publishers ahead of Apple news launch
  83. UPS plans to deliver vaccine-toting nurses to your doorstep
  84. You Need to Protect Your Website Against Formjacking Right Now
  85. Don't Kill Rogue Cloud Accounts, Embrace Them
  86. CTO view: the convergence of information and operation technology
  87. Report: Downed 737s Lacked Two Safety Features Because Boeing Charged Extra for Them
  88. Facebook’s leaked moderation rules show why Big Tech can’t police hate speech
  89. Google’s upcoming Pixel 4 and Pixel 4 XL look stunning in these new renders
  90. Microsoft announces Xbox Live for any iOS or Android game
  91. This Big Facebook Critic Fears Tech’s Business Model
  92. The Huawei Case Is Part of a New US–China Cold War Over Tech
  93. Please, for the Love of God, Make Sure You Delete Things Properly
  94. Samsung Could Kill the TV Power Cable Forever
  95. Samsung Working on Two More Foldable Smartphones
  96. Alphabet’s Chronicle finally reveals its cybersecurity moonshot
  97. CMS hackers focus on WordPress | SC Media
  98. IRS warns of new tax-related phishing scams | SC Media
  99. What is Mimikatz? And how this password-stealing tool works
  100. Google Glass’ second-gen enterprise model leaks with updated specs and USB-C
  101. Windows by the numbers: Windows 7 is one obstinate OS
  102. Hack Brief: Google Reveals 'BuggyCow,' a Rare MacOS Zero-Day Vulnerability
  103. 9 biggest hurdles to AI adoption
  104. In the Rush to Join the Smart Home Crowd, Buyers Should Beware
  105. Analysis | The Technology 202: Policymakers sound alarms as Facebook quietly collects sensitive data from apps
  106. A very merry Christmas at Best Buy with sales booming | Fox News
  107. The best new smartphones and gadgets from Mobile World Congress 2019
  108. New FTC task force will take on tech monopolies
  109. The 8 toughest decisions IT leaders face
  110. Facebook working on a new class of semiconductor, AI researcher suggests
  111. Apple and Goldman Sachs are reportedly teaming up to offer a joint credit card
  112. Containers: The pros and cons you may not know about
  113. Smartphone makers are pricing themselves out of the market
  114. HTC Goes All In on Easy-to-Use VR, But Not For Everyone
  115. You Give Apps Sensitive Personal Information. Then They Tell Facebook.
  116. Apple Plans on Combining iPhone, iPad, Mac Apps by 2021
  117. Cogitai Unwraps ‘Self-Learning’ AI Platform for Business
  118. Twitter names first international markets to get checks on political advertisers
  119. Google presents its anti-fake news system in detail
  120. Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes
  121. Six Advantages of Human-aided, 'Artificial' Artificial Intelligence
  122. Microsoft: Russian hackers are trying to influence EU elections
  123. Farmworkers vs robots: Will tomorrow fruit pickers be made of steel and tech?
  124. This Company Takes the Grunt Work Out of Using the Cloud
  125. Serverless: The future of cloud computing?
  126. Facebook Could Pay Multi-Billion Dollar Fine in FTC Settlement
  127. Amazon Bought A Router Company You've Never Heard Of. Here Is Why It's A Huge Deal.
  128. 7 ways to ensure IT gets the credit it deserves
  129. Five ways professionals will experience 5G, and when | ZDNet
  130. Microsoft lampoons Office 2019 in PR pitch for Office 365
  131. 6 secrets of customer-facing CIOs
  132. Full-stack developer: What it is, and how you can become one
  133. Apple's Chinese competitors figured out how to make better Apple products than Apple
  134. This is the best-looking smartphone we've ever seen, even better than the iPhone — take a look
  135. It’s the Real World—With Google Maps Layered on Top
  136. Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess
  137. Amazon Joins Microsoft's Call for Rules on Facial Recognition
  138. How to pick the perfect backpack for your laptop
  139. Someone at Samsung thinks a stylus with a camera is a good idea
  140. This is how Disney is going to compete against Netflix
  141. Remote Desktop Protocol flaws could be exploited to attack RDP clients
  142. Why People Still Don’t Buy Groceries Online
  143. Walmart Grocery
  144. Why It May Be Time to Break Up Facebook
  145. Why Amazon's AWS Cloud Business Will Continue to Grow
  146. Samsung's Galaxy S10 phones will support next-generation WiFi
  147. Ikea's Slow and Steady Plan to Save the Smart Home
  148. Streaming Services Are Beginning To Look Like Cable Companies
  149. The real lesson of Facebook's Apple dust-up shows why Zuckerberg's 'hacker way' is even more dangerous than we thought
  150. Apple Planning Netflix for iOS Games (Report)
  151. How to run Windows 10 on an iPad Pro or on Android
  152. Red Hat Advances Container Technology With Podman 1.0
  153. Apple's services help anchor a company rocked by slow iPhone sales
  154. The world’s most valuable resource is no longer oil, but data
  155. Facebook got caught paying people $20 a month to let them spy on their phones
  156. Data Privacy Improves Business Outcomes, Cisco Finds
  157. How SD-WAN can improve your security strategy
  158. Mark Zuckerberg’s WSJ op-ed was a message to would-be regulators: Hands off our ad business
  159. Checking In? No Thanks. I’m Just Here to Use the Wi-Fi.
  160. Is Big Tech Merging With Big Brother? Kinda Looks Like It
  161. Amazon Go, One Year Old, Has Attracted a Host of Cashierless Imitators
  162. Hulu is cutting the price of its most popular streaming service — and raising the price of its most expensive one
  163. The Waze features you’ve always wanted in Google Maps are finally coming to Android and iPhone
  164. France fines Google nearly $57 million for first major violation of new European privacy regime
  165. Why Did NASA, Lockheed Martin, and Others Spend Millions on This Quantum Computer?
  166. Thanks, Netflix (and Google): You've Just Confirmed Everyone's Worst Fear About the Cloud
  167. Commentary: These Are the Challenges Tech Giants Will Face in 2019
  168. Amazon Ruined Online Shopping
  169. Fool me once...
  170. Predictions 2019: What's in Store for Enterprise Information Practices
  171. Why the Netflix Price Hike Makes Sense
  172. A Sleeping Tesla Driver Highlights Autopilot's Biggest Flaw
  173. Quora breach leaks data on over 100 million users
  174. Robot Janitors Are Coming to Mop Floors at a Walmart Near You
  175. Marriott reveals data breach affecting 500 million hotel guests | ZDNet
  176. Half of all Phishing Sites Now Have the Padlock — Krebs on Security
  177. Marc Zuckerberg, Elon Musk and bitcoin top this year's list of Tech Turkeys
  178. Censored Planet
  179. Russian hackers are trying out this new malware against US and European targets | ZDNet
  180. Retail IoT is still coming into its own in 2019
  181. Amazon’s HQ2 stunt could come back to haunt it
  182. Microsoft launches blockchain development kit
  183. The rare form of machine learning that can spot hackers who have already broken in
  184. How The Wall Street Journal is preparing its journalists to detect deepfakes
  185. Best Antivirus Software and Apps 2018


  1. 2fa explained: How to enable it and how it works
  2. Wave goodbye to passwords: Soon you could unlock your PC just by holding up your hand | ZDNet
  3. US Govt. plant USB sticks in security study, 60% of subjects take the bait
  4. Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users
  5. How to Delete Online Accounts You No Longer Need
  6. Wipe Data From Your Car Before Selling It
  7. The zero trust model explained | SC Media
  8. Facebook will no longer scan user faces by default
  9. Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash | ZDNet
  10. Cyberwar: The Complete Guide
  11. Face It -- Biometrics To Be Big In Cybersecurity
  12. The World's First Cyber Crime: The Morris Worm [KERNEL PANIC]
  13. Capital One hack shows difficulty of defending against irrational cybercriminals
  14. Microsoft: Using multi-factor authentication blocks 99.9% of account hacks | ZDNet
  15. Examining and addressing threat detection and response challenges
  16. The bogus-check scam is back, in the form of a car-wrap offer
  17. The most stressful aspects of being a cybersecurity professional
  18. 10 Best Password Manager Apps (2019 Updated) | Drippler - Apps, Games, News, Updates & Accessories
  19. The growing backlash against facial recognition tech
  20. Hackers Found a Freaky New Way to Kill Your Car
  21. Check your access control permissions before hackers do
  22. DNS hijacking campaign targets national security organizations
  23. Microsoft Office now the most targeted platform, as browser security improves
  24. Opinion | We Built an ‘Unbelievable’ (but Legal) Facial Recognition Machine
  25. Wipro clients hit after firm falls for phishing attack | SC Media
  26. Data on Thousands of Law Enforcement Personnel Exposed in Breach
  27. Is Using Public WiFi Still a Bad Idea?
  28. Tracking Phones, Google Is a Dragnet for the Police
  29. Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography | SC Media
  30. Crypto-Gram: April 15, 2019 - Schneier on Security
  31. Use Your Android Phone as a Security Key for Signing into Websites
  32. Inside an Epic Hotel Room Hacking Spree
  33. Incognito mode won’t keep your browsing private. Do this instead
  34. Google Offers Built-In Security Key Feature for Android Phones
  35. Three lessons from the top cybersecurity threats of 2018 | SC Media
  36. How to Fight the Threat of USB Thumb Drives
  37. Call to delay use of Police Scotland data devices
  38. Facial recognition can speed you through airport security, but there's a cost
  39. How the EverCrypt Library Creates Hacker-Proof Cryptography | Quanta Magazine
  40. Facial recognition raises real ethical questions
  41. What Sony's robot dog teaches us about biometric data privacy
  42. Insurance Companies collaborate to offer Cybersecurity ratings | SC Media
  43. How to Protect Your Enterprise PCs Against Fake Updates
  44. Why 2019 will prove biometrics aren’t a security “silver bullet” | SC Media
  45. Crypto-Gram: March 15, 2019 - Schneier on Security
  46. Amex, Netflix customers targeted in phishing campaign | SC Media
  47. Here's how to view, download, and delete your personal information online
  48. Facebook Stored Millions of Passwords in Plaintext—Change Yours Now
  49. Facial recognition: Apple, Amazon, Google and the race for your face
  50. Locking More Than the Doors as Cars Become Computers on Wheels
  51. US Government Forging Ahead With Airport Facial Recognition Plans | Transportation | TechNewsWorld
  52. The Five Most Dangerous New Attack Techniques
  53. Will PSD2 Finally Kill The Password? | SC Media
  54. These are the 12 most common phishing email subject lines cyber criminals use to fool you | ZDNet
  55. 3 ways to monitor encrypted network traffic for malicious activity
  56. Phishing attacks: Half of organisations have fallen victim in last two years | ZDNet
  57. The NSA Makes Its Powerful Cybersecurity Tool Open Source
  58. Are employees the weakest (cybersecurity) link? Sometimes | SC Media
  59. Linux servers targeted by new Chinese crypto-mining group | ZDNet
  60. Fool ML once, shame on you. Fool ML twice, shame on... the AI dev? If you can hoodwink one model, you may be able to trick many more
  61. Microsoft wants to use blockchain to secure your identity
  62. Hackers Can Slip Invisible Malware into Some Cloud Computers
  63. NATO Group Catfished Soldiers to Prove a Point About Privacy
  64. Password manager flaws can expose data on compromised devices, report says | SC Media
  65. Using the zero trust model to prevent phishing | SC Media
  66. Explainer: What is quantum communication?
  67. The Wired Guide to Your Personal Data (and Who Is Using It)
  68. What is a man-in-the-middle attack? How MitM attacks work and how to prevent them
  69. What is phishing? How this cyber attack works and how to prevent it
  70. Scammer groups are exploiting Gmail 'dot accounts' for online fraud | ZDNet
  71. Major DNA testing company is sharing genetic data with the FBI
  72. Your digital identity has three layers, and you can only protect one of them
  73. Why Data Privacy Is About More Than Just Security
  74. Phishing attacks posing as missed voicemails nab credentials | SC Media
  75. What is a supply chain attack? Why you should be wary of third-party providers
  76. How WhatsApp Merger With Facebook Messenger Puts Your Privacy At Risk
  77. 12 Simple Things You Can Do to Be More Secure Online
  78. How Enterprises Need to Handle Today’s Threat Landscape
  79. Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security
  80. What is spear phishing? Why targeted email attacks are so difficult to stop
  81. Why Enterprises Need to Crack Down on Lazy Logins
  82. Why Marriott Breach Includes Some Valuable IT Lessons
  83. Data breaches can sucker-punch you. Prepare to fight back
  84. Marriott breach exposes more than just customer info | SC Media
  85. Hackers target Dell customer information
  86. Lawmakers call for data security legislation in wake of Marriott breach
  87. Cybercrime and cyberwar: A spotter's guide to the groups that are out to get you | ZDNet
  88. Cyberwar predictions for 2019: The stakes have been raised | ZDNet
  89. Survey shows IT professionals concerned about cyberwarfare, end users, and conducting international business | ZDNet
  90. Little FYI: Wi-Fi calling services on AT&T, T-Mobile US, Verizon are insecure, say boffins
  91. Mobile Phone Security: All You Need to Know | Cybersecurity | TechNewsWorld
  92. Be Warned: Customer Service Agents Can See What You're Typing in Real Time
  93. New cryptominer seeks out root permissions on Linux machines | SC Media
  94. The FBI Created a Fake FedEx Website to Unmask a Cybercriminal
  95. USPS fixes 'Informed Delivery' flaw that exposed 60M users | SC Media
  96. Career advice: Good enough security trumps best security
  97. Surveillance Kills Freedom By Killing Experimentation
  98. IRS Issues Urgent Warning On Tax Transcript Scam
  99. What network pros need to know about IoT
  100. Utilizing the Human Element to Mitigate Today’s Sophisticated Cyber Threat Landscape
  101. Crypto-Gram: November 15, 2018 - Schneier on Security
  102. With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes
  103. Apache Struts vulnerability would allow system take over | SC Media
  104. Worst malware and threat actors of 2018 so far
  105. National biometric database could be on the way (and in private hands) | ZDNet
  106. Hackers are increasingly destroying logs to hide attacks | ZDNet
  107. Mobile device security: A guide for business leaders - Tech Pro Research
  108. How to keep your data secure and private, step by step
  109. ​The day computer security turned real: The Morris Worm turns 30 | ZDNet
  110. Cyber threats fueled by AI: Security's next big challenge
  111. DDoS and ransomware tools for starter and experienced cybercriminals exposed | SC Media
  112. Thieves steal a Tesla Model S by hacking the entry fob
  113. Free decryption tool released for multiple GandCrab ransomware versions | ZDNet
  114. Most consumers have cyber security concerns, but a fraction take action | ZDNet
  115. Create an Alias For Your iCloud Address to Maintain Your Online Privacy
  116. Tim Cooks warns of ‘data-industrial complex’ in call for comprehensive US privacy laws
  117. Latest Firefox takes aim at tracking cookies and promotes the use of VPN
  118. Every minute for three months, GM secretly gathered data on 90,000 drivers' radio-listening habits and locations
  119. U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections
  120. Six tips to stop phishing attacks | SC Media
  121. Securing Middle America: small towns more at risk of ransomware, phishing and more | SC Media
  122. 3 top multi-cloud security challenges, and how to build a strategy
  123. Facebook reportedly aims to buy a 'major' cybersecurity company
  124. 5 reasons eSignatures are the must-have tool you don't think about
  125. How to Stay Anonymous Online | Digital Trends
  126. 17 penetration testing tools the pros use
  127. Securing risky network ports
  128. Why CISOs Fumble With Understanding Security Needs
  129. Why Supply Chain Security a Serious Enterprise Problem
  130. Expanding attack surfaces and difficulties obtaining the right people worry NCSA panelists | SC Media
  131. Despite proposed solutions, DNS security issues remain in tech industry
  132. Crypto-Gram: October 15, 2018 - Schneier on Security
  133. 'Flash update' scam serves up legit software, but with a side of cryptominer | SC Media | SC Media
  134. Ransomware hits Madison County Idaho government | SC Media | SC Media
  135. It Only Took 9 Seconds to Guess a DOD Weapons System Password
  136. What is IAM? Identity and access management explained
  137. Apple, Amazon deny servers affected by China microchip plot | SC Media
  138. Five Trends in Attacks on Industrial Control Systems
  139. Apple, Amazon deny report that Chinese spy chips infiltrated their hardware
  140. China Used a Tiny Chip in a Hack That Infiltrated Amazon and Apple
  141. Digital IDs Are More Dangerous Than You Think
  142. Security News This Week: The Feds Can't Force Facebook to Wiretap Messenger
  143. Quantum computers could break encryption, so it’s going quantum too
  144. Everything We Know About Facebook's Massive Security Breach
  145. 5 biggest cybersecurity challenges at smaller organizations
  146. Trump's Immigration Cops Just Gave America's Hottest iPhone Hackers Their Biggest Payday Yet
  147. Four Security Questions Healthcare Organizations Must Address When Moving to the Cloud | SC Media
  148. Mobile Carriers Join Together for Project Verify Authentication Effort
  149. Five security settings in iOS 12 you should change right now
  150. What is Zero Trust? A model for more effective security
  151. Crypto-Gram: September 15, 2018 - Schneier on Security
  152. You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it
  153. A Decade-Old Attack Can Break the Encryption of Most PCs
  154. For safety’s sake, we must slow innovation in internet-connected things
  155. 6 ways companies fail at security fundamentals
  156. How to Send a Secret Image in Plain Sight
  157. Facebook launches Clear History feature that should have been there all along | ZDNet
  158. Mark Zuckerberg Says It Will Take 3 Years to Fix Facebook
  159. Everything Facebook Announced Today at F8
  160. Cyber security: Don't leave it to your tech team or you'll get breached, warns data protection chief | ZDNet
  161. Private web browsing doesn’t mean no one is watching
  162. Worse Than Y2K: Quantum Computing And The End Of Privacy
  163. Nine Best Practices for Keeping Bad Actors Out of a Database
  164. Crypto-Gram: April 15, 2018 - Schneier on Security
  165. The One Router Setting Everyone Should Change (But No One Does)
  166. How quantum computing could wreak havoc on cryptocurrency
  167. DNS Security with DNSCrypt | OpenDNS
  168. Amazon Advances Cloud Security, Storage Tools at AWS Summit
  169. How to Create Secure Passwords That Aren't Impossible to Type
  170. How to use Cloudflare's DNS service to speed up and secure your internet | ZDNet
  171. 10 Ways to tell if that email is legitimate...or not
  172. Are you ready? This is all the data Facebook and Google have on you | Dylan Curran
  173. StumbleUpon
  174. GitHub Survived the Biggest DDoS Attack Ever Recorded
  175. FBI's Use of Paid Best Buy Informants Goes Deeper Than We Knew
  176. IT pros don't learn from cyberattacks, study
  177. Apple App Store Scam Stealing Credit Cards: What to Do
  178. FTC warning users to do homework before using VPN apps
  179. DoubleDoor Botnet Chains Exploits to Bypass Firewalls
  180. Study shows which phishing attacks most successful
  181. Microsoft is trying to kill passwords. It can't happen soon enough
  182. Add a PIN to Your Smartphone Account
  183. Why Linux is better than Windows or macOS for security
  184. Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders
  185. Many businesses still using outdated security, says Troy Hunt
  186. Your Sloppy Bitcoin Drug Deals Will Haunt You for Years
  187. What Is Bitcoin, and How Does it Work?
  188. How does Bitcoin work? - Bitcoin
  189. New to Bitcoin?
  190. Best Password Managers 2018
  191. The Best VPN Services and Apps of 2018
  192. To Improve Cybersecurity, Start with Improving Human Behavior
  193. Watch a 10-Year-Old's Face Unlock His Mom's iPhone X
  194. Cybersecurity is dead – long live cyber awareness
  195. Google: Our hunt for hackers reveals phishing is far deadlier than data breaches | ZDNet
  196. Update Your Tor Browser to Prevent It From Leaking Your Real IP Address
  197. Know the risks of Amazon Alexa and Google Home
  198. 7 steps for crafting the perfect password
  199. T-Mobile Alerted ‘A Few Hundred Customers’ Targeted By Hackers
  200. Phishing Attacks: Which Departments Are Most at Risk?
  201. KRACK Attack Hacks All Wi-Fi Networks: What to Do
  202. How to Secure Your (Easily Hackable) Smart Home
  203. Security experts air concerns over hackers using AI and machine learning for phishing attacks
  204. Intelligence Experts Say Cyber-Thieves, Nation-State Hackers Teaming Up
  205. Cleartext passwords, and worse found among top 21 financial trading apps
  206. Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too
  207. Quantum Computing Poses Risks to Cryptography and Bitcoin

  208. DDoS protection, mitigation and defense: 7 essential tips
  209. Must-have Wi-Fi troubleshooting and management tools
  210. BlueBorne Bluetooth Flaws Put Billions of Devices at Risk
  211. Discovery Channel - The Secret History Of Hacking
  212. What’s the Difference Between a Fraud Alert, Security Freeze and Credit Lock?
  213. New Social Security Scam Targets Benefit Check Recipients
  214. Equifax breach: How to protect yourself
  215. Top secret data on former U.S. military personnel exposed on Amazon S3 repository
  216. Data breach exposes about 4 million Time Warner customer records
  217. Google Removes Malicious WireX DDoS Botnet Apps from Play Store
  218. Hacking Retail Gift Cards Remains Scarily Easy
  219. If Your Email Address Is On This List, Change Your Password Right Now
  220. TunnelBear: Secure VPN Service
  221. WannaCry Helps Push Cyber-Crime Attacks to New Heights in 2Q17
  222. Fuzzing Analysis Shows ICS, IoT Industries Most at Risk of Zero Days
  223. The Very Best Hacks From Black Hat and Defcon
  224. An Obscure App Flaw Creates Backdoors In Millions of Smartphones
  225. The Best VPN Services
  226. Galaxy S8 face recognition already defeated with a simple picture
  227. Private Internet Access, a VPN provider, takes out a full page ad in The New York Time calling out 50 senators.
  228. Here's how to wipe your old iPad/iPhone/iPod touch ready for resale | ZDNet
  229. A hacker explains why Trump using his old Android phone for Twitter could be a huge security threat
  230. For True Cyber Security, Using a USB Firewall Is Essential
  231. Say Hello to the Super-Stealthy Malware That’s Going Mainstream
  232. Abbrase - Abbreviated Passphrase Password Generator - Darknet
  233. Here's how protect your privacy from hackers and spies
  234. Sophisticated Phishing: Beware the Latest Gmail Phishing Attack | NewsFactor Network
  235. Hardening the Linux server
  236. 20 Linux Server Hardening Security Tips
  237. How to See Everything Your Browser Knows About You
  238. Online Security Made Easy
  239. This $5 Device Can Hack Your Locked Computer In One Minute
  240. Chinese company installed secret backdoor on hundreds of thousands of phones
  241. Beware, iPhone Users: Fake Retail Apps Are Surging Before Holidays
  242. Online Threats Still Rising as Mobile Malware Subsides: Kaspersky
  243. This evil office printer hijacks your cellphone connection
  244. After You Strengthen Your Passwords, Here’s How to Store Them
  245. Trending Mobile VPN Technologies That You Know Of - Information Security Buzz
  246. Information security set for steep trajectory, says (ISC)2
  247. Ethical Hacking Tutorials, Tips and Tricks
  248. Hacksplaining: Learn to Hack
  249. Internet Providers Could Be the Key to Securing All the IoT Devices Already out There
  250. Google's AI created its own form of encryption
  251. Forget the Touch Bar. The MacBook Pro’s Most Important New Feature Is Touch ID
  252. Better safe than sorry: 5 apps for encrypting and shredding files
  253. Attackers Hiding Stolen Credit Card Numbers in Images
  254. Federal Regulators Want Banks to Follow Better Cybersecurity Practices
  255. Crash: how computers are setting us up for disaster | Tim Harford
  256. No endgame for cyber security, says Mikko Hypponen
  257. 10 Tips for Identifying and Dealing With Phishing Email
  258. Tech Support Scams Evolve to Target Broader Range of Users
  259. Microsoft: Tech Support Scams Hit Two-Thirds of Consumers
  260. Hacking demo(messing with loud neighbors) - YouTube
  261. Feds Walk Into A Building. Demand Everyone's Fingerprints To Open Phones
  262. How a chunk of the web disappeared this week: GlobalSign's global HTTPS snafu explained
  263. Remove ransomware infections from your PC using these free tools | ZDNet
  264. Artificial intelligence-powered malware is coming, and it's going to be terrifying
  265. Rethinking Data Protection, Recovery in a Multi-Cloud World
  266. This Hacked Kids’ Toy Opens Garage Doors in Seconds
  267. Lack of IoT Security Is Huge Risk for Critical Enterprise IT Systems
  268. If you've ever created a Yahoo account, take these steps immediately to protect your data
  269. Yahoo under fire over data breach affecting 500 million users
  270. Security News: Cyber, IT, National Security | WIRED
  271. Cloud computing: Four reasons why companies are choosing public over private or hybrid clouds | ZDNet
  272. Dropbox Breach Exposes 68 Million Passwords
  273. Create a Strong Password Using These Tips and Tools
  274. LastPass Authenticator Two-Factor App Launch
  275. FedEx: Amazon would have to spend 'tens of billions' to compete with us
  276. 10 Great Security Tools You Should Be Using
  277. A Journey in the Life of an Encrypted Email
  278. 9 Facts About Computer Security That Experts Wish You Knew
  279. P0wned plug-in puts a million WordPress sites at risk of attack
  280. Why Security Awareness Alone Won't Stop Hackers
  281. The Top 8 Mobile Security Risks: How to Protect Your Organization
  282. 10 Security Apps to Help Your Android Device Fend Off Malware
  283. Schneier on Security: My Conversation with Edward Snowden
  284. Schneier on Security: January 15, 2015
  285. The Five Best Password Managers
  286. LastPass releases Open Source command line client • The Register
  287. Planning Considerations for BYOD and Consumerization of IT (Part 6)
  288. How To Use John The Ripper To Crack Passwords-BackTrack Tutorials For Beginners - Learn With Pranshu
  289. How to Tap Your Network and See Everything That Happens On It
  290. How to Hack Your Own Network and Beef Up Its Security with Kali Linux
  291. Google goes beyond two-step verification with new USB Security Key | Naked Security
  292. YubiKey Authentication | LastPass User Manual
  293. Frequently Asked Questions
  294. POODLE attack takes bytes out of your encrypted data – here’s what to do | Naked Security
  295. With This Tiny Box, You Can Anonymize Everything You Do Online | WIRED
  296. The Ultimate Wireshark Tutorial
  297. Apple Pay security: Hope abounds, but questions linger
  298. http://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf
  299. The Start-to-Finish Guide to Securing Your Cloud Storage
  300. Google’s Location History is Still Recording Your Every Move
  301. Nearly Half Of Americans Claim They've Changed Their Behavior Due To NSA | Techdirt
  302. The Beginner’s Guide to iptables, the Linux Firewall
  303. Here's Everywhere You Should Enable Two-Factor Authentication Right Now
  304. Introduction to Wireshark (Part 1 of 3)
  305. Following Best Coding Practices Doesn't Always Mean Better Security - Slashdot
  306. Aging networking protocols abused in DDoS attacks - security, Prolexic - Computerworld
  307. The 7 elements of a successful security awareness program - Network World
  308. SANS NewsBites
  309. Supply chain 2013: Stop playing whack-a-mole with security threats - Network World
  310. Schneier on Security: Pinging the Entire Internet
  311. Book Review: The Death of the Internet - Slashdot
  312. Review: OpenPuff steganography tool hides confidential data in plain sight | PCWorld
  313. 15 (FREE!) security tools you should try
  314. We suck at security, study says [infographic] | VentureBeat
  315. Hacker 10 – Security Hacker | Computer security tutorials, encryption and privacy software.
  316. Metasploit Helpful Tips | SOA World Magazine
  317. Dropbox Rolls Out Two-Step Verification; Use It
  318. Android Passwords are stored in plain text on Disk ~ THN : The Hacker News
  319. The 5 Biggest IT Security Mistakes | PCWorld
  320. Cellular network hijacking for fun and profit • The Register
  321. Forget Anonymous: Evidence Suggests GOP Hacked, Stole 2004 Election : politics
  322. Use Lion's FileVault 2 to encrypt your Mac's internal drive | Storage | Macworld
  323. Why you shouldn't trust Google (or any cloud service) with your data | ZDNet
  324. Default Router Passwords - The internets most comprehensive router password database
  325. Beware the All-Powerful Administrator - PCWorld
  326. Security Secrets the Bad Guys Don't Want You to Know
  327. Timeline: The History of Hacking


  1. Apple exec confirms cryptocurrency is on company radar
  2. The Most Incredible Gadget Apple Plans to Introduce This Fall Is Something You Never Saw Coming (Here's Why It's Brilliant)
  3. Amazon is planning to bring a biometric payment method to Whole Foods
  4. Steve Wozniak says Apple should have broken up years ago
  5. Wi-Fi 6 will double your network's range and triple its speed -- once you upgrade your router, phone, PC, and everything else
  6. Verizon automatically enrolling customers in free robocall-blocking service
  7. 8 technologies that will disrupt business in 2020
  8. Marriott to Expand Its Home-Sharing Business in a Challenge to Airbnb
  9. Restructuring IT for the digital age
  10. What iPhone? Apple's push toward services begins
  11. Smart TVs Are Cheaper Than Ever, and It's Because They're Selling Your Data
  12. Return your Amazon orders to any Kohl's store starting in July
  13. 7 steps to revenue-driven IT
  14. Apple settles with Qualcomm - the 5G iPhone looks more real (u)
  15. Will Apple need to spin out its services business?
  16. 3 signs you’re going overboard with cloud features
  17. 12 ways IT can create business value in 2019
  18. How AI is helping the help desk
  19. Google Needs to Grow Its Cloud Business—Very Carefully
  20. T-Mobile's streaming TV service will include Viacom channels
  21. Walmart partners with Google on voice-enabled grocery shopping
  22. Huawei's Problem Isn't Chinese Backdoors. It's Buggy Software
  23. The emerging 737 MAX scandal, explained
  24. Facebook Charged With Violating Fair Housing Laws
  25. What you should know about serverless computing before you start
  26. McDonald's Bites on Big Data With $300 Million Acquisition
  27. Google appoints an “AI council” to head off controversy, but it proves controversial
  28. Apple event 2019: Apple Card, TV Plus, News Plus, Arcade and everything just announced
  29. XaaS: Making the shift to services-oriented IT
  30. Top IT spending priorities for 2019
  31. Google's Netflix-like Stadia instantly makes it a video game powerhouse
  32. Google unveils Stadia cloud gaming service
  33. Google Spent Years On a Secret New Plan to Attack a $140 Billion Industry. It All Starts Tomorrow
  34. What customer-centric IT really looks like
  35. 4 takeaways from Apple and Qualcomm's big patent fight
  36. Apple dealt legal blow as jury awards Qualcomm $31 million
  37. How a 50-year design came back to haunt Boeing with its troubled 737 Max jet
  38. Here's how New T-Mobile plans to disrupt the current US in-home broadband market — and why it will be successful
  39. Amazon took over the $176 billion market for cloud computing. Now it's using the same playbook in logistics.
  40. Fitbit CEO James Park talks lessons learned from the company’s struggles
  41. Amazon Almost Killed Best Buy. Then, Best Buy Did Something Completely Brilliant
  42. New Wearables Cut Health Care Costs With Better Monitoring
  43. Facebook sues Chinese companies for selling fake accounts
  44. Facebook faces backlash over users' safety phone numbers
  45. No, Data Is Not the New Oil
  46. AT&T Breaks Up Turner, Bulks Up Warner Bros. in Major WarnerMedia Overhaul
  47. WSJ: Amazon to open new US grocery chain separate from Whole Foods
  48. Google looks to leave passwords behind for a billion Android devices
  49. Walmart Joins Amazon in Chase for Ad Dollars
  50. J.P. Morgan to launch a U.S. dollar-backed cryptocurrency
  51. Microsoft Wants Part Of This $180-Billion Industry
  52. AI, machine learning, and deep learning: The complete guide
  53. AR and VR bring a new twist to collaboration
  54. Information Technology Outsourcing Market (ITO) report for 2019 made available by top research firm
  55. Amazon Gobbles Up Eero to Round Out Its Smart Home Plan
  56. FDA approves AI-powered diagnostic that doesn’t need a doctor’s help
  57. T-Mobile/Sprint merger turns two disruptors into one “mega company,” Dems warn
  58. Maybe Ron Johnson Was Right About J.C. Penney After All -- The Motley Fool
  59. IoT for retailers: opportunities and challenges
  60. IBM Buying Open Source Specialist Red Hat for $34 Billion
  61. IBM's acquisition of Red Hat is huge news for the Linux world
  62. Forget Watson, the Red Hat acquisition may be the thing that saves IBM
  63. IBM to acquire Red Hat in deal valued at $34 billion
  64. 5 ways AI is transforming customer experience
  65. How Enterprises Can Help Build Ethical AI Strategies
  66. Amazon's Echo devices get redesign on the way to world domination
  67. Tech Disrupted the World. Who Will Shake up the Next 25 Years?
  68. Fitbit buddies up with Google for better health
  69. How to build a business case for Artificial Intelligence
  70. Sprint and T-Mobile Are Officially Merging, and It's Terrible
  71. T-Mobile, Sprint agree to merge as America's national wireless carriers shrink from 4 to 3
  72. Ford will stop selling most of its cars in North America
  73. Battle between Apple and Microsoft is over | Cult of Mac
  74. Ford to stop selling every car in North America but the Mustang and Focus Active
  75. How Artificial Intelligence Will Revamp Education
  76. Artificial intelligence will wipe out half the banking jobs in a decade, experts say
  77. Car 'subscriptions' could make ownership obsolete
  78. How Artificial Intelligence Is Revolutionizing Business In 2017
  79. Five CIO tips for building an IT strategy in the digital age
  80. The psychological impact of an $11 Facebook subscription
  81. Gartner Worldwide IT Market Report Predicts Fastest Growth in Decade
  82. Developing the right IT strategy - Supporting business strategy with technology
  83. 4 Models Of The Shopping Mall Of The Future
  84. How blockchain will disrupt Google, Apple, Amazon, and Facebook

Student Info

  1. 8 hot IT security jobs and what they pay
  2. 7 High-Paying Jobs You Can Get Without a 4-Year College Degree
  3. Top 15 data science professional development certificates
  4. The highest-paying entry-level job in tech pays $113,254 a year—here are the other 9
  5. Blockchain jobs remain unfilled, while skilled workers are being poached
  6. 11 business intelligence certifications to advance your BI career
  7. 15 top data science certifications
  8. A movement to prepare students for the future of work
  9. The Deeper Education Issue Under the College Bribery Scandal
  10. Demand for blockchain engineers is ‘through the roof’
  11. 10 IT skills paying the highest premiums today
  12. What Frameworks and Languages Are Developers Using in 2019?
  13. Best-paying programming languages, skills: Here are the top earners | ZDNet
  14. AWS Training and Certification - Machine Learning
  15. Amazon says it’s making freely available the same machine learning courses that it uses to teach its own engineers
  16. 10 Impressive Questions to Ask in a Job Interview
  17. Cybersecurity, AI skills to dominate IT staff hires in 2019 | ZDNet
  18. 10 must-have skills for ITSM pros
  19. Gartner: IT spending to hit $3.8 trillion; enterprise software, IT services outlays lead way
  20. The 15 top-paying certifications of 2018
  21. According to Hiring Managers, 1 Type of Resume Makes You Look Desperate
  22. This Is The #1 Resume Lie That'll Cost You A Job According To Hiring Managers
  23. The 7 most in-demand tech jobs for 2018 — and how to hire for them
  24. The future technology skills that will keep you in work
  25. AI and the Future of Work
  26. More Companies Teach Workers What Colleges Don’t
  27. The blockchain market is hot; here's how to learn the skills for it
  28. Net Neutrality: Everything You Need To Know
  29. How IT Professionals Can Survive, and Thrive in, an Automated World
  30. Demand for cyber security skills outstrips internal supply, research finds
  31. 9 Things to Consider Before Accepting a New Job
  32. The Interview Question That's Always Asked (and How to Nail It)
  33. How to spot 4 common lies employers tell job applicants
  34. Scan Your Social Profiles Like a Potential Employer Will
  35. 10 Great Places to Work at Large, Medium and Small Tech Companies
  36. Old School May Be Better Than High-Tech.
  37. Americans who haven't gone to college are way worse off today than 40 years ago
  38. Skills shortage tops Security Serious agenda
  39. Top 10 most desired traits for cybersecurity job candidates
  40. The next IT jobs boom? The internet of things
  41. 10 in-demand jobs for workers without a bachelor's degree
  42. Why Tech Pros Need to Develop Soft Skills
  43. Facebook helped advertisers target teens who feel “worthless”
  44. Amazon’s CEO Perfectly Explains AI in Just Two Sentences
  45. Computerworld's IT Salary Survey 2017 results
  46. Cybersecurity jobs are there for the taking. Are you ready?
  47. Python on the Web: The Amazing Things You Can Build
  48. JavaScript Is Still Most Popular Language, but Developers Love Rust
  49. Science: 81 Percent of People Lie in Job Interviews. Here's What Top Companies Are Doing Instead
  50. Five Questions You Absolutely, Positively Must Ask On A Job Interview
  51. A woman who has reviewed over 40,000 résumés outlines the 8 most annoying mistakes she sees
  52. Tutorials for Spring AOP, Gerrit, Spring MVC, Apache Solr, Excel Power View, Sencha Touch, Tex Commands, Agile Testing, Apache Tajo, C++ Library, MariaDB, SAP QM, SAP SOLMAN, SAP SCM, MS Access, KoaJS, OAuth2.0, Scrapy, SAP CCA, SAP PM, SAPUI5, Cognos, Internet of Things, Rural Marketing, Trampolining, Golf, CakePHP, SAP EWM, Web Dynpro, Angular2, Framework7, Arduino, CherryPy, Firebase,SAP C4C, SAP Dashboard, SAP PI, ExpressJS, Design Thinking, Internet Security, PyGTK, Apache Drill, Excel Charts, Elastic Search, Computer Security, Extreme Programming, Behavior Driven Development, Conversion Rate Optimization, SAP Basis, Business Law, Kanban, Erlang, SAP Payroll, ASP.Net WP, PouchDB, MFC, SAP HR, Yii, Clojure, Aurelia, CoffeeScript, CPanel, Laravel, SAP Webi, MS SQL Server, pinterest, Indian Polity, Teradata, Windows10
  53. 10 Websites for Ethical Hacking Tutorial - Free
  54. The Best Questions to Ask in Every Job Interview Round
  55. IT Pros Need More Training on Linux and the Cloud
  56. Robert Half Report Lists the Most In-Demand IT Jobs In 2017
  57. It took Sheryl Sandberg Exactly 2 Sentences to Give the Best Career Advice You'll Hear Today
  58. What Employers Want to Know During Job Interviews
  59. How To Answer 'What's The Lowest Salary You Would Accept?'
  60. Learn ethical hacking from scratch
  61. Technology skills demand accelerates outside the IT department
  62. So You Want to be a Functional Programmer (Part 1)
  63. The 15 most popular computer languages, according to the Facebook for programmers
  64. Why Is JavaScript the Programming Language of the Future? - DZone Web Dev
  65. How to Use Markdown in WordPress to Improve Workflow - Make Tech Easier
  66. Ten Self-Defeating Gestures of Job Candidates
  67. A common job-interview question about money is a trap, and you should never answer it directly
  68. Comparing Struts 1 and 2
  69. IT Salary Survey 2016: Do certifications really help?
  70. IT Salary Survey 2016: Highlights
  71. IT Salary Survey 2016: 10 tech specialties with rising salaries
  72. How to Answer "Tell Me About a Time You Failed" in an Interview
  73. Top 10 Tools for a Free Online Education
  74. 5 Interview Mistakes You Didn't Know You’re Making
  75. The 15 Most Popular Free Online Courses for Professionals
  76. The 15-step guide to nailing any job interview
  77. WebServlet annotation examples
  78. Help - Eclipse Platform
  79. Companies Plan to Hire More Linux Pros
  80. Linux Treasures: 11 Sublime Native Linux Apps That Will Make You Want To Switch
  81. The Ten Best Tech Jobs in America
  82. 15 of the Best Courses on Udemy for Self-Improvement
  83. This 'Smart' Whisky Bottle Must Be Stopped
  84. RadioShack Corporation — Our Company — History — Timeline
  85. IT jobs market booming in the Southwest
  86. What I Wish I Knew When I Started My Career as a Software Developer
  87. How to Negotiate Your Salary When You Don't Have Any Work Experience
  88. Higher education: The university experiment : Nature News & Comment
  89. How To Improve Your Programming Career Opportunities
  90. Google gives students unlimited cloud storage
  91. HTG Explains: What is a File System, and Why Are There So Many of Them?
  92. a_message_from_everyone_to_it_workers
  93. Advice I Wish Someone Had Given Me for My First Job
  94. America Has Hit “Peak Jobs” | TechCrunch
  95. 2013 job watch: Top 11 metro areas for tech jobs
  96. How to Tackle Three of the Toughest Interview Questions
  97. Use the "Embarrassment Test" to Help Make Difficult Decisions
  98. Google Developers Live
  99. 2013 IT salaries: 15 titles getting the biggest pay raises
  100. 12 effective habits of indispensable IT pros
  101. The geek skills challenge: 10 talents worth mastering
  102. Support - Forums - General Forums - CrossOver for free on Wednesday, October... - Discussion of Windows on Mac and Linux
  103. Texas Tech University Libraries :: Lynda.com
  104. Adobe - Adobe Education Store - North America - Adobe Creative Cloud Student and Teacher Edition
  105. The Interview Question That's Always Asked (and How to Nail It)
  106. Java, C, PHP: 15 Programming, IT Skills That Are Thriving on Wall Street
  107. How to Stand Out in an Interview
  108. SecTools.Org Top Network Security Tools
  109. Hacking Videos
  110. The Hardest Job Interview Questions—And How to Ace Them
  111. 100 Best Places to Work in IT 2012 - Computerworld
  112. Outdoor Leadership Programs | Outward Bound
  113. Apply for a Tech Position That Doesn't Exist - Wired How-To Wiki
  114. 200+ Most Common Interview Questions & 1000+ Answers
  115. avoid-a-me-resume-and-avoid-getting-ignored-by-yet-another-employer
  116. Study: Salaries Poised to Rise for Workers With Mobile, Cloud, UI Skills | PCWorld Business Center
  117. What Questions Should I Be Ready to Answer at Just About Any Job Interview?
  118. How to Answer "What Is Your Greatest Weakness?"
  119. Lynda
  120. Three reasons why asking risky questions reduces risk
  121. Pepper Your Resume with a Company's Cultural Keywords to Help Beat the Screeners
  122. 15 things successful CEOs want you to know
  123. CEO: The 5 Things I Look for In a Great Job Interview | LinkedIn
  124. 8 nice text-based applications in Linux ~ Linux and Life
  125. The Strange Birth and Long Life of Unix - IEEE Spectrum
  126. Five Best Online File Storage Services
  127. Occupational Hazards: 7 hot jobs for 2012
  128. Hulu - CNBC Originals: Code Wars - Watch the full episode now.
  129. When passwords attack: the problem with aggressive password policies
  130. 0,2817,2395429,00.asp
  131. 68 great ideas for running a security department
  132. discover-whats-new-in-css-4
  133. 5 Tech Pros Companies Want to Hire | PCWorld
  134. High-speed Ethernet Planning Guide | PCWorld
  135. Web server security
  136. Newegg.com - LIAN LI Lancool PC-K56 Black 0.8 mm SECC, Plastic + Mesh ATX Mid Tower Computer Case
  137. TR's fall 2011 system guide - The Tech Report - Page 1
  138. Choose an Irrelevant Skill When Asked "What Are Your Weaknesses?" in a Job Interview
  139. 10 Cloud Career Skills - PCWorld

Cool! / Interesting

  1. The Best Smart Displays for 2019
  2. What Sci-Fi Can Teach Computer Science About Ethics
  3. Kernel Panic: Inside the World's Worst Cyberattacks
  4. Mathematicians Discover the Perfect Way to Multiply
  5. MicroLED is the first new screen tech in a decade. Can it beat OLED?
  6. Disney Plus will cost $7 a month and launch Nov. 12
  7. What Is 5G?
  8. 3 Reasons Brits Voted For Brexit
  9. Apple News+ has issues, but it's a great deal for casual readers
  10. The danger of “I already pay for Apple News+”
  11. Your Environment Is Cleaner. Your Immune System Has Never Been So Unprepared.
  12. The Most Beautiful Day Hikes In America
  13. Pilot Who Hitched a Ride Saved Lion Air 737 Day Before Deadly Crash
  14. AI Algorithms Are Now Shockingly Good at Doing Science
  15. Foldable phones are about to make the US very jealous
  16. Inside the High-Stakes Race to Make Quantum Computers Work
  17. The 20 Best Places to Go in 2019
  18. Confused By Expiration Dates? You’re Not Alone. Here’s What They Really Mean
  19. Apple's Radical New iPhone Suddenly Takes Shape
  20. The best e-reader you should buy
  21. 10 Breakthrough Technologies 2019, curated by Bill Gates
  22. Today's Companies Have A Technology Adoption Problem, Not An Innovation Problem
  23. Facebook’s promised Clear History privacy tool to launch later this year following delay
  24. Wi-Fi 6, explained: how fast it really is
  25. Do Not Disturb: How I Ditched My Phone and Unbroke My Brain
  26. 15 Moments That Defined Facebook's First 15 Years
  27. 15 Years of Facebook in 4 Charts
  28. What programming languages rule the Internet of Things?
  29. How a Vermont social network became a model for online communities
  30. Super Blood Wolf Moon in Pictures
  31. Tim Cook calls on FTC to let consumers track and delete their personal data
  32. How Ring's Neighbors app is making home security a social thing
  33. 190 universities just launched 600 free online courses. Here’s the full list.
  34. Explainable AI: Peering inside the deep learning black box
  35. 100 Websites That Shaped the Internet as We Know It
  36. Web Founder Launches Inrupt to Improve Internet Privacy
  37. The Birth of Google
  38. Amazon Wants Alexa to Hear Your Whispers and Frustration
  39. Reimagining of Schrödinger's Cat Breaks Quantum Mechanics--and Stumps Physicists
  40. 10 critical points from Zuckerberg’s epic security manifesto
  41. The WIRED Guide to Virtual Reality
  42. Microsoft Translator Uses AI to Break Language Barriers on Smartphones
  43. Here Are the Major New Features Google Added to Gmail Today (and What It Didn't)
  44. Google’s astounding new search tool will answer any question by reading thousands of books
  45. RSS is undead
  46. It's Time For an RSS Revival
  47. SpareFoot Acquires SiteLink to Drive Innovation for the Self-Storage Industry - The SpareFoot Blog
  48. How the iPad Pro with Smart Keyboard totally replaced my Macbook | ZDNet
  49. Augmented Reality Check: Why Businesses are Embracing AR in 2018
  50. Microsoft’s new open source tool lets you bring your own Linux distro to Windows
  51. How IBM Aims to Make AI Commonplace in AppDev, Business
  52. Why Blockchain Will Survive, Even If Bitcoin Doesn’t
  53. The Secret to a High Tech Concierge Medical Office? Data
  54. Why Artificial Intelligence Researchers Should Be More Paranoid
  55. Introducing AMP Stories, a Whole New Way to Read WIRED
  56. The hottest iPhone and Android accessory we’ve covered in 2018 so far is only $37 on Amazon
  57. Muse Auto smartens your car with Alexa
  58. What Is Bitcoin? | Cool History
  59. The Entire History of Bitcoin in a Single Infographic
  60. Should Data Scientists Adhere to a Hippocratic Oath?
  61. The Chrome Extensions We Can't Live Without
  62. Intel wants smart glasses to be a thing
  63. You can now use Alexa to send SMS messages
  64. Best Amazon Alexa Skills 2018 - Top 50 Cool and Useful Things Alexa Can Do
  65. You Need to Deal With Your Digital Legacy Right Now
  66. Facebook Local Might Be the Only Facebook App You Need
  67. StumbleUpon
  68. Twenty Years after His Death, Carl Sagan Is Still Right
  69. A history of hacking and hackers
  70. Here's what happened when 30 high school sophomores gave up their phones for a day
  71. Find Out Which Cognitive Biases Alter Your Perspective
  72. Life-hacking websites you didn’t know existed (10 photos)
  73. The 10 must-have Safari extensions of 2017
  74. The 12 must-have Firefox add-ons of 2017
  75. Google Earth Gets a Huge Redesign with Guided Tours, 3D View, and More
  76. USAFacts
  77. Is Evernote Premium Worth Its Money for You?
  78. Evernote Embraces MacBook Pro's Touch Bar for Faster Note Taking
  79. 15 fascinating facts you probably didn't know about Amazon
  80. The 15 Most Useful Google Apps You Never Knew Existed
  81. The Seven Best Things You Can Do With an Amazon Echo
  82. This Site Shows You Both Sides of Major Controversial Issues
  83. 5 Brilliant Kindle Apps and Sites Every Ebook Lover Needs
  84. The world's smallest USB-C laptop charger—I'm in love
  85. Google Maps lets you save and share favorite places with launch of Lists
  86. Physicists Just Showed That Quantum Entanglement Is a Physical Reality
  87. Top 10 Free Alternatives to Expensive Software
  88. Apple CarPlay: everything you need to know about iOS in the car
  89. Comparing Microsoft's New Surface Book to Apple's MacBook Pro
  90. A Free Open Source Alternative to Microsoft Visio
  91. Massive banks are ripping off Americans. There is finally an alternative.
  92. REVIEW: Google Home is a win (and better than the Amazon Echo)
  93. These Skills Are Hard To Learn But Pay Off For The Rest of Your Life – The Mission
  94. Millennials changing the face of cybersecurity
  95. 10 Powerful Habits That Will Boost Your Intelligence
  96. The real-world uses for virtual reality - BBC News
  97. This Week's Top Downloads
  98. Amazon Launches New Prime Reading Program
  99. QuickSafes.com
  100. The AI disruption wave
  101. How people are using the Amazon Echo: New study reveals surprising patterns
  102. United States set to Hand Over Control of the Internet to ICANN Today
  103. US hands over control of internet on schedule - despite last-ditch protests | ZDNet
  104. Google Allo: Everything you need to know | Drippler - Apps, Games, News, Updates & Accessories
  105. A Gorgeous—and Unsettling—Video of Evolution in Action
  106. Top 10 Places to Download or Stream Movies For Free, Legally
  107. 11 basic Excel tricks that will change your life
  108. The Ultimate Road Trip Has Been Planned By Scientists. THIS Is What It Looks Like
  109. 6 literary classics you should listen to as audiobooks
  110. Three essential coding languages you can learn today
  111. IBM's Watson analyzed all the 'Harry Potter' books and movies — and the results are fascinating
  112. 35 Most Popular Facebook Pages in the Geek World
  113. A Simple Explanation of What Net Neutrality Is All About
  114. See 11 of the Year's Best Wildlife Photographs
  115. How Much Digital Media Can Fit on History's Storage Devices
  116. What’s Up With That: Why Does Sleeping In Just Make Me More Tired?
  117. 6 Websites to Download eBooks For Free and Legally
  118. Offline over the weekend? Read all the tech news you missed here
  119. 10 Best Channels for STEM Education on YouTube
  120. Programming Languages - Hyperpolyglot
  121. Google's New Flight Search Tool Helps You Find The Best Price
  122. Total Knee Replacement: A Patient's Guide | UW Orthopaedics and Sports Medicine, Seattle
  123. Automagic: 4 Dropbox-connected apps that do the work for you | Dropbox for Business blog
  124. Google Translate Now Does Real-Time Voice And Sign Translations On Mobile | TechCrunch
  125. 10 CES Themes Likely to Resonate for Some Time
  126. Viva Las Vegas!
  127. 15 Documentaries About The Internet, Hacking, Startups & Cyberculture [Stuff to Watch]
  128. What File System Should I Use for My USB Drive?
  129. Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
  130. Best Computer Monitors: October 2014 - Best Monitors For The Money
  131. What You Should Know About the Amazon Kindle Voyage
  132. Most Popular Place to Buy Computer Parts: Newegg
  133. Plastc wants to replace your entire wallet with a single card
  134. Logitech K480 Multi-Devices Bluetooth Keyboard
  135. 50 Little-Known Ways Google Docs Can Help In Education | Edudemic
  136. Amazon.com: Business Analysis: Best Practices for Success (IIL/Wiley Series in Business Analysis) eBook: Steven Blais: Kindle Store
  137. Mozilla launches Open Badges 1.0, delivers virtual kudos for real skills
  138. Visual Network Simulator To Teach Basic Networking?


  1. You don't need a new computer, here's how to keep your old one running like new
  2. Workstation Pro - VMware Products : Windows Virtualization for Everyone
  3. Linux on your laptop: A closer look at EFI boot options | ZDNet
  4. How to remap the Bixby button on most recent Samsung Galaxy devices! | Drippler - Apps, Games, News, Updates & Accessories
  5. 12+ essential iPad productivity tips
  6. Outlook vs. Gmail: Which works better for business?
  7. G Suite now lets users work with Google Docs, Sheets, and Slides directly inside Dropbox
  8. How to manage your Linux environment
  9. MyEclipse Learning Center - Genuitec
  10. How to create Servlet in MyEclipse IDE - javatpoint
  11. Two-Factor Authentication: Who Has It and How to Set It Up
  12. A short collection of Safari tips for iPhones, iPad
  13. How to Turn Off Email Trackers
  14. Here's how to securely wipe your Android smartphone for resale | ZDNet
  15. Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
  16. How to use your Mac safely in public places
  17. How to use the SwiftKey Keyboard
  18. Zipping files on Linux: the many variations and how to use them
  19. SQL tutorial: Learn SQL on MariaDB
  20. These secret settings instantly make any Android phone feel twice as fast
  21. How to See Which Facebook Advertisers Have Your Info
  22. How to Lock Down What Websites Can Access on Your Computer
  23. How To Stop Robocalls From Bothering You
  24. How to Set Up a Fake Phone Number
  25. Compiling and Installing - Apache HTTP Server Version 2.4
  26. 10 essential MySQL tools for admins
  27. bash howto debug - Google Search
  28. How to Get the Most Out of Gmail’s New Features
  29. Google’s light search app Go can now read you articles and web pages
  30. Gmail Update Helps Protect Businesses from Phishing, BEC Threats
  31. How to Protect Your Identity, Personal Data and Property
  32. Get the Fastest Wifi on Your Wireless Network With Wifi Explorer for Mac
  33. Learn Basic Javascript For Free With This Google App
  34. Build Free Databases
  35. How to build your own Alexa skills with the new Alexa Blueprints
  36. MySQL :: Download MySQL Community Server
  37. MySQL :: MySQL 5.7 Reference Manual :: B.5.3.2 How to Reset the Root Password
  38. Google Keeps a Record of Your ENTIRE Search History
  39. How to Manage Your Google Privacy Settings
  40. How to Check If Cambridge Analytica Could Access Your Facebook Data
  41. Get the Most Out of Your Kindle iOS App
  42. Want to Learn More About Computers? Try Building Your Own PC
  43. How to Manage All of Facebook's Privacy and Security Settings
  44. How to Group Mac App Icons More Prominently in Your Dock
  45. Google Lens Now Available for iOS: How to Get It
  46. Android Oreo: 18 advanced tips and tricks
  47. Here’s how you access the super creepy data Facebook has on you
  48. 12 tips to free up storage space on your Android phone or tablet | Drippler - Apps, Games, News, Updates & Accessories
  49. Constant Field Values (Java Platform SE 6)
  50. New Feature In Google Drive Improves Interoperability with Microsoft Office
  51. Top 32 Nmap Command Examples For Linux Sys/Network Admins - nixCraft
  52. How To Recover Linux Grub Boot Loader Password - nixCraft
  53. Cortana explained: How to use Microsoft's virtual assistant for business
  54. The Cognitive Biases That Convince You the World Is Falling Apart
  55. What is IFTTT? How to use If This, Then That services
  56. How to Keep Your Home Wi-Fi Safe From Hackers
  57. Ditch Your Smartphone Keyboard For Gboard
  58. How to Install Packages with Homebrew for OS X
  59. How to Customize Your Android Phone Exactly How You Like It
  60. How to Delete the Voice Data That Amazon Echo and Google Home Are Storing
  61. VMware shared folders - Google Search
  62. VirtualBox share folders - Google Search
  63. How to tweak the new Firefox 57 Quantum browser to suit your preferences | ZDNet
  64. How to Send Email to Any Cell Phone (for Free)
  65. build a computer - Google Search
  66. How to install or compile GIMP filters/plugins/extensions on Linux
  67. New Theory Cracks Open the Black Box of Deep Neural Networks
  68. How to Download Your Kindle Notes and Highlights and Export Them | The Digital Reader
  69. How to Stop Hackers From Ransoming Your Mac or iPhone [Updated]
  70. How to Turn Off App Ratings Requests in iOS 11
  71. Install Fedora Linux in Just 10 Steps
  72. Must-have Wi-Fi troubleshooting and management tools
  73. The Complete Guide to Speeding Up Your Virtual Machines
  74. IFTTT / Incompatible Browser
  75. IFTTT / Incompatible Browser
  76. Transfer Photos from Android to Mac OS X
  77. How to Create Shareable Download Links for Files on Google Drive
  78. 14 Practical Examples of Linux Find Command for Beginners
  79. The Best Keyboard Shortcuts for Bash (aka the Linux and macOS Terminal)
  80. How to install Bash shell command-line tool on Windows 10
  81. How to Snoop-Proof Any Phone or Tablet
  82. How to make the dock the most powerful part of your launcher | Drippler - Apps, Games, News, Updates & Accessories
  83. How to install Ansible on Apple MacOS X using command line
  84. Here's how to access the iPhone's hidden mode that turns the camera into a magnifying glass
  85. The Privacy Enthusiast's Guide to Using Android
  86. A Guide to Getting Past Customs With Your Digital Privacy Intact
  87. The travel-only Gmail account: A practical proposal for digital privacy at the US border
  88. Want to Sharpen Your Focus? Science Says to Drop These 5 Habits
  89. How to legally cross a US (or other) border without surrendering your data and passwords
  90. How to stop seeing your Amazon searches everywhere
  91. Vim Editor Modes Explained
  92. Automatic Backup in Linux using bash script / Linux data backup solution
  93. How to Schedule Tasks in Linux with Cron and Crontab
  94. How to Schedule Tasks on Linux: An Introduction to Crontab Files
  95. Quick HOWTO : Ch14 : Linux Firewalls Using iptables - Linux Home Networking
  96. Linux Server Security and Linux Network Security and How To Use Snort Intrusion Detection
  97. How to See Other Devices Logged in to Your Google Account
  98. How to Create a Bootable Backup of Your Entire Mac on an External Drive
  99. Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely « Null Byte
  100. Stop HTML5 autoplay videos in Chrome, Firefox, Opera (but not Edge, Explorer, Safari) | PCWorld
  101. How to Unlock Your Phone Without Pressing the Home Button | TIME
  102. There's a hidden map in your iPhone of everywhere you've been
  103. 4 Great Firefox Addons For Anonymous Surfing and Improved Privacy - Make Tech Easier
  104. How to Start a WordPress Blog - Make Tech Easier
  105. Unlock the Hidden Power of Preview to Better Manage PDF Files [Mac] - Make Tech Easier
  106. How to Make a Bootable macOS Sierra USB Flash Drive
  107. Escaping from Zip Ties
  108. Easily Edit Documents with PDF Expert 2.0 for Mac
  109. How to Fix iOS 10's Biggest Annoyances
  110. Neural networks are powerful thanks to physics, not math
  111. 7 Tips and Tricks for Google Maps on Android - Make Tech Easier
  112. How to Add Blank Spaces to Your Mac's Dock - Make Tech Easier
  113. DeskDock shares your computer's mouse and keyboard with your Android device | Drippler - Apps, Games, News, Updates & Accessories
  114. 39 Brilliant Camping Hacks To Try On Your Next Trip
  115. How to Tame Your Negative Talk in Your Mind
  116. How To Use Google Photo Service in 7 Steps
  117. The Best Wireless Routers of 2016
  118. Convert File Formats on Linux with FF Multi Converter
  119. 10 Super Efficient Ways Inbox by Gmail Saves You Time
  120. 25 Google Search Hacks to Make Life Easier
  121. How to Remove a Service From the Context Menu on Mac
  122. 7 Creative Uses for Amazon Echo and Alexa
  123. How to Change the Launchpad Layout on Your Mac
  124. How to Hide the Menu Bar in OS X El Capitan
  125. 4 Tips to Make Your Mac Run Faster
  126. The Beginner's Guide to Creating Virtual Machines with VirtualBox
  127. How to install WordPress with Apache, MariaDB and PHP 7 on Arch Linux
  128. Linux Mint: The right way to react to a security breach | ZDNet
  129. How to Use a USB Flash Drive with Your Android Phone or Tablet
  130. symless/synergy
  131. 5 Favorite Ways to Collect Content in Evernote
  132. 11 Advanced Searches To Bookmark To Become A Google Power User
  133. Convert Virtual Machines from VMware to VirtualBox
  134. Evernote Can Encrypt Bits of Text to Keep Your Notes Private
  135. 15 Things You Didn’t Know You Could Do with Dropbox
  136. 4 very common Macbook problems—and how to fix them
  137. How to Play DVDs and Blu-rays on Linux
  138. How To Use a USB Stick To Securely Log In to Gmail
  139. How To Move Emails From One Gmail Account To Another
  140. How to see all the companies tracking you on Facebook — and block them
  141. How to use multi-app multitasking on the iPad Pro
  142. How to track your Linux laptop
  143. 10 of the best network and server monitoring tools
  144. Trim Will Find Your Subscriptions, Cancel Those You No Longer Want
  145. How to Play Classic Retro Games on Android
  146. Setting Up IP and Port Based Virtualhost Apache
  147. How to Activate GodMode in Windows 10
  148. How to do image steganography on Linux
  149. How to Export or Save All Pictures from MMS Text Messages on Android
  150. How to Enable and Use iCloud Drive on Your iPhone or iPad
  151. How to trigger commands on File/Directory changes with Incron on Debian
  152. How to Download YouTube Movies & Music on Android | Drippler - Apps, Games, News, Updates & Accessories
  153. 3 Powerful New Features to Try in iOS 9 | PCMag.com
  154. iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode
  155. Who gives the best advice about password security? | Naked Security
  156. How to Make a Program Run at Startup on Any Computer
  157. How to Save Google Maps Offline | PCMag.com
  158. How to Make Cool Gmail Signatures Right from Google Drive
  159. How to Convert Any File Format Online with Free Tools
  160. Collecting Ubuntu Linux System Information
  161. How to Mount a NTFS Drive on CentOS / RHEL / Scientific Linux
  162. How to Create Windows 10 USB Installer in Mac
  163. Google Classroom Launches Chrome Extension So Teachers Can Instantly Share Links With The Entire Class | TechCrunch
  164. Here are the best Gmail hacks to keep you on track
  165. Get the Best of MakeUseOf with Our New Android App, and Win a Samsung Galaxy S6 Edge!
  166. How to Fully Control Your Android Device from Any Computer | Drippler - Apps, Games, News, Updates & Accessories
  167. How and Why to Encrypt Your Text Messages
  168. How to monitor your system performance on (Ubuntu) Linux
  169. How To Organize Your Apps Using LaunchPad in OS X
  170. How to Encrypt and Decrypt Files on an Android Device
  171. The only technique to learn something new
  172. The ultimate guide to staying anonymous and protecting your privacy online - Slideshow | ExtremeTech
  173. Amazon's voice-guided speaker juggles your IFTTT tasks
  174. IFTTT Recipes That Help You Save Money
  175. 5 secret ways you can control your phone using Google search on your computer | Drippler - Apps, Games, News, Updates & Accessories
  176. Snap and edit pictures like a pro with these great Android photo apps | Drippler - Apps, Games, News, Updates & Accessories
  177. 9 Amazing ES File Explorer Features That Can Replace Other Android Apps | Drippler - Apps, Games, News, Updates & Accessories
  178. Here’s How to Download and Delete What Google Knows About You
  179. Use Your Mac’s Notification Center for Widgets, Scripts, and Notifications
  180. How to Enable CMD + n Shortcuts in Safari for Easy Tab Switching
  181. Securing tomcat - OWASP
  182. 4 "About:Config" Tricks to Extend The Functionality Of Firefox
  183. If you lose your Android phone, just Google 'Find My Phone' and it will
  184. Easily Create KVM Virtual Machines on Linux With GNOME Boxes
  185. How to Install Hardware Drivers on Linux
  186. How to Remove Bloatware on Android Without Rooting
  187. HiddenMe Hides all Your Mac Desktop Icons in One Click
  188. How to Use Your Mac’s Disk Utility to Partition, Wipe, Repair, Restore, and Copy Drives
  189. How to Convert a Physical Windows or Linux PC to a Virtual Machine
  190. How to Clear Your Dropbox Cache in Windows and Linux
  191. Configuration Mania Adds a Ton of Hidden Options to Firefox
  192. 6 Tricks You Can Use To Increase The Range Of Your Home Wi-Fi Router
  193. Five tips for cleaning and speeding up your Mac - CNET
  194. How to Disable Your Webcam (and Why You Should)
  195. Why You Really Want a Linux Virtual Server Instead of a Private Server
  196. How to Safely Share Your Smartphone, Computer, or Tablet With a Guest
  197. Google quietly backs away from encrypting new Lollipop devices by default | Ars Technica
  198. How to monitor server log files with Logwatch on Debian and Ubuntu
  199. Singapore’s Lee Kong Chian School of Medicine develops curriculum across time zones, with help from Dropbox for Business
  200. Review: Ring Video Doorbell | WIRED
  201. Featured: Top 10 Backup Apps For Android | Drippler - Apps, Games, News, Updates & Accessories
  202. Kindlebox Automatically Sends Books from Dropbox to Your Kindle
  203. Use Manual Refresh to Save Battery Life on Any Tablet or Smartphone
  204. What To Do If You Lose the Master Password to Your Password Manager
  205. Anyone With Your Mac Can Bypass Your Password Unless You Do This
  206. 4 tips to keep your business data private
  207. How to Make Macs and iOS Devices Work Together Seamlessly with Continuity
  208. Easily Share Files Between Windows 7, 8 and Mac OS X
  209. How to Use Bluetooth File Transfer Between OS X and Android 5.0 Devices
  210. Using secure shell (ssh) for login and secure copy (scp) for data transfer on Linux
  211. The Best Built-In Mac Tips You've Never Heard of, According to Reddit
  212. Everything You Can Do to Free up Space on Your Mac
  213. 4 Things You Didn't Know You Could Do With Google Earth Pro
  214. Repair Linux Boot failures in Grub 2 rescue mode
  215. How to Make a Smart Home From a Dumb One | PCMag.com
  216. How to Run a Full Linux Desktop in a Browser Tab on Your Chromebook
  217. ifttt Review & Rating | PCMag.com
  218. How to install Django on Ubuntu 14.04
  219. GRUB 2 boot menu basics and how to add a custom splash image
  220. 3 Common SQL Mistakes You are Probably Making as a Java Developer | DZone
  221. How to Power Up OS X's Spotlight with Flashlight
  222. 22 tips, tricks and shortcuts for Android Lollipop
  223. How to Anonymize Everything You Do Online | WIRED
  224. How to configure an NFS server and mount NFS shares on Ubuntu 14.10 | HowtoForge - Linux Howtos and Tutorials
  225. How do You Password Protect a Folder on Linux/Unix without Encryption?
  226. How to Unlock Hidden Settings In Your Favorite Software
  227. Learn to Build Android Apps with This Curated Collection of Courses
  228. Your Mac Logs Everything You Download, Here's How to Clear It Out
  229. Beginner's Electronics: 10 Skills You Need to Know
  230. Apple releases web tool to deregister phone numbers from iMessage | The Verge
  231. How to Find and Remove Duplicate Files on Mac OS X
  232. How To Safely Store A Password | codahale.com
  233. How Inbox by Gmail Works, and How to Use It for More Productive Email
  234. How to Use Handbrake to Convert Any Video File to Any Format
  235. How to Identify and Solve your Android Battery Problems | Drippler - Apps, Games, News, Updates & Accessories
  236. Hands On With Google Inbox: Useful Email Triage Tools For A Mobile Workflow | TechCrunch
  237. Useful SystemD commands (hints for systemctl or systemctl vs chkconfig and service)
  238. I Want to Write Android Apps. Where Do I Start?
  239. How to configure a host intrusion detection system on CentOS - Xmodulo
  240. Secure Your Linux Desktop and SSH Login Using Two Factor Google Authentication
  241. How to Organize Your Linux File System for Clutter-Free Folders | Linux.com
  242. mamp - Google Search
  243. How to Set Up Family Sharing in iOS 8 | News & Opinion | PCMag.com
  244. How to Save the Net | Magazine | WIRED
  245. DIY NAS: EconoNAS 2014
  246. The Apps You Need to Deauthenticate Before Selling Your Devices
  247. Plan Your Free Online Education at Lifehacker U: Fall Semester 2014
  248. How to make your email address as hard to guess as your password
  249. Stop Thieves From Recovering Your Data After A Factory Reset
  250. Creating Bibliographies & Footnote Citations Is Easier With Bookends for Mac
  251. How To Install Tomcat On CentOS 7 | HowtoForge - Linux Howtos and Tutorials
  252. 7 Tips For Less Terrible Smartphone Photos
  253. How to Easily Encrypt Files on Windows, Linux, and Mac OS X
  254. Troubleshoot Your Mac With These Hidden Startup Options
  255. ISC Diary | Stop, Drop and File Carve
  256. Evernote Food Saves, Organizes, and Helps You Find Great New Recipes
  257. How to create a VPN shortcut in OS X | MacFixIt - CNET Reviews
  258. What to Do (If Anything) About a Cluttered OS X Desktop | Gadget Lab | Wired.com
  259. Google Drive Blog: Bringing people together in Drive
  260. The Best Experimental Chrome Features You Should Check Out
  261. Use nettop command to check per-application network activity in OS X | MacFixIt - CNET Reviews
  262. Use OS X Finder shortcuts in Open and Save dialog boxes | MacFixIt - CNET Reviews
  263. Mac OS X Easter Eggs - Business Insider
  264. Give Your Laptop and Smartphone a Spring Cleaning
  265. How to Set Up Your Own Private Cloud Storage Service in Five Minutes with OwnCloud
  266. ISC Diary | The HTTP "Range" Header
  267. Multiboot Linux distributions from one USB key - LinuxBSDos.com
  268. How to Make Windows 8 Look and Feel Like Windows 7
  269. Mac Remote Controls Your Mac from the Comfort of Your Android Phone or Tablet
  270. Apple Adds Two-Factor Authentication to Apple ID, Here's How to Set It Up
  271. How to Boot Into Linux from Your Android Phone
  272. Instantly Hide Any File in OS X by Putting It In Your Library Folder
  273. Apache Tomcat 6 Installation on OS X 10.7 Lion and Eclipse Integration | Whatta-Whatta
  274. Cool User File Systems, Part 1: SSHFS | Linux Magazine
  275. What To Do After You've Been Hacked | Gadget Lab | Wired.com
  276. Nova Launcher
  277. How to install Google Play Store apk & Launcher on Kindle Fire HD/2
  278. [ROOT] How To: Root the Kindle Fire 7" HD or 2 with Linux/MAC - Noob (Simple) Version - xda-developers
  279. Make Your Own Pocket-Sized, Grid-It-Style Organizer for $2.50
  280. Daemonize a bash Script
  281. Linux Daemon Writing HOWTO
  282. How to Create a Strong Password in Wake of Twitter Hack Episode - CIO.com
  283. Hackers release iOS 6.1 jailbreak utility - Network World
  284. Build a Computer This Weekend
  285. Encrypt Your Data With EncFS (Fedora 18) | HowtoForge - Linux Howtos and Tutorials
  286. Turn a Raspberry Pi into a Personal VPN for Secure Browsing Anywhere You Go
  287. Video: The Philips uWand Is All I Want in a Smart TV Remote Control | Gadget Lab | Wired.com
  288. Learn Beginner and Advanced HTML/CSS Skills for Free
  289. Five Best Desktop Media Servers
  290. review-linux-live-usb-creator-makes-it-easier-to-install-linux.html
  291. This Is the Best of Lifehacker 2012
  292. Most Popular How-To Guides of 2012
  293. Set Up a Raspberry Pi as a Personal Web Server
  294. Automatically Create Evernote Template Notebooks with AppleScript
  295. Five Best Deal Sites
  296. MySQL 5.5 Admin Cheat Sheet from DZone Refcardz - Free, professional tutorial guides for developers
  297. The Perfect Desktop - Ubuntu 12.10 (Quantal Quetzal) | HowtoForge - Linux Howtos and Tutorials
  298. iPhone 5 Setup and Security Guide
  299. How to Secure and Encrypt Your Web Browsing on Public Networks (with Hamachi and Privoxy)
  300. Inotify: Efficient, Real-Time Linux File System Event Monitoring
  301. Remote MySQL Performance And Query Monitoring | HowtoForge - Linux Howtos and Tutorials
  302. http://www.networkworld.com/research/2012/110612-pc-security-your-essential-software-264010.html
  303. Turning the smartphone from a telephone into a tricorder | ExtremeTech
  304. Lifehacker.com Updates: QuickLock Is A Better Way To Lock Your Mac
  305. 20 Linux Server Hardening Security Tips
  306. Coffee Table Pi
  307. How to install Google's Chrome OS | ZDNet
  308. When You Need to Remember Something You Can't Write Down, Think of Something Crazy
  309. PSA: The Dot In Your Gmail Address Doesn’t Matter | TechCrunch
  310. Sleeping On Difficult Problems Actually Helps Solve Them
  311. Amazon's Remote Wipe of Customer's Kindle Highlights Perils of DRM | Gadget Lab | Wired.com
  312. Insync - Your Google Docs backup and sync tool
  313. how_to_adjust_settings_in_vlc_to_permanently
  314. How to Break Into a Mac (And Prevent It from Happening to You)
  315. The Ultimate Beginner's Guide To AppleScript | Mactuts+
  316. HTC Security Flaw Found on Multiple Android Phones
  317. iPhone, iOS 6 Apps to Monitor Your Network, Find WiFi
  318. Making Your own Custom Linux Distro - YouTube
  319. How do I select which folders to sync to my computer?
  320. Site44 Creates Web Sites from Dropbox Folders, Perfect for Personal Landing Pages and Resumes
  321. SSH tip: Send commands remotely | MacFixIt - CNET Reviews
  322. freedesktop.org - Software/systemd/FrequentlyAskedQuestions
  323. Lock down your social media with essential security add-ons | PCWorld
  324. If Your Android Phone Is Stolen, This App Photographs the Thief - Yahoo! News
  325. How a Secret Sequence of Doorbell Buzzes Can Unlock Your Home With
  326. [SAMSUNG GALAXY S3 QCOM TOOLKIT V2.3] Drivers Backup Root CWM BusyBox + MORE [SPR] - xda-developers
  327. Cracked! Hacker Claims to Jailbreak the iPhone 5. - Mike Isaac - Mobile - AllThingsD
  328. How to add and arrange Home screens on the Galaxy S3 | Android Central
  329. How to Root U.S. and Canada Galaxy S3 SGH-T999/SGH-I747/SPH-L710! [Fail-Proof][Noob-Proof][U.S. Cellular] | GalaxyS3Root.com
  330. Here's the List of iOS 6 Compatible Jailbreak Tweaks
  331. Kindle Fire HD 7-inch rooted in spite of Amazon, unstoppable force meets the unhackable object (video) -- Engadget
  332. How to root the Sprint Galaxy S3 L710 without increasing flash counter
  333. [VIDEO] How to Root the Amazon Kindle Fire HD Tablet - xda-developers
  334. Managing Multiple MySQL Servers From One phpMyAdmin Installation (Using SSL Encryption) | HowtoForge - Linux Howtos and Tutorials
  335. Get Google and iOS Living Together in Perfect Harmony
  336. WiFi Pineapple Mark IV | jwz
  337. HakShop — WiFi Pineapple Mark IV
  338. Got a BMW? Thicko thieves can EASILY NICK IT with $30 box • The Register
  339. Customizable Shortcuts for Firefox Lets You Create Key Commands for Anything
  340. Google releases new Java to iOS source code translator -- Engadget
  341. Evernote For Education: Citelighter Teams Up With Cengage To Take The Pain Out Of Online Research | TechCrunch
  342. How to quickly create an encrypted archive in OS X | MacFixIt - CNET Reviews
  343. Computer Hacking/Security Testing with BackTrack5
  344. Spec Comparison: Apple's iPhone 5 vs. Samsung Galaxy S3 - The Mac Observer
  345. Installing Apache2 With PHP5 And MySQL Support On OpenSUSE 12.2 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  346. Backtrack 5 : How to Bypass Antivirus and Hack Window Systems / SET – (Tutorial) « Connection Reset By Peer
  347. Lifehacker top 10 News, Videos, Reviews and Gossip - Lifehacker
  348. Videos | Tenable Network Security
  349. Tenable Network Security: Enabling Nessus on BackTrack 5 - The Official Guide
  350. Pinpointing Your Security Risks - IT Security
  351. How to create and use Live USB - FedoraProject
  352. Turn Any Laptop Into a Money-Saving Wi-Fi Hotspot For Your Hotel Room
  353. 18 great IT tools for Android
  354. Norton Utilities 15 Review & Rating | PCMag.com
  355. Welcome to SecurityTube.net
  356. Parallels Desktop 8 and VMWare Fusion 5 announced | MacFixIt - CNET Reviews
  357. Learn to Code a Basic iPhone App
  358. How to Dual Boot Linux on Your Mac and Take Back Your Powerhouse Apple Hardware
  359. The Twilight Desktop
  360. iBuildApp :: Create Free iPhone App Using Online Interface Builder| Android, iPad
  361. How Technology Helps Keep This 3,000-Student Class Engaged | Digg Technology
  362. Delete Dropbox cache to recover drive space | Macworld
  363. Master MySQL in the Amazon Cloud | PCWorld Business Center
  364. Pick the right shutter speed for every photographic situation | Macworld
  365. Why Mosh is better than SSH? - LinuxScrew: Linux Blog
  366. Speed Up Dropbox's File Syncing with a Simple Tweak
  367. How to hack your own Wi-Fi network
  368. Just Show Me: How to read Microsoft Office files on your Kindle Fire | Technology News Blog - Yahoo! News
  369. Easily Shake The Eggshells Off A Bunch of Boiled Eggs
  370. The Best Online Backup App for OS X
  371. How to Customize Any Folder or App Icon Using Any Image in OS X
  372. Review: 7 password managers for Windows, Mac OS X, iOS, and Android
  373. 16 ultimate SSH hacks
  374. Sync iPad to Multiple Computers - Guides of Syncing iPad with Multiple Computers - StumbleUpon
  375. how to hack video screens on times square - YouTube
  376. Thanks, Dev-Team! New iPad Already Jailbroken [Updated] | PCWorld
  377. Tweaking Lion's firewall | Macworld
  378. USB Outlet Quattro-”the Gadget Plug”
  379. Read Later Brings Instapaper, Read It Later to Your Mac's Desktop
  380. How to Create a Custom Theme for Your WordPress Blog with Minimal Coding Required
  381. Sync Files and Folders Outside Your My Dropbox Folder
  382. CyberKiko | Dropbox and multiple sync folders
  383. Ubuntu for Android | Ubuntu
  384. Creating A Portable MySQL On CentOS 6 And Ubuntu 11.10 Linux From Sources | HowtoForge - Linux Howtos and Tutorials
  385. Secrets
  386. Mac OS X Lion — Changing SSHD port | .: A Blog To Be Named Later :.
  387. See How SugarSync Stacks up to the Competition - SugarSync
  388. File Sync & Online Backup - Access and File Sharing from Any Device - SugarSync
  389. MyEclipse UML | Eclipse UML diagrams | UML Modeling Capabilities :: MyEclipse
  390. my_laptop_was_stolen_but_dropbox_is_running_and_i
  391. The MacPorts Project -- Download & Installation
  392. Ten OS X Command Line Utilities you might not know about
  393. Handy Mac OSX Command Line Tricks | Snipe.Net
  394. How to Crack WPA2 WPS WiFi password
  395. 6 Ways to Defend Against Drive-by Downloads | PCWorld
  396. macosx - Full guide for installing tomcat on OS X - Server Fault
  397. How To: Upgrade a Wall Outlet to USB Functionality
  398. Changing Apache Server Name To Whatever You Want With mod_security On Debian 6 | HowtoForge - Linux Howtos and Tutorials
  399. Pimp Your Facebook: How to Create a Badass Timeline Banner
  400. Four ways to make the Dock more powerful | Macworld
  401. MySQL Reference for OS X
  402. 14 Practical Ways to Use Evernote
  403. How to Unlock Padlocks Without a Key Using Cheap DIY Shims
  404. SSH tricks
  405. Pro Tips for Regular People: Five Photography Tricks Anyone Who Owns a Camera Should Know
  406. How to Roll Your Own Awesome Drag-and-Drop File Sharing Service
  407. diary.html
  408. Five Best Ways to Stream Live TV
  409. WiFi garage door opener makes forgotten keys a thing of the past - Hack a Day
  410. How to use your iPad or iPhone as a second monitor — Mac Tips
  411. Be a Grown Up Boy Scout: The Wilderness Survival Skills Everyone Should Know
  412. Using Bash To Output To Screen And File At The Same Time
  413. AssistantExtensions Is an All-In-One Siri Hack Manager
  414. MyEclipse UML Tutorial
  415. De-Mystifying the Dark Corners of Windows: The Registry, DLLs, and More Explained
  416. How To Maintain and Use Collaborative Grocery Lists
  417. Remove Unnecessary System Preferences Icons in OS X to Simplify Your Settings
  418. Everything You Thought You Knew About Learning Is Wrong | GeekDad | Wired.com
  419. How To Install Siri on iPad 2 -Video
  420. My Top 10 Jailbreak Tweaks
  421. The Best Wi-Fi Articles for Securing Your Network and Optimizing Your Router
  422. 7 Things I Learned From Building My First Desktop PC | PCWorld
  423. Install A Hard Drive Or SSD In Your Notebook's Optical Bay : Tiered Storage In A Single-Bay Notebook
  424. Evi one-ups Siri for iOS and Android
  425. How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive
  426. Online Tool Converts JavaScript Bookmarklets into Chrome Extensions | PCWorld
  427. Deleting Files Within Lion's Applications Folder | PCWorld
  428. iPhone 4S and iPad 2 Finally Get Proper, Untethered Jailbreaks
  429. The Always Up-to-Date Guide to Jailbreaking Your iPhone, iPod touch, and iPad [iOS 5.0.1]
  430. Going Google-Free: The Best Alternatives to Google Services on the Web
  431. Installing Apache2 With PHP5 And MySQL Support On Fedora 16 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  432. 7 Essential CSS3 Tutorials For Web Developers | Digg Technology
  433. MiniPwner Is a Cheap Penetration Tester and Portable Wi-Fi Node
  434. 35 MacGyver Tips, Clever Uses, and Other Life Hacks in One Infographic
  435. How to Prevent WordPress Site From SQL Injection Attack
  436. Performance Upgrades; FireWire USB SATA Storage; Memory, more at OWC
  437. Apple - OS X Lion Recovery - Introducing Lion Recovery
  438. Troubleshooting: My computer won't turn on
  439. iMac G5: How to Reset the SMU
  440. The Best Jailbreak Apps for iOS 5
  441. Add a Custom Message to Your Mac OS X Login Screen to Help People Contact You If Your Mac is Lost
  442. How to Boost Your Reading Comprehension by Reading Smarter and More Conscientiously
  443. EncFS 1.7.4 installer for Mac OS X available - BoxCryptor Blog
  444. Encrypted Filesystem for Mac OS X
  445. Best of Lifehacker 2011 News, Videos, Reviews and Gossip - Lifehacker
  446. Five Best Video Editors
  447. The Best System Tweaker for Linux
  448. External desktop hard drives buying guide | Macworld
  449. File Management Apps : How and Why to Root your Android: 15 Worthwhile Apps
  450. How to Root Kindle Fire for Mac OSX or Linux! | RootKindleFire.com
  451. The Get More Out of Google Infographic Summarizes Online Research Tricks for Students
  452. Finally, Some Privacy! Cool LCD Monitor Hack Helps Keep Your Secrets | PCWorld
  453. How to Choose A Cloud Storage Provider: Security - storage Blog
  454. Headphones buying guide | Macworld
  455. Best SSDs For The Money: November 2011 : Best SSDs For The Money: November Updates
  456. Macs, Kindle Fire, and managing files | Macworld
  457. Best Chrome Extensions
  458. Virtualization With KVM On Ubuntu 11.10 | HowtoForge - Linux Howtos and Tutorials
  459. Download a Free Dynamic DNS Update client for your dynamic IP
  460. How to Fix Your Family’s Computer This Holiday So the Rest of the Year Is Easy
  461. How to Securely Wipe Your Data from Any Phone on Any Platform
  462. How to Improve Your iPhone's Battery Life
  463. Enabling and disabling cookies | How to | Firefox Help
  464. Disable AutoRun to Stop 50% of Windows Malware Threats
  465. Apple’s Cloud-Based Music Service Now Live On iTunes | Gadget Lab | Wired.com
  466. HOWTO: SSH Tunneling Made Easy
  467. ArchBang Brings Arch Linux's Greatest Features to Your PC Without the Stressful Installation
  468. How to Make (and Sustain) a Good First Impression Every Time
  469. How to Use Photoshop to Pop Pimples, Change Facial Expressions, and Alter Reality As We Know It
  470. abyssoft - teleport
  471. Apache/NCSA Custom Log Format
  472. Best 5 monitors for professionals | Crave - CNET
  473. 5 More PC Upgrade Mistakes (And How To Avoid Them) | PCWorld
  474. Synergy
  475. Replace Your Keychain w/Technology, Convenience, & Style - Keyport Slide and Blades | Keyport, Inc.
  476. iOS 5 Shortcut Feature Enables A Hilarious Prank
  477. Microsoft Lync client for Linux ~ MyTricks
  478. Compare directories via diff - Mac OS X Hints
  479. Five Best Disk Defragmentation Tools
  480. How to Crack a Wi-Fi Network's WEP Password with BackTrack
  481. Top 10 Ways to Unlock the Unlockable
  482. WinX DVD Ripper Platinum Preview | PCMag.com
  483. How to Break Into a Windows PC (and Prevent It from Happening to You)
  484. Making UEFI Secure Boot Work With Open Platforms | The Linux Foundation
  485. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  486. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  487. What to Do When You've Forgotten Your Smartphone's Passcode
  488. How to bypass the iPad 2 password in five seconds : technology
  489. A Gadget for the Home Learns by Degrees - Katherine Boehret - The Digital Solution - AllThingsD
  490. Bump Key HOWTO
  491. Silence Noisy Neighbors by Transmitting Your Music to Their Speakers
  492. Pick Locks - Wired How-To Wiki
  493. The Perfect Desktop - Ubuntu 11.10 (Oneiric Ocelot) | HowtoForge - Linux Howtos and Tutorials
  494. Installing Apache2 With PHP5 And MySQL Support On Ubuntu 11.10 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  495. TonidoPlug - Tiny, Low Power, Low Cost, Linux Home Server | Access your files, music and media from anywhere
  496. More ways to move data to a new Mac
  497. Groovy - Home
  498. Learn How to Pick Locks from a Competitive Lockpicker Who Truly Loves Locks
  499. BackTrack Wiki
  500. The Best Disk Cloning App for Mac OS X
  501. Spool Is Instapaper On Steroids | TechCrunch
  502. Open Security Screws with a Rotary Tool
  503. The Always Up-To-Date Guide to Rooting Any Android Phone
  504. Synapse Is a Super-Fast, Tightly Integrated Application Launcher for Linux
  505. Cartoonify Photos with the GIMP
  506. What Settings Should I Change on My Wi-Fi Router? [Ask Lifehacker]


  1. Why wearables, health records and clinical trials need a blockchain injection
  2. FedEx CIO: It’s time to mandate blockchain for international shipping
  3. How blockchain is becomming the 5G of the payment industry
  4. IBM launches global blockchain-based payments network
  5. The difference between blockchain and a database explained
  6. Blockchain: The complete guide
  7. Sharding: What it is and why many blockchain protocols rely on it
  8. W. Va. says mobile voting via blockchain went smoothly
  9. Blockchain for business: 6 promising pilots
  10. Walmart, Sam’s Club tell suppliers to get on blockchain network
  11. 1. How Blockchain Works
  12. Here's what two executive surveys revealed about blockchain adoption
  13. W. Va. to use blockchain-based mobile app for mid-term voting
  14. What is blockchain? The most disruptive tech in decades
  15. New blockchain ledger will let you sell personal healthcare data
  16. BMW, GM, Ford and Renault launch blockchain research group for automotive industry
  17. Blockchain growth makes developers a hot commodity
  18. Will privacy be a stumbling block for blockchain?
  19. Someone wrote a kids' book to explain bitcoin and blockchain
  20. Can Blockchain Fix the Opioid Epidemic? Intel Wants to Find Out
  21. Hackers steal over $150,000 in cryptocurrency with DNS scam
  22. How blockchain can give readers more power on the internet
  23. Explainer: What is a blockchain?
  24. Bank Of America Seeks Patent On Blockchain-Based Data Storage System
  25. Blockchain to ‘radically’ transform anti-fraud, anti-money-laundering efforts
  26. How blockchain could solve the internet privacy problem
  27. Google will soon bring a blockchain-like system to the cloud
  28. Startup Xage Launches Blockchain-Protected IIoT Security
  29. IFTF: Blockchain Futures Lab
  30. Why Blockchain Will Serve New IT Purposes in 2018
  31. As blockchain heats up, so do job prospects for devs
  32. UpNest Featured in ABC 6 News
  33. 5 ways blockchain is the new business collaboration tool
  34. IBM sees blockchain as ready for government use
  35. Looking To Integrate Blockchain Into Your Business? Here's How
  36. Looking To Integrate Blockchain Into Your Business? Here's How
  37. Microsoft to test blockchain-based self-sovereign ID system
  38. Blockchain: The Complete Guide
  39. How blockchain can secure the IoT
  40. Blockchain - Wikipedia
  41. The Basics of Blockchain Technology, Explained in Plain English
  42. How Amazon Is Quietly Entering The Blockchain And Cryptocurrency Boom
  43. Blockchain and cryptocurrency may soon underpin cloud storage
  44. What Is Blockchain?

Cloud Computing

  1. IBM Opens Up Series of Security, AI and Cloud Initiatives
  2. What is a data lake? Flexible big data management explained
  3. 4 hidden cloud computing costs that will get you fired
  4. IT Turning to the Cloud to Handle Growing Big Data Demands
  5. Cloud Storage Comparison 2018: Compare Security & Features
  6. The 3 reasons CIOs have become cloud-first
  7. How Cloud Computing Impacts Corporate Security for Better or Worse
  8. What is cloud computing? Everything you need to know from public and private cloud to software-as-a-service | ZDNet
  9. How the Internet of Things will affect security & privacy
  10. Lima: Your Personal Cloud Storage Review
  11. Opinion: The FCC's Net Neutrality Victory Is Anything But | WIRED
  12. Best practice for using cloud computing in Europe 2013 (Part 1)
  13. 8 questions that will dominate enterprise cloud adoption
  14. Apple iOS 6 iCloud enhancements bring new enterprise problems
  15. Cloud computing is entering its teen years | Digg Technology
  16. VMware's WSX Does Virtual Desktops With HTML5 | Cloudline | Wired.com
  17. Dropbox just integrated with Facebook, making it easy to invite friends to shared folders | Digg Technology
  18. Jolicloud Me to Integrate Content From Multiple Online Services | PCWorld Business Center
  19. Jolicloud Me Delivers Personal Cloud Search, More | Cloudline | Wired.com
  20. What the cloud really means for your IT job
  21. 'Personal Cloud' to Replace PC by 2014, Says Gartner | Cloudline | Wired.com