|
|
|
|
|
|
|
|
|
Google for Developers: 8 Hot New Tools - Application Development - News & Reviews - eWeek.com
|
How To Take Control of Your Next Job Interview
|
The 50 Best Websites of 2011 - TIME
|
|
Information Security Interview Questions | danielmiessler.com
|
Hack This Site!
|
Apple iOS is safer than Android, McAfee says | Security - CNET News
|
|
How to Root Kindle Fire for Mac OSX or Linux! | RootKindleFire.com
|
File Management Apps : How and Why to Root your Android: 15 Worthwhile Apps
|
Kindle Fire Auto-Update Scorches Roots and Potentially Shutters Android Marketplace
|
|
Hackers break into car using a mobile phone - News | TopGear.com.ph
|
As SOPA/PIPA Still Loom, Techies Already Creating Workarounds | Techdirt
|
Steve Jobs Says This Will Be Your Greatest Life Revelation
|
|
App scans Facebook for unflattering photos you haven't been tagged in - Techworld.com
|
Netflix want cloud alternatives to Amazon Web Services - Techworld.com
|
AMD moves away from Intel rivalry, rethinks course | Computer Hardware - InfoWorld
|
|
10 Ways to Protect Your Privacy Online ~ LockerGnome
|
The Strange Birth and Long Life of Unix - IEEE Spectrum
|
MasterCard further invests into mobile payments via mFoundry | ZDNet
|
|
8
nice text-based applications in Linux ~ Linux and Life |
iPhone
4S satisfies 96 percent of owners, ChangeWave says | The Digital Home -
CNET News |
Bitdefender
officially releases Mobile Security app for Android - Yahoo! News
|
|
The
Best System Tweaker for Linux |
External
desktop hard drives buying guide | Macworld |
Research
team finds disk encryption foils law enforcement efforts |
|
Five Best
Video Editors |
The
Always Up-To-Date Guide to Rooting Any Android Phone |
Facebook
Is Tracking Your Every Move on the Web; Here's How to Stop It |
12/6 |
How
to Completely Anonymize Your BitTorrent Traffic with BTGuard |
Best of
Lifehacker 2011 News, Videos, Reviews and Gossip - Lifehacker |
Texas
Tech University :: Advanced IT Security Training |
|
Amazon
Kindle Source Code
|
The
Promise Of The 15-Inch MacBook Air
|
New
Tool Keeps Censors in the Dark
|
|
How
to Mentally Prepare Yourself to Start a New Job
|
The
Pirate Bay Dancing for Firefox Bypasses National IP and DNS Blocks
|
Synapse
Is a Super-Fast, Tightly Integrated Application Launcher for Linux
|
|
1000+ UN emails,
usernames and passwords leaked
|
A
Step By Step Debunking Of US Chamber Of Commerce's Dishonest Stats
About 'Rogue Sites'
|
7
hot jobs for 2012
|
|
The
Get More Out of Google Infographic Summarizes Online Research Tricks
for Students
|
Android
malware problems continue to grow
|
Google’s
Chrome Browser Edges In Front Of Firefox To Become Worlds Second Most
Popular Browser
|
|
Most
Common iPhone Passcodes
|
Netflix
is 'broken' with no fix in sight, analyst says
|
Hackers
post UN staffer user names, passwords
|
|
Apple
TV or Roku Set-top Box: Which is Right for You?
|
Carrier
IQ: The Sony rootkit all over again
Carrier
IQ: How the Widespread Rootkit Can Track Everything on Your Phone, and
How to Remove It |
Strange
Security: Hackers Could Set Your Printer on Fire from a Distance
|
|
Is
Technology Destroying Jobs?
|
9
Gadgets That Prove You’re a Hard-Core Early Adopter
|
How
to connect to Thunderbolt
|
|
Understanding
Windows 7's 'GodMode'
|
Developer
builds Siri proxy server
|
Find
Out How “In Demand” You Are in The Job Market With Identified
|
12/1 |
Seven
Security Habits of Successful Admins
|
Seven
Kindle Fire Apps for Getting Work Done
|
Try
OpenSUSE Linux 12.1 for Stability and Flexibility
|
|
Five
Best Online File Storage Services
|
Researchers
Crack Blu-Ray Encryption With Cheap Hardware
|
Virtualization
With KVM On Ubuntu 11.10
|
|
The
Hacker Quarterly
|
Two-thirds
of firewall managers lack confidence in their security posture
|
Finally,
Some Privacy! Cool LCD Monitor Hack Helps Keep Your Secrets
|
|
Apple's
telly vision
|
Hackers
prey on smartphone use at work during holidays
|
Top
10 Dumb Computer Security Notions and Myths
|
|
Controversial
New Website Spies on Voicemail, says P.I.
|
Slide
Show: 10 Tips And Best Practices For Becoming A Data Security Detective
|
Linux,
Open Source & Ubuntu: 10 Custom Linux Distros That Ease IT
Administrators` Workload
|
|
Doomed
by default passwords
|
TTU/HSC:
Programmer/Analyst II
|
Industry
says Africa fastest growing mobile market
|
|
The
Best Disc Burning App for Linux
|
The Jerk
|
The 101
Best Chrome Extensions
|
|
Headphones
buying guide
|
Best
SSDs For The Money: November 2011
|
Macs,
Kindle Fire, and managing files
|
|
Black
Friday iTunes infected credit malware alert
|
McAfee
Protects Your Mac Without Affecting Performance
|
How
to Fix Your Family’s Computer This Holiday So the Rest of the Year Is
Easy
|
11/29 |
The
Best Paying Jobs of The Future
|
How to
Choose A Cloud Storage Provider: Security
|
Toilet gaming
technology targets urinal boredom
|
|
Ten
Tips for Public Wi-Fi Hotspot Security
|
Which
VPN Providers Really Take Anonymity Seriously?
|
AMD
introduces world’s first 16-core PC microprocessor
|
|
Breakthrough
chip mimics human brain function
|
Playing with
Project Management
|
European
Parliament votes in favour of net neutrality
|
|
Treehouse
Is an Elegant, Focused Online Learning Resource for Aspiring Designers
and Developers
|
Sloppy
use of Amazon cloud can expose users to hacking
|
DARPA
Seeks New Methods For Biometric Authentication
|
|
Don’t
Say You’re "Experienced" on Your Resume (and Other Words to Banish)
|
The
Pros and Cons of a Tethered Jailbreak on Your iPhone, iPad, or iPod
touch
|
Report:
$79 Amazon Kindle Costs $84 to Make
|
|
Facebook
tracking is under scrutiny
|
Enabling
and disabling cookies
|
A Real-World
Approach to Improving Security in the Cloud
|
|
How
to Securely Wipe Your Data from Any Phone on Any Platform
|
How
to Improve Your iPhone’s Battery Life
|
Old
Java versions breed new security exploits
|
|
Remotely
Opening Prison Doors
|
Why
healthcare IT security is harder than the rest
|
This
Brilliant Door Prank Will Terrify and Maybe Kill Your Friends
|
11/17 |
4
spear-phishing hooks for the holidays
|
Stephen
King’s Rules for Time Travel
|
FBI
investigating intrusion into university records system to alter grades
|
|
Anti-Hacking
Law Criminalizes Most Computer Users, Former Prosecutor Says
|
Disable
AutoRun to Stop 50% of Windows Malware Threats
|
Kindle
Fire Creates Dilemma for Android
|
|
CNBC:
Codewars
|
FBI
stop hackers using
|
Apple’s
Cloud-Based Music Service Now Live On iTunes
|
11/15 |
Synergy /
QuickSynergy How-To |
SSH
Tunneling made easy
|
iOS Developer Center Pending
|
|
Linux
World Map
|
http://developer.apple.com/
|
Sloppy
use of Amazon cloud can expose users to hacking
|
|
World's
smallest computer measures just 1mm
|
Ralph
Langner: Cracking Stuxnet, a 21st-century cyber weapon
|
Researchers
recover typed text using audio recording of keystrokes
|
|
Electronic
medical records rarely encrypted: expert
|
Senators
Introduce Internet Sales Tax Bill
|
Amazon
Has Acquired Yap, the Closest Thing to a Siri Clone It Can Find
|
|
Sign
legal documents with your finger, your iPad and Softsign
|
Add
Lifehacker and Its Writers to Your Circles on Google+ to Breathe New
Life into Your Stream
|
Fedora
16 now being served, with large side order of cloud
|
|
Reed's Mail
|
What
is the best scientific paper you have read
|
ArchBang
Brings Arch Linux’s Greatest Features to Your PC Without the Stressful
Installation
|
|
WebTalks
Reads Your RSS Feeds for You Off Your Android Device
|
Toyota’s
New Infotainment System Mirrors Your Smartphone’s Display
|
Apple
requires Mac App Store candidates to be sandboxed
|
|
MIT
server hijacked and used in drive-by attack campaign
|
So many
risks, so little time
|
Bank
Adopts 'Security Data Warehouse' to Fight Persistent Security Threats
|
|
Norton
Tablet Security
|
Job
Outlook: The Candidate Skills/Qualities Employers Want
|
Game
Over: Amazon Prime Is Officially the Greatest Deal in Tech
|
|
How
Can Malware Be Stopped?
|
Study:
Signature-based antivirus can't stop polymorphic malware, unknown
malcode
|
5
Things You Need to Know About Android Phones
|
|
Adobe's
decision to ditch mobile Flash: What you need to know
|
Teenagers
Tell Researchers It’s a Cruel, Cruel Online World
|
Common
sense wanted in the IT department
|
11/10 |
Revealed:
the material properties of memristors
|
How
to Use Photoshop to Pop Pimples, Change Facial Expressions, and Alter
Reality As We Know It
|
How
to Make (and Sustain) a Good First Impression Every Time
|
|
Synergy
lets you easily share your mouse and keyboard
|
KDE
3.5 Fork Trinity Releases First Major Update
|
5
More PC Upgrade Mistakes (And How To Avoid Them)
|
|
Best
5 monitors for professionals
|
5
Hot Tech Projects to Boost Your IT Career
|
Entertainment
Industry Gets Another Usenet Provider To Shut Down: Is Usenet Illegal?
|
|
Wi-Fi
security do's and don'ts
|
Top
10 Disruptive Techs from the Last Century
|
The
Best Terminal Emulator for Mac OS X
|
|
1Password
vs. DataVault for iPhone: Fight!
|
Six
Good Reasons to Try Fedora 16
|
Everything
You Always Wanted to Know About Web Tracking (But Were Too Paranoid to
Ask)
|
|
Fedora Core 16
released
|
What
Would The Movie Business Be Like If The MPAA Succeeded In Killing The
VCR?
|
OSXFUSE
|
|
15
Apps and Tweaks That May Convince You to Jailbreak Your iPhone
|
U.S.
Counts on the Cloud to Boost Cyber–Security
|
Fedora
to simplify filesystem hierarchy
|
|
40
People Who Changed the Internet
|
iPhone
Security Bug Lets Innocent-Looking Apps Go Bad
|
Busted!
Two New Fed GPS Trackers Found on SUV
|
|
Screen-spy
program can read texts and emails
|
Cyber-espionage
attempts on US businesses are on rise
|
How
To Never Bust Through Your Smartphone’s Data Cap Again
|
11/8 |
From
College Major to Career
|
Hijacking
Google Analytics
|
Microsoft
issues workaround for Duqu attack while it prepares a patch
|
|
Customized,
stealthy malware growing pervasive
|
They
are the 11 percent (or less) who really get security
|
iOS
5 Shortcut Feature Enables A Hilarious Prank
|
|
Network
World's Hottest Tech Arguments
|
How
to find out if your email address has been compromised
|
New
Apple Store app launches Thursday; here’s how it will change Apple’s
retail operations
|
|
Ubuntu
Linux heads to smartphones, tablets, and smart TVs
|
Browser
wars: IE vs. Firefox vs. Chrome vs. Safari vs. Opera
|
Check
Out the Guide to 400 Essential Apps By Wired and Gizmodo
|
|
New
cyber attack targets chemical firms: Symantec
|
Governments
turn to hacking techniques for surveillance of citizens
|
Half
of all spam is relayed via Asian computers
|
|
Sony
splits TV business in three as trouble persists
|
Disney-ABC
Signs Streaming Deals With Amazon And Netflix
|
Moving
On? 5 Things NOT To Do When You Quit
|
|
Five
Best Disk Defragmentation Tools
|
How
to Make the Most of Airplane Wi-Fi and Never Pay Full Price Again
|
IT's
guide to managing Macs in the OS X Lion era
|
|
How
to Crack a Wi-Fi Network’s WEP Password with BackTrack
|
US
Copyright Office Still Out Of Touch; Supports PROTECT IP/E-PARASITE
& Felony Streaming Bills
|
A
Sister’s Eulogy for Steve Jobs
|
|
Amazon
Kindle Fire Poised to Reshape Tablet Market: 10 Reasons Why
|
Siri
iPhone Voice App Is Important to Apple`s Future: 10 Reasons Why
|
68
great ideas for running a security department
|
|
Keyport Slide
|
Portable Software Applications
that run from USB
|
Uptick
in tainted ads hurts consumers, advertisers
|
11/3 |
Applying
to grad schools? Clean up your Facebook
|
Facebook
Timeline a new privacy test
|
Amazon
launches Lending Library for Kindle owners
|
|
Macs
are invading the business world, study says
|
How
to Break Into a Windows PC (And Prevent It from Happening to You)
|
Warner
Bros. Hates Libraries, Wants To Embargo DVD Sales To Libraries For A
Month
|
|
Amazon Kindle
4 review
|
PandoraEnhancer
for Chrome Removes Ads, Adds Desktop Notifications for Song Changes
|
(At
least) 4 web authentication authorities breached since June
ssl as good as broken
|
|
Making
UEFI Secure Boot Work With Open Platforms
|
9
Essential Geek Books You Must Read Right Now
|
These
Are the Greatest Geek Books of All Time |
|
Kernel
for Linux Data Recovery Software
|
Linux Journal
|
MPAA
Lists “Notorious” Pirate Sites To U.S. Government
|
|
Ubuntu
vs Fedora: which is best?
|
Dropbox
adds new file-sharing service for work groups
|
Want
a raise? 11 IT jobs set for 6%-9% pay hikes in 2012
|
|
Books
Unbound or What is a book
|
It’s
3-D, High Definition and in Your Face
|
Top
10 Ways to Unlock the Unlockable
|
|
Hacks
make large-scale sabotage possible
|
Watch
Out for Fake Untethered iOS 5 Jailbreak Tools
|
iPhone
4S Battery Problems May Be a Bug with iOS Location Services
|
|
Computer
program could point police to gang-crime suspects
|
How
to Break Into a Mac (And Prevent It from Happening to You)
|
When
passwords attack: the problem with aggressive password policies
|
|
Hacking
the Google TV Box Without Rooting It
|
BofA
Calls Off Debit-Fee Plan
|
Get
real about your security risks
|
11/1 |
The 40 Most Popular
Tools For Your System Admin Bag
|
Google's Maps
Street View service pilots indoor photos
|
Microsoft
has figured out how to turn any surface into a touch pad
|
|
BT
ordered to block Newzbin2 filesharing site within 14 days |
A
Guide to Sniffing Out Passwords and Cookies (and How to Protect
Yourself Against It) |
public
vpn service |
|
HTC's on the
Hotseat for Allowing Critical Smartphone Security Flaw
|
Facebook Enlists
Websense for Neighborhood Watch
|
GotYa
For Android Takes Geo-tagged Photos Of Person Who Stole Your Phone
|
|
Enterprise
Mobility: Apple iPad's Reign as Top Tablet Won't Last Forever: 10
Reasons Why
|
Safety
in the Cloud - Best Practices for Private and Public Models
|
Hands
On With Nokia's Crazy Flexible Phone
|
|
Researchers
Demo Cloud Security Issue with Amazon AWS attack
|
Citrix:
Virtual desktops about to become cheaper than physical ones
|
Researcher
finds major flaw in Facebook
|
|
FBI
Wishes for a Network Security Utopia That Can Never Exist
|
One
in five IT staff expected to quit current employer within 12 months
|
How to
Spoof Caller ID |
|
'Big
Data' Prep: 5 Things IT Should Do Now
|
5
Signs Technology is Moving Too Fast
|
Researchers
find "massive" security flaws in cloud architectures
|
|
5
Tech Pros Companies Want to Hire
|
A
Gadget for the Home Learns by Degrees
|
High-speed
Ethernet Planning Guide
|
|
Congress
asked to investigate internet “supercookies”
|
Linux
Desktop Faceoff: GNOME 3 vs Ubuntu Unity
|
Consumerization
101: How to crack the iPad password in 5 seconds
|
|
PROTECT
IP Renamed E-PARASITES Act; Would Create The Great Firewall Of America
|
The
best tidbits from the Steve Jobs bio
|
What
to Do When You’ve Forgotten Your Smartphone’s Passcode
|
10/27 |
LIAN
LI Lancool PC-K56 Black 0.8 mm SECC, Plastic + Mesh ATX Mid Tower
Computer Case $59
|
TR's fall 2011 system
guide
|
Discover
What’s New in CSS 4
|
|
Windows
XP hacks Books by O'Reilly : 100 Industrial Strength Tips and tools
|
You
say you want a revolution? It's called post-PC computing
|
How to Read Body Language to
Reveal the Underlying Truth in Almost Any Situation
|
|
Apple
quietly bumps MacBook Pro processors, graphics
|
Silence
Noisy Neighbors by Transmitting Your Music to Their Speakers
|
HTC
partners with Dropbox, 5GB free on every Android
|
|
Smartphone
sales fell in the U.S. for the first time during Q3
|
Apache
Web server security
|
More
Gyroscope-based smartphone keylogging attack
|
|
Police
use Facebook to track down man who stole booze from bar
|
Laser
attacks on planes continue, despite greater penalties
|
Myspace:
Five lessons learned from the front
|
|
The
Most Common Hiding Places for Workplace Passwords
|
Google
Explains Online Safety and Privacy at Good to Know
|
How
to Get iOS 5’s Biggest Features in Android Right Now
|
|
Get
your scroll bars back in OS X Lion
|
HowTo Pick Locks
|
Bump
Key HOWTO
|
|
New
Mac malware variant disables OS X defenses
|
How
to Get All Your Apps Everywhere
|
5
Ways to Fix a Slow PC
|
|
The
5 biggest gripes so far about the iPhone 4S
|
Lytro wants to
reinvent photography
|
The
IPad's Secret Abilities
|
|
Hacker's
phone call to police saying he defaced their website.. because he was
bored
|
Microsoft's
YouTube channel has been hacked
|
Want
To Easily Boot Users Off Your Wi-Fi Network? WiFiKill Can Take Care Of
That For You
|
|
The
“world’s most wanted hacker,” Kevin Mitnick, has gone straight
(interview)
|
Zimperium
Finally Releases 'Anti' For Android, Allows You To Use Penetration
Testing Tools On The Go
|
How
to find out everything that Facebook *really* knows about you
|
10/25 |
How
to put your logo in a QR code
|
The
Internet of Things [INFOGRAPHIC]
|
55
Portable Apps for Making a USB Super Stick
|
|
Kaspersky
Pure Total Security (3 User) Free AR at Newegg
|
For
iPads in the enterprise, hassles aplenty
|
Doxie
Go: Wireless Scanner (mostly) Cuts the Cord
|
|
Crypto
is cracked: How not to fall in
|
Turn
your nose up at Dart and instead smell the CoffeeScript
|
Apple's
Siri is AI with an attitude
|
|
Should
tech pros get an MBA?
|
Websites
leak more info than most know: study
|
45 Minutes to a
Linux Terminal Server
|
|
Outside Boulder this weekend
|
A Day in the Life
of Privacy
|
How
to Fix Internet Embarrassments and Improve Your Online Reputation
|
|
Should
I Switch to iCloud From Google?
|
Amazon
Bypassing Publishers By Signing Authors Directly
|
Thousands
of Social Security Numbers Leaked Yearly
|
|
Is
Your Car Tweeting? -- What's Next for Connected Devices
|
The
Perfect Desktop - Ubuntu 11.10 (Oneiric Ocelot)
|
Installing
Apache2 With PHP5 And MySQL Support On Ubuntu 11.10 (LAMP)
|
10/18 |
Some
things to consider before switching your bank
|
New
Gadgets, Without the New Car
|
Tips
for Using Wi-Fi Securely
|
|
INSIDE
EDITION Investigates Electronic Pickpocketing |
Dart:
a language for structured web programming |
Anonymous
'hacktivists' briefly take down NYSE.com |
|
Government'
backdoor R2D2 Trojan discovered by Chaos Computer Club |
How
NOT to redact a PDF - Military radar secrets spilled |
DoJ’s
WikiLeaks Probe Widens to Include Gmail, ISP |
|
Mythbusters
to Host Discovery’s Documentary on Steve Jobs |
Flashback
contains a Mac Trojan |
iOS
5 now protects against DigiNotar, MD5-signed certs |
|
The
Federal Reserve Plans To Monitor Facebook, Twitter, Google News |
Enterprise
Mobility: Buy iPhone 4 Instead of iPhone 4S: 10 Reasons Why |
Qwikster
dies before it is born |
|
How
to Hack the New Road Signs (Updated) |
Computer
virus hits US Predator and Reaper drone fleet |
The
Best System Monitor for Linux |
10/13; |
How to build a Linux
media server |
Tom's Hardware (Fall 2011)
Best
Graphics Cards 3TB
Harddrives |
Tom's Hardware Home |
|
Supreme
Court Declines Music Download Case |
TechAmerica:
US IT industry adds jobs in 2011 |
Protecting
iPad data without hobbling users |
|
Check
your machines for malware, Linux developers told |
iPhone
and iPad Security: The Human Element |
This is how
Windows get infected with malware |
|
Amazon
Adds Free Encryption to Storage Service |
Amazon
Adds Free Encryption to Storage Service |
Hide
Your Stuff in Plain Sight |
|
Ten
Security Essentials for the Networked Enterprise |
Mobile
Security Threats Are Heating Up |
iOS
5: What you need to know |
|
How Secure Is My Password?
|
New
OS X Trojan horse sends screenshots, files to remote servers |
Microsoft
addresses Windows 8 secure boot issue |
|
Uniform Traffic
Ticket Scam email
|
Steve
Jobs (1955-2011) |
WiFi
users blissfully ignorant about real security, research finds |
|
Adobe:
We've got the Touch for tablets
|
What
does your mobile carrier know about you?
|
How
to Use the Internet to Investigate Your Next Date, Coworker, or New
Friend (Without Being Creepy)
|
|
Federal
IT security incidents increasing rapidly
|
Facebook
looks to San Diego's Websense to improve security
|
Hackers
may target cars next, McAfee says
|
10/6 |
AT&T
Begins Sending Throttling Warnings to Top Data Hogs
|
Apple
unveils iPhone 4S
|
TONIDO Plug Linux mini
computer
|
|
Congress
Is About to Make It Legal to Robocall Your Cell Phone; Here’s How to
Speak Up Against It
|
Firefox
devs mull dumping Java to stop BEAST attacks
|
Rhapsody
to Acquire Napster in Deal With Best Buy
|
|
email:
Reminder: Employer Panel
|
Isaac
Asimov on Security Theater
|
An
Incredibly Simple Way to Escape from Wrist-Binding Zip Ties
|
|
Paid
Internships Key to Job-Search Success
|
Reed's
email about job fair & other stuff
|
The
next frontier in fearing the iPad
|
|
Diebold
voting
machines can be hacked by remote control
|
Java,
Adobe vulns blamed for Windows malware mayhem
|
Global
Internet governance fight looms
|
|
Problems
with Mac OS X Lion Passwords
|
How
Does the Amazon Kindle Fire Tablet Stack Up to the Competition?
|
Hackers
disguise malware as emailed docs from smart printers
|
|
The
Future Of Books: A Dystopian Timeline
|
15
Free Apps for Personalizing Your Android Phone
|
More
ways to move data to a new Mac
|
|
Top
10 Kindle Hacks
|
Firefox
Add-On Cocoon – Strengths and Weaknesses
|
Groovy a dynamic language
for java
|
|
Buy
This Movie Or Legally Download It For Free: Your Call
|
'Bring
your own device' programs give Apple a boost in the enterprise
|
Incredibly
Useful CSS Snippets
|
|
Decoding
Twitter
|
25
Free eBooks for Web Developers and Designers
|
Force
Windows Recycle Bins to Empty for Every User on a System
|
10/4 |
HTC
Android 'massive security' flaw leaks private info like a sieve
|
Windows
XP Usage Share Falls by Record Amount
|
Innovatio’s
Infringement Suit Rampage Expands To Corporate Hotels
|
|
What
to Do if You've Been Hacked |
The
Best Hacker Films |
CSS
Awards – 15 Awesome Websites |
|
What's
a Company's Biggest Security Risk? You. |
Facebook
tracks what you do online, even when you’re logged out
NOT
|
The
Most Prevalent Attack Techniques Used By Today's Hackers |
|
Mac trojan spreads under guise of PDF document
|
Pentagon
extends cyberattack defense program |
Concern
over U.S. snoops drives Canadian political party to cloud-based
encryption |
|
How
to Stop Facebook From Tracking You Across the Internet |
Android
powered 56 percent of smartphones sold in the last three
months |
Facebook
Gold
Snopes
Article
|
|
Make
Your Own RFID Shielded Wallet To Foil ID Thieves |
5
Ways QR Codes could change the 2012 Election
|
Changes to
Facebook |
|
Typosquatting
hacks: Finger slips sink ships |
Twitter
Bans Bad Passwords |
VITAband
Holds Emergency Medical Info, Visa RFID Credit Card For Joggers |
|
Zite |
The
10 Most Lovable Creatures in Science Fiction |
Keep
your Mac safe from Web security flaws |
|
Make
Your Own Windows 8 Tablet with Off-the-Shelf Gear |
Most
— But Not All — Big Magazine Publishers Sign On for Amazon's Tablet |
5
Dirty Tricks: Social Engineers' Latest Pick-up Lines |
|
Learn
How to Pick Locks from a Competitive Lockpicker Who Truly Loves Locks |
Austin
Police Planned... Then Postponed Wardriving Plans In An Attempt To
Shutdown Open WiFi |
Security
becoming a must on smartphones (Inside Apps)
|
9/27
|
The
Always Up-To-Date Guide to Rooting Any Android Phone
|
APP
Guide: New Fall Season |
Thunderbolt
Display |
|
Adobe
patches Flash bug hackers are already exploiting
|
Bigger
isn't better when it comes to social engineering attacks
|
Wrapping
Personal
Devices and Critical Data in Stale Policies
|
|
Windows
8 Certified Computers May Not Be Able To Boot Linux
|
The
best changes IT can make: top 5 reader suggestions
|
3
Hacks for Firefox That Will Double Your Internet Browsing Speed
|
|
Apple
iPad 3 Might Face Trouble at Launch: 10 Reasons Why
|
Groovy,
JavaScript, Ruby Among Fastest Growing Programming Languages
|
Smartphone
to
measure radiation
|
|
How
a Quick WiFi Tweak Could Double Your Phone's Battery Life
|
Google
improves video chat opens to the world
|
iPad: About backups
|
|
How
Do I Protect My OS X Lion Passwords from Being Easily Hacked?
|
McAfee
Delivers Comprehensive Protection for Mobile Devices
|
Stubbornness
Increases the More People Tell You You’re Wrong
|
|
Legal
risks abound for firms without a mobile device security policy
|
Relive
The Classics DRM-Free: GOG.com Interview
|
Mounting
Remote Directories With SSHFS On Debian Squeeze
|
|
5
Secrets to Building a Great Security Team
|
System
Builder Marathon, Sept. 2011: $2000 Performance PC
|
Skype
for iPhone makes stealing address books a snap
|
|
Angry IP Scanner?
|
Top 4 Port
Scanners
|
11
Android Apps to Boost Speed and Battery Life
|
9/22 |
nmap.org
|
TCP/IP Reference
|
Unicornscan
|
|
Protect
your privacy with a new crop of security suites
|
Five
Reasons to Try Joomla for Content Management
|
Travel
Back in Time to Usenet 30 Years Ago
|
|
UBS
Rogue Trader Underscores Insider Threats Facing Enterprises
|
Capitol
Alert: Computer hacking sparks Assembly warning to dozens of aides
|
Intel
officials' emails posted after hack of cybersecurity group
|
|
$700
/ 2br -
3 BEDROOM HOME FOR RENT (Lubbock, TX)
|
Electronic
Medical Records Service Practice Fusion Raises $6M From SV Angel,
Founders Fund
|
Organizations
Over-Confident About Security Strategy: Survey
|
|
Call
It Your Online Driver’s License
|
How
to Turn Your Nook Color into an Android Tablet
|
Iran
blocks Tor; Tor releases same-day fix
|
|
Linux Home
Networking
|
Quick
HOWTO : Ch14 : Linux Firewalls Using iptables
|
Tyler
Technologies
Jobs
|
|
Gauge
Your Mobile Internet Usage
|
Capitol
Alert: Computer hacking sparks Assembly warning to dozens of aides
|
16
essential Android apps for IT pros
|
|
Wired
and Tired: The Long View on the New Netflix
Netflix
Stock
|
Google
Wallet Goes Live On Sprint, Visa/Discover/AmEx Support On The Way
|
Hackers
break SSL encryption used by millions of sites
|
|
Zenmap
|
15
essential open source tools for Windows admins
|
OS
X Lion passwords can be changed by any local user
|
|
Privacy
at risk: Who's watching you? (roundup)
|
The World's Largest
Photo Libraries
|
Quickly
open unlinked URLs in Terminal
|
9/20
|
Mac OS X: How to
start up in
single-user or verbose mode
|
AITP and Marathon Oil invite
you to attend a
special event on Tuesday, September 27th at 5:30pm in BA 55
|
NI
September 22 at 4:30pm in BA 365. Did we mention that free food and
drinks from Rosa's Cafe
|
|
Obama
administration seeking tougher penalties for cybercrimes like hacking
|
Hidden
Wi-Fi Diagnostics Tool In Mac OS X 10.7 Lion
|
Forensic
Tool Unlocks Online History
|
|
Network
trust and security in doubt
|
RIAA
Sending DMCA Takedowns On *FREE* Music Being Distributed Directly Off
Universal Music Website & Promoted By The Artist
|
How
You Should Be Using LinkedIn: Tips from an Insider
|
|
Windows
8 Screenshot Tour: Everything You Possibly Want to Know
|
Microsoft
Ditches Flash on Metro Version of Internet Explorer 10
|
Newzbin2
Release Encrypted Client To Defeat Website Blocking
|
|
Google
Building Maker |
Newseum
What
Should I Read Next |
Everything
SSH |
|
Homeland
Security Digital Library - Priceless resource |
VMware
updates Windows-on-a-Mac software |
Review:
Track your stolen laptop for free with Prey |
|
Vocre
Turns Your iPhone Into a Near-Instant Universal Speech Translator |
VC
legend Doerr: Tech is booming, not in a bubble
|
McAfee
and Intel partner up to put anti-theft tech in Ultrabooks |
|
Book
Review: Metasploit The Penetration Tester's Guide |
How
Do I Get Cool Desktop Effects in Linux? |
Windows
8 Will Run From USB Thumb Drive |
|
Cracks
in security leave DHS financial systems vulnerable to abuse |
Windows
8 on Workstation 7.1.4? |
Microsoft
download from The Garage: Mouse without Borders |
|
Prompt |
The
Best Disk Cloning App for Windows |
Risk
Perception and
Terrorism: Applying the Psychometric Paradigm |
9/15 |
QR
codes and security – my take |
Bitcasa
moves your hard drive to the cloud
|
Why
Sprint Offering Unlimited Data for iPhone 5 Is No Big Deal |
|
TED:
Ideas worth
spreading
SixthSense |
eMail!! |
New
emotion detector can see when we're lying |
|
How
I Got My Stolen Laptop Back Within 24 Hours Using Prey |
How
to Turn Your FreeNAS Box Into an Internet PVR with SABnzbd and Sick
Beard |
Authors
Guild sues universities over online books |
|
Linux.com
pwned in fresh round of cyber break-ins |
Researchers
develop botnet drone that targets Wi-Fi networks
Gizmodo
Link
|
E-mail
typos result in 20GB of stolen data |
|
This
Day in Tech: Data from Stanford Hospital patients found online
|
Systemd |
Open
Security Screws with a Rotary Tool |
|
Everpix:
All Your Photos, Automatically Organized And Accessible From Anywhere |
Can
Irrational Decisions Be Corrected? A Football Case Study |
Windows
8 Gets Ready for Its Big Debut
Top
8 expected features of Windows 8 |
|
Spool
Is Instapaper On Steroids |
Six
Ways Amazon Book Streaming Could Help Small Business |
Net
neutrality rules move closer to implementation |
|
The
Best Disk Cloning App for Mac OS X |
Installing
MySQL Administrator Tool To Connect To Remote Databases |
Top
10 Video Game Cheat Codes |
9/13 |
Amazon
'to launch book rental service |
HP
Introduces New Enterprise Security Software |
10
Hackers Who Made History |
|
Could
DigiNotar Hack Lead to a Cyberattack on You? |
Linux
Init Process / PC Boot Procedure |
Low
blow: Phishers target student loan applicants |
|
Cutting
the Gordian Knot of Web Identity |
Daily
iPad App: PDF Expert |
Car
Hacking: Researchers Highlight Emerging Risks and Lack of Security in
Automobiles |
|
IT
Security & Network Security News & Reviews: 10
Notorious Hackers Who Went to Work for 'The Man' |
MPAA's
Bogus 'Piracy' Numbers Mean It Thinks Downloaders Would Buy 200 More
DVDs Per Year |
Cloud
Encryption and Security Tips |
|
Cybersecurity
Focus Increasing as Organizations Adopt New Computing Models |
Senators
Push for Changes in Cybercrime Law |
This
Is How Insanely Fast the Texas Wildfires Are Spreading |
|
RFID
credit cards easily hacked with $8 reader
|
Encryption
and
Privacy
|
Many
US schools adding iPads, trimming textbooks |
9/8 |
How to Build a
Remarkable Computer and Save $ |
Unbelievable
solutions to common tech problems
|
Java
or Python Reddid display |
|
Hacking
ATMs With Infrared Cameras |
History
of
Software Piracy |
How
to Use LinkedIn to Increase Your Hirability |
|
6
Javascript Libraries for Developers |
Diamond
Wireless Range Extender WR300n Review |
UPDATE:
TrueCrypt v7.1! |
|
Some
Guy Pranked YouTube Into Taking Down Justin Bieber’s Official Videos
Because of a Fake Copyright Claim |
Wired:
eReaders Comparied |
WikiLeaks:
MPAA behind Aussie ISP lawsuit
(but don't tell anybody) |
|
What
do top CIOs make |
MIT
researchers craft defense against wireless man-in-middle attacks |
The
GRUB Boot Loader |
|
How
to root and hack your Android phone |
Students
Find Ways to Thwart Facebook Bans |
Understanding
the Insider Threat |
|
It's
still good to have gatekeepers |
TV In The
Cloud |
Why
iPad is Conquering the Workplace |
|
OS
- Browser market share August 2011 |
How-To
significantly increase volume on iPad. etc |
DHS
Warns of Anonymous Cyber-Attack Tools, Planned Mass Protests |
|
How
the Starz-Netflix Divorce Will Remake Video |
Why
the Number of Apps in an App Store Doesn't Matter |
Irongeek.com |
9/6 |
The road forward for
systemd |
The
Efficacy of Post-9/11 Counterterrorism |
JavaScript-Toolkit-V110-Released |
|
http://bensbargains.net/deal/212705/?referrer=rss%2F/ |
OpenDNS
and Google working with CDNs on DNS speedup |
10
Secure Linux Distributions You Need Know About |
|
How
to
install Grub to the MBR |
Occupational
Outlook
Handbook, 2010-11 Edition |
Would
We Have Art Without Copyright Law? |
|
Is
There One Image That Makes You Laugh Every Time You See It . . . No
Matter How Many Times You See It? |
Boot with
GRUB |
VMware
CEO: Cloud to end computer desktop era |
|
Linux
Now Runs on iPad; Tuxedo Optional |
Linux
at 20: New Challenges, New Opportunities |
Software
tracking could turn Chinese piracy into revenue |
|
Survey:
IT Pros Split on Allowing End Users to Download, Install Software |
Speech
recognition leaps forward |
Jailbreaking
101: Which Tool to Use to Hack Your iDevice |
|
Codecademy
Is a Free, Interactive Webapp That Teaches You How to Code |
How
Do I Securely Wipe a Computer |
Five
Good Reasons to Try Mandriva Linux 2011 |
|
Yale
gives iPads to med school students |
Why
did CNN buy the news aggregator Zite?
|
Book
Review: CoffeeScript |
|
Hard
Drives 101: Magnetic Storage |
How
To Install VMware Player On Ubuntu 11.04/Linux Mint 11 |
"those
who are too smart to engage in politics are punished by being governed
by those who are dumber."--Plato 2005 |
9/1 |
Hoot
Turns Facebook into a Study Hall and Project Collaboration App |
Top
5
Recession-Proof Careers |
Pakistan
to ban encryption software |
|
Deeper
Is a Lion Tweaking Tool with Dozens of Customization Options |
Browsing
and Privacy: How to Not Get Tracked |
How
to Share Your Wi-Fi Network with Android Users, No Password Typing
Required |
|
Five
Best Phone Recovery Tools |
Print
to PDF Can Create a PDF from Any Printable Content on Your iPhone or
iPad |
Apple's
iOS 5 Beta 6 Jailbroken |
|
Tiered
pricing comes to the Internet backbone |
How
To Prevent IT Sabotage Inside Your Company |
Dear
MPAA: Stomp Your Feet And Repeat It As Many Times As You Want, But
Infringement Is Not Theft |
|
https://kindle.amazon.com/your_highlights
|
https://kindle.amazon.com/profile/Dr-John-R-Durrett/2334
|
The
collar bomber's explosive tech gaffe
|
|
Fired
techie created virtual chaos at pharma company
|
Free
Textbooks For Students Will Break Greedy Monopoly
|
Investigation
reveals widespread insider hacking at immigration agency
|
|
Apple
Neutralizes Jailbreaking Threat – By Employing Him
|
How
Hackers Perpetrate Click-Fraud
|
Google's
War Against Scraper Sites Continues
|
|
Lawsuit
Accuses comScore of Major Privacy Violations
|
50
books that were banned
|
How
Can I Make the Windows Command Prompt Better?
|
8/30 |
Top
10 Secret Agent Security Tips and Tricks |
The
Perfect Server - CentOS 6.0 x86_64 |
Five
Best Hard Drive Space Analyzers |
|
Amazon
Student for iOS Makes Buying, Selling Textbooks a Breeze |
Why
Software Is Eating The World |
How
To Prevent IT Sabotage Inside Your Company |
|
|
|
|
|
August 29th Time
Password Article
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SF-Wireshark
(ethereal)
|
YouTube-History
of Hacking
|
W:Max
Butler--Stolen Credit Cards
|
8/25
|
DealNews.com
|
SF-nmap
|
SF-dig
|
|
History
of Hacking (Video)
|
JohnRDurrett
on Twitter
|
MSDNAA
|
|
Learn
10 good Unix usage habits
|
Protecting
MySQL
database from SQL injection attacks with GreenSQL
|
Instapaper
|
Misc Summer
|
All
Things Digital
|
Cool
Tools
|
Linux/NIX
Web Authoring Tools
|
|
|
|
|