1. The Best Mobile Payment Apps for 2020
  2. Linux 5.10 to make Year 2038 problem the Year 2486 problem
  3. Home automation: Your options, explained
  4. Clever uses for your Amazon Echo - and security steps you can’t skip
  5. iPhone 12 Pro camera uses lidar. What that is and why it matters
  6. iPhone 12's MagSafe is the sleeper feature you should care about
  7. What is a DDoS attack? Everything you need to know about Distributed Denial-of-Service attacks and how to protect against them | ZDNet
  8. Barnes & Noble confirms cyberattack, suspected customer data breach | ZDNet
  9. iPhone 12 has 5G, but Apple still has us questioning why we need it
  10. Analysis: New Apple 'iPhone 12' to offer 5G speeds U.S. networks can't deliver
  11. How To Install LAMP Stack on Fedora 32/31/30/29 | ComputingForGeeks
  12. Feds may target Google’s Chrome browser for breakup
  13. Apple’s Biggest Challenge Hides Inside Revolutionary MacBook Pro
  14. 13 Things to Know About Amazon Prime
  15. Amazon's very different Prime Day could render Black Friday an afterthought
  16. 6 ways Android 11 just turned up the heat against Apple's iPhone
  17. How to Install Linux
  18. How to use the new Google Photos editor
  19. Could Microsoft be en route to dumping Windows in favor of Linux?
  20. What Are Ebike 'Classes' and What Do They Mean?
  21. Drive Full: How to Avoid Running Out of Storage Space on Every Device
  22. How social networks are preparing for a potential October hack-and-leak
  23. Encrypted messaging can be intercepted. Here's what that means for you
  24. Google is giving data to police based on search keywords, court docs show
  25. 7 ways to effectively ensure IT-business alignment
  26. FBI Warns Against Using Hotel Wi-Fi for Work
  27. US Army Testing AR Goggles for Bomb-Sniffing Dogs
  28. Everything you need to know about wired networking on the Mac | AppleInsider
  29. 15 sci-fi movies you need to watch before they leave Netflix in October
  30. Become a Prime Day Pro With These Tips and Early Deals
  31. Prime Day vs. Black Friday: When is the best time to buy?
  32. iOS 14's Smart Stack is a must have for any iPhone user. Here's what you need to know
  33. Congress' Big Tech investigation finds companies wield 'monopoly power'
  34. iPhone 12 launch date: Apple's virtual event for its expected 5G smartphone is Oct. 13
  35. 11 of the best sci-fi books that transport you to another world
  36. 9 hidden iPhone features we discovered after installing iOS 14
  37. Google Nest Audio Review
  38. Apple Sues Ontario Recycling Firm for Reselling Over 100K Devices
  39. The Worst Storage Mediums of All Time - ExtremeTech
  40. Why Walmart Plus thinks it can challenge Amazon Prime
  41. This worm phishing campaign is a game-changer in password theft, account takeovers | ZDNet
  42. Hacking your brain to change bad habits comes down to one psychological trick
  43. The Best External Hard Drives In 2020 For Mac Computers
  44. The 10 Best Debian-based Linux Distributions
  45. How to Monitor CPU Usage on Your Mac’s Dock
  46. 8 Best Ebook Reader Devices for Students
  47. Here's When You Can Download iOS 14 and iPadOS 14 in Time Zones Around the World
  48. Apple will finally sell Apple Watches to people without iPhones, offering a new hook into its ecosystem
  49. Crypto-gram: September 15, 2020 - Schneier on Security
  50. WSJ News Exclusive | FTC Preparing Possible Antitrust Suit Against Facebook
  51. iPhone 12 needs iPad Air's new Touch ID while we're all still wearing masks
  52. iOS 14 and iPadOS 14 arrive Sept. 16. Do this to your iPhone and iPad today
  53. Industry experts say it’s full speed ahead as Snowflake files S-1 – TechCrunch
  54. How to Run Multiple Linux Commands at Once in Linux Terminal [Essential Beginner's Tip]
  55. How to Blur Your House in Google Maps' Street View
  56. 5 Ways Hackers Can Get Around Your MFA Solution
  57. The WIRED Guide to 5G
  58. The Safest Ways to Log In to Your Computer
  59. Face-mask recognition has arrived—for better or worse
  60. USB-C Was Supposed to Simplify Our Lives. Instead, It’s a Total Mess.
  61. Why Are Some Mac App Icons Crossed Out?
  62. T-Mobile customers can now roam on Sprint's former network
  63. Motorola claims the Razr can fold 200,000 times. We get a peek at how it's tested
  64. Google could make Chromebooks last years longer with a huge change to Chrome OS
  65. How to get started using a password manager
  66. 4 scenarios for the future of Facebook
  67. How to Securely Wipe Your Computer, Phone, or Tablet
  68. How to Print Using Alexa
  69. Bluetooth Unveils Its Latest Security Issue, With No Security Solution
  70. Congress probes how AI will impact U.S. economic recovery
  71. Linux users beware - you could be facing more cyber threats than ever before
  72. The 10 Best Rolling Release Linux Distributions
  73. VMware Cuts Pay for Remote Workers Fleeing Silicon Valley
  74. Become a Galaxy Note 20 pro with these 10 hidden features
  75. Why Linux still needs a flagship distribution
  76. Enable Google's 'Verified Calls' on Android With This Setting
  77. Portland, Oregon Imposes Strict Ban on Facial-Recognition Technology
  78. Linux is still the standard
  79. Yubico's latest security key uses NFC and USB-C for authentication
  80. How to Link Websites Without the Eventual Broken Links
  81. All Your Questions on Apple’s Move Away from Intel, Answered
  82. You Have a Million Tabs Open. Here’s How to Manage Them
  83. These are the best iPad apps of all time
  84. Worst may be over for U.S. IT job losses in COVID-19 pandemic
  85. The Best Free Google Chrome Extensions
  86. Linux Fu: Moving /usr
  87. 11 must-see science fiction shows and movies on Netflix (September 2020)
  88. OnePlus explains why it moved away from stock Android
  89. Red Hat And Lenovo Want To ‘Evolve Linux’ As A Laptop OS
  90. Working from home: The 12 new rules for getting it right | ZDNet
  91. Walmart+ will finally launch in September. Can it compete with Amazon Prime?
  92. 14 ways to speed up Windows 10
  93. The Best Sci-Fi TV Shows to Binge-Watch Right Now | TV Guide
  94. What's in the latest Firefox upgrade? Nothing notable (again)
  95. Linux Has A Hardware Problem And We Need To Solve It
  96. Where to Back Up Your Smartphone Photos Online (and Why You Should)
  97. FBI Reports On Linux Drovorub Malware
  98. The complete Zoom guide: From basic help to advanced tricks | ZDNet
  99. Linux Security HOWTO
  100. Bash vs Zsh: A comparison of two command line shells (2019 Update)
  101. Speed up your home office: How to optimize your network for remote work and learning | ZDNet
  102. C programming cheat sheet
  103. This surprise Linux malware warning shows that hackers are changing their targets | ZDNet
  104. 9 Apps to Boost Your Phone's Security and Privacy
  105. You Can Now Tell Alexa to Delete Your Conversations
  106. Ransomware: These warning signs could mean you are already under attack | ZDNet
  107. The Cheapest Cloud Storage Services of 2020 for All Your Files
  108. Linux vs. Windows: It's a matter of perspective
  109. Google fax - fax from Gmail, Google Drive, Docs, and Sheets
  110. A guide to sharing files wirelessly with Apple, Android, and Windows devices
  111. Hayden James - Linux Systems Analyst
  112. Google is testing domain-only URLs in Chrome to help foil scams and phishing
  113. cybersecurity linux - Google Search
  114. Blackboard Support | eLearning & Academic Partnerships | TTU
  115. Evil AI: These are the 20 most dangerous crimes that artificial intelligence will create | ZDNet
  116. Now Is The Time To Talk About Ethics And Privacy In The Metaverse
  117. This DIY Implant Lets You Stream Movies From Inside Your Leg
  118. Ransomware: Your biggest security headache refuses to go away | ZDNet
  119. 9 Tips to Keep Your Cloud Storage Safe and Secure
  120. Free Up Space in Your Google Account So You Can Back Up Your Phone
  121. ‘BootHole’ Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10
  122. How to Spot the Latest Netflix Phishing Scam
  123. The Reckoning Is Coming: Regulating Big Tech
  124. How to Use the fd Command on Linux
  125. Remote work is the new normal. But the tech problems won't go away | ZDNet
  126. Got An Email From A Hacker With Your Password? Do These 3 Things
  127. The Best Smart Locks for 2020
  128. How to Use the ss Command on Linux
  129. Linux Administrator's Security Guide - Linux Security
  130. Linux Administrator's Security Guide - Linux Network Security
  131. Avoid These 'No-Log' VPN Services That Leaked Millions of Users' Data
  132. A Day In The Metaverse
  133. Chinese hackers are trying to get Android users to click on a ‘missed delivery’ text
  134. Why It’s Time To Pay Attention To This Linux Laptop Company
  135. How Two-Factor Authentication Keeps Your Accounts Safe
  136. How to Uninstall Carrier/OEM Bloatware Without Root Access
  137. lonux network security - Google Search
  138. The Metaverse Is Coming & It’s A Very Big Deal
  139. What Is USB-C? An Explainer
  140. New Mac Ransomware Is Even More Sinister Than It Appears
  141. 15 Epic Books Like ‘Dune’
  142. The Best Free Software of 2020
  143. Apple Confirms It Will Remove Beloved MacBook Pro Feature
  144. Safari joins browsers that tell you who's trying to track you
  145. The best cheap web hosting services: How to find the right provider | ZDNet
  146. New macOS malware spreading through Google search results
  147. How to Get Your MacBook Ready to Sell
  148. Why Desktop Linux Still Matters
  149. How to Change Your Email Address Without Screwing Everything Up
  150. How Hackers Use An Ordinary Light Bulb To Spy On Conversations 80 Feet Away
  151. The 15 Best Time-Travel Movies Ever Made, Ranked
  152. 'The world is really changing': Why Linux on desktop is taking a sudden leap forward
  153. 10 Short Road Trips to Take This Summer
  154. Systemd Will Change How Your Linux Home Directory Works
  155. Why Linux’s systemd Is Still Divisive After All These Years
  156. Why abandoned domain names are so dangerous
  157. 10 reasons why digital transformations fail
  158. The ultimate guide to privacy on Android
  159. The sci-fi movie that's killing it on Amazon Prime
  160. Ex-Windows chief: Here's why Microsoft waged war on open source | ZDNet
  161. Look what's inside Linus Torvalds' latest Linux development PC | ZDNet
  162. Login • Instagram
  163. Everything You Need to Know About Slow Internet Speeds
  164. VMware Security- One Of The Best Kept IT Secrets
  165. The 19 best sci-fi shows of all time, according to fans
  166. Linux distro review: Fedora Workstation 32
  167. How to Prepare Your Digital Life for Your Death
  168. The Best Robot Vacuums for 2020
  169. How to Clone a Hard Drive
  170. Desktop Linux: Why open source is heading for a new breakthrough
  171. The 27 best sci-fi shows of all time, according to critics
  172. Free alternatives to Photoshop that give you maximum creative freedom
  173. Can the FBI access your browser history if you use a VPN?
  174. 15 epic books you may finally have time to read now
  175. These 8 photos apps make pictures from your old iPhone or Android infinitely better
  176. How to Use Multiple Email Signatures in Gmail
  177. How To Add Your Own Services to systemd For Easier Management
  178. How to Use tmux on Linux (and Why It’s Better Than Screen)
  179. How to Use the Linux top Command (and Understand Its Output)
  180. Linux on the desktop as a web developer
  181. Thunderbolt flaw allows access to a PC’s data in minutes
  182. A classic 'Twilight Zone' episode warns us how not to behave during a pandemic
  183. Did you know: Samsung once thought Android was a joke
  184. 2020 Honda Accord Review, Pricing, and Specs
  185. How to repeat a Linux command until it succeeds
  186. Apple's Magic Keyboard Really Does Turn the iPad Pro Into a Neat Little Laptop
  187. Linux Desktop Environment Face-Off: Which GUI is Best?
  188. Windows 10 and macOS: Here are the six apps I install first | ZDNet
  189. 6 hidden Android features that will blow your mind
  190. How Unix Won
  191. How to Quickly Manage Split View on Mac
  192. Nasty malware steals banking passwords and 2FA codes
  193. Linux home directory management is about to undergo major change
  194. Don't Let Cognitive Biases Cause You to Engage in Risky Public Health Behavior
  195. How to use Zoom like a pro: 13 hidden features to try at your next meeting
  196. Hackers can access your mobile and laptop cameras and record you – cover them up now.
  197. How’s it been like living with the Galaxy Note 10 for the past 8 months?
  198. Apple will reportedly use 12-core 5nm ARM processor in a 2021 Mac
  199. Wi-Fi 6E devices can operate in the 6GHz band. Here's why that's a big deal
  200. You should probably charge your MacBook using the ports on its right side
  201. Dashlane vs LastPass: The ultimate password manager showdown
  202. Apple Confirms New Warning Affecting Almost All iPhone Users
  203. How Space and Time Could Be a Quantum Error-Correcting Code | Quanta Magazine
  204. Gboard clipboard suggestions now testing on Android - 9to5Google
  205. All the things COVID-19 will change forever, according to 30 top experts
  206. 14 Tech Pros Predict The 'Next Big Thing' In Cybersecurity And Encryption
  207. Which Web Conferencing Software Is The Most Popular With Its Users?
  208. How to organize your Kindle library
  209. systemctl list all failed units/services on Linux - nixCraft
  210. Facebook Map Could Help Track Coronavirus | Digital Trends
  211. Con artists are after your stimulus checks—here are 4 red flags to watch for, says fraud expert | News Break
  212. Cloud security secrets your cloud provider doesn’t want you to know
  213. How to Use Multitasking on Your iPad
  214. How to Work with Snap Packages on Linux
  215. The iPad Pro is ready to supplant the Mac just as the MacBook Air is great again
  216. One of Google’s best inventions ever just went live on Android
  217. The FBI Warns About This Online Shopping Scam
  218. Meet The Innovative Linux OS That’s Easier To Use Than Windows 10 and MacOS
  219. Best security keys in 2020: Hardware-based two-factor authentication for online protection | ZDNet
  220. Apple hit with giant €1.1 billion fine by French competition watchdog | ZDNet
  221. Coronavirus online scams: 3 things to watch out for
  222. State-sponsored hackers are now using coronavirus lures to infect their targets | ZDNet
  223. The iPhone’s best feature might be coming to the MacBook soon
  224. Facebook cookie-stealing trojans surface on Android devices
  225. Staying in due to the coronavirus? Here's what to stock in your fridge and pantry
  226. How to Check Memory Usage From the Linux Terminal
  227. howtogeek.com
  228. Gophish - Open Source Phishing Framework
  229. BPI Anti-Piracy Removal Notices to Google Now Total 500 Million
  230. Windows 10 isn’t the most vulnerable operating system – it’s actually Linux
  231. AT&T Just Killed Off DirecTV For Good
  232. Why leaving the customer copy of a receipt could be bad
  233. Can't Stop Touching Your Face? Science Has Some Theories Why
  234. Folding iPhone or iPad idea in new Apple patent application - 9to5Mac
  235. 4 steps you should take to secure your Gmail account right away
  236. Microsoft Confirms ‘Really, Really High’ Hacking Risk For Millions Of Users: Here’s What You Do Now
  237. With So Many Streaming Services, What Really Sets Them Apart?
  238. You might not be saddled with human-unfriendly, insecure password technology much longer
  239. Apple Issues New Warning Affecting Millions Of iPhone Users
  240. Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys
  241. Why Amazon can’t stop coronavirus price gougers
  242. What is Venmo?
  243. The Best VPNs to Protect Yourself Online
  244. Samsung Shock Warning For Millions Of Galaxy S20, S20 Ultra Buyers
  245. This one trick will make the Apple News app WAY better | Cult of Mac
  246. Why Costco Only Accepts Visa Credit Cards
  247. How to Use the traceroute Command on Linux
  248. US Mobile Carriers (Barely) Fined for Selling Customer Location Data
  249. Walmart is quietly working on an Amazon Prime competitor called Walmart+
  250. WSJ News Exclusive | FCC Probe Finds Mobile Carriers Didn’t Safeguard Customer Location Data
  251. Tech Platforms Aren’t Bound by First Amendment, Appeals Court Rules
  252. My essential Mac apps for 2020 include Fantastical, AirBuddy,etc- 9to5Mac
  253. Microsoft’s new Office app arrives on iOS and Android with mobile-friendly features
  254. WSJ News Exclusive | Google Resists Demands From States in Digital-Ad Probe
  255. Google Just Gave Millions Of Users A Reason To Quit Chrome
  256. Chrome is ditching third-party cookies because Google wants your data all to itself | Digital Trends
  257. Airports warn of chaos with looming Real ID deadline
  258. How to Get Google to Quit Tracking You
  259. The Best Password Managers for 2020


  1. Publishers worry as ebooks fly off libraries’ virtual shelves
  2. Amazon’s Alexa app will soon work as an in-car display for the Echo Auto
  3. Buy YubiKeys at Yubico.com | Shop hardware authentication security keys
  4. Google Maps is getting a dedicated car mode UI
  5. How MariaDB achieves global scale with Xpand
  6. Twitter will ask everyone if they read an article before they retweet it
  7. The Ring drone is just the latest Amazon privacy puzzle box
  8. Amazon Sidewalk is coming to your neighborhood. Here's what that means
  9. The 4 Top Artificial Intelligence Trends For 2021
  10. We Need to Talk About Audible
  11. Can Australia Force Google and Facebook to Pay for News?
  12. Amazon wins FAA approval for Prime Air drone delivery fleet
  13. Google Offers to Help Others With the Tricky Ethics of AI
  14. Powell’s says it won’t sell books on Amazon anymore: ‘We must take a stand’
  15. What the T-Mobile and Sprint Merger Means for You
  16. Meg Whitman says Quibi reached 1.7 million downloads in first week
  17. Walmart Is Setting A Smart Example For The Rest Of The Grocery Industry To Follow
  18. Researchers’ AI recommends lockdown strategies to curb coronavirus
  19. COVID-19 has exposed serious food-security issues in the US. Technology can help.
  20. A Supermarket Chain Was One Of The First To Anticipate Coronavirus. Then It Made A Truly Thoughtful Gesture To Help Local Restaurants
  21. Ten years in, a look at the iPad killers that weren't
  22. Silicon Valley Is Saving Us—for Now
  23. AI Can Help Us Fight Infectious Diseases In A More Effective Way
  24. Leaked screenshots reveal what Apple’s new CarKey feature is going to look like
  25. We visited a small Virginia town where drone deliveries have begun for real
  26. Best Buy moves to curbside pickup only as it sees surge in orders for home office equipment
  27. Amazon Offers Its Cashierless Tech to Other Retail Stores
  28. How Facebook’s new AI system has deactivated more than 100M fake accounts
  29. 5 sneaky ways Costco gets you to spend more | Considerable
  30. Amazon makes its same-day delivery service faster in select U.S. cities – TechCrunch
  31. AT&T launches new online TV service as video customers fall
  32. Business process re-engineering - Wikipedia
  33. Boston Dynamics Robot Dog Goes on Patrol at Norwegian Oil Rig
  34. Google's Mapping Chief Says Maps' Future Goes Beyond Driving
  35. Google calls out Samsung for 'unnecessary' Android changes - 9to5Google
  36. The 5 Hottest Technologies In Banking For 2020
  37. U.S. Tech Lead Over China May Not Matter
  38. Apple's iPad Filled a Crucial Gap in a Product Line and Our Psyches
  39. Google’s US antitrust worries could be entering a more serious phase
  40. Perlego giving last word to Pearson, Wiley and Cengage textbooks
  41. 2020 is the year Apple gets serious about augmented reality | Cult of Mac
  42. Don't Break Up Big Tech
  43. Bloomberg: Apple will start making a smaller, cheaper iPhone in February
  44. Amazon is working to develop biometric scanners to link handprints to credit cards, allowing shoppers to buy with the swipe of their palm
  45. Inside the Feds’ Battle Against Huawei
  46. Latest AI acquisition shows Apple isn’t sacrificing privacy for smarts
  47. AI Is Biased. Here's How Scientists Are Trying to Fix It
  48. Manipulating Machine Learning Systems by Manipulating Training Data - Schneier on Security
  49. Surveillance on steroids: How A.I. is making Big Brother bigger and brainier | Digital Trends
  50. The state of AI in 2019
  51. Instagram explains how it uses AI to choose content for your Explore tab
  52. FCC formally approves the T-Mobile-Sprint merger
  53. Has shopping died?
  54. Google wants to give doctors web-like searches for medical records
  55. Google’s Big .New Thing Is Here to Simplify Your Life
  56. HBO Max to Be Free for HBO Subscribers and AT&T Customers
  57. Facebook launches a news section - and will pay publishers
  58. A face-scanning algorithm increasingly decides whether you deserve the job
  59. An Apple device like nothing we’ve ever seen before is launching next year
  60. Los Angeles Fire Department wants to double its drone fleet
  61. Facebook’s Mark Zuckerberg defends political ad rules, says digital speech is new ‘fifth estate’
  62. Surface Neo and Surface Duo tell you everything about Microsoft's future | ZDNet
  63. eBay, Visa and Mastercard pull out of Facebook's Libra cryptocurrency
  64. Apple Glasses: Release Date, Price, Specs, Leaks and More
  65. Google and Levi's built a new gesture-sensing smart jacket
  66. Apple Arcade and Google Play Pass will be totally different stores
  67. 10 most important tech trends of the decade
  68. Microsoft Surface: Saving the future of PCs
  69. Are Dropbox's Paid Plans Worth It?
  70. Microsoft doesn’t think Windows is important anymore
  71. Microsoft's new hardware strategy should worry Apple and Intel | ZDNet
  72. Dropbox launches Spaces, its ‘smart’ collaboration workspace
  73. Why is Dropbox reinventing itself? – TechCrunch
  74. Why Facebook and Amazon have joined the race to bring computing to your face
  75. As Amazon floods the market with Alexa devices, the business model is getting fresh scrutiny
  76. These are the huge differences between Apple Arcade and Google Play Pass
  77. Amazon's new Echo Frames smart glasses bring Alexa to your face for $180
  78. iOS 13: Apple's big BYOD improvements help enterprise pros
  79. Amazon creates a huge alliance to demand voice assistant compatibility
  80. Kodak Is Ready for an Instant Camera Comeback
  81. The iPad Can Finally Replace a Laptop for Most People
  82. Google is bringing Assistant to people without internet access – TechCrunch
  83. Redesigning business processes for digital success
  84. Hands on with Apple Arcade in iOS 13
  85. Researchers: AI surveillance is expanding worldwide
  86. How Much Would You Spend on Streaming Services Per Month?
  87. Bill Gates Says Big Tech Companies Shouldn’t Be Broken Up
  88. Amazon Music rolls out a lossless streaming tier that Spotify and Apple can’t match
  89. The Shift to Electric Vehicles Propels a Strike Against GM
  90. Google Fi now offers an unlimited plan
  91. Apple as a service: One day you'll rent it all...
  92. Will Samsung kill the Galaxy Note series next year? - SamMobile
  93. Gartner sees blockchain as ‘transformational’ across industries – in 5 to 10 years
  94. Gartner: Get ready for more AI in the workplace
  95. Artificial intelligence today: What’s hype and what’s real?
  96. Walmart takes its $98 Delivery Unlimited service nationwide
  97. Apple exec confirms cryptocurrency is on company radar
  98. The Most Incredible Gadget Apple Plans to Introduce This Fall Is Something You Never Saw Coming (Here's Why It's Brilliant)
  99. Amazon is planning to bring a biometric payment method to Whole Foods
  100. Steve Wozniak says Apple should have broken up years ago
  101. Wi-Fi 6 will double your network's range and triple its speed -- once you upgrade your router, phone, PC, and everything else
  102. Verizon automatically enrolling customers in free robocall-blocking service
  103. 8 technologies that will disrupt business in 2020
  104. Marriott to Expand Its Home-Sharing Business in a Challenge to Airbnb
  105. Restructuring IT for the digital age
  106. What iPhone? Apple's push toward services begins
  107. Smart TVs Are Cheaper Than Ever, and It's Because They're Selling Your Data
  108. Return your Amazon orders to any Kohl's store starting in July
  109. 7 steps to revenue-driven IT
  110. Apple settles with Qualcomm - the 5G iPhone looks more real (u)
  111. Will Apple need to spin out its services business?
  112. 3 signs you’re going overboard with cloud features
  113. 12 ways IT can create business value in 2019
  114. How AI is helping the help desk
  115. Google Needs to Grow Its Cloud Business—Very Carefully
  116. T-Mobile's streaming TV service will include Viacom channels
  117. Walmart partners with Google on voice-enabled grocery shopping
  118. Huawei's Problem Isn't Chinese Backdoors. It's Buggy Software
  119. The emerging 737 MAX scandal, explained
  120. Facebook Charged With Violating Fair Housing Laws
  121. What you should know about serverless computing before you start
  122. McDonald's Bites on Big Data With $300 Million Acquisition
  123. Google appoints an “AI council” to head off controversy, but it proves controversial
  124. Apple event 2019: Apple Card, TV Plus, News Plus, Arcade and everything just announced
  125. XaaS: Making the shift to services-oriented IT
  126. Top IT spending priorities for 2019
  127. Google's Netflix-like Stadia instantly makes it a video game powerhouse
  128. Google unveils Stadia cloud gaming service
  129. Google Spent Years On a Secret New Plan to Attack a $140 Billion Industry. It All Starts Tomorrow
  130. What customer-centric IT really looks like
  131. 4 takeaways from Apple and Qualcomm's big patent fight
  132. Apple dealt legal blow as jury awards Qualcomm $31 million
  133. How a 50-year design came back to haunt Boeing with its troubled 737 Max jet
  134. Here's how New T-Mobile plans to disrupt the current US in-home broadband market — and why it will be successful
  135. Amazon took over the $176 billion market for cloud computing. Now it's using the same playbook in logistics.
  136. Fitbit CEO James Park talks lessons learned from the company’s struggles
  137. Amazon Almost Killed Best Buy. Then, Best Buy Did Something Completely Brilliant
  138. New Wearables Cut Health Care Costs With Better Monitoring
  139. Facebook sues Chinese companies for selling fake accounts
  140. Facebook faces backlash over users' safety phone numbers
  141. No, Data Is Not the New Oil
  142. AT&T Breaks Up Turner, Bulks Up Warner Bros. in Major WarnerMedia Overhaul
  143. WSJ: Amazon to open new US grocery chain separate from Whole Foods
  144. Google looks to leave passwords behind for a billion Android devices
  145. Walmart Joins Amazon in Chase for Ad Dollars
  146. J.P. Morgan to launch a U.S. dollar-backed cryptocurrency
  147. Microsoft Wants Part Of This $180-Billion Industry
  148. AI, machine learning, and deep learning: The complete guide
  149. AR and VR bring a new twist to collaboration
  150. Information Technology Outsourcing Market (ITO) report for 2019 made available by top research firm
  151. Amazon Gobbles Up Eero to Round Out Its Smart Home Plan
  152. FDA approves AI-powered diagnostic that doesn’t need a doctor’s help
  153. T-Mobile/Sprint merger turns two disruptors into one “mega company,” Dems warn
  154. Maybe Ron Johnson Was Right About J.C. Penney After All -- The Motley Fool
  155. IoT for retailers: opportunities and challenges
  156. IBM Buying Open Source Specialist Red Hat for $34 Billion
  157. IBM's acquisition of Red Hat is huge news for the Linux world
  158. Forget Watson, the Red Hat acquisition may be the thing that saves IBM
  159. IBM to acquire Red Hat in deal valued at $34 billion
  160. 5 ways AI is transforming customer experience
  161. How Enterprises Can Help Build Ethical AI Strategies
  162. Amazon's Echo devices get redesign on the way to world domination
  163. Tech Disrupted the World. Who Will Shake up the Next 25 Years?
  164. Fitbit buddies up with Google for better health
  165. How to build a business case for Artificial Intelligence
  166. Sprint and T-Mobile Are Officially Merging, and It's Terrible
  167. T-Mobile, Sprint agree to merge as America's national wireless carriers shrink from 4 to 3
  168. Ford will stop selling most of its cars in North America
  169. Battle between Apple and Microsoft is over | Cult of Mac
  170. Ford to stop selling every car in North America but the Mustang and Focus Active
  171. How Artificial Intelligence Will Revamp Education
  172. Artificial intelligence will wipe out half the banking jobs in a decade, experts say
  173. Car 'subscriptions' could make ownership obsolete
  174. How Artificial Intelligence Is Revolutionizing Business In 2017
  175. Five CIO tips for building an IT strategy in the digital age
  176. The psychological impact of an $11 Facebook subscription
  177. Gartner Worldwide IT Market Report Predicts Fastest Growth in Decade
  178. Developing the right IT strategy - Supporting business strategy with technology
  179. 4 Models Of The Shopping Mall Of The Future
  180. How blockchain will disrupt Google, Apple, Amazon, and Facebook


  1. The beauty and the shame of Google's Pixel 5 gamble
  2. Intel inks agreement with Sandia National Laboratories to explore neuromorphic computing
  3. Galaxy Z Fold 2 after a month: Simply a joy to use | ZDNet
  4. As tech reaches end of life, hackers are watching | SC Media
  5. DigiTimes: 12.9-inch Mini-LED iPad Pro Arriving Early 2021, Mini-LED MacBook Coming Later
  6. Roku introduces a new Ultra player, a 2-in-1 ‘Streambar’ and a new OS with support for AirPlay 2 – TechCrunch
  7. Android Users Need to Manually Remove These 17 Infected Apps
  8. Apple AirPlay heads to Roku 4K streamers and TVs with free software update
  9. Apple's battle with Epic Games could lead to big changes in iPhone apps
  10. Amazon Announces Luna Cloud Gaming Service - ExtremeTech
  11. Buying a new car? These tech features could drive your choice
  12. Why Amazon packages are randomly showing up at people's doors
  13. The new Apple Watch Series 6 is the best all-around smartwatch, but don't buy it just for the blood oxygen sensor
  14. A million students and counting have learned Linux | ZDNet
  15. AT&T and Verizon complain to FCC about T-Mobile’s big spectrum advantage
  16. 10 weirdest things Alexa can do on your Amazon Echo
  17. Why Everything Is Sold Out
  18. New and existing T-Mobile customers are in for another awesome surprise this Friday
  19. macOS Big Sur release date, features and compatibility
  20. We found out who makes Walmart’s new Gateway laptops, and it’s bad news
  21. The Subtle Tricks Shopping Sites Use to Make You Spend More
  22. How to Spot—and Avoid—Dark Patterns on the Web
  23. Why You Should Stop Sending Texts From Your Android Messages App
  24. Apple rejects Facebook app that tells users Apple takes 30% cut of in-app purchases
  25. Samsung Galaxy Note 20 Ultra review: 5G, display, cameras, and S Pen make it the best phone for business Review | ZDNet
  26. There Are Alternatives to Goodreads
  27. Judge in Apple v. Epic Case 'Inclined' to Side With Apple on Fortnite and Epic on Unreal Engine
  28. Samsung Galaxy S21 (S30) Ultra 5G may replace Galaxy Note series
  29. Police Want Your Smart Speaker—Here's Why
  30. Study Reveals a Smartphone Can Detect You Are Drunk With 90 Percent Accuracy
  31. Apple Threatens to Terminate Epic Games' Developer Accounts on August 28
  32. Introduction to Java Servlets - GeeksforGeeks
  33. Wash Your Hands—but Beware the Electric Hand Dryer
  34. Huawei made a 5G iPad Pro clone with wireless charging
  35. Which MacBook Is Best for You?
  36. Android App Giant With Hundreds Of Millions Of Users Was Just Wiped From Play Store
  37. This App Tells You When Nearby Smart Devices Are Snooping on You
  38. Apple might finally let you set third-party browsers and email apps as defaults on iPhone and iPad
  39. CBS will massively expand All Access’ streaming library in 2020
  40. T-Mobile and Sprint Merger: Everything You Need to Know
  41. WSJ News Exclusive | Bloomberg Bankrolls a Social-Media Army to Push Message
  42. Apple warns of iPhone 'supply shortages' due to coronavirus outbreak
  43. Pier 1 files for bankruptcy
  44. Uber Changes Its Rules, and Drivers Adjust Their Strategies
  45. The Galaxy Z Flip's glass screen isn't very durable
  46. Linux distro review: Intel’s own Clear Linux OS
  47. Get Back At Your Robocallers: Robo Revenge Lets You Sue for $3,000
  48. 5 reasons to buy the older Galaxy S10 instead of Samsung's brand-new Galaxy S20
  49. The First Room Burglars Check for Valuables
  50. These email apps are scraping information from your inbox and selling the data for a profit
  51. Why Chrome Is Going to Start Blocking Some of Your Downloads
  52. Here's how the T-Mobile-Sprint merger might actually affect you
  53. Apple Just Made A Striking New Security Move That Could Impact All Users
  54. With In-Car AR, Drivers Get a New View of the Road Ahead
  55. Samsung’s Galaxy Z Flip phone Oscars advert had some weird small print
  56. Electric co-ops could be the key to solving the rural digital divide
  57. Amazon Flex drivers are using bots to cheat their way to getting more work
  58. How Companies Learn Your Secrets
  59. Apple Just Gave Millions Of Users A Reason Keep Their iPhones
  60. Paper Masks Are Fooling Facial Recognition Software
  61. Facial recognition introduced to US schools
  62. The decentralized ride-sharing disruptors taking on Uber - Decrypt
  63. He ordered coffee while wearing an AirPod. The barista refused to serve him | ZDNet
  64. Video leak appears to show Samsung's foldable Galaxy Z Flip in action
  65. Nearly 3 million subscribers ditched DirecTV last year. Will AT&T do the same?
  66. How Fast Is Wi-Fi 6?
  67. Sonos sorry for revealing customer email addresses
  68. How to Compare Third-party ITSM Solutions
  69. 5 Of The Most In-Demand Soft Skills Companies Are Looking For This Year
  70. Motorola on the Razr’s folding screen: ‘bumps and lumps are normal’
  71. Phone Running Slow? Use Android's Built-in RAM Manager to Free Up Memory
  72. New scary email scam goes after your banking info
  73. Linux could win over more PC gamers from Windows thanks to Wine 5.0
  74. New text message scam disguises itself as FedEx notification
  75. Apple drops Flash from its latest Safari browser preview
  76. 10 good habits of network administrators
  77. Microsoft’s software plan for the Duo Android phone is surprisingly realistic
  78. Students Are Swapping AirPods So That They Can Talk To Each Other In Class
  79. LastPass is in the midst of a major outage | ZDNet
  80. How to Upgrade From Windows 7 to Linux
  81. This unsettling practice turns your phone into a tracking device for the government
  82. Silicon Valley Abandons the Culture That Made It the Envy of the World
  83. NBCUniversal's streaming service will be called Peacock
  84. The EU wants to mandate USB-C ports on smartphones
  85. Google makes it easier to sign up for advanced hacking protection
  86. The making of Mojo, AR contact lenses that give your eyes superpowers
  87. 4 things laptop buyers waste money on
  88. T-Mobile launches first U.S. nationwide 5G network with low-band 600MHz
  89. Linux.com - News For Open Source Professionals
  90. Hotel front desks are now a hotbed for hackers | ZDNet
  91. Phishing emails are still managing to catch everyone out | ZDNet
  92. A decade of hacking: The most notable cyber-security events of the 2010s | ZDNet
  93. Electronic waste pileup sparks warnings
  94. Why Sharing Your Disney+ or Netflix Password Is a Bad Idea
  95. Don't Buy Anyone a Ring Camera
  96. Don't fall for these 4 sneaky Black Friday scams
  97. Alexa's Voice Can Now Express Excitement, Disappointment
  98. Firefox 72 to Block 'Fingerprinters' by Default
  99. This is Tim Berners-Lee's grand plan to save the web from digital dystopia | ZDNet
  100. 1.2 Billion Records Found Exposed Online in a Single Server
  101. Scammers try a new way to steal online shoppers’ payment-card data
  102. Officials warn about the dangers of using public USB charging stations | ZDNet
  103. The Morning After: iFixit looks inside the 16-inch MacBook Pro
  104. Google’s rollout of RCS chat for all Android users in the US begins today
  105. Turn Off Facebook's Camera Privileges on iOS Right Now
  106. Intel Fixes a Security Flaw it Said Was Repaired 6 Months Ago
  107. Google to offer checking accounts in partnership with banks starting next year – TechCrunch
  108. It’s time to unsubscribe from some streaming services
  109. Download Firefox 70 for Windows, macOS, Linux & Mobile
  110. How much does it cost to launch a cyberattack?
  111. Twitter spy scandal a wake-up call for companies to clean up their data access acts
  112. 5 steps to a successful red team engagement
  113. Best Buy Made These Smart Home Gadgets Dumb Again
  114. Twitter is working on a policy to flag deepfakes
  115. The evolution of Apple's iPhone
  116. 11 reasons I'm buying an Apple iPhone 11 Pro instead of a Samsung Galaxy Note 10 Plus | ZDNet
  117. iPhone 11, 11 Pro and 11 Pro Max specs vs. iPhone XR, XS and XS Max: What's new and different
  118. Apple will release iOS 13 and watchOS 6 on September 19, macOS Catalina in October
  119. Apple iPhone event 2019
  120. Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks
  121. European regulators to Microsoft: We’re watching you
  122. Apple, Foxconn Broke a Chinese Labor Law to Build Latest iPhones
  123. Samsung Just Announced Its Most Astonishing Product Yet, and It's a Great Example of How to Recover From Failure
  124. McDonald's Just Made a Truly Stunning Change to Its Menu. (There's Only 1 Little Problem)
  125. Unprecedented Cyberattack Hit the US Power Grid
  126. Lime brings electric scooter Group Ride option to US so you'll stop riding tandem - Electrek
  127. Google can’t fix the Android update problem
  128. How to Access Google's Secret Easter Eggs in Android 9 and Android 10
  129. 14 easy ways to cut back on data use in Android
  130. Millions of Android phones vulnerable to phishing attacks | SC Media
  131. Roku Debuts a Soundbar, and It Comes With a Roku Built In
  132. USB4 gets final approval, offers Ethernet-like speed
  133. Hackers Ask for $5.3 Million Ransom, Turn Down $400k, Get Nothing
  134. Here's every way Samsung fixed the Galaxy Fold
  135. Android 10 Arrives Today. Here are the 5 Best New Features
  136. A Mass Cyberattack on more that 100,000 iPhones Just Reported. Here's How To Protect Yourself.
  137. What You Need To Know About U.S. Election Security And Voting Machines
  138. 5G won't replace 4G: Debunking all the 5G myths
  139. Airlines Are Banning MacBooks in Checked Luggage Regardless of Recall Status
  140. Video, reports of machines automatically changing votes in Mississippi GOP Governor runoff
  141. WSJ News Exclusive | National-Security Concerns Threaten Undersea Data Link Backed by Google, Facebook
  142. Instagram phishing scam uses fake 2FA code to appear trustworthy
  143. Disney Plus: Disney's streaming service opens preorders at a big discount
  144. Downloads – Oracle VM VirtualBox
  145. How Amazon convinces police to sign up with Ring
  146. Rockville Center School District pays $88,000 ransom | SC Media
  147. YouTube adds labels to videos w/ public, government funding - 9to5Google
  148. Employees connect nuclear plant to the internet so they can mine cryptocurrency | ZDNet
  149. Amazon's Ring wants police to keep these surveillance details from you
  150. Anti-surveillance clothes foil cameras by making you look like a car
  151. Google Nest cameras won't let you turn off light that shows you're recording
  152. U.S. Carried Out Cyberattacks on Iran
  153. A Guide to Using Tor on Android: Apps, Privacy, and More | Drippler - Apps, Games, News, Updates & Accessories
  154. Exclusive: Google Is Banning A Play Store Developer With More Than Half A Billion App Installs
  155. I consistently recommend smartphones from a company that few in the US have ever heard of over Apple's iPhones or Samsung's Galaxy phones — this is why
  156. Ransomware ravages municipalities nationwide this week | SC Media
  157. 13 signs your software project may be doomed
  158. Galaxy Fold loss could help other foldable phones
  159. Essential traits of business-driven IT leaders
  160. Thousands of leaked Facebook documents show Mark Zuckerberg as ‘master of leverage’ in plan to trade user data
  161. Microsoft Email Hack Shows the Lurking Danger of Customer Support
  162. Hands-on with the Samsung Galaxy Fold: more than just a concept
  163. Apple’s latest iMacs are fast and familiar
  164. 15 Months of Fresh Hell Inside Facebook
  165. Amazon’s Alexa isn’t just AI — thousands of humans are listening
  166. How AI Data Actually Moves from Collection to Algorithm
  167. Your next car may not allow you to speed on the highway
  168. 'Exodus' Spyware Posed as a Legit iOS App
  169. Facebook is still tracking you after you deactivate your account
  170. Larry Sanger wants Everipedia to be a post-truth Wikipedia
  171. Massive bank app security holes: You might want to go back to that money under the mattress tactic
  172. 74 Facebook groups for cybercriminals found | SC Media
  173. Airbnb Guests Find Hidden Camera Live-Streaming Their Stay
  174. Verizon flips on 5G for phones in parts of Chicago and Minneapolis
  175. Elizabeth Warren introduces bill that could hold tech execs responsible for data breaches
  176. These Chinese hackers tricked Tesla's Autopilot into suddenly switching lanes
  177. Google begins shutting down its failed Google+ social network
  178. Why did Apple kill its AirPower wireless charger?
  179. WhatsApp launches fact-check service to fight fake news during...
  180. This free team collaboration app is changing how teams work together
  181. Georgia Tech stung with 1.3 million-person data breach | SC Media
  182. New Intel Chip Bug Can Expose All Data on a Computer to Hackers
  183. Facebook Had an Incredibly Busy Weekend
  184. Android security report confirms the two best ways to stay safe
  185. usaa-pilots-iot-technology-to-detect-need-forhome.html
  186. HTTPS Isn't Always As Secure As It Seems
  187. Apple News
  188. Apple Launches TV App, Credit Card, Subscription Services
  189. 6 secrets to CISO job longevity
  190. How Cloud Environments Will Evolve During Next Few Years
  191. Safety-Obsessed Volvo Goes After Distracted, Speedy Drivers
  192. Just Wait Until Cars and Cities Start Talking Amongst Themselves
  193. Facebook’s blockchain cryptocurrency could mean big money – and kill 'fake news'
  194. The death of the VPN - It’s time to say goodbye | SC Media
  195. New York Times CEO warns publishers ahead of Apple news launch
  196. UPS plans to deliver vaccine-toting nurses to your doorstep
  197. You Need to Protect Your Website Against Formjacking Right Now
  198. Don't Kill Rogue Cloud Accounts, Embrace Them
  199. CTO view: the convergence of information and operation technology
  200. Report: Downed 737s Lacked Two Safety Features Because Boeing Charged Extra for Them
  201. Facebook’s leaked moderation rules show why Big Tech can’t police hate speech
  202. Google’s upcoming Pixel 4 and Pixel 4 XL look stunning in these new renders
  203. Microsoft announces Xbox Live for any iOS or Android game
  204. This Big Facebook Critic Fears Tech’s Business Model
  205. The Huawei Case Is Part of a New US–China Cold War Over Tech
  206. Please, for the Love of God, Make Sure You Delete Things Properly
  207. Samsung Could Kill the TV Power Cable Forever
  208. Samsung Working on Two More Foldable Smartphones
  209. Alphabet’s Chronicle finally reveals its cybersecurity moonshot
  210. CMS hackers focus on WordPress | SC Media
  211. IRS warns of new tax-related phishing scams | SC Media
  212. What is Mimikatz? And how this password-stealing tool works
  213. Google Glass’ second-gen enterprise model leaks with updated specs and USB-C
  214. Windows by the numbers: Windows 7 is one obstinate OS
  215. Hack Brief: Google Reveals 'BuggyCow,' a Rare MacOS Zero-Day Vulnerability
  216. 9 biggest hurdles to AI adoption
  217. In the Rush to Join the Smart Home Crowd, Buyers Should Beware
  218. Analysis | The Technology 202: Policymakers sound alarms as Facebook quietly collects sensitive data from apps
  219. A very merry Christmas at Best Buy with sales booming | Fox News
  220. The best new smartphones and gadgets from Mobile World Congress 2019
  221. New FTC task force will take on tech monopolies
  222. The 8 toughest decisions IT leaders face
  223. Facebook working on a new class of semiconductor, AI researcher suggests
  224. Apple and Goldman Sachs are reportedly teaming up to offer a joint credit card
  225. Containers: The pros and cons you may not know about
  226. Smartphone makers are pricing themselves out of the market
  227. HTC Goes All In on Easy-to-Use VR, But Not For Everyone
  228. You Give Apps Sensitive Personal Information. Then They Tell Facebook.
  229. Apple Plans on Combining iPhone, iPad, Mac Apps by 2021
  230. Cogitai Unwraps ‘Self-Learning’ AI Platform for Business
  231. Twitter names first international markets to get checks on political advertisers
  232. Google presents its anti-fake news system in detail
  233. Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes
  234. Six Advantages of Human-aided, 'Artificial' Artificial Intelligence
  235. Microsoft: Russian hackers are trying to influence EU elections
  236. Farmworkers vs robots: Will tomorrow fruit pickers be made of steel and tech?
  237. This Company Takes the Grunt Work Out of Using the Cloud
  238. Serverless: The future of cloud computing?
  239. Facebook Could Pay Multi-Billion Dollar Fine in FTC Settlement
  240. Amazon Bought A Router Company You've Never Heard Of. Here Is Why It's A Huge Deal.
  241. 7 ways to ensure IT gets the credit it deserves
  242. Five ways professionals will experience 5G, and when | ZDNet
  243. Microsoft lampoons Office 2019 in PR pitch for Office 365
  244. 6 secrets of customer-facing CIOs
  245. Full-stack developer: What it is, and how you can become one
  246. Apple's Chinese competitors figured out how to make better Apple products than Apple
  247. This is the best-looking smartphone we've ever seen, even better than the iPhone — take a look
  248. It’s the Real World—With Google Maps Layered on Top
  249. Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess
  250. Amazon Joins Microsoft's Call for Rules on Facial Recognition
  251. How to pick the perfect backpack for your laptop
  252. Someone at Samsung thinks a stylus with a camera is a good idea
  253. This is how Disney is going to compete against Netflix
  254. Remote Desktop Protocol flaws could be exploited to attack RDP clients
  255. Why People Still Don’t Buy Groceries Online
  256. Walmart Grocery
  257. Why It May Be Time to Break Up Facebook
  258. Why Amazon's AWS Cloud Business Will Continue to Grow
  259. Samsung's Galaxy S10 phones will support next-generation WiFi
  260. Ikea's Slow and Steady Plan to Save the Smart Home
  261. Streaming Services Are Beginning To Look Like Cable Companies
  262. The real lesson of Facebook's Apple dust-up shows why Zuckerberg's 'hacker way' is even more dangerous than we thought
  263. Apple Planning Netflix for iOS Games (Report)
  264. How to run Windows 10 on an iPad Pro or on Android
  265. Red Hat Advances Container Technology With Podman 1.0
  266. Apple's services help anchor a company rocked by slow iPhone sales
  267. The world’s most valuable resource is no longer oil, but data
  268. Facebook got caught paying people $20 a month to let them spy on their phones
  269. Data Privacy Improves Business Outcomes, Cisco Finds
  270. How SD-WAN can improve your security strategy
  271. Mark Zuckerberg’s WSJ op-ed was a message to would-be regulators: Hands off our ad business
  272. Checking In? No Thanks. I’m Just Here to Use the Wi-Fi.
  273. Is Big Tech Merging With Big Brother? Kinda Looks Like It
  274. Amazon Go, One Year Old, Has Attracted a Host of Cashierless Imitators
  275. Hulu is cutting the price of its most popular streaming service — and raising the price of its most expensive one
  276. The Waze features you’ve always wanted in Google Maps are finally coming to Android and iPhone
  277. France fines Google nearly $57 million for first major violation of new European privacy regime
  278. Why Did NASA, Lockheed Martin, and Others Spend Millions on This Quantum Computer?
  279. Thanks, Netflix (and Google): You've Just Confirmed Everyone's Worst Fear About the Cloud
  280. Commentary: These Are the Challenges Tech Giants Will Face in 2019
  281. Amazon Ruined Online Shopping
  282. Fool me once...
  283. Predictions 2019: What's in Store for Enterprise Information Practices
  284. Why the Netflix Price Hike Makes Sense
  285. A Sleeping Tesla Driver Highlights Autopilot's Biggest Flaw
  286. Quora breach leaks data on over 100 million users
  287. Robot Janitors Are Coming to Mop Floors at a Walmart Near You
  288. Marriott reveals data breach affecting 500 million hotel guests | ZDNet
  289. Half of all Phishing Sites Now Have the Padlock — Krebs on Security
  290. Marc Zuckerberg, Elon Musk and bitcoin top this year's list of Tech Turkeys
  291. Censored Planet
  292. Russian hackers are trying out this new malware against US and European targets | ZDNet
  293. Retail IoT is still coming into its own in 2019
  294. Amazon’s HQ2 stunt could come back to haunt it
  295. Microsoft launches blockchain development kit
  296. The rare form of machine learning that can spot hackers who have already broken in
  297. How The Wall Street Journal is preparing its journalists to detect deepfakes
  298. Best Antivirus Software and Apps 2018


  1. Ransomware: Gangs are shifting targets and upping their ransom demands | ZDNet
  2. Amazon introduces ability to pay with your hands
  3. Best password manager | CNN Underscored
  4. The iOS 14 Privacy and Security Features You Should Know
  5. The Best VPN Services for 2020
  6. Is now the time to deploy passwordless options?
  7. 3 Amazon Echo security features to turn on when you leave the house
  8. How to Protect the Data on Your Laptop
  9. Enough with the Linux security FUD | ZDNet
  10. Kindle Collects a Surprisingly Large Amount of Data
  11. Top exploits used by ransomware gangs are VPN bugs, but RDP still reigns supreme | ZDNet
  12. Google to trial drastically truncated URLs in Chrome in anti-phishing move
  13. 10 cybersecurity myths you need to stop believing
  14. How to protect against 'Apple' phishing scams
  15. For Security Professionals, The Enemy Is No Longer At The Gate
  16. Zoom security: Your meetings will be safe and secure if you do these 10 things | ZDNet
  17. 1Password vs LastPass: What’s the best password manager?
  18. Apple and Google have a clever way of encouraging people to install contact-tracing apps for COVID-19
  19. 10 Billion Wrecked Accounts Show Why You Need 'Have I Been Pwned'
  20. Apple, Google to Turn Smartphones Into Coronavirus Tracking Devices
  21. Google Just Gave Millions Of Users A Reason To Keep Chrome
  22. How to Cover Your Tracks Every Time You Go Online
  23. VPN app threatens 100 million: Delete it right now
  24. Apple, Google team up to develop COVID-19 contact tracing technology | ZDNet
  25. Attackers can bypass fingerprint authentication with an ~80% success rate
  26. These hackers have been quietly targeting Linux servers for years | ZDNet
  27. Two-factor authentication is broken: What comes next?
  28. Cloudflare is over the moon because its pro-privacy DNS service got a clean bill of health from everyone's favorite auditor – KPMG
  29. Safari Is Now the Best Browser for Blocking Third-Party Tracking
  30. The Best and Worst Browsers for Privacy, Ranked
  31. Social Security Issues Warning On New Texting Scam
  32. Hackers are using coronavirus maps to infect your computer
  33. U.S. government commission rolls out doomsday plan for cyberwar
  34. Two-factor authentication? Not as secure as you'd expect when logging into email or your bank
  35. Google tracked his bike ride past a burglarized home. That made him a suspect.
  36. A free, new tool can keep companies from tracking you online
  37. These are the first passwords hackers will try when attacking your device | ZDNet
  38. Clean Master stole browsing data from over a billion Android devices
  39. Four steps you should take to secure your Gmail account right now
  40. 'Malware-free' attacks now most popular tactic amongst cybercriminals | ZDNet
  41. Do these three things to protect your web security camera from hackers | ZDNet
  42. "OK Google": How a hacker can surf into your phone silently
  43. WireGuard Gives Linux a Faster, More Secure VPN
  44. ‘Smishing’ is the latest Social Security scam making the rounds | Considerable
  45. Schools are using phones, wristbands to monitor students, regardless of effectiveness
  46. The police want your phone data. Here’s what they can get — and what they can’t.
  47. The FBI Wants You To Stop Using Passwords And Do This Instead
  48. Voting App Flaws Could Have Let Hackers Manipulate Results
  49. Don't Click on Links in Texts From 'Your Bank'
  50. Ring cameras are more secure now, but your neighbors still snoop with them
  51. Common Encryption Types, Protocols and Algorithms Explained
  52. Perspective | Don’t sell my data! Now there’s a law for that — if you jump through these hoops
  53. VPNs will change forever with the arrival of WireGuard into Linux | ZDNet
  54. Watch Out for Coronavirus Phishing Scams
  55. Zuckerberg says Facebook's new approach 'is going to piss off a lot of people'
  56. FBI warns of new online threat to personal, credit card information
  57. Phishing scams leveled up, and we didn’t
  58. Jeff Bezos’s iPhone had Apple’s state-of-the-art security, and that may have helped its alleged hackers
  59. How to delete what Facebook knows about your life outside of Facebook
  60. How encryption could stop personal data exposures on the cloud
  61. Perspective | Facebook will now show you exactly how it stalks you — even when you’re not using Facebook
  62. Apple reportedly ditched plan for encrypted iCloud backup after FBI pressure
  63. Google CEO Sundar Pichai: We must be 'clear-eyed' about how AI could go wrong
  64. Google Kills the Cookie, Leaving Digital Media Companies Craving a New Way Forward
  65. The Secretive Company That Might End Privacy as We Know It
  66. Beware of this sneaky phishing technique now being used in more attacks | ZDNet
  67. Crypto-Gram: January 15, 2020 - Schneier on Security
  68. The Best VPN Services and Apps of 2019
  69. I Ditched Google for DuckDuckGo. Here's Why You Should Too
  70. EU investigates Google data collection practices
  71. Private Internet Access VPN to be acquired by malware company founded by former Israeli spy
  72. The 25 Most Dangerous Software Vulnerabilities
  73. What is Google going to do with your Fitbit data? Anything it likes
  74. The Top Cybersecurity Threats of 2020
  75. Data breach compromises T-Mobile prepaid accounts
  76. Secure, Fast & Private Web Browser with Adblocker | Brave Browser
  77. Iowa paid a security firm to break into a courthouse, then arrested employees when they succeeded
  78. My Apple Card Got Stolen: Here’s What Happened
  79. How to Save Your Data When You Quit Your Job
  80. Learn About Cybersecurity with These 11 Essential Videos
  81. WSJ News Exclusive | Google’s Secret ‘Project Nightingale’ Gathers Personal Health Data on Millions of Americans
  82. 5 keys to protect your supply chain from cyberattacks
  83. NCR blocked Mint, Quickbooks after attackers take over, drain accounts | SC Media
  84. IBM: Face Recognition Tech Should be Regulated, Not Banned | SecurityWeek.Com
  85. Alexa, Siri, Google Assistant smart speakers – they're all open to remote laser attacks | ZDNet
  86. Greed is good... for this phishing scam | SC Media
  87. Russia Tests New Disinformation Tactics in Africa to Expand Influence
  88. Perspective | What is fingerprinting? The online tracking you can’t avoid.
  89. Facebook sues surveillance tool provider and hosts of hacking websites
  90. Data breach causes 10 percent of small businesses to shutter | SC Media
  91. Cyber awareness starts with vulnerability awareness | SC Media
  92. Stop ignoring printer security: It's time for CSOs to take control
  93. What Is Tor and How Does Onion Routing Protect Privacy?
  94. Amazon Just Announced an Incredible New Feature That Most People Are Going to Love. There's Only 1 (Pretty Big) Problem
  95. UN, NGOs targeted by ongoing phishing attack | SC Media
  96. Cyber defense is a team sport -- Train accordingly | SC Media
  97. 5 reasons users hate cybersecurity awareness training, and how to make them love it
  98. A scam targeting Americans over the phone has resulted in millions of dollars lost to hackers. Don't be the next victim.
  99. Why Keybase Doesn't Offer Two Factor Authentication
  100. U.S. Government, Military Personnel Data Leaked By Autoclerk
  101. Adobe exposed nearly 7.5 million Creative Cloud accounts to the public
  102. How 18 Malware Apps Snuck Into Apple's App Store
  103. Why Keybase Doesn't Offer Two Factor Authentication
  104. Phishing alert: This fake email about a bank payment delivers trojan malware | ZDNet
  105. Tips for those of all ages interested in pursuing a career in cybersecurity | SC Media
  106. IT pros go back to school to advance their careers
  107. Top cloud security controls you should be using
  108. Equifax allegedly used insecure password "admin" to protect portal
  109. It's Time to Outsource Your Passwords to an App
  110. Alexa and Google Home devices leveraged to phish and eavesdrop on users, again | ZDNet
  111. 10 risk factors no one talks about
  112. The Creators Of Pokémon Go Mapped The World. Now They're Mapping You
  113. WAV audio files are now being used to hide malicious code | ZDNet
  114. What is the Tor Browser? How it protects your identity online
  115. Teens find circumventing Apple’s parental controls is child’s play
  116. Deepfakes and their potential impact on society | SC Media
  117. A Controversial Plan to Encrypt More of the Internet
  118. Turn Bluetooth Off When You're Not Using It
  119. 11 top cloud security threats
  120. Permanent Record (autobiography) - Wikipedia
  121. How to Prevent Apple Employees From Listening to Your Siri Commands
  122. No One Knows About Two-Factor Authentication, and It's Putting Their Security at Risk
  123. Never Trust a Platform to Put Privacy Ahead of Profit
  124. 7 ways 5G mobile networks will change IoT security, and how to prepare
  125. Justice Department takes another run at encryption backdoors with ‘lawful access’
  126. Decryptors developed for new Muhstik and HildaCrypt ransomwares
  127. Tomorrow's attacks today: How to defend against next-generation cyberattacks | SC Media
  128. Kernel privilege escalation bug actively exploited in Android devices
  129. 5 OT security takeaways CISOs need to communicate to stakeholders
  130. The courts have ruled: Mobile sites must be accessible. But why did enterprises ever resist?
  131. VPNs won't solve these 3 problems for you
  132. How to Avoid Airbnb Scams
  133. FBI’s Use of Foreign-Surveillance Tool Violated Americans’ Privacy Rights, Court Found
  134. FBI warns about attacks that bypass multi-factor authentication (MFA) | ZDNet
  135. Russian hackers modify Chrome and Firefox to track secure web traffic
  136. Google launches leaked-password checker, will bake it into Chrome in December
  137. Rethinking Cyberisks amid a rapidly evolving threat environment | SC Media
  138. How Can I Find Out If Someone’s Stealing My Wifi?
  139. Technology and social change: How government CIOs can improve outcomes for citizens and society | ZDNet
  140. The four big US carriers want to help you get rid of passwords, but you’ll have to wait
  141. Google launches Password Checkup security tool | SC Media
  142. Linux to get kernel 'lockdown' feature | ZDNet
  143. Malware that can't be detected by Windows Defender is spreading by the thousands - MSPoweruser
  144. New SIM Card Attacks: Both Android And iOS Impacted—Are You Vulnerable?
  145. Amazon may soon be able to track your phone’s location even if you don’t use any of its products or services
  146. Apple Issues New Warning For Millions Of iPhone Users
  147. You Need a Password Manager. Here Are the Best Ones
  148. Unfixable Exploit Is the Latest Apple Security Upheaval
  149. Google Draws House Antitrust Scrutiny of Internet Protocol
  150. To use Alexa, you have to trust Amazon
  151. What a security career will look like in five years
  152. 'Right to be forgotten' by Google doesn't apply worldwide, Europe's top court rules
  153. The top 5 email encryption tools: More capable, better integrated
  154. 10 signs you're being socially engineered
  155. My Surprising Career as an Amazon.com "Fake" Reviewer | Anonymous
  156. Millions of medical records exposed online | SC Media
  157. In cybersecurity speed kills, but faster saves | SC Media
  158. Gamification: A winning strategy for cybersecurity training | SC Media
  159. Ransomware: 11 steps you should take to protect against disaster | ZDNet
  160. The ransomware crisis is going to get a lot worse | ZDNet
  161. The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite
  162. 'Simjacker' Attack Can Track Phones Just by Sending a Text
  163. LastPass bug leaks credentials from previous site | ZDNet
  164. Sidewalk Labs' controversial data collection project is now a company
  165. Google collects face data now. Here's what it means and how to opt out
  166. Crypto-Gram: September 15, 2019 - Schneier on Security
  167. 2fa explained: How to enable it and how it works
  168. Wave goodbye to passwords: Soon you could unlock your PC just by holding up your hand | ZDNet
  169. US Govt. plant USB sticks in security study, 60% of subjects take the bait
  170. Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users
  171. How to Delete Online Accounts You No Longer Need
  172. Wipe Data From Your Car Before Selling It
  173. The zero trust model explained | SC Media
  174. Facebook will no longer scan user faces by default
  175. Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash | ZDNet
  176. Cyberwar: The Complete Guide
  177. Face It -- Biometrics To Be Big In Cybersecurity
  178. The World's First Cyber Crime: The Morris Worm [KERNEL PANIC]
  179. The Myth of Consumer-Grade Security - Schneier on Security
  180. More than 400 police forces working with Ring to view doorbell cam footage
  181. Capital One hack shows difficulty of defending against irrational cybercriminals
  182. Microsoft: Using multi-factor authentication blocks 99.9% of account hacks | ZDNet
  183. Examining and addressing threat detection and response challenges
  184. The bogus-check scam is back, in the form of a car-wrap offer
  185. The most stressful aspects of being a cybersecurity professional
  186. 10 Best Password Manager Apps (2019 Updated) | Drippler - Apps, Games, News, Updates & Accessories
  187. The growing backlash against facial recognition tech
  188. Hackers Found a Freaky New Way to Kill Your Car
  189. Check your access control permissions before hackers do
  190. DNS hijacking campaign targets national security organizations
  191. Microsoft Office now the most targeted platform, as browser security improves
  192. Opinion | We Built an ‘Unbelievable’ (but Legal) Facial Recognition Machine
  193. Wipro clients hit after firm falls for phishing attack | SC Media
  194. Data on Thousands of Law Enforcement Personnel Exposed in Breach
  195. Is Using Public WiFi Still a Bad Idea?
  196. Tracking Phones, Google Is a Dragnet for the Police
  197. Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography | SC Media
  198. Crypto-Gram: April 15, 2019 - Schneier on Security
  199. Use Your Android Phone as a Security Key for Signing into Websites
  200. Inside an Epic Hotel Room Hacking Spree
  201. Incognito mode won’t keep your browsing private. Do this instead
  202. Google Offers Built-In Security Key Feature for Android Phones
  203. Three lessons from the top cybersecurity threats of 2018 | SC Media
  204. How to Fight the Threat of USB Thumb Drives
  205. Call to delay use of Police Scotland data devices
  206. Facial recognition can speed you through airport security, but there's a cost
  207. How the EverCrypt Library Creates Hacker-Proof Cryptography | Quanta Magazine
  208. Facial recognition raises real ethical questions
  209. What Sony's robot dog teaches us about biometric data privacy
  210. Insurance Companies collaborate to offer Cybersecurity ratings | SC Media
  211. How to Protect Your Enterprise PCs Against Fake Updates
  212. Why 2019 will prove biometrics aren’t a security “silver bullet” | SC Media
  213. Crypto-Gram: March 15, 2019 - Schneier on Security
  214. Amex, Netflix customers targeted in phishing campaign | SC Media
  215. Here's how to view, download, and delete your personal information online
  216. Facebook Stored Millions of Passwords in Plaintext—Change Yours Now
  217. Facial recognition: Apple, Amazon, Google and the race for your face
  218. Locking More Than the Doors as Cars Become Computers on Wheels
  219. US Government Forging Ahead With Airport Facial Recognition Plans | Transportation | TechNewsWorld
  220. The Five Most Dangerous New Attack Techniques
  221. Will PSD2 Finally Kill The Password? | SC Media
  222. These are the 12 most common phishing email subject lines cyber criminals use to fool you | ZDNet
  223. 3 ways to monitor encrypted network traffic for malicious activity
  224. Phishing attacks: Half of organisations have fallen victim in last two years | ZDNet
  225. The NSA Makes Its Powerful Cybersecurity Tool Open Source
  226. Are employees the weakest (cybersecurity) link? Sometimes | SC Media
  227. Linux servers targeted by new Chinese crypto-mining group | ZDNet
  228. Fool ML once, shame on you. Fool ML twice, shame on... the AI dev? If you can hoodwink one model, you may be able to trick many more
  229. Microsoft wants to use blockchain to secure your identity
  230. Hackers Can Slip Invisible Malware into Some Cloud Computers
  231. NATO Group Catfished Soldiers to Prove a Point About Privacy
  232. Password manager flaws can expose data on compromised devices, report says | SC Media
  233. Using the zero trust model to prevent phishing | SC Media
  234. Explainer: What is quantum communication?
  235. The Wired Guide to Your Personal Data (and Who Is Using It)
  236. What is a man-in-the-middle attack? How MitM attacks work and how to prevent them
  237. What is phishing? How this cyber attack works and how to prevent it
  238. Scammer groups are exploiting Gmail 'dot accounts' for online fraud | ZDNet
  239. Major DNA testing company is sharing genetic data with the FBI
  240. Your digital identity has three layers, and you can only protect one of them
  241. Why Data Privacy Is About More Than Just Security
  242. Phishing attacks posing as missed voicemails nab credentials | SC Media
  243. What is a supply chain attack? Why you should be wary of third-party providers
  244. How WhatsApp Merger With Facebook Messenger Puts Your Privacy At Risk
  245. 12 Simple Things You Can Do to Be More Secure Online
  246. How Enterprises Need to Handle Today’s Threat Landscape
  247. Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security
  248. What is spear phishing? Why targeted email attacks are so difficult to stop
  249. Why Enterprises Need to Crack Down on Lazy Logins
  250. Why Marriott Breach Includes Some Valuable IT Lessons
  251. Data breaches can sucker-punch you. Prepare to fight back
  252. Marriott breach exposes more than just customer info | SC Media
  253. Hackers target Dell customer information
  254. Lawmakers call for data security legislation in wake of Marriott breach
  255. Cybercrime and cyberwar: A spotter's guide to the groups that are out to get you | ZDNet
  256. Cyberwar predictions for 2019: The stakes have been raised | ZDNet
  257. Survey shows IT professionals concerned about cyberwarfare, end users, and conducting international business | ZDNet
  258. Little FYI: Wi-Fi calling services on AT&T, T-Mobile US, Verizon are insecure, say boffins
  259. Mobile Phone Security: All You Need to Know | Cybersecurity | TechNewsWorld
  260. Be Warned: Customer Service Agents Can See What You're Typing in Real Time
  261. New cryptominer seeks out root permissions on Linux machines | SC Media
  262. The FBI Created a Fake FedEx Website to Unmask a Cybercriminal
  263. USPS fixes 'Informed Delivery' flaw that exposed 60M users | SC Media
  264. Career advice: Good enough security trumps best security
  265. Surveillance Kills Freedom By Killing Experimentation
  266. IRS Issues Urgent Warning On Tax Transcript Scam
  267. What network pros need to know about IoT
  268. Utilizing the Human Element to Mitigate Today’s Sophisticated Cyber Threat Landscape
  269. Crypto-Gram: November 15, 2018 - Schneier on Security
  270. With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes
  271. Apache Struts vulnerability would allow system take over | SC Media
  272. Worst malware and threat actors of 2018 so far
  273. National biometric database could be on the way (and in private hands) | ZDNet
  274. Hackers are increasingly destroying logs to hide attacks | ZDNet
  275. Mobile device security: A guide for business leaders - Tech Pro Research
  276. How to keep your data secure and private, step by step
  277. ​ The day computer security turned real: The Morris Worm turns 30 | ZDNet
  278. Cyber threats fueled by AI: Security's next big challenge
  279. DDoS and ransomware tools for starter and experienced cybercriminals exposed | SC Media
  280. Thieves steal a Tesla Model S by hacking the entry fob
  281. Free decryption tool released for multiple GandCrab ransomware versions | ZDNet
  282. Most consumers have cyber security concerns, but a fraction take action | ZDNet
  283. Create an Alias For Your iCloud Address to Maintain Your Online Privacy
  284. Tim Cooks warns of ‘data-industrial complex’ in call for comprehensive US privacy laws
  285. Latest Firefox takes aim at tracking cookies and promotes the use of VPN
  286. Every minute for three months, GM secretly gathered data on 90,000 drivers' radio-listening habits and locations
  287. U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections
  288. Six tips to stop phishing attacks | SC Media
  289. Securing Middle America: small towns more at risk of ransomware, phishing and more | SC Media
  290. 3 top multi-cloud security challenges, and how to build a strategy
  291. Facebook reportedly aims to buy a 'major' cybersecurity company
  292. 5 reasons eSignatures are the must-have tool you don't think about
  293. How to Stay Anonymous Online | Digital Trends
  294. 17 penetration testing tools the pros use
  295. Securing risky network ports
  296. Why CISOs Fumble With Understanding Security Needs
  297. Why Supply Chain Security a Serious Enterprise Problem
  298. Expanding attack surfaces and difficulties obtaining the right people worry NCSA panelists | SC Media
  299. Despite proposed solutions, DNS security issues remain in tech industry
  300. Crypto-Gram: October 15, 2018 - Schneier on Security
  301. 'Flash update' scam serves up legit software, but with a side of cryptominer | SC Media | SC Media
  302. Ransomware hits Madison County Idaho government | SC Media | SC Media
  303. It Only Took 9 Seconds to Guess a DOD Weapons System Password
  304. What is IAM? Identity and access management explained
  305. Apple, Amazon deny servers affected by China microchip plot | SC Media
  306. Five Trends in Attacks on Industrial Control Systems
  307. Apple, Amazon deny report that Chinese spy chips infiltrated their hardware
  308. China Used a Tiny Chip in a Hack That Infiltrated Amazon and Apple
  309. Digital IDs Are More Dangerous Than You Think
  310. Security News This Week: The Feds Can't Force Facebook to Wiretap Messenger
  311. Quantum computers could break encryption, so it’s going quantum too
  312. Everything We Know About Facebook's Massive Security Breach
  313. 5 biggest cybersecurity challenges at smaller organizations
  314. Trump's Immigration Cops Just Gave America's Hottest iPhone Hackers Their Biggest Payday Yet
  315. Four Security Questions Healthcare Organizations Must Address When Moving to the Cloud | SC Media
  316. Mobile Carriers Join Together for Project Verify Authentication Effort
  317. Five security settings in iOS 12 you should change right now
  318. What is Zero Trust? A model for more effective security
  319. Crypto-Gram: September 15, 2018 - Schneier on Security
  320. You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it
  321. A Decade-Old Attack Can Break the Encryption of Most PCs
  322. For safety’s sake, we must slow innovation in internet-connected things
  323. 6 ways companies fail at security fundamentals
  324. How to Send a Secret Image in Plain Sight
  325. Facebook launches Clear History feature that should have been there all along | ZDNet
  326. Mark Zuckerberg Says It Will Take 3 Years to Fix Facebook
  327. Everything Facebook Announced Today at F8
  328. Cyber security: Don't leave it to your tech team or you'll get breached, warns data protection chief | ZDNet
  329. Private web browsing doesn’t mean no one is watching
  330. Worse Than Y2K: Quantum Computing And The End Of Privacy
  331. Nine Best Practices for Keeping Bad Actors Out of a Database
  332. Crypto-Gram: April 15, 2018 - Schneier on Security
  333. The One Router Setting Everyone Should Change (But No One Does)
  334. How quantum computing could wreak havoc on cryptocurrency
  335. DNS Security with DNSCrypt | OpenDNS
  336. Amazon Advances Cloud Security, Storage Tools at AWS Summit
  337. How to Create Secure Passwords That Aren't Impossible to Type
  338. How to use Cloudflare's DNS service to speed up and secure your internet | ZDNet
  339. 10 Ways to tell if that email is legitimate...or not
  340. Are you ready? This is all the data Facebook and Google have on you | Dylan Curran
  341. StumbleUpon
  342. GitHub Survived the Biggest DDoS Attack Ever Recorded
  343. FBI's Use of Paid Best Buy Informants Goes Deeper Than We Knew
  344. IT pros don't learn from cyberattacks, study
  345. Apple App Store Scam Stealing Credit Cards: What to Do
  346. FTC warning users to do homework before using VPN apps
  347. DoubleDoor Botnet Chains Exploits to Bypass Firewalls
  348. Study shows which phishing attacks most successful
  349. Microsoft is trying to kill passwords. It can't happen soon enough
  350. Add a PIN to Your Smartphone Account
  351. Why Linux is better than Windows or macOS for security
  352. Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders
  353. Many businesses still using outdated security, says Troy Hunt
  354. Your Sloppy Bitcoin Drug Deals Will Haunt You for Years
  355. What Is Bitcoin, and How Does it Work?
  356. How does Bitcoin work? - Bitcoin
  357. New to Bitcoin?
  358. Best Password Managers 2018
  359. The Best VPN Services and Apps of 2018
  360. To Improve Cybersecurity, Start with Improving Human Behavior
  361. Watch a 10-Year-Old's Face Unlock His Mom's iPhone X
  362. Cybersecurity is dead – long live cyber awareness
  363. Google: Our hunt for hackers reveals phishing is far deadlier than data breaches | ZDNet
  364. Update Your Tor Browser to Prevent It From Leaking Your Real IP Address
  365. Know the risks of Amazon Alexa and Google Home
  366. 7 steps for crafting the perfect password
  367. T-Mobile Alerted ‘A Few Hundred Customers’ Targeted By Hackers
  368. Phishing Attacks: Which Departments Are Most at Risk?
  369. KRACK Attack Hacks All Wi-Fi Networks: What to Do
  370. How to Secure Your (Easily Hackable) Smart Home
  371. Security experts air concerns over hackers using AI and machine learning for phishing attacks
  372. Intelligence Experts Say Cyber-Thieves, Nation-State Hackers Teaming Up
  373. Cleartext passwords, and worse found among top 21 financial trading apps
  374. Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too
  375. Quantum Computing Poses Risks to Cryptography and Bitcoin

  376. DDoS protection, mitigation and defense: 7 essential tips
  377. Must-have Wi-Fi troubleshooting and management tools
  378. BlueBorne Bluetooth Flaws Put Billions of Devices at Risk
  379. Discovery Channel - The Secret History Of Hacking
  380. What’s the Difference Between a Fraud Alert, Security Freeze and Credit Lock?
  381. New Social Security Scam Targets Benefit Check Recipients
  382. Equifax breach: How to protect yourself
  383. Top secret data on former U.S. military personnel exposed on Amazon S3 repository
  384. Data breach exposes about 4 million Time Warner customer records
  385. Google Removes Malicious WireX DDoS Botnet Apps from Play Store
  386. Hacking Retail Gift Cards Remains Scarily Easy
  387. If Your Email Address Is On This List, Change Your Password Right Now
  388. TunnelBear: Secure VPN Service
  389. WannaCry Helps Push Cyber-Crime Attacks to New Heights in 2Q17
  390. Fuzzing Analysis Shows ICS, IoT Industries Most at Risk of Zero Days
  391. The Very Best Hacks From Black Hat and Defcon
  392. An Obscure App Flaw Creates Backdoors In Millions of Smartphones
  393. The Best VPN Services
  394. Galaxy S8 face recognition already defeated with a simple picture
  395. Private Internet Access, a VPN provider, takes out a full page ad in The New York Time calling out 50 senators.
  396. Here's how to wipe your old iPad/iPhone/iPod touch ready for resale | ZDNet
  397. A hacker explains why Trump using his old Android phone for Twitter could be a huge security threat
  398. For True Cyber Security, Using a USB Firewall Is Essential
  399. Say Hello to the Super-Stealthy Malware That’s Going Mainstream
  400. Abbrase - Abbreviated Passphrase Password Generator - Darknet
  401. Here's how protect your privacy from hackers and spies
  402. Sophisticated Phishing: Beware the Latest Gmail Phishing Attack | NewsFactor Network
  403. Hardening the Linux server
  404. 20 Linux Server Hardening Security Tips
  405. How to See Everything Your Browser Knows About You
  406. Online Security Made Easy
  407. This $5 Device Can Hack Your Locked Computer In One Minute
  408. Chinese company installed secret backdoor on hundreds of thousands of phones
  409. Beware, iPhone Users: Fake Retail Apps Are Surging Before Holidays
  410. Online Threats Still Rising as Mobile Malware Subsides: Kaspersky
  411. This evil office printer hijacks your cellphone connection
  412. After You Strengthen Your Passwords, Here’s How to Store Them
  413. Trending Mobile VPN Technologies That You Know Of - Information Security Buzz
  414. Information security set for steep trajectory, says (ISC)2
  415. Ethical Hacking Tutorials, Tips and Tricks
  416. Hacksplaining: Learn to Hack
  417. Internet Providers Could Be the Key to Securing All the IoT Devices Already out There
  418. Google's AI created its own form of encryption
  419. Forget the Touch Bar. The MacBook Pro’s Most Important New Feature Is Touch ID
  420. Better safe than sorry: 5 apps for encrypting and shredding files
  421. Attackers Hiding Stolen Credit Card Numbers in Images
  422. Federal Regulators Want Banks to Follow Better Cybersecurity Practices
  423. Crash: how computers are setting us up for disaster | Tim Harford
  424. No endgame for cyber security, says Mikko Hypponen
  425. 10 Tips for Identifying and Dealing With Phishing Email
  426. Tech Support Scams Evolve to Target Broader Range of Users
  427. Microsoft: Tech Support Scams Hit Two-Thirds of Consumers
  428. Hacking demo(messing with loud neighbors) - YouTube
  429. Feds Walk Into A Building. Demand Everyone's Fingerprints To Open Phones
  430. How a chunk of the web disappeared this week: GlobalSign's global HTTPS snafu explained
  431. Remove ransomware infections from your PC using these free tools | ZDNet
  432. Artificial intelligence-powered malware is coming, and it's going to be terrifying
  433. Rethinking Data Protection, Recovery in a Multi-Cloud World
  434. This Hacked Kids’ Toy Opens Garage Doors in Seconds
  435. Lack of IoT Security Is Huge Risk for Critical Enterprise IT Systems
  436. If you've ever created a Yahoo account, take these steps immediately to protect your data
  437. Yahoo under fire over data breach affecting 500 million users
  438. Security News: Cyber, IT, National Security | WIRED
  439. Cloud computing: Four reasons why companies are choosing public over private or hybrid clouds | ZDNet
  440. Dropbox Breach Exposes 68 Million Passwords
  441. Create a Strong Password Using These Tips and Tools
  442. LastPass Authenticator Two-Factor App Launch
  443. FedEx: Amazon would have to spend 'tens of billions' to compete with us
  444. 10 Great Security Tools You Should Be Using
  445. A Journey in the Life of an Encrypted Email
  446. 9 Facts About Computer Security That Experts Wish You Knew
  447. P0wned plug-in puts a million WordPress sites at risk of attack
  448. Why Security Awareness Alone Won't Stop Hackers
  449. The Top 8 Mobile Security Risks: How to Protect Your Organization
  450. 10 Security Apps to Help Your Android Device Fend Off Malware
  451. Schneier on Security: My Conversation with Edward Snowden
  452. Schneier on Security: January 15, 2015
  453. The Five Best Password Managers
  454. LastPass releases Open Source command line client • The Register
  455. Planning Considerations for BYOD and Consumerization of IT (Part 6)
  456. How To Use John The Ripper To Crack Passwords-BackTrack Tutorials For Beginners - Learn With Pranshu
  457. How to Tap Your Network and See Everything That Happens On It
  458. How to Hack Your Own Network and Beef Up Its Security with Kali Linux
  459. Google goes beyond two-step verification with new USB Security Key | Naked Security
  460. YubiKey Authentication | LastPass User Manual
  461. Frequently Asked Questions
  462. POODLE attack takes bytes out of your encrypted data – here’s what to do | Naked Security
  463. With This Tiny Box, You Can Anonymize Everything You Do Online | WIRED
  464. The Ultimate Wireshark Tutorial
  465. Apple Pay security: Hope abounds, but questions linger
  466. http://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf
  467. The Start-to-Finish Guide to Securing Your Cloud Storage
  468. Google’s Location History is Still Recording Your Every Move
  469. Nearly Half Of Americans Claim They've Changed Their Behavior Due To NSA | Techdirt
  470. The Beginner’s Guide to iptables, the Linux Firewall
  471. Here's Everywhere You Should Enable Two-Factor Authentication Right Now
  472. Introduction to Wireshark (Part 1 of 3)
  473. Following Best Coding Practices Doesn't Always Mean Better Security - Slashdot
  474. Aging networking protocols abused in DDoS attacks - security, Prolexic - Computerworld
  475. The 7 elements of a successful security awareness program - Network World
  476. SANS NewsBites
  477. Supply chain 2013: Stop playing whack-a-mole with security threats - Network World
  478. Schneier on Security: Pinging the Entire Internet
  479. Book Review: The Death of the Internet - Slashdot
  480. Review: OpenPuff steganography tool hides confidential data in plain sight | PCWorld
  481. 15 (FREE!) security tools you should try
  482. We suck at security, study says [infographic] | VentureBeat
  483. Hacker 10 – Security Hacker | Computer security tutorials, encryption and privacy software.
  484. Metasploit Helpful Tips | SOA World Magazine
  485. Dropbox Rolls Out Two-Step Verification; Use It
  486. Android Passwords are stored in plain text on Disk ~ THN : The Hacker News
  487. The 5 Biggest IT Security Mistakes | PCWorld
  488. Cellular network hijacking for fun and profit • The Register
  489. Forget Anonymous: Evidence Suggests GOP Hacked, Stole 2004 Election : politics
  490. Use Lion's FileVault 2 to encrypt your Mac's internal drive | Storage | Macworld
  491. Why you shouldn't trust Google (or any cloud service) with your data | ZDNet
  492. Default Router Passwords - The internets most comprehensive router password database
  493. Beware the All-Powerful Administrator - PCWorld
  494. Security Secrets the Bad Guys Don't Want You to Know
  495. Timeline: The History of Hacking

Student Info

  1. 10 best entry-level IT certifications to launch your career
  2. Linux Foundation launches new entry-level IT certification | ZDNet
  3. Google’s Plan to Disrupt the College Degree Is Absolute Genius
  4. The cybersecurity skills shortage is getting worse
  5. IT automation shakes up the entry-level career path
  6. Train up on today's essential cybersecurity skills for $40
  7. The Python Programming Language Is More Popular Than Ever
  8. Train to become a skilled AWS expert for less than $50
  9. 15 Top Paying IT Certifications In 2020
  10. The top 20 tech skills of 2019—and the easiest one to learn in 2020
  11. This 12-course bundle will teach you how to be an ethical hacker for $39
  12. Best practices for data modeling
  13. 60 Cybersecurity Interview Questions [2019 Update] | Daniel Miessler
  14. Top 17 project management methodologies — and how to pick the best for success
  15. 12 blockchain-related jobs to consider in 2020
  16. IT Career Roadmap: Infrastructure software manager
  17. Gartner: 10 infrastructure trends you need to know
  18. How to Answer 'Why Do You Want to Work Here?' in a Job Interview
  19. Software jobs pay twice the national average
  20. 8 hot IT security jobs and what they pay
  21. 7 High-Paying Jobs You Can Get Without a 4-Year College Degree
  22. Top 15 data science professional development certificates
  23. The highest-paying entry-level job in tech pays $113,254 a year—here are the other 9
  24. Blockchain jobs remain unfilled, while skilled workers are being poached
  25. 11 business intelligence certifications to advance your BI career
  26. 15 top data science certifications
  27. A movement to prepare students for the future of work
  28. The Deeper Education Issue Under the College Bribery Scandal
  29. Demand for blockchain engineers is ‘through the roof’
  30. 10 IT skills paying the highest premiums today
  31. What Frameworks and Languages Are Developers Using in 2019?
  32. Best-paying programming languages, skills: Here are the top earners | ZDNet
  33. AWS Training and Certification - Machine Learning
  34. Amazon says it’s making freely available the same machine learning courses that it uses to teach its own engineers
  35. 10 Impressive Questions to Ask in a Job Interview
  36. Cybersecurity, AI skills to dominate IT staff hires in 2019 | ZDNet
  37. 10 must-have skills for ITSM pros
  38. Gartner: IT spending to hit $3.8 trillion; enterprise software, IT services outlays lead way
  39. The 15 top-paying certifications of 2018
  40. According to Hiring Managers, 1 Type of Resume Makes You Look Desperate
  41. This Is The #1 Resume Lie That'll Cost You A Job According To Hiring Managers
  42. The 7 most in-demand tech jobs for 2018 — and how to hire for them
  43. The future technology skills that will keep you in work
  44. AI and the Future of Work
  45. More Companies Teach Workers What Colleges Don’t
  46. The blockchain market is hot; here's how to learn the skills for it
  47. Net Neutrality: Everything You Need To Know
  48. How IT Professionals Can Survive, and Thrive in, an Automated World
  49. Demand for cyber security skills outstrips internal supply, research finds
  50. 9 Things to Consider Before Accepting a New Job
  51. The Interview Question That's Always Asked (and How to Nail It)
  52. How to spot 4 common lies employers tell job applicants
  53. Scan Your Social Profiles Like a Potential Employer Will
  54. 10 Great Places to Work at Large, Medium and Small Tech Companies
  55. Old School May Be Better Than High-Tech.
  56. Americans who haven't gone to college are way worse off today than 40 years ago
  57. Skills shortage tops Security Serious agenda
  58. Top 10 most desired traits for cybersecurity job candidates
  59. The next IT jobs boom? The internet of things
  60. 10 in-demand jobs for workers without a bachelor's degree
  61. Why Tech Pros Need to Develop Soft Skills
  62. Facebook helped advertisers target teens who feel “worthless”
  63. Amazon’s CEO Perfectly Explains AI in Just Two Sentences
  64. Computerworld's IT Salary Survey 2017 results
  65. Cybersecurity jobs are there for the taking. Are you ready?
  66. Python on the Web: The Amazing Things You Can Build
  67. JavaScript Is Still Most Popular Language, but Developers Love Rust
  68. Science: 81 Percent of People Lie in Job Interviews. Here's What Top Companies Are Doing Instead
  69. Five Questions You Absolutely, Positively Must Ask On A Job Interview
  70. A woman who has reviewed over 40,000 résumés outlines the 8 most annoying mistakes she sees
  71. Tutorials for Spring AOP, Gerrit, Spring MVC, Apache Solr, Excel Power View, Sencha Touch, Tex Commands, Agile Testing, Apache Tajo, C++ Library, MariaDB, SAP QM, SAP SOLMAN, SAP SCM, MS Access, KoaJS, OAuth2.0, Scrapy, SAP CCA, SAP PM, SAPUI5, Cognos, Internet of Things, Rural Marketing, Trampolining, Golf, CakePHP, SAP EWM, Web Dynpro, Angular2, Framework7, Arduino, CherryPy, Firebase,SAP C4C, SAP Dashboard, SAP PI, ExpressJS, Design Thinking, Internet Security, PyGTK, Apache Drill, Excel Charts, Elastic Search, Computer Security, Extreme Programming, Behavior Driven Development, Conversion Rate Optimization, SAP Basis, Business Law, Kanban, Erlang, SAP Payroll, ASP.Net WP, PouchDB, MFC, SAP HR, Yii, Clojure, Aurelia, CoffeeScript, CPanel, Laravel, SAP Webi, MS SQL Server, pinterest, Indian Polity, Teradata, Windows10
  72. 10 Websites for Ethical Hacking Tutorial - Free
  73. The Best Questions to Ask in Every Job Interview Round
  74. IT Pros Need More Training on Linux and the Cloud
  75. Robert Half Report Lists the Most In-Demand IT Jobs In 2017
  76. It took Sheryl Sandberg Exactly 2 Sentences to Give the Best Career Advice You'll Hear Today
  77. What Employers Want to Know During Job Interviews
  78. How To Answer 'What's The Lowest Salary You Would Accept?'
  79. Learn ethical hacking from scratch
  80. Technology skills demand accelerates outside the IT department
  81. So You Want to be a Functional Programmer (Part 1)
  82. The 15 most popular computer languages, according to the Facebook for programmers
  83. Why Is JavaScript the Programming Language of the Future? - DZone Web Dev
  84. How to Use Markdown in WordPress to Improve Workflow - Make Tech Easier
  85. Ten Self-Defeating Gestures of Job Candidates
  86. A common job-interview question about money is a trap, and you should never answer it directly
  87. Comparing Struts 1 and 2
  88. IT Salary Survey 2016: Do certifications really help?
  89. IT Salary Survey 2016: Highlights
  90. IT Salary Survey 2016: 10 tech specialties with rising salaries
  91. How to Answer "Tell Me About a Time You Failed" in an Interview
  92. Top 10 Tools for a Free Online Education
  93. 5 Interview Mistakes You Didn't Know You’re Making
  94. The 15 Most Popular Free Online Courses for Professionals
  95. The 15-step guide to nailing any job interview
  96. WebServlet annotation examples
  97. Help - Eclipse Platform
  98. Companies Plan to Hire More Linux Pros
  99. Linux Treasures: 11 Sublime Native Linux Apps That Will Make You Want To Switch
  100. The Ten Best Tech Jobs in America
  101. 15 of the Best Courses on Udemy for Self-Improvement
  102. This 'Smart' Whisky Bottle Must Be Stopped
  103. RadioShack Corporation — Our Company — History — Timeline
  104. IT jobs market booming in the Southwest
  105. What I Wish I Knew When I Started My Career as a Software Developer
  106. How to Negotiate Your Salary When You Don't Have Any Work Experience
  107. Higher education: The university experiment : Nature News & Comment
  108. How To Improve Your Programming Career Opportunities
  109. Google gives students unlimited cloud storage
  110. HTG Explains: What is a File System, and Why Are There So Many of Them?
  111. a_message_from_everyone_to_it_workers
  112. Advice I Wish Someone Had Given Me for My First Job
  113. America Has Hit “Peak Jobs” | TechCrunch
  114. 2013 job watch: Top 11 metro areas for tech jobs
  115. How to Tackle Three of the Toughest Interview Questions
  116. Use the "Embarrassment Test" to Help Make Difficult Decisions
  117. Google Developers Live
  118. 2013 IT salaries: 15 titles getting the biggest pay raises
  119. 12 effective habits of indispensable IT pros
  120. The geek skills challenge: 10 talents worth mastering
  121. Support - Forums - General Forums - CrossOver for free on Wednesday, October... - Discussion of Windows on Mac and Linux
  122. Texas Tech University Libraries :: Lynda.com
  123. Adobe - Adobe Education Store - North America - Adobe Creative Cloud Student and Teacher Edition
  124. The Interview Question That's Always Asked (and How to Nail It)
  125. Java, C, PHP: 15 Programming, IT Skills That Are Thriving on Wall Street
  126. How to Stand Out in an Interview
  127. SecTools.Org Top Network Security Tools
  128. Hacking Videos
  129. The Hardest Job Interview Questions—And How to Ace Them
  130. 100 Best Places to Work in IT 2012 - Computerworld
  131. Outdoor Leadership Programs | Outward Bound
  132. Apply for a Tech Position That Doesn't Exist - Wired How-To Wiki
  133. 200+ Most Common Interview Questions & 1000+ Answers
  134. avoid-a-me-resume-and-avoid-getting-ignored-by-yet-another-employer
  135. Study: Salaries Poised to Rise for Workers With Mobile, Cloud, UI Skills | PCWorld Business Center
  136. What Questions Should I Be Ready to Answer at Just About Any Job Interview?
  137. How to Answer "What Is Your Greatest Weakness?"
  138. Lynda
  139. Three reasons why asking risky questions reduces risk
  140. Pepper Your Resume with a Company's Cultural Keywords to Help Beat the Screeners
  141. 15 things successful CEOs want you to know
  142. CEO: The 5 Things I Look for In a Great Job Interview | LinkedIn
  143. 8 nice text-based applications in Linux ~ Linux and Life
  144. The Strange Birth and Long Life of Unix - IEEE Spectrum
  145. Five Best Online File Storage Services
  146. Occupational Hazards: 7 hot jobs for 2012
  147. Hulu - CNBC Originals: Code Wars - Watch the full episode now.
  148. When passwords attack: the problem with aggressive password policies
  149. 0,2817,2395429,00.asp
  150. 68 great ideas for running a security department
  151. discover-whats-new-in-css-4
  152. 5 Tech Pros Companies Want to Hire | PCWorld
  153. High-speed Ethernet Planning Guide | PCWorld
  154. Web server security
  155. Newegg.com - LIAN LI Lancool PC-K56 Black 0.8 mm SECC, Plastic + Mesh ATX Mid Tower Computer Case
  156. TR's fall 2011 system guide - The Tech Report - Page 1
  157. Choose an Irrelevant Skill When Asked "What Are Your Weaknesses?" in a Job Interview
  158. 10 Cloud Career Skills - PCWorld


  1. What is IFTTT? How to use If This, Then That services
  2. 14 Hidden Firefox Functions for Browsing Like a Boss
  3. Make your iPad more like a Mac. How to use Apple's new iPadOS 14 features
  4. Linux Fu: Simple SSH File Sharing
  5. How to Install Apache Cassandra on CentOS 8
  6. 12 ways Google Lens can make you more productive on Android
  7. How to Encrypt Files with gocryptfs on Linux
  8. 11 ways to list and sort files on Linux
  9. Single list of HOWTOs
  10. How to Figure Out What's Wrong With Your Internet Connection
  11. What's in the latest Chrome update? Tabs gather in groups
  12. You Can Now Check If Your ISP Uses Basic Security Measures
  13. How to See How Busy a Store Is Right Now with Google Maps
  14. Working from home? Here's how to make sure your Wi-Fi is up to speed
  15. Use Multitasking on your iPad
  16. You Need to Lock Down Your Router's Remote Management Options
  17. How to hide files and photos on your phone
  18. How to Convert a Document to PDF on iOS
  19. Manage your Location History - Google Account Help
  20. Your internet provider knows where you've been. How to keep your browsing more private
  21. How to Enable the Classic Mac Startup Chime
  22. How to Unlock Chrome's Hidden Bottom Toolbar in Android
  23. How to Use the awk Command on Linux
  24. How to convert any file to any format
  25. Explore the internet faster with these keyboard shortcuts
  26. 20 essential Mac keyboard shortcuts to save you a click
  27. Rethinking the PC: Why virtual machines should replace operating systems
  28. How to Enable Developer Options on Galaxy Note 10 and Note 10+
  29. How to buy a router
  30. How to find the best VPN service: Your guide to staying safe on the internet | ZDNet
  31. How to check on all the app subscriptions you’ve forgotten you’re still paying for
  32. How To See Who Uses Your Wi-Fi?
  33. How to choose a database for your application
  34. How to Automatically Delete Your Google Data, and Why You Should
  35. How to use Gmail labels to tame your inbox
  36. How to Create an RSS Feed from a Google Alert
  37. How to Tap Your Network and See Everything That Happens On It
  38. Storing your stuff securely in the cloud
  39. Trading in your smartphone could be a 'ticking time bomb' for your personal data — here's how one expert says you can protect yourself
  40. How to Control the Privacy of Your Facebook, Instagram, Twitter, and Snapchat Posts
  41. Charge your devices the right way
  42. How to Spring Clean Your Digital Clutter to Protect Yourself
  43. When You Electronically Sign Documents, Always Keep a Copy
  44. How to freeze and lock your Linux system (and why you would want to)
  45. How to Set up a Used Mac When You Don't Know the User Name or Password
  46. How to check if you've been hacked
  47. How to safely open any USB device
  48. You don't need a new computer, here's how to keep your old one running like new
  49. Workstation Pro - VMware Products : Windows Virtualization for Everyone
  50. Linux on your laptop: A closer look at EFI boot options | ZDNet
  51. How to remap the Bixby button on most recent Samsung Galaxy devices! | Drippler - Apps, Games, News, Updates & Accessories
  52. 12+ essential iPad productivity tips
  53. Outlook vs. Gmail: Which works better for business?
  54. G Suite now lets users work with Google Docs, Sheets, and Slides directly inside Dropbox
  55. How to manage your Linux environment
  56. How to create Servlet in MyEclipse IDE - javatpoint
  57. Two-Factor Authentication: Who Has It and How to Set It Up
  58. A short collection of Safari tips for iPhones, iPad
  59. How to Turn Off Email Trackers
  60. Here's how to securely wipe your Android smartphone for resale | ZDNet
  61. Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
  62. How to use your Mac safely in public places
  63. How to use the SwiftKey Keyboard
  64. Zipping files on Linux: the many variations and how to use them
  65. SQL tutorial: Learn SQL on MariaDB
  66. These secret settings instantly make any Android phone feel twice as fast
  67. How to See Which Facebook Advertisers Have Your Info
  68. How to Lock Down What Websites Can Access on Your Computer
  69. How To Stop Robocalls From Bothering You
  70. How to Set Up a Fake Phone Number
  71. Compiling and Installing - Apache HTTP Server Version 2.4
  72. 10 essential MySQL tools for admins
  73. bash howto debug - Google Search
  74. How to Get the Most Out of Gmail’s New Features
  75. Google’s light search app Go can now read you articles and web pages
  76. Gmail Update Helps Protect Businesses from Phishing, BEC Threats
  77. How to Protect Your Identity, Personal Data and Property
  78. Get the Fastest Wifi on Your Wireless Network With Wifi Explorer for Mac
  79. Learn Basic Javascript For Free With This Google App
  80. Build Free Databases
  81. How to build your own Alexa skills with the new Alexa Blueprints
  82. MySQL :: Download MySQL Community Server
  83. MySQL :: MySQL 5.7 Reference Manual :: B.5.3.2 How to Reset the Root Password
  84. Google Keeps a Record of Your ENTIRE Search History
  85. How to Manage Your Google Privacy Settings
  86. How to Check If Cambridge Analytica Could Access Your Facebook Data
  87. Get the Most Out of Your Kindle iOS App
  88. How to Manage All of Facebook's Privacy and Security Settings
  89. How to Group Mac App Icons More Prominently in Your Dock
  90. Google Lens Now Available for iOS: How to Get It
  91. Android Oreo: 18 advanced tips and tricks
  92. Here’s how you access the super creepy data Facebook has on you
  93. 12 tips to free up storage space on your Android phone or tablet | Drippler - Apps, Games, News, Updates & Accessories
  94. Constant Field Values (Java Platform SE 6)
  95. New Feature In Google Drive Improves Interoperability with Microsoft Office
  96. Top 32 Nmap Command Examples For Linux Sys/Network Admins - nixCraft
  97. How To Recover Linux Grub Boot Loader Password - nixCraft
  98. Cortana explained: How to use Microsoft's virtual assistant for business
  99. The Cognitive Biases That Convince You the World Is Falling Apart
  100. What is IFTTT? How to use If This, Then That services
  101. How to Keep Your Home Wi-Fi Safe From Hackers
  102. Ditch Your Smartphone Keyboard For Gboard
  103. How to Install Packages with Homebrew for OS X
  104. How to Customize Your Android Phone Exactly How You Like It
  105. How to Delete the Voice Data That Amazon Echo and Google Home Are Storing
  106. VMware shared folders - Google Search
  107. VirtualBox share folders - Google Search
  108. How to tweak the new Firefox 57 Quantum browser to suit your preferences | ZDNet
  109. How to Send Email to Any Cell Phone (for Free)
  110. build a computer - Google Search
  111. How to install or compile GIMP filters/plugins/extensions on Linux
  112. New Theory Cracks Open the Black Box of Deep Neural Networks
  113. How to Download Your Kindle Notes and Highlights and Export Them | The Digital Reader
  114. How to Stop Hackers From Ransoming Your Mac or iPhone [Updated]
  115. How to Turn Off App Ratings Requests in iOS 11
  116. Install Fedora Linux in Just 10 Steps
  117. Must-have Wi-Fi troubleshooting and management tools
  118. The Complete Guide to Speeding Up Your Virtual Machines
  119. IFTTT / Incompatible Browser
  120. IFTTT / Incompatible Browser
  121. Transfer Photos from Android to Mac OS X
  122. How to Create Shareable Download Links for Files on Google Drive
  123. 14 Practical Examples of Linux Find Command for Beginners
  124. The Best Keyboard Shortcuts for Bash (aka the Linux and macOS Terminal)
  125. How to install Bash shell command-line tool on Windows 10
  126. How to Snoop-Proof Any Phone or Tablet
  127. How to make the dock the most powerful part of your launcher | Drippler - Apps, Games, News, Updates & Accessories
  128. How to install Ansible on Apple MacOS X using command line
  129. Here's how to access the iPhone's hidden mode that turns the camera into a magnifying glass
  130. The Privacy Enthusiast's Guide to Using Android
  131. A Guide to Getting Past Customs With Your Digital Privacy Intact
  132. The travel-only Gmail account: A practical proposal for digital privacy at the US border
  133. Want to Sharpen Your Focus? Science Says to Drop These 5 Habits
  134. How to legally cross a US (or other) border without surrendering your data and passwords
  135. How to stop seeing your Amazon searches everywhere
  136. Vim Editor Modes Explained
  137. Automatic Backup in Linux using bash script / Linux data backup solution
  138. How to Schedule Tasks in Linux with Cron and Crontab
  139. How to Schedule Tasks on Linux: An Introduction to Crontab Files
  140. Quick HOWTO : Ch14 : Linux Firewalls Using iptables - Linux Home Networking
  141. Linux Server Security and Linux Network Security and How To Use Snort Intrusion Detection
  142. How to See Other Devices Logged in to Your Google Account
  143. How to Create a Bootable Backup of Your Entire Mac on an External Drive
  144. Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely « Null Byte
  145. Stop HTML5 autoplay videos in Chrome, Firefox, Opera (but not Edge, Explorer, Safari) | PCWorld
  146. How to Unlock Your Phone Without Pressing the Home Button | TIME
  147. There's a hidden map in your iPhone of everywhere you've been
  148. 4 Great Firefox Addons For Anonymous Surfing and Improved Privacy - Make Tech Easier
  149. How to Start a WordPress Blog - Make Tech Easier
  150. Unlock the Hidden Power of Preview to Better Manage PDF Files [Mac] - Make Tech Easier
  151. How to Make a Bootable macOS Sierra USB Flash Drive
  152. Escaping from Zip Ties
  153. Easily Edit Documents with PDF Expert 2.0 for Mac
  154. How to Fix iOS 10's Biggest Annoyances
  155. Neural networks are powerful thanks to physics, not math
  156. 7 Tips and Tricks for Google Maps on Android - Make Tech Easier
  157. How to Add Blank Spaces to Your Mac's Dock - Make Tech Easier
  158. DeskDock shares your computer's mouse and keyboard with your Android device | Drippler - Apps, Games, News, Updates & Accessories
  159. 39 Brilliant Camping Hacks To Try On Your Next Trip
  160. How to Tame Your Negative Talk in Your Mind
  161. How To Use Google Photo Service in 7 Steps
  162. The Best Wireless Routers of 2016
  163. Convert File Formats on Linux with FF Multi Converter
  164. 10 Super Efficient Ways Inbox by Gmail Saves You Time
  165. 25 Google Search Hacks to Make Life Easier
  166. How to Remove a Service From the Context Menu on Mac
  167. 7 Creative Uses for Amazon Echo and Alexa
  168. How to Change the Launchpad Layout on Your Mac
  169. How to Hide the Menu Bar in OS X El Capitan
  170. 4 Tips to Make Your Mac Run Faster
  171. The Beginner's Guide to Creating Virtual Machines with VirtualBox
  172. How to install WordPress with Apache, MariaDB and PHP 7 on Arch Linux
  173. Linux Mint: The right way to react to a security breach | ZDNet
  174. How to Use a USB Flash Drive with Your Android Phone or Tablet
  175. symless/synergy
  176. 5 Favorite Ways to Collect Content in Evernote
  177. 11 Advanced Searches To Bookmark To Become A Google Power User
  178. Convert Virtual Machines from VMware to VirtualBox
  179. Evernote Can Encrypt Bits of Text to Keep Your Notes Private
  180. 15 Things You Didn’t Know You Could Do with Dropbox
  181. 4 very common Macbook problems—and how to fix them
  182. How to Play DVDs and Blu-rays on Linux
  183. How To Use a USB Stick To Securely Log In to Gmail
  184. How To Move Emails From One Gmail Account To Another
  185. How to see all the companies tracking you on Facebook — and block them
  186. How to use multi-app multitasking on the iPad Pro
  187. How to track your Linux laptop
  188. 10 of the best network and server monitoring tools
  189. Trim Will Find Your Subscriptions, Cancel Those You No Longer Want
  190. How to Play Classic Retro Games on Android
  191. Setting Up IP and Port Based Virtualhost Apache
  192. How to Activate GodMode in Windows 10
  193. How to do image steganography on Linux
  194. How to Export or Save All Pictures from MMS Text Messages on Android
  195. How to Enable and Use iCloud Drive on Your iPhone or iPad
  196. How to trigger commands on File/Directory changes with Incron on Debian
  197. How to Download YouTube Movies & Music on Android | Drippler - Apps, Games, News, Updates & Accessories
  198. 3 Powerful New Features to Try in iOS 9 | PCMag.com
  199. iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode
  200. Who gives the best advice about password security? | Naked Security
  201. How to Make a Program Run at Startup on Any Computer
  202. How to Save Google Maps Offline | PCMag.com
  203. How to Make Cool Gmail Signatures Right from Google Drive
  204. How to Convert Any File Format Online with Free Tools
  205. Collecting Ubuntu Linux System Information
  206. How to Mount a NTFS Drive on CentOS / RHEL / Scientific Linux
  207. How to Create Windows 10 USB Installer in Mac
  208. Google Classroom Launches Chrome Extension So Teachers Can Instantly Share Links With The Entire Class | TechCrunch
  209. Here are the best Gmail hacks to keep you on track
  210. Get the Best of MakeUseOf with Our New Android App, and Win a Samsung Galaxy S6 Edge!
  211. How to Fully Control Your Android Device from Any Computer | Drippler - Apps, Games, News, Updates & Accessories
  212. How and Why to Encrypt Your Text Messages
  213. How to monitor your system performance on (Ubuntu) Linux
  214. How To Organize Your Apps Using LaunchPad in OS X
  215. How to Encrypt and Decrypt Files on an Android Device
  216. The only technique to learn something new
  217. The ultimate guide to staying anonymous and protecting your privacy online - Slideshow | ExtremeTech
  218. Amazon's voice-guided speaker juggles your IFTTT tasks
  219. IFTTT Recipes That Help You Save Money
  220. 5 secret ways you can control your phone using Google search on your computer | Drippler - Apps, Games, News, Updates & Accessories
  221. Snap and edit pictures like a pro with these great Android photo apps | Drippler - Apps, Games, News, Updates & Accessories
  222. 9 Amazing ES File Explorer Features That Can Replace Other Android Apps | Drippler - Apps, Games, News, Updates & Accessories
  223. Here’s How to Download and Delete What Google Knows About You
  224. Use Your Mac’s Notification Center for Widgets, Scripts, and Notifications
  225. How to Enable CMD + n Shortcuts in Safari for Easy Tab Switching
  226. Securing tomcat - OWASP
  227. 4 "About:Config" Tricks to Extend The Functionality Of Firefox
  228. If you lose your Android phone, just Google 'Find My Phone' and it will
  229. Easily Create KVM Virtual Machines on Linux With GNOME Boxes
  230. How to Install Hardware Drivers on Linux
  231. How to Remove Bloatware on Android Without Rooting
  232. HiddenMe Hides all Your Mac Desktop Icons in One Click
  233. How to Use Your Mac’s Disk Utility to Partition, Wipe, Repair, Restore, and Copy Drives
  234. How to Convert a Physical Windows or Linux PC to a Virtual Machine
  235. How to Clear Your Dropbox Cache in Windows and Linux
  236. Configuration Mania Adds a Ton of Hidden Options to Firefox
  237. 6 Tricks You Can Use To Increase The Range Of Your Home Wi-Fi Router
  238. Five tips for cleaning and speeding up your Mac - CNET
  239. How to Disable Your Webcam (and Why You Should)
  240. Why You Really Want a Linux Virtual Server Instead of a Private Server
  241. How to Safely Share Your Smartphone, Computer, or Tablet With a Guest
  242. Google quietly backs away from encrypting new Lollipop devices by default | Ars Technica
  243. How to monitor server log files with Logwatch on Debian and Ubuntu
  244. Singapore’s Lee Kong Chian School of Medicine develops curriculum across time zones, with help from Dropbox for Business
  245. Review: Ring Video Doorbell | WIRED
  246. Featured: Top 10 Backup Apps For Android | Drippler - Apps, Games, News, Updates & Accessories
  247. Kindlebox Automatically Sends Books from Dropbox to Your Kindle
  248. Use Manual Refresh to Save Battery Life on Any Tablet or Smartphone
  249. What To Do If You Lose the Master Password to Your Password Manager
  250. Anyone With Your Mac Can Bypass Your Password Unless You Do This
  251. 4 tips to keep your business data private
  252. How to Make Macs and iOS Devices Work Together Seamlessly with Continuity
  253. Easily Share Files Between Windows 7, 8 and Mac OS X
  254. How to Use Bluetooth File Transfer Between OS X and Android 5.0 Devices
  255. Using secure shell (ssh) for login and secure copy (scp) for data transfer on Linux
  256. The Best Built-In Mac Tips You've Never Heard of, According to Reddit
  257. Everything You Can Do to Free up Space on Your Mac
  258. 4 Things You Didn't Know You Could Do With Google Earth Pro
  259. Repair Linux Boot failures in Grub 2 rescue mode
  260. How to Make a Smart Home From a Dumb One | PCMag.com
  261. How to Run a Full Linux Desktop in a Browser Tab on Your Chromebook
  262. ifttt Review & Rating | PCMag.com
  263. How to install Django on Ubuntu 14.04
  264. GRUB 2 boot menu basics and how to add a custom splash image
  265. 3 Common SQL Mistakes You are Probably Making as a Java Developer | DZone
  266. How to Power Up OS X's Spotlight with Flashlight
  267. 22 tips, tricks and shortcuts for Android Lollipop
  268. How to Anonymize Everything You Do Online | WIRED
  269. How to configure an NFS server and mount NFS shares on Ubuntu 14.10 | HowtoForge - Linux Howtos and Tutorials
  270. How do You Password Protect a Folder on Linux/Unix without Encryption?
  271. How to Unlock Hidden Settings In Your Favorite Software
  272. Learn to Build Android Apps with This Curated Collection of Courses
  273. Your Mac Logs Everything You Download, Here's How to Clear It Out
  274. Beginner's Electronics: 10 Skills You Need to Know
  275. Apple releases web tool to deregister phone numbers from iMessage | The Verge
  276. How to Find and Remove Duplicate Files on Mac OS X
  277. How To Safely Store A Password | codahale.com
  278. How Inbox by Gmail Works, and How to Use It for More Productive Email
  279. How to Use Handbrake to Convert Any Video File to Any Format
  280. How to Identify and Solve your Android Battery Problems | Drippler - Apps, Games, News, Updates & Accessories
  281. Hands On With Google Inbox: Useful Email Triage Tools For A Mobile Workflow | TechCrunch
  282. Useful SystemD commands (hints for systemctl or systemctl vs chkconfig and service)
  283. I Want to Write Android Apps. Where Do I Start?
  284. How to configure a host intrusion detection system on CentOS - Xmodulo
  285. Secure Your Linux Desktop and SSH Login Using Two Factor Google Authentication
  286. How to Organize Your Linux File System for Clutter-Free Folders | Linux.com
  287. mamp - Google Search
  288. How to Set Up Family Sharing in iOS 8 | News & Opinion | PCMag.com
  289. How to Save the Net | Magazine | WIRED
  290. DIY NAS: EconoNAS 2014
  291. The Apps You Need to Deauthenticate Before Selling Your Devices
  292. Plan Your Free Online Education at Lifehacker U: Fall Semester 2014
  293. How to make your email address as hard to guess as your password
  294. Stop Thieves From Recovering Your Data After A Factory Reset
  295. Creating Bibliographies & Footnote Citations Is Easier With Bookends for Mac
  296. How To Install Tomcat On CentOS 7 | HowtoForge - Linux Howtos and Tutorials
  297. 7 Tips For Less Terrible Smartphone Photos
  298. How to Easily Encrypt Files on Windows, Linux, and Mac OS X
  299. Troubleshoot Your Mac With These Hidden Startup Options
  300. ISC Diary | Stop, Drop and File Carve
  301. Evernote Food Saves, Organizes, and Helps You Find Great New Recipes
  302. How to create a VPN shortcut in OS X | MacFixIt - CNET Reviews
  303. What to Do (If Anything) About a Cluttered OS X Desktop | Gadget Lab | Wired.com
  304. Google Drive Blog: Bringing people together in Drive
  305. The Best Experimental Chrome Features You Should Check Out
  306. Use nettop command to check per-application network activity in OS X | MacFixIt - CNET Reviews
  307. Use OS X Finder shortcuts in Open and Save dialog boxes | MacFixIt - CNET Reviews
  308. Mac OS X Easter Eggs - Business Insider
  309. Give Your Laptop and Smartphone a Spring Cleaning
  310. How to Set Up Your Own Private Cloud Storage Service in Five Minutes with OwnCloud
  311. ISC Diary | The HTTP "Range" Header
  312. Multiboot Linux distributions from one USB key - LinuxBSDos.com
  313. How to Make Windows 8 Look and Feel Like Windows 7
  314. Mac Remote Controls Your Mac from the Comfort of Your Android Phone or Tablet
  315. Apple Adds Two-Factor Authentication to Apple ID, Here's How to Set It Up
  316. How to Boot Into Linux from Your Android Phone
  317. Instantly Hide Any File in OS X by Putting It In Your Library Folder
  318. Apache Tomcat 6 Installation on OS X 10.7 Lion and Eclipse Integration | Whatta-Whatta
  319. Cool User File Systems, Part 1: SSHFS | Linux Magazine
  320. What To Do After You've Been Hacked | Gadget Lab | Wired.com
  321. Nova Launcher
  322. How to install Google Play Store apk & Launcher on Kindle Fire HD/2
  323. [ROOT] How To: Root the Kindle Fire 7" HD or 2 with Linux/MAC - Noob (Simple) Version - xda-developers
  324. Make Your Own Pocket-Sized, Grid-It-Style Organizer for $2.50
  325. Daemonize a bash Script
  326. Linux Daemon Writing HOWTO
  327. How to Create a Strong Password in Wake of Twitter Hack Episode - CIO.com
  328. Hackers release iOS 6.1 jailbreak utility - Network World
  329. Build a Computer This Weekend
  330. Encrypt Your Data With EncFS (Fedora 18) | HowtoForge - Linux Howtos and Tutorials
  331. Turn a Raspberry Pi into a Personal VPN for Secure Browsing Anywhere You Go
  332. Video: The Philips uWand Is All I Want in a Smart TV Remote Control | Gadget Lab | Wired.com
  333. Learn Beginner and Advanced HTML/CSS Skills for Free
  334. Five Best Desktop Media Servers
  335. review-linux-live-usb-creator-makes-it-easier-to-install-linux.html
  336. This Is the Best of Lifehacker 2012
  337. Most Popular How-To Guides of 2012
  338. Set Up a Raspberry Pi as a Personal Web Server
  339. Automatically Create Evernote Template Notebooks with AppleScript
  340. Five Best Deal Sites
  341. MySQL 5.5 Admin Cheat Sheet from DZone Refcardz - Free, professional tutorial guides for developers
  342. The Perfect Desktop - Ubuntu 12.10 (Quantal Quetzal) | HowtoForge - Linux Howtos and Tutorials
  343. iPhone 5 Setup and Security Guide
  344. How to Secure and Encrypt Your Web Browsing on Public Networks (with Hamachi and Privoxy)
  345. Inotify: Efficient, Real-Time Linux File System Event Monitoring
  346. Remote MySQL Performance And Query Monitoring | HowtoForge - Linux Howtos and Tutorials
  347. http://www.networkworld.com/research/2012/110612-pc-security-your-essential-software-264010.html
  348. Turning the smartphone from a telephone into a tricorder | ExtremeTech
  349. Lifehacker.com Updates: QuickLock Is A Better Way To Lock Your Mac
  350. 20 Linux Server Hardening Security Tips
  351. Coffee Table Pi
  352. How to install Google's Chrome OS | ZDNet
  353. When You Need to Remember Something You Can't Write Down, Think of Something Crazy
  354. PSA: The Dot In Your Gmail Address Doesn’t Matter | TechCrunch
  355. Sleeping On Difficult Problems Actually Helps Solve Them
  356. How to fix drive-permissions problem in OS X | MacFixIt - CNET Reviews
  357. Amazon's Remote Wipe of Customer's Kindle Highlights Perils of DRM | Gadget Lab | Wired.com
  358. Insync - Your Google Docs backup and sync tool
  359. how_to_adjust_settings_in_vlc_to_permanently
  360. How to Break Into a Mac (And Prevent It from Happening to You)
  361. The Ultimate Beginner's Guide To AppleScript | Mactuts+
  362. HTC Security Flaw Found on Multiple Android Phones
  363. iPhone, iOS 6 Apps to Monitor Your Network, Find WiFi
  364. Making Your own Custom Linux Distro - YouTube
  365. How do I select which folders to sync to my computer?
  366. Site44 Creates Web Sites from Dropbox Folders, Perfect for Personal Landing Pages and Resumes
  367. SSH tip: Send commands remotely | MacFixIt - CNET Reviews
  368. freedesktop.org - Software/systemd/FrequentlyAskedQuestions
  369. Lock down your social media with essential security add-ons | PCWorld
  370. If Your Android Phone Is Stolen, This App Photographs the Thief - Yahoo! News
  371. How a Secret Sequence of Doorbell Buzzes Can Unlock Your Home With
  372. [SAMSUNG GALAXY S3 QCOM TOOLKIT V2.3] Drivers Backup Root CWM BusyBox + MORE [SPR] - xda-developers
  373. Cracked! Hacker Claims to Jailbreak the iPhone 5. - Mike Isaac - Mobile - AllThingsD
  374. How to add and arrange Home screens on the Galaxy S3 | Android Central
  375. How to Root U.S. and Canada Galaxy S3 SGH-T999/SGH-I747/SPH-L710! [Fail-Proof][Noob-Proof][U.S. Cellular] | GalaxyS3Root.com
  376. Here's the List of iOS 6 Compatible Jailbreak Tweaks
  377. Kindle Fire HD 7-inch rooted in spite of Amazon, unstoppable force meets the unhackable object (video) -- Engadget
  378. How to root the Sprint Galaxy S3 L710 without increasing flash counter
  379. [VIDEO] How to Root the Amazon Kindle Fire HD Tablet - xda-developers
  380. Managing Multiple MySQL Servers From One phpMyAdmin Installation (Using SSL Encryption) | HowtoForge - Linux Howtos and Tutorials
  381. Get Google and iOS Living Together in Perfect Harmony
  382. WiFi Pineapple Mark IV | jwz
  383. HakShop — WiFi Pineapple Mark IV
  384. Got a BMW? Thicko thieves can EASILY NICK IT with $30 box • The Register
  385. Customizable Shortcuts for Firefox Lets You Create Key Commands for Anything
  386. Google releases new Java to iOS source code translator -- Engadget
  387. Evernote For Education: Citelighter Teams Up With Cengage To Take The Pain Out Of Online Research | TechCrunch
  388. How to quickly create an encrypted archive in OS X | MacFixIt - CNET Reviews
  389. Computer Hacking/Security Testing with BackTrack5
  390. How to Install Dropbox on the Kindle Fire
  391. Spec Comparison: Apple's iPhone 5 vs. Samsung Galaxy S3 - The Mac Observer
  392. Installing Apache2 With PHP5 And MySQL Support On OpenSUSE 12.2 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  393. Backtrack 5 : How to Bypass Antivirus and Hack Window Systems / SET – (Tutorial) « Connection Reset By Peer
  394. Lifehacker top 10 News, Videos, Reviews and Gossip - Lifehacker
  395. Videos | Tenable Network Security
  396. Tenable Network Security: Enabling Nessus on BackTrack 5 - The Official Guide
  397. Pinpointing Your Security Risks - IT Security
  398. How to create and use Live USB - FedoraProject
  399. Turn Any Laptop Into a Money-Saving Wi-Fi Hotspot For Your Hotel Room
  400. 18 great IT tools for Android
  401. Norton Utilities 15 Review & Rating | PCMag.com
  402. Welcome to SecurityTube.net
  403. Parallels Desktop 8 and VMWare Fusion 5 announced | MacFixIt - CNET Reviews
  404. Learn to Code a Basic iPhone App
  405. How to Dual Boot Linux on Your Mac and Take Back Your Powerhouse Apple Hardware
  406. The Twilight Desktop
  407. iBuildApp :: Create Free iPhone App Using Online Interface Builder| Android, iPad
  408. How Technology Helps Keep This 3,000-Student Class Engaged | Digg Technology
  409. Delete Dropbox cache to recover drive space | Macworld
  410. Master MySQL in the Amazon Cloud | PCWorld Business Center
  411. Pick the right shutter speed for every photographic situation | Macworld
  412. Why Mosh is better than SSH? - LinuxScrew: Linux Blog
  413. Speed Up Dropbox's File Syncing with a Simple Tweak
  414. How to hack your own Wi-Fi network
  415. Just Show Me: How to read Microsoft Office files on your Kindle Fire | Technology News Blog - Yahoo! News
  416. Easily Shake The Eggshells Off A Bunch of Boiled Eggs
  417. The Best Online Backup App for OS X
  418. How to Customize Any Folder or App Icon Using Any Image in OS X
  419. Review: 7 password managers for Windows, Mac OS X, iOS, and Android
  420. 16 ultimate SSH hacks
  421. Sync iPad to Multiple Computers - Guides of Syncing iPad with Multiple Computers - StumbleUpon
  422. how to hack video screens on times square - YouTube
  423. Thanks, Dev-Team! New iPad Already Jailbroken [Updated] | PCWorld
  424. Tweaking Lion's firewall | Macworld
  425. USB Outlet Quattro-”the Gadget Plug”
  426. Read Later Brings Instapaper, Read It Later to Your Mac's Desktop
  427. How to Create a Custom Theme for Your WordPress Blog with Minimal Coding Required
  428. Sync Files and Folders Outside Your My Dropbox Folder
  429. CyberKiko | Dropbox and multiple sync folders
  430. Ubuntu for Android | Ubuntu
  431. Creating A Portable MySQL On CentOS 6 And Ubuntu 11.10 Linux From Sources | HowtoForge - Linux Howtos and Tutorials
  432. Secrets
  433. Mac OS X Lion — Changing SSHD port | .: A Blog To Be Named Later :.
  434. See How SugarSync Stacks up to the Competition - SugarSync
  435. File Sync & Online Backup - Access and File Sharing from Any Device - SugarSync
  436. MyEclipse UML | Eclipse UML diagrams | UML Modeling Capabilities :: MyEclipse
  437. my_laptop_was_stolen_but_dropbox_is_running_and_i
  438. The MacPorts Project -- Download & Installation
  439. Ten OS X Command Line Utilities you might not know about
  440. Handy Mac OSX Command Line Tricks | Snipe.Net
  441. How to Crack WPA2 WPS WiFi password
  442. 6 Ways to Defend Against Drive-by Downloads | PCWorld
  443. macosx - Full guide for installing tomcat on OS X - Server Fault
  444. How To: Upgrade a Wall Outlet to USB Functionality
  445. Changing Apache Server Name To Whatever You Want With mod_security On Debian 6 | HowtoForge - Linux Howtos and Tutorials
  446. Pimp Your Facebook: How to Create a Badass Timeline Banner
  447. Four ways to make the Dock more powerful | Macworld
  448. MySQL Reference for OS X
  449. 14 Practical Ways to Use Evernote
  450. How to Unlock Padlocks Without a Key Using Cheap DIY Shims
  451. SSH tricks
  452. Pro Tips for Regular People: Five Photography Tricks Anyone Who Owns a Camera Should Know
  453. How to Roll Your Own Awesome Drag-and-Drop File Sharing Service
  454. diary.html
  455. Five Best Ways to Stream Live TV
  456. WiFi garage door opener makes forgotten keys a thing of the past - Hack a Day
  457. How to use your iPad or iPhone as a second monitor — Mac Tips
  458. Be a Grown Up Boy Scout: The Wilderness Survival Skills Everyone Should Know
  459. Using Bash To Output To Screen And File At The Same Time
  460. AssistantExtensions Is an All-In-One Siri Hack Manager
  461. MyEclipse UML Tutorial
  462. De-Mystifying the Dark Corners of Windows: The Registry, DLLs, and More Explained
  463. How To Maintain and Use Collaborative Grocery Lists
  464. Remove Unnecessary System Preferences Icons in OS X to Simplify Your Settings
  465. Everything You Thought You Knew About Learning Is Wrong | GeekDad | Wired.com
  466. How To Install Siri on iPad 2 -Video
  467. My Top 10 Jailbreak Tweaks
  468. The Best Wi-Fi Articles for Securing Your Network and Optimizing Your Router
  469. 7 Things I Learned From Building My First Desktop PC | PCWorld
  470. Install A Hard Drive Or SSD In Your Notebook's Optical Bay : Tiered Storage In A Single-Bay Notebook
  471. Evi one-ups Siri for iOS and Android
  472. How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive
  473. Online Tool Converts JavaScript Bookmarklets into Chrome Extensions | PCWorld
  474. Deleting Files Within Lion's Applications Folder | PCWorld
  475. iPhone 4S and iPad 2 Finally Get Proper, Untethered Jailbreaks
  476. The Always Up-to-Date Guide to Jailbreaking Your iPhone, iPod touch, and iPad [iOS 5.0.1]
  477. Going Google-Free: The Best Alternatives to Google Services on the Web
  478. Installing Apache2 With PHP5 And MySQL Support On Fedora 16 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  479. 7 Essential CSS3 Tutorials For Web Developers | Digg Technology
  480. MiniPwner Is a Cheap Penetration Tester and Portable Wi-Fi Node
  481. 35 MacGyver Tips, Clever Uses, and Other Life Hacks in One Infographic
  482. How to Prevent WordPress Site From SQL Injection Attack
  483. Performance Upgrades; FireWire USB SATA Storage; Memory, more at OWC
  484. Apple - OS X Lion Recovery - Introducing Lion Recovery
  485. Troubleshooting: My computer won't turn on
  486. iMac G5: How to Reset the SMU
  487. The Best Jailbreak Apps for iOS 5
  488. Add a Custom Message to Your Mac OS X Login Screen to Help People Contact You If Your Mac is Lost
  489. How to Boost Your Reading Comprehension by Reading Smarter and More Conscientiously
  490. EncFS 1.7.4 installer for Mac OS X available - BoxCryptor Blog
  491. Encrypted Filesystem for Mac OS X
  492. Best of Lifehacker 2011 News, Videos, Reviews and Gossip - Lifehacker
  493. Five Best Video Editors
  494. The Best System Tweaker for Linux
  495. External desktop hard drives buying guide | Macworld
  496. File Management Apps : How and Why to Root your Android: 15 Worthwhile Apps
  497. How to Root Kindle Fire for Mac OSX or Linux! | RootKindleFire.com
  498. The Get More Out of Google Infographic Summarizes Online Research Tricks for Students
  499. Finally, Some Privacy! Cool LCD Monitor Hack Helps Keep Your Secrets | PCWorld
  500. How to Choose A Cloud Storage Provider: Security - storage Blog
  501. Headphones buying guide | Macworld
  502. Best SSDs For The Money: November 2011 : Best SSDs For The Money: November Updates
  503. Macs, Kindle Fire, and managing files | Macworld
  504. Best Chrome Extensions
  505. Virtualization With KVM On Ubuntu 11.10 | HowtoForge - Linux Howtos and Tutorials
  506. Download a Free Dynamic DNS Update client for your dynamic IP
  507. How to Fix Your Family’s Computer This Holiday So the Rest of the Year Is Easy
  508. How to Securely Wipe Your Data from Any Phone on Any Platform
  509. How to Improve Your iPhone's Battery Life
  510. Enabling and disabling cookies | How to | Firefox Help
  511. Disable AutoRun to Stop 50% of Windows Malware Threats
  512. Apple’s Cloud-Based Music Service Now Live On iTunes | Gadget Lab | Wired.com
  513. HOWTO: SSH Tunneling Made Easy
  514. ArchBang Brings Arch Linux's Greatest Features to Your PC Without the Stressful Installation
  515. How to Make (and Sustain) a Good First Impression Every Time
  516. How to Use Photoshop to Pop Pimples, Change Facial Expressions, and Alter Reality As We Know It
  517. abyssoft - teleport
  518. Apache/NCSA Custom Log Format
  519. Best 5 monitors for professionals | Crave - CNET
  520. 5 More PC Upgrade Mistakes (And How To Avoid Them) | PCWorld
  521. Synergy
  522. Replace Your Keychain w/Technology, Convenience, & Style - Keyport Slide and Blades | Keyport, Inc.
  523. iOS 5 Shortcut Feature Enables A Hilarious Prank
  524. Microsoft Lync client for Linux ~ MyTricks
  525. Compare directories via diff - Mac OS X Hints
  526. Five Best Disk Defragmentation Tools
  527. How to Crack a Wi-Fi Network's WEP Password with BackTrack
  528. Top 10 Ways to Unlock the Unlockable
  529. WinX DVD Ripper Platinum Preview | PCMag.com
  530. How to Break Into a Windows PC (and Prevent It from Happening to You)
  531. Making UEFI Secure Boot Work With Open Platforms | The Linux Foundation
  532. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  533. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  534. What to Do When You've Forgotten Your Smartphone's Passcode
  535. How to bypass the iPad 2 password in five seconds : technology
  536. A Gadget for the Home Learns by Degrees - Katherine Boehret - The Digital Solution - AllThingsD
  537. Bump Key HOWTO
  538. Silence Noisy Neighbors by Transmitting Your Music to Their Speakers
  539. Pick Locks - Wired How-To Wiki
  540. The Perfect Desktop - Ubuntu 11.10 (Oneiric Ocelot) | HowtoForge - Linux Howtos and Tutorials
  541. Installing Apache2 With PHP5 And MySQL Support On Ubuntu 11.10 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  542. TonidoPlug - Tiny, Low Power, Low Cost, Linux Home Server | Access your files, music and media from anywhere
  543. More ways to move data to a new Mac
  544. Groovy - Home
  545. Learn How to Pick Locks from a Competitive Lockpicker Who Truly Loves Locks
  546. BackTrack Wiki
  547. The Best Disk Cloning App for Mac OS X
  548. Spool Is Instapaper On Steroids | TechCrunch
  549. Open Security Screws with a Rotary Tool
  550. The Always Up-To-Date Guide to Rooting Any Android Phone
  551. Synapse Is a Super-Fast, Tightly Integrated Application Launcher for Linux
  552. Cartoonify Photos with the GIMP
  553. What Settings Should I Change on My Wi-Fi Router? [Ask Lifehacker]

Cool! / Interesting

  1. How open-source software transformed the business world | ZDNet
  2. One Year With ThinkPad and Linux (From Macbook Pro)
  3. Commit 1 million: The history of the Linux kernel | ZDNet
  4. Amazing Apple Card concept shows the power of augmented reality
  5. Everyone's Video Chatting! But Which Service Is Best for You?
  6. Facebook rolls out tool to make it easier to help during the coronavirus outbreak
  7. What to know before buying a smartwatch
  8. Bang For Buck: 2020 Quad-Core MacBook Air Vs MacBook Pro Vs The MacBook Of The Future — The 2020 12.9-Inch iPad Pro With Magic Keyboard (Specs, Benchmarks, Price)
  9. Switching from iPhone to Android was an excruciating breakup
  10. Google Maps just got an amazing new hidden feature
  11. The flying taxi market is ready for takeoff, changing the travel experience forever
  12. Do this with your old Android phone
  13. Google Assistant's Text-to-Speech Feature Goes Live Today on Android
  14. This hidden Google Maps trick just changed my life
  15. A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH
  16. Wikipedia Is the Last Best Place on the Internet
  17. Facebook pushes EU for dilute and fuzzy Internet content rules – TechCrunch
  18. Did the Early Internet Activists Blow It?
  19. I just dumped one of Apple's worst, most beautiful products | ZDNet
  20. Apple lays groundwork to use iPhone as a car key via NFC
  21. Sign-stealing scandal: Should MLB restrict the use of technology or embrace it?
  22. The iPad Turns 10: A Look Back at Its First Decade
  23. This Graphic Explains 20 Cognitive Biases That Affect Your Decision-Making
  24. A quantum computing future is unlikely, due to random hardware errors
  25. How blockchain will kill fake news (and four other predictions for 2020)
  26. Amazon Echo Studio review: finally, an Echo that sounds great
  27. The Internet Archive Is Making Wikipedia More Reliable
  28. As the internet turns 50, experts weigh future advances and emerging issues
  29. What's in the latest Firefox update? Firefox 70 stops social media trackers
  30. The latest version of Firefox shows the wild scale of web tracking
  31. Remember The Dress? Here’s Why We All See Colors Differently
  32. 7 ways to use augmented reality on your phone
  33. Master data analytics and deep learning with this $35 Python certification bundle
  34. USB-C Has Finally Come Into Its Own
  35. Samsung Galaxy Watch Active 2 review: ‘good’ is as good as it gets
  36. The best open source software of 2019
  37. Prepare for the Deepfake Era of Web Video
  38. What's Your Favorite News Aggregator or RSS Reader?
  39. What is JavaScript? JavaScript and ECMAScript, explained
  40. Everything Amazon Announced Today, From Speakers to Glasses
  41. The Best Fitness Trackers and Watches for Everyone
  42. Why Your Memory Sucks, and What You Can Do About It
  43. 10 weirdest things your Amazon Echo can do
  44. Edward Snowden in His Own Words: Why I Became a Whistle-Blower
  45. Why France and Germany fear Facebook’s cryptocurrency – and plan to block it
  46. Top 10 file-sharing options: Dropbox, Box, Google Drive, OneDrive and more
  47. Three words for a faster emergency response | what3words
  48. The Best Smart Displays for 2019
  49. Kernel Panic: Inside the World's Worst Cyberattacks
  50. Mathematicians Discover the Perfect Way to Multiply
  51. MicroLED is the first new screen tech in a decade. Can it beat OLED?
  52. Disney Plus will cost $7 a month and launch Nov. 12
  53. What Is 5G?
  54. 3 Reasons Brits Voted For Brexit
  55. Apple News+ has issues, but it's a great deal for casual readers
  56. The danger of “I already pay for Apple News+”
  57. Your Environment Is Cleaner. Your Immune System Has Never Been So Unprepared.
  58. The Most Beautiful Day Hikes In America
  59. Pilot Who Hitched a Ride Saved Lion Air 737 Day Before Deadly Crash
  60. AI Algorithms Are Now Shockingly Good at Doing Science
  61. Foldable phones are about to make the US very jealous
  62. Inside the High-Stakes Race to Make Quantum Computers Work
  63. The 20 Best Places to Go in 2019
  64. Confused By Expiration Dates? You’re Not Alone. Here’s What They Really Mean
  65. Apple's Radical New iPhone Suddenly Takes Shape
  66. The best e-reader you should buy
  67. 10 Breakthrough Technologies 2019, curated by Bill Gates
  68. Today's Companies Have A Technology Adoption Problem, Not An Innovation Problem
  69. Facebook’s promised Clear History privacy tool to launch later this year following delay
  70. Wi-Fi 6, explained: how fast it really is
  71. Do Not Disturb: How I Ditched My Phone and Unbroke My Brain
  72. 15 Moments That Defined Facebook's First 15 Years
  73. 15 Years of Facebook in 4 Charts
  74. What programming languages rule the Internet of Things?
  75. How a Vermont social network became a model for online communities
  76. Super Blood Wolf Moon in Pictures
  77. Tim Cook calls on FTC to let consumers track and delete their personal data
  78. How Ring's Neighbors app is making home security a social thing
  79. 190 universities just launched 600 free online courses. Here’s the full list.
  80. Explainable AI: Peering inside the deep learning black box
  81. 100 Websites That Shaped the Internet as We Know It
  82. Web Founder Launches Inrupt to Improve Internet Privacy
  83. The Birth of Google
  84. Amazon Wants Alexa to Hear Your Whispers and Frustration
  85. Reimagining of Schrödinger's Cat Breaks Quantum Mechanics--and Stumps Physicists
  86. 10 critical points from Zuckerberg’s epic security manifesto
  87. The WIRED Guide to Virtual Reality
  88. Microsoft Translator Uses AI to Break Language Barriers on Smartphones
  89. Here Are the Major New Features Google Added to Gmail Today (and What It Didn't)
  90. Google’s astounding new search tool will answer any question by reading thousands of books
  91. RSS is undead
  92. It's Time For an RSS Revival
  93. SpareFoot Acquires SiteLink to Drive Innovation for the Self-Storage Industry - The SpareFoot Blog
  94. How the iPad Pro with Smart Keyboard totally replaced my Macbook | ZDNet
  95. Augmented Reality Check: Why Businesses are Embracing AR in 2018
  96. Microsoft’s new open source tool lets you bring your own Linux distro to Windows
  97. How IBM Aims to Make AI Commonplace in AppDev, Business
  98. Why Blockchain Will Survive, Even If Bitcoin Doesn’t
  99. The Secret to a High Tech Concierge Medical Office? Data
  100. Why Artificial Intelligence Researchers Should Be More Paranoid
  101. Introducing AMP Stories, a Whole New Way to Read WIRED
  102. The hottest iPhone and Android accessory we’ve covered in 2018 so far is only $37 on Amazon
  103. Muse Auto smartens your car with Alexa
  104. What Is Bitcoin? | Cool History
  105. The Entire History of Bitcoin in a Single Infographic
  106. Should Data Scientists Adhere to a Hippocratic Oath?
  107. The Chrome Extensions We Can't Live Without
  108. Intel wants smart glasses to be a thing
  109. You can now use Alexa to send SMS messages
  110. Best Amazon Alexa Skills 2018 - Top 50 Cool and Useful Things Alexa Can Do
  111. You Need to Deal With Your Digital Legacy Right Now
  112. Facebook Local Might Be the Only Facebook App You Need
  113. StumbleUpon
  114. Twenty Years after His Death, Carl Sagan Is Still Right
  115. A history of hacking and hackers
  116. Here's what happened when 30 high school sophomores gave up their phones for a day
  117. Find Out Which Cognitive Biases Alter Your Perspective
  118. Life-hacking websites you didn’t know existed (10 photos)
  119. The 10 must-have Safari extensions of 2017
  120. The 12 must-have Firefox add-ons of 2017
  121. Google Earth Gets a Huge Redesign with Guided Tours, 3D View, and More
  122. USAFacts
  123. Is Evernote Premium Worth Its Money for You?
  124. Evernote Embraces MacBook Pro's Touch Bar for Faster Note Taking
  125. 15 fascinating facts you probably didn't know about Amazon
  126. The 15 Most Useful Google Apps You Never Knew Existed
  127. The Seven Best Things You Can Do With an Amazon Echo
  128. This Site Shows You Both Sides of Major Controversial Issues
  129. 5 Brilliant Kindle Apps and Sites Every Ebook Lover Needs
  130. The world's smallest USB-C laptop charger—I'm in love
  131. Google Maps lets you save and share favorite places with launch of Lists
  132. Physicists Just Showed That Quantum Entanglement Is a Physical Reality
  133. Top 10 Free Alternatives to Expensive Software
  134. Apple CarPlay: everything you need to know about iOS in the car
  135. Comparing Microsoft's New Surface Book to Apple's MacBook Pro
  136. A Free Open Source Alternative to Microsoft Visio
  137. Massive banks are ripping off Americans. There is finally an alternative.
  138. REVIEW: Google Home is a win (and better than the Amazon Echo)
  139. These Skills Are Hard To Learn But Pay Off For The Rest of Your Life – The Mission
  140. Millennials changing the face of cybersecurity
  141. 10 Powerful Habits That Will Boost Your Intelligence
  142. The real-world uses for virtual reality - BBC News
  143. This Week's Top Downloads
  144. Amazon Launches New Prime Reading Program
  145. QuickSafes.com
  146. The AI disruption wave
  147. How people are using the Amazon Echo: New study reveals surprising patterns
  148. United States set to Hand Over Control of the Internet to ICANN Today
  149. US hands over control of internet on schedule - despite last-ditch protests | ZDNet
  150. Google Allo: Everything you need to know | Drippler - Apps, Games, News, Updates & Accessories
  151. A Gorgeous—and Unsettling—Video of Evolution in Action
  152. Top 10 Places to Download or Stream Movies For Free, Legally
  153. 11 basic Excel tricks that will change your life
  154. The Ultimate Road Trip Has Been Planned By Scientists. THIS Is What It Looks Like
  155. 6 literary classics you should listen to as audiobooks
  156. Three essential coding languages you can learn today
  157. IBM's Watson analyzed all the 'Harry Potter' books and movies — and the results are fascinating
  158. 35 Most Popular Facebook Pages in the Geek World
  159. A Simple Explanation of What Net Neutrality Is All About
  160. See 11 of the Year's Best Wildlife Photographs
  161. How Much Digital Media Can Fit on History's Storage Devices
  162. What’s Up With That: Why Does Sleeping In Just Make Me More Tired?
  163. 6 Websites to Download eBooks For Free and Legally
  164. Offline over the weekend? Read all the tech news you missed here
  165. 10 Best Channels for STEM Education on YouTube
  166. Programming Languages - Hyperpolyglot
  167. Google's New Flight Search Tool Helps You Find The Best Price
  168. Total Knee Replacement: A Patient's Guide | UW Orthopaedics and Sports Medicine, Seattle
  169. Automagic: 4 Dropbox-connected apps that do the work for you | Dropbox for Business blog
  170. Google Translate Now Does Real-Time Voice And Sign Translations On Mobile | TechCrunch
  171. 10 CES Themes Likely to Resonate for Some Time
  172. Viva Las Vegas!
  173. 15 Documentaries About The Internet, Hacking, Startups & Cyberculture [Stuff to Watch]
  174. What File System Should I Use for My USB Drive?
  175. Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
  176. Best Computer Monitors: October 2014 - Best Monitors For The Money
  177. What You Should Know About the Amazon Kindle Voyage
  178. Most Popular Place to Buy Computer Parts: Newegg
  179. Plastc wants to replace your entire wallet with a single card
  180. Logitech K480 Multi-Devices Bluetooth Keyboard
  181. 50 Little-Known Ways Google Docs Can Help In Education | Edudemic
  182. Amazon.com: Business Analysis: Best Practices for Success (IIL/Wiley Series in Business Analysis) eBook: Steven Blais: Kindle Store
  183. Mozilla launches Open Badges 1.0, delivers virtual kudos for real skills
  184. Visual Network Simulator To Teach Basic Networking?


  1. KDE Plasma 5.20 Looks Like an Awesome Update - OMG! Ubuntu!
  2. 20 years of Linux on Big Iron | ZDNet
  3. How to Use the sed Command on Linux
  4. Windows 10 is getting Linux files integration in File Explorer
  5. How to use the dig Command on Linux
  6. How to Use Linux’s man Command: Hidden Secrets and Basics
  7. Best Linux Desktop Distributions Overall
  8. Tricks for getting around your Linux file system
  9. How to Use Regular Expressions (regexes) on Linux
  10. Best Linux GUIs for every type of user
  11. Filesystem Hierarchy Standard
  12. Snowflake is the Linux SSH GUI you didn't know you needed
  13. How to Install and Dual Boot Linux on Your Mac
  14. Linus Torvalds, creator of the Linux operating system, warned developers not to use an Oracle-owned file system because of the company's 'litigious nature'
  15. My Search For The Perfect Linux OS Just Ended — With An Unexpected Surprise
  16. iOS 13.2 tips: Check these security and privacy settings today | ZDNet
  17. MacOS 10.15 Catalina Review: More Mobile Features, More Security, and No More iTunes
  18. One of Linux's most important commands had a glaring security flaw
  19. Decoding Apple’s Touch Bar philosophy
  20. Apple Confirms Serious MacBook Pro Problems In MacOS Catalina
  21. How to find out if your apps are compatible with macOS Catalina
  22. All the Best iPadOS Features That You Don't Get in iOS
  23. Here’s What Sets iPadOS Apart from iOS - TidBITS
  24. iOS, iPadOS and tvOS 13.1 updates are now available – TechCrunch
  25. An introduction to the Linux boot and startup processes
  26. Apple iOS 13 Has 25 Great Secret Features
  27. How to take full advantage of Android 10's privacy-reclaiming powers
  28. 21 Best Kali Linux Tools for Hacking and Penetration Testing
  29. Take These Steps Before Installing Android 10 on Your Phone
  30. Linux on your laptop: Here's what you need to know about UEFI firmware | ZDNet
  31. The best Android file manager apps
  32. Microsoft wants to bring exFAT to the Linux kernel – TechCrunch
  33. Working with variables on Linux
  34. The best Android keyboard apps for on-the-go productivity
  35. Two thirds of Android antivirus apps don't work properly
  36. Know When Malware Tries to Access Your Mac's Camera or Mic With This App
  37. What is Linux? Everything you need to know about the open-source operating system
  38. How to identify shell builtins, aliases and exe files on Linux systems
  39. Command-Line Tip: Put Down the Pipe | Linux Journal
  40. Testing openSUSE, Manjaro, Debian, Fedora, and Mint Linux distributions on my new laptop | ZDNet
  41. How to Speed up Your Mac | Digital Trends
  42. Android security: Analysis, advice, and next-level knowledge
  43. Project Ubuntu: Getting Linux Running on Your Mac
  44. systemd unit file basics - Fedora Magazine
  45. 13 Best File Managers for Linux Systems
  46. systemd-analyze plot - Google Search
  47. Microsoft Pledges to Protect Linux and Open Source With Its Patents
  48. Understanding Bash: Elements of Programming | Linux Journal
  49. 10.6. Creating and Modifying systemd Unit Files Red Hat Enterprise Linux 7 | Red Hat Customer Portal
  50. systemd file locations fedora - Google Search
  51. With Linux’s founder stepping back, will the community change its culture?
  52. bash howto - Google Search
  53. The Best New Features to Try in iOS 12
  54. 10 best email apps for Android
  55. Microsoft’s bid to secure the Internet of Things: Custom Linux, custom chips, Azure
  56. The best Android file manager apps
  57. Fedora 28 Set to Deliver New GNOME Linux Desktop for Workstations
  58. Why not the best? Why not Linux Mint?
  59. 21 keyboard shortcuts Mac users need to know
  60. 10 Ways KDE Is a Better Linux Desktop Than GNOME
  61. How to Install Software on Linux
  62. 7 Useful macOS Tricks You Might Not Know
  63. How to mount an ISO image/file under Linux - nixCraft
  64. Five hidden features of Android 8.0 Oreo you should be using
  65. Home - FUSE for macOS
  66. Mingis on Tech: All about Android 8.0 'Oreo'
  67. 24 Things You Can Do in iOS 11 That You Couldn't Before
  68. iOS 10 Tips and Tricks for iPad - Apple Support
  69. iOS 11 improvements that Apple wants to tell you about
  70. Apple shows you how to use iOS 11 on iPad Pro
  71. Linux Operating Systems for The Paranoid: What Are The Most Secure Options?
  72. How to run multiple commands in sudo under Linux or Unix
  73. OpenSnitch: The Little Snitch application like firewall tool for Linux
  74. The 10 Best Launchers for Android | Drippler - Apps, Games, News, Updates & Accessories
  75. The Best Email Client for MacOS
  76. How to Use Your Bash History in the Linux or macOS Terminal
  77. Apple Clips (for iPhone)
  78. Mac Users Should Ditch Google Chrome for Safari
  79. Bixby Brings Samsung Smartphones Into the Personal Assistant Era
  80. Linux Commands - Overview and Examples
  81. Parrot Security OS 3.5 Improves Linux Security Tools Distribution
  82. All the Folders You Can Probably Exclude From Your Mac's Backups
  83. What’s the Difference Between Bash, Zsh, and Other Linux Shells?
  84. How to create Kali Linux bootable USB live in windows 10
  85. WiFi Pineapple NANO: Kali Linux 2.0 Internet Connection Sharing
  86. Which Linux File System Should You Use?
  87. How to find all hard links in a directory on Linux
  88. How to setup a Linux server on Amazon AWS,
  89. 5 Interesting New Photo Viewing and Editing Apps to Download
  90. The Most Used Linux Terminal Commands and What They Do
  91. Five Tools for Beginners that Power Up the Command Line
  92. Linux command line navigation tips/tricks 3 - the CDPATH environment variable
  93. How to Copy Multiple Things to Your Mac’s Clipboard at Once
  94. Advanced Bash-Scripting Guide
  95. My First 10 Minutes On a Server - Primer for Securing Ubuntu
  96. How to split a large archive file into multiple small files using Split command in Linux
  97. GNU GRUB Manual 2.00
  98. Android 7.1's Keyboard Is Hiding a Handy New GIF Search Tool
  99. Pixel Phones Bought From Google Will Have Unlockable Bootloaders
  100. 7 Reasons Why You Should (and Shouldn’t) Dual Boot Linux
  101. Systemd - FedoraProject
  102. SysVinit explained: starting and stopping of services | linuxvoodoo.com
  103. Boot process, Init and shutdown
  104. Meet systemd, the controversial project taking over a Linux distro near you
  105. systemd - Wikipedia, the free encyclopedia
  106. The Story Behind 'init' and 'systemd': Why 'init' Needed to be Replaced with 'systemd' in Linux
  107. linux startup systemd vs systemv - Google Search
  108. 10 Most Valuable Features in Apple's macOS Sierra
  109. Apple to fix backup security vulnerability in iOS 10
  110. Top 10 iOS 10 Features for iPad
  111. 12 hidden features in iOS 10
  112. Top 10 Terminal Tricks in macOS
  113. Kali Linux 2016.2 Delivers New Security Testing Options
  114. linux distro comparison - Google Search
  115. Bash Guide for Beginners, Free Machtelt Garrels Guide
  116. 5 of the Best Antivirus Programs for Ubuntu - Make Tech Easier
  117. Linux Took Over the Web. Now, It’s Taking Over the World
  118. LinuxCon: Tracing Linux's Roots, Mapping Its Future
  119. Linux at 25: What's Behind Its Success and Where It's Going
  120. How To Create ISO Files In Linux
  121. How Net Neutrality Works, And How It Affects You
  122. What You Must Know About Linux Rootkits
  123. How to Install Encfs and Encrypt Files in Mac OS X - Make Tech Easier
  124. Three Ways to Password Protect Folder on Mac OS X(El Capitan Included)
  125. How to Lock A Folder on Mac for Free without Software(El Capitan Included)
  126. Run Android Apps on Linux with Shashlik
  127. Cyborg Hawk Linux - Penetration Testing Linux Distro - Darknet - The Darkside
  128. Parallels, VMware, VirtualBox & Boot Camp face off
  129. Fedora 23 Improves Security, Desktop and Cloud
  130. 11 Hidden OS X El Capitan Features You Might Not Know About
  131. How to Use OS X’s New Split Windows View
  132. How to Enable Android 6.0’s Experimental Multi-Window Mode
  133. How to Easily Select Your Default Apps in Android 6.0
  134. How to Use Android 6.0’s Built-in File Manager
  135. How to speed up your internet connection on Linux
  136. 14 Things You Can Do in Android Marshmallow That You Couldn't Do in Lollipop
  137. How to Install and Configure CSF (Config Server Firewall) on CentOS 7
  138. How to Change a USER and GROUP ID on Linux For All Owned Files
  139. The Beginner’s Guide to Shell Scripting: The Basics
  140. systemd
  141. How To SSH Run Multiple Command On Remote Machine And Exit Safely
  142. BackBox Linux - Penetration Testing LiveCD - Darknet - The Darkside
  143. Top 3 Online Resources For Learning The Command Line
  144. Debugging Bash scripts
  145. Bash Shell PS1: 10 Examples to Make Your Linux Prompt like Angelina Jolie
  146. Intel's New Processors Bring 'Most Significant Advancements in Computing'
  147. Linus Torvalds Talks Linux Security at LinuxCon
  148. 5 YouTube Videos to Help You Get Started with Linux
  149. 4 of the Best Markdown Editors for Linux
  150. 5 Cool Android Camera Tricks with Camera360 Ultimate
  151. VirtualBox error "VT-x is disabled in the BIOS. (VERR_VMX_MSR_VMXON_DISABLED)"
  152. 22.9. Enabling Intel VT-x and AMD-V virtualization hardware extensions in BIOS
  153. virtualbox.org • View topic - Error after upgrade:VT-x is not available. (VERR_VMX_NO_VMX)
  154. Pentoo - Gentoo Based Penetration Testing Linux LiveCD - Darknet - The Darkside
  155. Rosetta Stone for Unix
  156. Linux Vs Unix: The Crucial Differences That Matter To Linux Professionals
  157. What Really Happens When You Delete Something from Your PC
  158. Android Lollipop: Taking mobile security to a new level
  159. Linux File Systems: Ext2 vs Ext3 vs Ext4
  160. General overview of the Linux file system
  161. Comparison of Linux distributions - Wikipedia, the free encyclopedia
  162. Linux Journal | The Original Magazine of the Linux Community
  163. How To Easily Enable Silverlight, And Watch Netflix, on Linux
  164. netfilter/iptables project homepage - The netfilter.org project
  165. I have a SysV init script on Fedora 18. How can I make it start after the network is ready? - Stack Overflow
  166. KDE System Administration/Startup - KDE TechBase
  167. Glx-Dock / Cairo-Dock - Home
  168. LibreOffice Review & Rating | PCMag.com
  169. Using Linux in a Windows world
  170. The Best Navigation App for iOS
  171. Demystifying Android 4.2 Jelly Bean | ExtremeTech
  172. CheatSheet Instantly Displays All the Keyboard Shortcuts for Mac Apps
  173. Buzzblog: EXCLUSIVE: Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  174. Bartender Cleans Up Your Mac’s Menubar
  175. Opening the OS X Firewall for your Server
  176. Top 10 Downloads That Enhance Mac OS X's Built-In Tools | Digg Technology
  177. NTFS-3G for Mac OS X: NTFS-3G 2009.4.4
  178. Mounting remote filesystems on OSX Leopard using sshfs, MacFuse and Macfusion
  179. Mac Os X: Mount NFS Share / Set an NFS Client
  180. 10.6: Mount remote Linux sshfs disks in 64-bit 10.6 - Mac OS X Hints
  181. The MacPorts Project -- Home
  182. The Best News Reader Application for Linux
  183. Eight tips for OS X's Quick Look | Macworld
  184. The Best Virtual Assistant for Android
  185. SlingPlayer (Kindle Fire Edition) Review & Rating | PCMag.com
  186. 15 Apps and Tweaks That May Convince You to Jailbreak Your iPhone
  187. OSXFUSE for Mac
  188. The best tidbits from the Steve Jobs bio - CNN.com
  189. Linux Desktop Faceoff: GNOME 3 Shell vs Ubuntu Unity
  190. 15 Free Apps for Personalizing Your Android Phone
  191. Systemd - FedoraProject
  192. 18 ways to view the ~/Library folder in Lion | Operating Systems | Macworld
  193. MacBook Air and OS X Lion synergy: A big hurdle for Windows 8 | ZDNet
  194. Virtualboxes.org Helps You Discover Your New Favorite Linux Flavor with Tons of Virtualbox Images
  195. Top 10 Secret Features in Mac OS X Lion
  196. Linux 3.0 a Steady Step Forward | PCWorld
  197. Oracle VM VirtualBox
  198. Get the Linux Mint GNOME Menu in Ubuntu [Linux Tip]


  1. Why the Fed is considering a cash-backed cryptocurrency
  2. Utah county moves to expand mobile voting through blockchain
  3. IBM launches blockchain-based supply chain service with AI, IoT integration
  4. Why Wells Fargo plans to pilot its own cryptocurrency
  5. How pharma will soon use blockchain to track your drugs
  6. Why wearables, health records and clinical trials need a blockchain injection
  7. FedEx CIO: It’s time to mandate blockchain for international shipping
  8. How blockchain is becomming the 5G of the payment industry
  9. IBM launches global blockchain-based payments network
  10. The difference between blockchain and a database explained
  11. Blockchain: The complete guide
  12. Sharding: What it is and why many blockchain protocols rely on it
  13. W. Va. says mobile voting via blockchain went smoothly
  14. Blockchain for business: 6 promising pilots
  15. Walmart, Sam’s Club tell suppliers to get on blockchain network
  16. 1. How Blockchain Works
  17. Here's what two executive surveys revealed about blockchain adoption
  18. W. Va. to use blockchain-based mobile app for mid-term voting
  19. What is blockchain? The most disruptive tech in decades
  20. New blockchain ledger will let you sell personal healthcare data
  21. BMW, GM, Ford and Renault launch blockchain research group for automotive industry
  22. Blockchain growth makes developers a hot commodity
  23. Will privacy be a stumbling block for blockchain?
  24. Someone wrote a kids' book to explain bitcoin and blockchain
  25. Can Blockchain Fix the Opioid Epidemic? Intel Wants to Find Out
  26. Hackers steal over $150,000 in cryptocurrency with DNS scam
  27. How blockchain can give readers more power on the internet
  28. Explainer: What is a blockchain?
  29. Bank Of America Seeks Patent On Blockchain-Based Data Storage System
  30. Blockchain to ‘radically’ transform anti-fraud, anti-money-laundering efforts
  31. How blockchain could solve the internet privacy problem
  32. Google will soon bring a blockchain-like system to the cloud
  33. Startup Xage Launches Blockchain-Protected IIoT Security
  34. IFTF: Blockchain Futures Lab
  35. Why Blockchain Will Serve New IT Purposes in 2018
  36. As blockchain heats up, so do job prospects for devs
  37. UpNest Featured in ABC 6 News
  38. 5 ways blockchain is the new business collaboration tool
  39. IBM sees blockchain as ready for government use
  40. Looking To Integrate Blockchain Into Your Business? Here's How
  41. Looking To Integrate Blockchain Into Your Business? Here's How
  42. Microsoft to test blockchain-based self-sovereign ID system
  43. Blockchain: The Complete Guide
  44. How blockchain can secure the IoT
  45. Blockchain - Wikipedia
  46. The Basics of Blockchain Technology, Explained in Plain English
  47. How Amazon Is Quietly Entering The Blockchain And Cryptocurrency Boom
  48. Blockchain and cryptocurrency may soon underpin cloud storage
  49. What Is Blockchain?

Cloud Computing

  1. IBM Opens Up Series of Security, AI and Cloud Initiatives
  2. What is a data lake? Flexible big data management explained
  3. 4 hidden cloud computing costs that will get you fired
  4. IT Turning to the Cloud to Handle Growing Big Data Demands
  5. Cloud Storage Comparison 2018: Compare Security & Features
  6. The 3 reasons CIOs have become cloud-first
  7. How Cloud Computing Impacts Corporate Security for Better or Worse
  8. What is cloud computing? Everything you need to know from public and private cloud to software-as-a-service | ZDNet
  9. How the Internet of Things will affect security & privacy
  10. Lima: Your Personal Cloud Storage Review
  11. Opinion: The FCC's Net Neutrality Victory Is Anything But | WIRED
  12. Best practice for using cloud computing in Europe 2013 (Part 1)
  13. 8 questions that will dominate enterprise cloud adoption
  14. Apple iOS 6 iCloud enhancements bring new enterprise problems
  15. Cloud computing is entering its teen years | Digg Technology
  16. VMware's WSX Does Virtual Desktops With HTML5 | Cloudline | Wired.com
  17. Dropbox just integrated with Facebook, making it easy to invite friends to shared folders | Digg Technology
  18. Jolicloud Me to Integrate Content From Multiple Online Services | PCWorld Business Center
  19. Jolicloud Me Delivers Personal Cloud Search, More | Cloudline | Wired.com
  20. What the cloud really means for your IT job
  21. 'Personal Cloud' to Replace PC by 2014, Says Gartner | Cloudline | Wired.com