Unread

  1. Mark Zuckerberg hits back at Facebook whistleblower claims
  2. Here are the key moments from the Facebook whistleblower's congressional testimony
  3. Google Drive Is Getting Labels for Your Files
  4. Fingerprint ID in YubiKey Bio security key helps banish passwords
  5. Facebook whistleblower urges lawmakers to establish oversight of social network
  6. Data on over 1.5 billion Facebook users is for sale on the dark web
  7. Facebook apologizes for that massive outage, says no user data was compromised
  8. Facebook asks court to dismiss FTC's amended antitrust complaint
  9. 11 Google Drive Features Everyone Should Know About
  10. The 5 Best Window Managers for Linux
  11. The Books Briefing: The Essential Qualities of a Book
  12. How to stop Google from tracking what you type, watch or say
  13. 6 iPhone and Android Apps Every Driver Needs
  14. Clearview AI Has New Tools to Identify You in Photos
  15. 10 Gmail tricks to make your life easier
  16. The real stakes of Apple’s battle over remote work
  17. Google scraps plans to manage people's bank accounts
  18. Windows 11 upgrade: Five questions to ask first | ZDNet
  19. 1Password's brilliant new security feature lets you hide your email
  20. How to Rid Your Phone of Those Default Apps You Never Use
  21. This dangerous mobile Trojan has stolen a fortune from over 10 million victims | ZDNet
  22. Facebook again defends its research on kids as it comes under increase scrutiny
  23. Facebook announces $50 million investment in 'responsible' metaverse development | ZDNet
  24. 10 of the Biggest Annoyances in iOS 15 and iPadOS 15 (and How to Fix Them)
  25. Google privacy settings to change now
  26. iOS 15 lets you spy on apps that might be spying on you | ZDNet
  27. Best VPN for iPhone and iPad 2021 | ZDNet
  28. Debian 11: Moving forward while standing still
  29. What Is Arch Linux and Who Uses It?
  30. How to Mass Delete Emails in Gmail
  31. The Gmail app takes calls now, too, because Google wants it to do everything
  32. Don't want to get hacked? Then avoid these three 'exceptionally dangerous' cybersecurity mistakes | ZDNet
  33. 7 New Features in the Newly Released Debian 11 'Bullseye' Linux Distro - It's FOSS News
  34. KDE Gear 21.08 Brings Improvements to Dolphin, Konsole, Okular, and Many Other KDE Apps - 9to5Linux
  35. How to Finally FaceTime Your Non-Apple Friends
  36. How to Find the Hidden 'Orphaned' Files Eating Your Google Drive Storage
  37. How to Trick Your Brain into Remembering Almost Anything
  38. How to breathe a new life into your aging MacBook
  39. Apple iPadOS: A cheat sheet
  40. A guide to all the Dune terminology you need to know
  41. What Is Kali Undercover? How to Install It on Linux
  42. Apple plans to scan US iPhones for child abuse imagery
  43. Is Rocky Linux the new CentOS?
  44. Which Linux Desktop Should You Use? KDE vs. GNOME
  45. What Will Be the Highest-Paying IT Career 5 Years From Now? — PCMag
  46. How to Manage Linux Network Connections from the Command Line
  47. The 6 Best Linux Distros for Power Users in 2021
  48. Linux Mint 20.2 arrives: Top desktop Linux keeps improving | ZDNet
  49. Power Up Anywhere With the Best Travel Adapters
  50. How To Create a Multiboot USB Drive for Linux
  51. https://thenextweb.com/news/object-oriented-programming-is-dead-syndication
  52. Create rules to filter your emails - Gmail Help
  53. KDE is to Linux what 7 was to Windows
  54. Thunderbird — Make Email Easier.
  55. Ventoy : A New Bootable USB Solution !!! Kali Linux
  56. 6 Must-Have Open-Source Tools to Secure Your Linux Server
  57. What the Linux Mint developers have pulled off is nothing short of astounding
  58. Why the Password Isn't Dead Quite Yet
  59. Why Linux’s biggest strength is also its biggest weakness
  60. Europe Makes the Case to Ban Biometric Surveillance
  61. Biden Orders FTC Crackdown on Repair Restrictions Around Phones, Electronics
  62. 13 Safari Settings You Should Change to Make It a Better Browser
  63. REAPER | Audio Production Without Limits
  64. Dark Audacity
  65. Google Photos is so 2020—welcome to the world of self-hosted photo management
  66. A Collection Of Linux Tools On Steroids
  67. Checking Linux system performance with sar
  68. 5 Best Routes for a Cross-Country Road Trip
  69. MySQL 101: Installation, care, and feeding on Ubuntu
  70. Linux Fu: Databases Are Next-Level File Systems
  71. Where Is Our Spotify for Books?
  72. Students Are Sharing The Shocking Reasons Why Their Teachers Were Fired, And I. Am. Flabbergasted.
  73. Hackers reportedly used a compromised password in Colonial Pipeline cyberattack
  74. As offices open back up, not all tech companies are sold on a remote future
  75. The best ways to back up your Big Sur Mac
  76. Why Incognito Mode and Private Browsing are Not Private
  77. Clonezilla Live 2.7.2 Disk Cloning Tool Released with Many New Features and Improvements - 9to5Linux
  78. Time Twisting Movies to Watch While We Wait for 'Loki' - Bell of Lost Souls
  79. macOS Terminal commands every Mac user should know
  80. Why You Should Stop Using Other People’s iPhone Cables
  81. 7 epic fantasies to read if you liked 'The Kingkiller Chronicle'
  82. The Best Multi-Tools for Any Task
  83. Apple's Latest iPad Pro Is Overburdened With Power
  84. iPad Screen Protector
  85. Google Photos finally stops pretending its compressed photos are "high quality"
  86. Quantum computers could crack today's encrypted messages. That's a problem
  87. Apple's rivals may never be able to catch up to its powerful new chip
  88. Want a Better PC? Try Building Your Own
  89. Google revives RSS – TechCrunch
  90. The Best Photo Editing Software for Macs in 2021
  91. How to Use Brace Expansion in Linux’s Bash Shell
  92. Amazon's new Echo Buds feel great, sound great and let you talk to Alexa | CNN Underscored
  93. Mobile Device Management
  94. Chrome, Edge, Firefox, Opera, or Safari: Which Browser Is Best?
  95. The Distribution Vector That Changed Linux Forever
  96. Texas Road Trip - 15 Texas Road Trips You have to Take!
  97. How to scan and sign a document using your iPhone or iPad
  98. How to Set Up Every iOS 14.5 Feature Worth Knowing About
  99. Linux Fu: Mixing Bash And Python
  100. AirTag review: They work great—maybe a little too great
  101. The 10 Best Linux Server Distributions
  102. Seattle startup Modica turns shipping containers into software-driven microfactories
  103. 38 advanced Mac keyboard shortcuts for productivity | Popular Science
  104. AirDrop Is Leaking Email Addresses and Phone Numbers
  105. Why You Should Use a Physical Key to Sign Into Your Accounts
  106. AirTags are scarily good at tracking items and ... people. I know because I tried.
  107. 9 network commands every Linux admin should know
  108. 2021 iPad Pro boasts truly dramatic RAM upgrade
  109. What Is Thunderbolt 4? Why This New Interface Will Matter in PCs in 2021
  110. What it'll take to get me to dump my Windows PC for a new iMac
  111. A centuries-old secret society is hanging out in Facebook groups
  112. 5+ Unusual Places to Find Free Reading Material and Ebooks for Kindle
  113. How to pick a hard drive for video editing on iPad - 9to5Mac
  114. 4 new hidden Chrome features you should really be using
  115. Tito's – William Murray Golf
  116. Samsung Galaxy Note 20 Ultra gets eSIM support for T-Mobile in the US | Engadget
  117. 10 of the best ways to get help on Linux
  118. Hands On With T-Mobile's 5G Home Internet Gateway
  119. Crypto-gram: April 15, 2021 - Schneier on Security
  120. Google backs effort to bring Rust to the Linux kernel | ZDNet
  121. The FBI is remotely hacking hundreds of computers to protect them from Hafnium
  122. Hearing Aids for the Masses

Student Info

  1. Drop These Phrases From Your Vocabulary If You Want to Sound More Confident
  2. These 15 IT certifications have the best ROI | ZDNet
  3. The shortage of tech workers is about to become an even bigger problem for everyone | ZDNet
  4. Turbocharge your IT career with this cybersecurity training that is on sale for just $30 | ZDNet
  5. The real reason everyone is quitting their jobs right now
  6. How Emotionally Intelligent People Use the 'Golden Question'
  7. Developers, DevOps, or cybersecurity? Which is the top tech talent employers are looking for now? | ZDNet
  8. Cloud and security certifications for Google, Windows, AWS and more lead to highest-paying IT positions | ZDNet
  9. The 10 Highest-Paying IT Certifications for 2021
  10. Tech salaries rose in 2020 — despite COVID-19
  11. The 15 Master's Degrees With the Best Return on Investment
  12. This Interview Question From Elon Musk Is Absolute Genius — Inc.
  13. The 10 Highest-Paying IT Certifications for 2020
  14. Linux and open-source jobs are hotter than ever | ZDNet
  15. 10 best entry-level IT certifications to launch your career
  16. Linux Foundation launches new entry-level IT certification | ZDNet
  17. Google’s Plan to Disrupt the College Degree Is Absolute Genius
  18. The cybersecurity skills shortage is getting worse
  19. IT automation shakes up the entry-level career path
  20. Train up on today's essential cybersecurity skills for $40
  21. The Python Programming Language Is More Popular Than Ever
  22. Train to become a skilled AWS expert for less than $50
  23. 15 Top Paying IT Certifications In 2020
  24. The top 20 tech skills of 2019—and the easiest one to learn in 2020
  25. This 12-course bundle will teach you how to be an ethical hacker for $39
  26. Best practices for data modeling
  27. 60 Cybersecurity Interview Questions [2019 Update] | Daniel Miessler
  28. Top 17 project management methodologies — and how to pick the best for success
  29. 12 blockchain-related jobs to consider in 2020
  30. IT Career Roadmap: Infrastructure software manager
  31. Gartner: 10 infrastructure trends you need to know
  32. How to Answer 'Why Do You Want to Work Here?' in a Job Interview
  33. Software jobs pay twice the national average
  34. 8 hot IT security jobs and what they pay
  35. 7 High-Paying Jobs You Can Get Without a 4-Year College Degree
  36. Top 15 data science professional development certificates
  37. The highest-paying entry-level job in tech pays $113,254 a year—here are the other 9
  38. Blockchain jobs remain unfilled, while skilled workers are being poached
  39. 11 business intelligence certifications to advance your BI career
  40. 15 top data science certifications
  41. A movement to prepare students for the future of work
  42. The Deeper Education Issue Under the College Bribery Scandal
  43. Demand for blockchain engineers is ‘through the roof’
  44. 10 IT skills paying the highest premiums today
  45. What Frameworks and Languages Are Developers Using in 2019?
  46. Best-paying programming languages, skills: Here are the top earners | ZDNet
  47. AWS Training and Certification - Machine Learning
  48. Amazon says it’s making freely available the same machine learning courses that it uses to teach its own engineers
  49. 10 Impressive Questions to Ask in a Job Interview
  50. Cybersecurity, AI skills to dominate IT staff hires in 2019 | ZDNet
  51. 10 must-have skills for ITSM pros
  52. Gartner: IT spending to hit $3.8 trillion; enterprise software, IT services outlays lead way
  53. The 15 top-paying certifications of 2018
  54. According to Hiring Managers, 1 Type of Resume Makes You Look Desperate
  55. This Is The #1 Resume Lie That'll Cost You A Job According To Hiring Managers
  56. The 7 most in-demand tech jobs for 2018 — and how to hire for them
  57. The future technology skills that will keep you in work
  58. AI and the Future of Work
  59. More Companies Teach Workers What Colleges Don’t
  60. The blockchain market is hot; here's how to learn the skills for it
  61. Net Neutrality: Everything You Need To Know
  62. How IT Professionals Can Survive, and Thrive in, an Automated World
  63. Demand for cyber security skills outstrips internal supply, research finds
  64. 9 Things to Consider Before Accepting a New Job
  65. The Interview Question That's Always Asked (and How to Nail It)
  66. How to spot 4 common lies employers tell job applicants
  67. Scan Your Social Profiles Like a Potential Employer Will
  68. 10 Great Places to Work at Large, Medium and Small Tech Companies
  69. Old School May Be Better Than High-Tech.
  70. Americans who haven't gone to college are way worse off today than 40 years ago
  71. Skills shortage tops Security Serious agenda
  72. Top 10 most desired traits for cybersecurity job candidates
  73. The next IT jobs boom? The internet of things
  74. 10 in-demand jobs for workers without a bachelor's degree
  75. Why Tech Pros Need to Develop Soft Skills
  76. Facebook helped advertisers target teens who feel “worthless”
  77. Amazon’s CEO Perfectly Explains AI in Just Two Sentences
  78. Computerworld's IT Salary Survey 2017 results
  79. Cybersecurity jobs are there for the taking. Are you ready?
  80. Python on the Web: The Amazing Things You Can Build
  81. JavaScript Is Still Most Popular Language, but Developers Love Rust
  82. Science: 81 Percent of People Lie in Job Interviews. Here's What Top Companies Are Doing Instead
  83. Five Questions You Absolutely, Positively Must Ask On A Job Interview
  84. A woman who has reviewed over 40,000 résumés outlines the 8 most annoying mistakes she sees
  85. Tutorials for Spring AOP, Gerrit, Spring MVC, Apache Solr, Excel Power View, Sencha Touch, Tex Commands, Agile Testing, Apache Tajo, C++ Library, MariaDB, SAP QM, SAP SOLMAN, SAP SCM, MS Access, KoaJS, OAuth2.0, Scrapy, SAP CCA, SAP PM, SAPUI5, Cognos, Internet of Things, Rural Marketing, Trampolining, Golf, CakePHP, SAP EWM, Web Dynpro, Angular2, Framework7, Arduino, CherryPy, Firebase,SAP C4C, SAP Dashboard, SAP PI, ExpressJS, Design Thinking, Internet Security, PyGTK, Apache Drill, Excel Charts, Elastic Search, Computer Security, Extreme Programming, Behavior Driven Development, Conversion Rate Optimization, SAP Basis, Business Law, Kanban, Erlang, SAP Payroll, ASP.Net WP, PouchDB, MFC, SAP HR, Yii, Clojure, Aurelia, CoffeeScript, CPanel, Laravel, SAP Webi, MS SQL Server, pinterest, Indian Polity, Teradata, Windows10
  86. 10 Websites for Ethical Hacking Tutorial - Free
  87. The Best Questions to Ask in Every Job Interview Round
  88. IT Pros Need More Training on Linux and the Cloud
  89. Robert Half Report Lists the Most In-Demand IT Jobs In 2017
  90. It took Sheryl Sandberg Exactly 2 Sentences to Give the Best Career Advice You'll Hear Today
  91. What Employers Want to Know During Job Interviews
  92. How To Answer 'What's The Lowest Salary You Would Accept?'
  93. Learn ethical hacking from scratch
  94. Technology skills demand accelerates outside the IT department
  95. So You Want to be a Functional Programmer (Part 1)
  96. The 15 most popular computer languages, according to the Facebook for programmers
  97. Why Is JavaScript the Programming Language of the Future? - DZone Web Dev
  98. How to Use Markdown in WordPress to Improve Workflow - Make Tech Easier
  99. Ten Self-Defeating Gestures of Job Candidates
  100. A common job-interview question about money is a trap, and you should never answer it directly
  101. Comparing Struts 1 and 2
  102. IT Salary Survey 2016: Do certifications really help?
  103. IT Salary Survey 2016: Highlights
  104. IT Salary Survey 2016: 10 tech specialties with rising salaries
  105. How to Answer "Tell Me About a Time You Failed" in an Interview
  106. Top 10 Tools for a Free Online Education
  107. 5 Interview Mistakes You Didn't Know You’re Making
  108. The 15 Most Popular Free Online Courses for Professionals
  109. The 15-step guide to nailing any job interview
  110. WebServlet annotation examples
  111. Help - Eclipse Platform
  112. Companies Plan to Hire More Linux Pros
  113. Linux Treasures: 11 Sublime Native Linux Apps That Will Make You Want To Switch
  114. The Ten Best Tech Jobs in America
  115. 15 of the Best Courses on Udemy for Self-Improvement
  116. This 'Smart' Whisky Bottle Must Be Stopped
  117. RadioShack Corporation — Our Company — History — Timeline
  118. IT jobs market booming in the Southwest
  119. What I Wish I Knew When I Started My Career as a Software Developer
  120. How to Negotiate Your Salary When You Don't Have Any Work Experience
  121. Higher education: The university experiment : Nature News & Comment
  122. How To Improve Your Programming Career Opportunities
  123. Google gives students unlimited cloud storage
  124. HTG Explains: What is a File System, and Why Are There So Many of Them?
  125. a_message_from_everyone_to_it_workers
  126. Advice I Wish Someone Had Given Me for My First Job
  127. America Has Hit “Peak Jobs” | TechCrunch
  128. 2013 job watch: Top 11 metro areas for tech jobs
  129. How to Tackle Three of the Toughest Interview Questions
  130. Use the "Embarrassment Test" to Help Make Difficult Decisions
  131. Google Developers Live
  132. 2013 IT salaries: 15 titles getting the biggest pay raises
  133. 12 effective habits of indispensable IT pros
  134. The geek skills challenge: 10 talents worth mastering
  135. Support - Forums - General Forums - CrossOver for free on Wednesday, October... - Discussion of Windows on Mac and Linux
  136. Texas Tech University Libraries :: Lynda.com
  137. Adobe - Adobe Education Store - North America - Adobe Creative Cloud Student and Teacher Edition
  138. The Interview Question That's Always Asked (and How to Nail It)
  139. Java, C, PHP: 15 Programming, IT Skills That Are Thriving on Wall Street
  140. How to Stand Out in an Interview
  141. SecTools.Org Top Network Security Tools
  142. Hacking Videos
  143. The Hardest Job Interview Questions—And How to Ace Them
  144. 100 Best Places to Work in IT 2012 - Computerworld
  145. Outdoor Leadership Programs | Outward Bound
  146. Apply for a Tech Position That Doesn't Exist - Wired How-To Wiki
  147. 200+ Most Common Interview Questions & 1000+ Answers
  148. avoid-a-me-resume-and-avoid-getting-ignored-by-yet-another-employer
  149. Study: Salaries Poised to Rise for Workers With Mobile, Cloud, UI Skills | PCWorld Business Center
  150. What Questions Should I Be Ready to Answer at Just About Any Job Interview?
  151. How to Answer "What Is Your Greatest Weakness?"
  152. Lynda
  153. Three reasons why asking risky questions reduces risk
  154. Pepper Your Resume with a Company's Cultural Keywords to Help Beat the Screeners
  155. 15 things successful CEOs want you to know
  156. CEO: The 5 Things I Look for In a Great Job Interview | LinkedIn
  157. 8 nice text-based applications in Linux ~ Linux and Life
  158. The Strange Birth and Long Life of Unix - IEEE Spectrum
  159. Five Best Online File Storage Services
  160. Occupational Hazards: 7 hot jobs for 2012
  161. Hulu - CNBC Originals: Code Wars - Watch the full episode now.
  162. When passwords attack: the problem with aggressive password policies
  163. 0,2817,2395429,00.asp
  164. 68 great ideas for running a security department
  165. discover-whats-new-in-css-4
  166. 5 Tech Pros Companies Want to Hire | PCWorld
  167. High-speed Ethernet Planning Guide | PCWorld
  168. Web server security
  169. Newegg.com - LIAN LI Lancool PC-K56 Black 0.8 mm SECC, Plastic + Mesh ATX Mid Tower Computer Case
  170. TR's fall 2011 system guide - The Tech Report - Page 1
  171. Choose an Irrelevant Skill When Asked "What Are Your Weaknesses?" in a Job Interview
  172. 10 Cloud Career Skills - PCWorld

Starred

  1. Security News This Week: Even the CIA and NSA Use Ad Blockers to Stay Safe Online
  2. EU proposes mandatory USB-C on all devices, including iPhones
  3. Tesla drivers become 'inattentive' when using Autopilot, study finds | Engadget
  4. 8 Ways to Make Your Old Smartphone Feel New Again
  5. Apple reportedly working on depression-diagnosis feature
  6. Should you update to iOS 15 when it's released on Monday?
  7. Apple releases update fixing NSO spyware vulnerability affecting Macs, iPhones, iPads and Watches | ZDNet
  8. Kape Technologies buys ExpressVPN as part of a $936 million deal
  9. Epic has appealed Friday’s ruling in the Epic v. Apple case
  10. Epic Leaves a Big Crack in Apple’s Walled Garden
  11. This is the perfect ransomware victim, according to cybercriminals | ZDNet
  12. Facebook debuts Ray-Ban Stories, smart glasses that record video
  13. First 8 things to do on your new Samsung Galaxy Watch 4
  14. AT&T pushes for FCC action on T-Mobile airwaves
  15. I just bought the Galaxy Z Fold 3, and I'll never go back to a non-foldable phone
  16. How a tech startup is creating a true 'home box office'
  17. Apple event 2021: New iMac and iPad, purple iPhone 12, AirTags and everything announced
  18. With Just 7 Words Tim Cook Perfectly Explained the Battle Between Apple and Facebook — Inc.
  19. Here's Why Bill Gates Still Prefers Android Instead of iPhone
  20. The Best Tech Brands for 2021
  21. Facebook signs pay deals with 3 Australian news publishers
  22. To All the Fry's I Loved Before: An Elegy for the Best Electronics Chain in the West
  23. How to Protect Your Smart Home From Hackers
  24. Facebook privacy lawsuit over facial recognition leads to $650M settlement
  25. Sign In with Apple reportedly under federal scrutiny
  26. The 5 Best Apps to Get Live TV Without Cable
  27. Facebook weighs whether to build facial recognition into smart glasses
  28. How to stop robocalls: Every way we know to prevent the annoying ringing
  29. This chart shows the connections between cybercrime groups | ZDNet
  30. The Best Outdoor Home Security Cameras for 2021
  31. T-Mobile Casts Aside Low-Budget Reputation With New $90 Plan
  32. Alexa Has No Place on Your Face. The Echo Frames Prove it
  33. Sites Have a Sneaky New Way to Track You Across the Web
  34. Facebook will reverse news block in Australia
  35. Best space heater: Stay warm in every space, from the garage to the basement
  36. iPad gains much-improved Microsoft Office app
  37. Underwater Meditation and the Therapeutic Benefits of VR
  38. Your Ring doorbell can now have Alexa greet visitors, take a message
  39. Opinion | The Coming Technology Boom
  40. Canon launches 'Photo Culling' iPhone app to intelligently keep your best photos and delete the rest - 9to5Mac
  41. A New Lens Technology Is Primed to Jump-Start Phone Cameras
  42. Yes, your security camera could be hacked: Here's how to stop spying eyes
  43. AR glasses are what comes after the smartphone
  44. If you get an email from any of these companies, think twice before opening
  45. SpaceX's Starlink Is Currently Serving More Than 10,000 Users
  46. How the United States Lost to Hackers
  47. Microsoft chiefs say big tech antitrust issues can be solved with laws, not lawsuits
  48. Dispute between Elastic and AWS highlights ongoing battle over open source business model
  49. How Apple's M1 MacBook changed my mind about the next iPad
  50. Amazon’s Ring now reportedly partners with more than 2,000 US police and fire departments
  51. A Vast Web of Vengeance
  52. When is Groundhog Day? And why do we ask an animal for weather predictions anyway?
  53. Facebook’s Oversight Board Has Spoken. But It Hasn’t Solved Much
  54. Lawmakers Take Aim at Insidious Digital ‘Dark Patterns’
  55. Facebook and Apple Are Beefing Over the Future of the Internet
  56. COVID-19 vaccines could end the pandemic by eliminating severe cases
  57. Apple comes out swinging against Facebook over data privacy
  58. Google releases alarming report about North Korean hackers posing as security analysts
  59. Google unveils privacy-friendly AI cookie killer
  60. The best external hard drives: Expand your file storage
  61. Biden-Harris Inauguration Day a palindrome that won't happen again for 1,000 years
  62. TechX Awards: The Most Innovative Products and Technologies of CES 2021
  63. CES 2021's coolest new gadgets: Rollable phones, giant TVs, coronavirus killers
  64. Vuzix’s new microLED smart glasses look like something you’d actually want to wear on your face
  65. Google Warns Google Drive Users: Use It, Or Lose Your Files
  66. Google Photos to end its unlimited free photo storage
  67. Google wants you to help train its AI by labeling images in Google Photos
  68. MacOS Big Sur Will Be Coming on November 12 | Digital Trends
  69. The Future of McDonald's Is in the Drive-Thru Lane
  70. EU files antitrust charges against Amazon over use of data
  71. McDonalds is making its own plant-based burger
  72. This AI Identifies Asymptomatic COVID Carriers by Their Cough
  73. Cloud storage is cheaper when you know how to share it
  74. Portland, Maine Voters Say No to Facial-Recognition Tech
  75. Wikipedia's disinformation task force braces for a high-stakes election
  76. Google is bringing its own VPN to desktops and phones with $9.99 Google One subscription
  77. T-Mobile's upcoming triple play bundle is a strategy loved by the very companies it bashes
  78. Why iPhone 12 makes me think Apple's killing all phone ports soon
  79. Gartner: Top 10 Strategic Predictions for 2021 and Beyond
  80. Why You Should Stop Using Your Facebook Messenger App
  81. Most customers expect companies to accelerate digital initiatives due to COVID-19 | ZDNet
  82. Cruise Will Soon Hit San Francisco With No Hands on the Wheel
  83. Strolling, It Turns Out, Is Good for You
  84. These tech jobs may disappear in the face of automation
  85. Dropbox’s new family plan is now available globally
  86. iPad Air 2020 review: Apple's middle child iPad steps up
  87. After a disaster, Wi-Fi is a lifeline
  88. The Best Mobile Payment Apps for 2020
  89. Linux 5.10 to make Year 2038 problem the Year 2486 problem
  90. Home automation: Your options, explained
  91. iPhone 12 Pro camera uses lidar. What that is and why it matters
  92. iPhone 12's MagSafe is the sleeper feature you should care about
  93. Barnes & Noble confirms cyberattack, suspected customer data breach | ZDNet
  94. iPhone 12 has 5G, but Apple still has us questioning why we need it
  95. Analysis: New Apple 'iPhone 12' to offer 5G speeds U.S. networks can't deliver
  96. Feds may target Google’s Chrome browser for breakup
  97. Apple’s Biggest Challenge Hides Inside Revolutionary MacBook Pro
  98. The beauty and the shame of Google's Pixel 5 gamble
  99. Intel inks agreement with Sandia National Laboratories to explore neuromorphic computing
  100. Galaxy Z Fold 2 after a month: Simply a joy to use | ZDNet
  101. As tech reaches end of life, hackers are watching | SC Media
  102. DigiTimes: 12.9-inch Mini-LED iPad Pro Arriving Early 2021, Mini-LED MacBook Coming Later
  103. Roku introduces a new Ultra player, a 2-in-1 ‘Streambar’ and a new OS with support for AirPlay 2 – TechCrunch
  104. Android Users Need to Manually Remove These 17 Infected Apps
  105. Apple AirPlay heads to Roku 4K streamers and TVs with free software update
  106. Apple's battle with Epic Games could lead to big changes in iPhone apps
  107. Amazon Announces Luna Cloud Gaming Service - ExtremeTech
  108. Buying a new car? These tech features could drive your choice
  109. Why Amazon packages are randomly showing up at people's doors
  110. The new Apple Watch Series 6 is the best all-around smartwatch, but don't buy it just for the blood oxygen sensor
  111. A million students and counting have learned Linux | ZDNet
  112. AT&T and Verizon complain to FCC about T-Mobile’s big spectrum advantage
  113. 10 weirdest things Alexa can do on your Amazon Echo
  114. Why Everything Is Sold Out
  115. New and existing T-Mobile customers are in for another awesome surprise this Friday
  116. macOS Big Sur release date, features and compatibility
  117. We found out who makes Walmart’s new Gateway laptops, and it’s bad news
  118. The Subtle Tricks Shopping Sites Use to Make You Spend More
  119. How to Spot—and Avoid—Dark Patterns on the Web
  120. Why You Should Stop Sending Texts From Your Android Messages App
  121. Apple rejects Facebook app that tells users Apple takes 30% cut of in-app purchases
  122. Samsung Galaxy Note 20 Ultra review: 5G, display, cameras, and S Pen make it the best phone for business Review | ZDNet
  123. There Are Alternatives to Goodreads
  124. Judge in Apple v. Epic Case 'Inclined' to Side With Apple on Fortnite and Epic on Unreal Engine
  125. Samsung Galaxy S21 (S30) Ultra 5G may replace Galaxy Note series
  126. Police Want Your Smart Speaker—Here's Why
  127. Study Reveals a Smartphone Can Detect You Are Drunk With 90 Percent Accuracy
  128. Apple Threatens to Terminate Epic Games' Developer Accounts on August 28
  129. Introduction to Java Servlets - GeeksforGeeks
  130. Wash Your Hands—but Beware the Electric Hand Dryer
  131. Huawei made a 5G iPad Pro clone with wireless charging
  132. Which MacBook Is Best for You?
  133. Android App Giant With Hundreds Of Millions Of Users Was Just Wiped From Play Store
  134. This App Tells You When Nearby Smart Devices Are Snooping on You
  135. Apple might finally let you set third-party browsers and email apps as defaults on iPhone and iPad
  136. CBS will massively expand All Access’ streaming library in 2020
  137. T-Mobile and Sprint Merger: Everything You Need to Know
  138. WSJ News Exclusive | Bloomberg Bankrolls a Social-Media Army to Push Message
  139. Apple warns of iPhone 'supply shortages' due to coronavirus outbreak
  140. Pier 1 files for bankruptcy
  141. Uber Changes Its Rules, and Drivers Adjust Their Strategies
  142. The Galaxy Z Flip's glass screen isn't very durable
  143. Linux distro review: Intel’s own Clear Linux OS
  144. Get Back At Your Robocallers: Robo Revenge Lets You Sue for $3,000
  145. 5 reasons to buy the older Galaxy S10 instead of Samsung's brand-new Galaxy S20
  146. The First Room Burglars Check for Valuables
  147. These email apps are scraping information from your inbox and selling the data for a profit
  148. Why Chrome Is Going to Start Blocking Some of Your Downloads
  149. Here's how the T-Mobile-Sprint merger might actually affect you
  150. Apple Just Made A Striking New Security Move That Could Impact All Users
  151. With In-Car AR, Drivers Get a New View of the Road Ahead
  152. Samsung’s Galaxy Z Flip phone Oscars advert had some weird small print
  153. Electric co-ops could be the key to solving the rural digital divide
  154. Amazon Flex drivers are using bots to cheat their way to getting more work
  155. How Companies Learn Your Secrets
  156. Apple Just Gave Millions Of Users A Reason Keep Their iPhones
  157. Paper Masks Are Fooling Facial Recognition Software
  158. Facial recognition introduced to US schools
  159. The decentralized ride-sharing disruptors taking on Uber - Decrypt
  160. He ordered coffee while wearing an AirPod. The barista refused to serve him | ZDNet
  161. Video leak appears to show Samsung's foldable Galaxy Z Flip in action
  162. Nearly 3 million subscribers ditched DirecTV last year. Will AT&T do the same?
  163. How Fast Is Wi-Fi 6?
  164. Sonos sorry for revealing customer email addresses
  165. How to Compare Third-party ITSM Solutions
  166. 5 Of The Most In-Demand Soft Skills Companies Are Looking For This Year
  167. Motorola on the Razr’s folding screen: ‘bumps and lumps are normal’
  168. Phone Running Slow? Use Android's Built-in RAM Manager to Free Up Memory
  169. New scary email scam goes after your banking info
  170. Linux could win over more PC gamers from Windows thanks to Wine 5.0
  171. New text message scam disguises itself as FedEx notification
  172. Apple drops Flash from its latest Safari browser preview
  173. 10 good habits of network administrators
  174. Microsoft’s software plan for the Duo Android phone is surprisingly realistic
  175. Students Are Swapping AirPods So That They Can Talk To Each Other In Class
  176. LastPass is in the midst of a major outage | ZDNet
  177. How to Upgrade From Windows 7 to Linux
  178. This unsettling practice turns your phone into a tracking device for the government
  179. Silicon Valley Abandons the Culture That Made It the Envy of the World
  180. NBCUniversal's streaming service will be called Peacock
  181. The EU wants to mandate USB-C ports on smartphones
  182. Google makes it easier to sign up for advanced hacking protection
  183. The making of Mojo, AR contact lenses that give your eyes superpowers
  184. 4 things laptop buyers waste money on
  185. T-Mobile launches first U.S. nationwide 5G network with low-band 600MHz
  186. Linux.com - News For Open Source Professionals
  187. Hotel front desks are now a hotbed for hackers | ZDNet
  188. Phishing emails are still managing to catch everyone out | ZDNet
  189. A decade of hacking: The most notable cyber-security events of the 2010s | ZDNet
  190. Electronic waste pileup sparks warnings
  191. Why Sharing Your Disney+ or Netflix Password Is a Bad Idea
  192. Don't Buy Anyone a Ring Camera
  193. Don't fall for these 4 sneaky Black Friday scams
  194. Alexa's Voice Can Now Express Excitement, Disappointment
  195. Firefox 72 to Block 'Fingerprinters' by Default
  196. This is Tim Berners-Lee's grand plan to save the web from digital dystopia | ZDNet
  197. 1.2 Billion Records Found Exposed Online in a Single Server
  198. Scammers try a new way to steal online shoppers’ payment-card data
  199. Officials warn about the dangers of using public USB charging stations | ZDNet
  200. The Morning After: iFixit looks inside the 16-inch MacBook Pro
  201. Google’s rollout of RCS chat for all Android users in the US begins today
  202. Turn Off Facebook's Camera Privileges on iOS Right Now
  203. Intel Fixes a Security Flaw it Said Was Repaired 6 Months Ago
  204. Google to offer checking accounts in partnership with banks starting next year – TechCrunch
  205. It’s time to unsubscribe from some streaming services
  206. Download Firefox 70 for Windows, macOS, Linux & Mobile
  207. How much does it cost to launch a cyberattack?
  208. Twitter spy scandal a wake-up call for companies to clean up their data access acts
  209. 5 steps to a successful red team engagement
  210. Best Buy Made These Smart Home Gadgets Dumb Again
  211. Twitter is working on a policy to flag deepfakes
  212. The evolution of Apple's iPhone
  213. 11 reasons I'm buying an Apple iPhone 11 Pro instead of a Samsung Galaxy Note 10 Plus | ZDNet
  214. iPhone 11, 11 Pro and 11 Pro Max specs vs. iPhone XR, XS and XS Max: What's new and different
  215. Apple will release iOS 13 and watchOS 6 on September 19, macOS Catalina in October
  216. Apple iPhone event 2019
  217. Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks
  218. European regulators to Microsoft: We’re watching you
  219. Apple, Foxconn Broke a Chinese Labor Law to Build Latest iPhones
  220. Samsung Just Announced Its Most Astonishing Product Yet, and It's a Great Example of How to Recover From Failure
  221. McDonald's Just Made a Truly Stunning Change to Its Menu. (There's Only 1 Little Problem)
  222. Unprecedented Cyberattack Hit the US Power Grid
  223. Lime brings electric scooter Group Ride option to US so you'll stop riding tandem - Electrek
  224. Google can’t fix the Android update problem
  225. How to Access Google's Secret Easter Eggs in Android 9 and Android 10
  226. 14 easy ways to cut back on data use in Android
  227. Millions of Android phones vulnerable to phishing attacks | SC Media
  228. Roku Debuts a Soundbar, and It Comes With a Roku Built In
  229. USB4 gets final approval, offers Ethernet-like speed
  230. Hackers Ask for $5.3 Million Ransom, Turn Down $400k, Get Nothing
  231. Here's every way Samsung fixed the Galaxy Fold
  232. Android 10 Arrives Today. Here are the 5 Best New Features
  233. A Mass Cyberattack on more that 100,000 iPhones Just Reported. Here's How To Protect Yourself.
  234. What You Need To Know About U.S. Election Security And Voting Machines
  235. 5G won't replace 4G: Debunking all the 5G myths
  236. Airlines Are Banning MacBooks in Checked Luggage Regardless of Recall Status
  237. Video, reports of machines automatically changing votes in Mississippi GOP Governor runoff
  238. WSJ News Exclusive | National-Security Concerns Threaten Undersea Data Link Backed by Google, Facebook
  239. Instagram phishing scam uses fake 2FA code to appear trustworthy
  240. Disney Plus: Disney's streaming service opens preorders at a big discount
  241. Downloads – Oracle VM VirtualBox
  242. How Amazon convinces police to sign up with Ring
  243. Rockville Center School District pays $88,000 ransom | SC Media
  244. YouTube adds labels to videos w/ public, government funding - 9to5Google
  245. Employees connect nuclear plant to the internet so they can mine cryptocurrency | ZDNet
  246. Amazon's Ring wants police to keep these surveillance details from you
  247. Anti-surveillance clothes foil cameras by making you look like a car
  248. Google Nest cameras won't let you turn off light that shows you're recording
  249. U.S. Carried Out Cyberattacks on Iran
  250. A Guide to Using Tor on Android: Apps, Privacy, and More | Drippler - Apps, Games, News, Updates & Accessories
  251. Exclusive: Google Is Banning A Play Store Developer With More Than Half A Billion App Installs
  252. I consistently recommend smartphones from a company that few in the US have ever heard of over Apple's iPhones or Samsung's Galaxy phones — this is why
  253. Ransomware ravages municipalities nationwide this week | SC Media
  254. 13 signs your software project may be doomed
  255. Galaxy Fold loss could help other foldable phones
  256. Essential traits of business-driven IT leaders
  257. Thousands of leaked Facebook documents show Mark Zuckerberg as ‘master of leverage’ in plan to trade user data
  258. Microsoft Email Hack Shows the Lurking Danger of Customer Support
  259. Hands-on with the Samsung Galaxy Fold: more than just a concept
  260. Apple’s latest iMacs are fast and familiar
  261. 15 Months of Fresh Hell Inside Facebook
  262. Amazon’s Alexa isn’t just AI — thousands of humans are listening
  263. How AI Data Actually Moves from Collection to Algorithm
  264. Your next car may not allow you to speed on the highway
  265. 'Exodus' Spyware Posed as a Legit iOS App
  266. Facebook is still tracking you after you deactivate your account
  267. Larry Sanger wants Everipedia to be a post-truth Wikipedia
  268. Massive bank app security holes: You might want to go back to that money under the mattress tactic
  269. 74 Facebook groups for cybercriminals found | SC Media
  270. Airbnb Guests Find Hidden Camera Live-Streaming Their Stay
  271. Verizon flips on 5G for phones in parts of Chicago and Minneapolis
  272. Elizabeth Warren introduces bill that could hold tech execs responsible for data breaches
  273. These Chinese hackers tricked Tesla's Autopilot into suddenly switching lanes
  274. Google begins shutting down its failed Google+ social network
  275. Why did Apple kill its AirPower wireless charger?
  276. WhatsApp launches fact-check service to fight fake news during...
  277. This free team collaboration app is changing how teams work together
  278. Georgia Tech stung with 1.3 million-person data breach | SC Media
  279. New Intel Chip Bug Can Expose All Data on a Computer to Hackers
  280. Facebook Had an Incredibly Busy Weekend
  281. Android security report confirms the two best ways to stay safe
  282. usaa-pilots-iot-technology-to-detect-need-forhome.html
  283. HTTPS Isn't Always As Secure As It Seems
  284. Apple News
  285. Apple Launches TV App, Credit Card, Subscription Services
  286. 6 secrets to CISO job longevity
  287. How Cloud Environments Will Evolve During Next Few Years
  288. Safety-Obsessed Volvo Goes After Distracted, Speedy Drivers
  289. Just Wait Until Cars and Cities Start Talking Amongst Themselves
  290. Facebook’s blockchain cryptocurrency could mean big money – and kill 'fake news'
  291. The death of the VPN - It’s time to say goodbye | SC Media
  292. New York Times CEO warns publishers ahead of Apple news launch
  293. UPS plans to deliver vaccine-toting nurses to your doorstep
  294. You Need to Protect Your Website Against Formjacking Right Now
  295. Don't Kill Rogue Cloud Accounts, Embrace Them
  296. CTO view: the convergence of information and operation technology
  297. Report: Downed 737s Lacked Two Safety Features Because Boeing Charged Extra for Them
  298. Facebook’s leaked moderation rules show why Big Tech can’t police hate speech
  299. Google’s upcoming Pixel 4 and Pixel 4 XL look stunning in these new renders
  300. Microsoft announces Xbox Live for any iOS or Android game
  301. This Big Facebook Critic Fears Tech’s Business Model
  302. The Huawei Case Is Part of a New US–China Cold War Over Tech
  303. Please, for the Love of God, Make Sure You Delete Things Properly
  304. Samsung Could Kill the TV Power Cable Forever
  305. Samsung Working on Two More Foldable Smartphones
  306. Alphabet’s Chronicle finally reveals its cybersecurity moonshot
  307. CMS hackers focus on WordPress | SC Media
  308. IRS warns of new tax-related phishing scams | SC Media
  309. What is Mimikatz? And how this password-stealing tool works
  310. Google Glass’ second-gen enterprise model leaks with updated specs and USB-C
  311. Windows by the numbers: Windows 7 is one obstinate OS
  312. Hack Brief: Google Reveals 'BuggyCow,' a Rare MacOS Zero-Day Vulnerability
  313. 9 biggest hurdles to AI adoption
  314. In the Rush to Join the Smart Home Crowd, Buyers Should Beware
  315. Analysis | The Technology 202: Policymakers sound alarms as Facebook quietly collects sensitive data from apps
  316. A very merry Christmas at Best Buy with sales booming | Fox News
  317. The best new smartphones and gadgets from Mobile World Congress 2019
  318. New FTC task force will take on tech monopolies
  319. The 8 toughest decisions IT leaders face
  320. Facebook working on a new class of semiconductor, AI researcher suggests
  321. Apple and Goldman Sachs are reportedly teaming up to offer a joint credit card
  322. Containers: The pros and cons you may not know about
  323. Smartphone makers are pricing themselves out of the market
  324. HTC Goes All In on Easy-to-Use VR, But Not For Everyone
  325. You Give Apps Sensitive Personal Information. Then They Tell Facebook.
  326. Apple Plans on Combining iPhone, iPad, Mac Apps by 2021
  327. Cogitai Unwraps ‘Self-Learning’ AI Platform for Business
  328. Twitter names first international markets to get checks on political advertisers
  329. Google presents its anti-fake news system in detail
  330. Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes
  331. Six Advantages of Human-aided, 'Artificial' Artificial Intelligence
  332. Microsoft: Russian hackers are trying to influence EU elections
  333. Farmworkers vs robots: Will tomorrow fruit pickers be made of steel and tech?
  334. This Company Takes the Grunt Work Out of Using the Cloud
  335. Serverless: The future of cloud computing?
  336. Facebook Could Pay Multi-Billion Dollar Fine in FTC Settlement
  337. Amazon Bought A Router Company You've Never Heard Of. Here Is Why It's A Huge Deal.
  338. 7 ways to ensure IT gets the credit it deserves
  339. Five ways professionals will experience 5G, and when | ZDNet
  340. Microsoft lampoons Office 2019 in PR pitch for Office 365
  341. 6 secrets of customer-facing CIOs
  342. Full-stack developer: What it is, and how you can become one
  343. Apple's Chinese competitors figured out how to make better Apple products than Apple
  344. This is the best-looking smartphone we've ever seen, even better than the iPhone — take a look
  345. It’s the Real World—With Google Maps Layered on Top
  346. Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess
  347. Amazon Joins Microsoft's Call for Rules on Facial Recognition
  348. How to pick the perfect backpack for your laptop
  349. Someone at Samsung thinks a stylus with a camera is a good idea
  350. This is how Disney is going to compete against Netflix
  351. Remote Desktop Protocol flaws could be exploited to attack RDP clients
  352. Why People Still Don’t Buy Groceries Online
  353. Walmart Grocery
  354. Why It May Be Time to Break Up Facebook
  355. Why Amazon's AWS Cloud Business Will Continue to Grow
  356. Samsung's Galaxy S10 phones will support next-generation WiFi
  357. Ikea's Slow and Steady Plan to Save the Smart Home
  358. Streaming Services Are Beginning To Look Like Cable Companies
  359. The real lesson of Facebook's Apple dust-up shows why Zuckerberg's 'hacker way' is even more dangerous than we thought
  360. Apple Planning Netflix for iOS Games (Report)
  361. How to run Windows 10 on an iPad Pro or on Android
  362. Red Hat Advances Container Technology With Podman 1.0
  363. Apple's services help anchor a company rocked by slow iPhone sales
  364. The world’s most valuable resource is no longer oil, but data
  365. Facebook got caught paying people $20 a month to let them spy on their phones
  366. Data Privacy Improves Business Outcomes, Cisco Finds
  367. How SD-WAN can improve your security strategy
  368. Mark Zuckerberg’s WSJ op-ed was a message to would-be regulators: Hands off our ad business
  369. Checking In? No Thanks. I’m Just Here to Use the Wi-Fi.
  370. Is Big Tech Merging With Big Brother? Kinda Looks Like It
  371. Amazon Go, One Year Old, Has Attracted a Host of Cashierless Imitators
  372. Hulu is cutting the price of its most popular streaming service — and raising the price of its most expensive one
  373. The Waze features you’ve always wanted in Google Maps are finally coming to Android and iPhone
  374. France fines Google nearly $57 million for first major violation of new European privacy regime
  375. Why Did NASA, Lockheed Martin, and Others Spend Millions on This Quantum Computer?
  376. Thanks, Netflix (and Google): You've Just Confirmed Everyone's Worst Fear About the Cloud
  377. Commentary: These Are the Challenges Tech Giants Will Face in 2019
  378. Amazon Ruined Online Shopping
  379. Fool me once...
  380. Predictions 2019: What's in Store for Enterprise Information Practices
  381. Why the Netflix Price Hike Makes Sense
  382. A Sleeping Tesla Driver Highlights Autopilot's Biggest Flaw
  383. Quora breach leaks data on over 100 million users
  384. Robot Janitors Are Coming to Mop Floors at a Walmart Near You
  385. Marriott reveals data breach affecting 500 million hotel guests | ZDNet
  386. Half of all Phishing Sites Now Have the Padlock — Krebs on Security
  387. Marc Zuckerberg, Elon Musk and bitcoin top this year's list of Tech Turkeys
  388. Censored Planet
  389. Russian hackers are trying out this new malware against US and European targets | ZDNet
  390. Retail IoT is still coming into its own in 2019
  391. Amazon’s HQ2 stunt could come back to haunt it
  392. Microsoft launches blockchain development kit
  393. The rare form of machine learning that can spot hackers who have already broken in
  394. How The Wall Street Journal is preparing its journalists to detect deepfakes
  395. Best Antivirus Software and Apps 2018

Security

  1. Privacy Reset: A guide to every setting you should change now
  2. How to delete your password for Microsoft online services like Outlook.com and Xbox Live
  3. Quantum computers could read all your encrypted data. This 'quantum-safe' VPN aims to stop that | ZDNet
  4. Trust, but verify: An in-depth analysis of ExpressVPN's terrible, horrible, no good, very bad week | ZDNet
  5. Microsoft is letting users say goodbye to passwords
  6. Crypto-gram: September 15, 2021 - Schneier on Security
  7. The Problem With ‘Complex’ Passwords
  8. After the T-Mobile breach, companies are preventing customers from securing their accounts
  9. Why You Should Delete Google Photos On Your iPhone, iPad And Mac
  10. Bosses turn to ‘tattleware’ to keep tabs on employees working from home
  11. Have a Gmail or Hotmail account? Microsoft says to keep your eyes out for this scam
  12. Apple will let you upload your driver's license to Apple Wallet
  13. Your browser privacy stinks. Change these settings in Chrome, Firefox, Brave and more
  14. This phishing attack is using a sneaky trick to steal your passwords, warns Microsoft | ZDNet
  15. T-Mobile's August breach: 4 ways to secure your data after a cyberattack
  16. 6 Things You Need to Do to Prevent Getting Hacked
  17. 6 Must-Have Open-Source Tools to Secure Your Linux Server
  18. Security researcher recommends against LastPass after detailing 7 trackers
  19. Amazon Alexa records you every time you ask it something — here's how to delete those recordings
  20. How to Avoid Phishing Emails and Scams
  21. Thought-detection: AI has infiltrated our last bastion of privacy
  22. A Case Against the Peeping Tom Theory of Privacy
  23. Your Phone Is Listening—Literally Listening—to Your TV
  24. The best security system of 2021
  25. Should You Pay for a Password Manager?
  26. 7 key questions facing the future of work
  27. 6 top security technologies to protect remote workers
  28. Chrome and Edge Want to Help Solve Your Password Problems
  29. Here’s your checklist for maximum smartphone security
  30. Amazon Hit With Class-Action, EBooks Price-Fixing Lawsuit
  31. Crypto-gram: January 15, 2021 - Schneier on Security
  32. Microsoft urges users to stop using phone-based multi-factor authentication | ZDNet
  33. The Best Security Suites for 2020
  34. 21 best free security tools
  35. Yes, You Should Be Using Apple Pay or Google Pay
  36. How to Clean Up Your Digital History
  37. Police are using facial recognition tech to fight petty crimes like shoplifting. Critics say the cost to civil liberties is too high
  38. The 6 best password managers
  39. PSA: Watch Out For This New Amazon Email Phishing Scam
  40. Russian hackers infiltrated state and local government networks, officials say
  41. NSA publishes list of top vulnerabilities currently targeted by Chinese hackers | ZDNet
  42. Seven mobile browsers vulnerable to address bar spoofing attacks | ZDNet
  43. What is a DDoS attack? Everything you need to know about Distributed Denial-of-Service attacks and how to protect against them | ZDNet
  44. Ransomware: Gangs are shifting targets and upping their ransom demands | ZDNet
  45. Amazon introduces ability to pay with your hands
  46. Best password manager | CNN Underscored
  47. The iOS 14 Privacy and Security Features You Should Know
  48. The Best VPN Services for 2020
  49. Is now the time to deploy passwordless options?
  50. 3 Amazon Echo security features to turn on when you leave the house
  51. How to Protect the Data on Your Laptop
  52. Enough with the Linux security FUD | ZDNet
  53. Kindle Collects a Surprisingly Large Amount of Data
  54. Top exploits used by ransomware gangs are VPN bugs, but RDP still reigns supreme | ZDNet
  55. Google to trial drastically truncated URLs in Chrome in anti-phishing move
  56. 10 cybersecurity myths you need to stop believing
  57. How to protect against 'Apple' phishing scams
  58. For Security Professionals, The Enemy Is No Longer At The Gate
  59. Zoom security: Your meetings will be safe and secure if you do these 10 things | ZDNet
  60. 1Password vs LastPass: What’s the best password manager?
  61. Apple and Google have a clever way of encouraging people to install contact-tracing apps for COVID-19
  62. 10 Billion Wrecked Accounts Show Why You Need 'Have I Been Pwned'
  63. Apple, Google to Turn Smartphones Into Coronavirus Tracking Devices
  64. Google Just Gave Millions Of Users A Reason To Keep Chrome
  65. How to Cover Your Tracks Every Time You Go Online
  66. VPN app threatens 100 million: Delete it right now
  67. Apple, Google team up to develop COVID-19 contact tracing technology | ZDNet
  68. Attackers can bypass fingerprint authentication with an ~80% success rate
  69. These hackers have been quietly targeting Linux servers for years | ZDNet
  70. Two-factor authentication is broken: What comes next?
  71. Cloudflare is over the moon because its pro-privacy 1.1.1.1 DNS service got a clean bill of health from everyone's favorite auditor – KPMG
  72. Safari Is Now the Best Browser for Blocking Third-Party Tracking
  73. The Best and Worst Browsers for Privacy, Ranked
  74. Social Security Issues Warning On New Texting Scam
  75. Hackers are using coronavirus maps to infect your computer
  76. U.S. government commission rolls out doomsday plan for cyberwar
  77. Two-factor authentication? Not as secure as you'd expect when logging into email or your bank
  78. Google tracked his bike ride past a burglarized home. That made him a suspect.
  79. A free, new tool can keep companies from tracking you online
  80. The Best VPNs to Protect Yourself Online
  81. These are the first passwords hackers will try when attacking your device | ZDNet
  82. Clean Master stole browsing data from over a billion Android devices
  83. Four steps you should take to secure your Gmail account right now
  84. 'Malware-free' attacks now most popular tactic amongst cybercriminals | ZDNet
  85. Do these three things to protect your web security camera from hackers | ZDNet
  86. "OK Google": How a hacker can surf into your phone silently
  87. WireGuard Gives Linux a Faster, More Secure VPN
  88. ‘Smishing’ is the latest Social Security scam making the rounds | Considerable
  89. Schools are using phones, wristbands to monitor students, regardless of effectiveness
  90. The police want your phone data. Here’s what they can get — and what they can’t.
  91. The FBI Wants You To Stop Using Passwords And Do This Instead
  92. Voting App Flaws Could Have Let Hackers Manipulate Results
  93. Don't Click on Links in Texts From 'Your Bank'
  94. Ring cameras are more secure now, but your neighbors still snoop with them
  95. Common Encryption Types, Protocols and Algorithms Explained
  96. Perspective | Don’t sell my data! Now there’s a law for that — if you jump through these hoops
  97. VPNs will change forever with the arrival of WireGuard into Linux | ZDNet
  98. Watch Out for Coronavirus Phishing Scams
  99. Zuckerberg says Facebook's new approach 'is going to piss off a lot of people'
  100. FBI warns of new online threat to personal, credit card information
  101. Phishing scams leveled up, and we didn’t
  102. Jeff Bezos’s iPhone had Apple’s state-of-the-art security, and that may have helped its alleged hackers
  103. How to delete what Facebook knows about your life outside of Facebook
  104. How encryption could stop personal data exposures on the cloud
  105. Perspective | Facebook will now show you exactly how it stalks you — even when you’re not using Facebook
  106. Apple reportedly ditched plan for encrypted iCloud backup after FBI pressure
  107. Google CEO Sundar Pichai: We must be 'clear-eyed' about how AI could go wrong
  108. Google Kills the Cookie, Leaving Digital Media Companies Craving a New Way Forward
  109. The Secretive Company That Might End Privacy as We Know It
  110. Beware of this sneaky phishing technique now being used in more attacks | ZDNet
  111. Crypto-Gram: January 15, 2020 - Schneier on Security
  112. The Best VPN Services and Apps of 2019
  113. I Ditched Google for DuckDuckGo. Here's Why You Should Too
  114. EU investigates Google data collection practices
  115. Private Internet Access VPN to be acquired by malware company founded by former Israeli spy
  116. The 25 Most Dangerous Software Vulnerabilities
  117. What is Google going to do with your Fitbit data? Anything it likes
  118. The Top Cybersecurity Threats of 2020
  119. Data breach compromises T-Mobile prepaid accounts
  120. Secure, Fast & Private Web Browser with Adblocker | Brave Browser
  121. Iowa paid a security firm to break into a courthouse, then arrested employees when they succeeded
  122. My Apple Card Got Stolen: Here’s What Happened
  123. How to Save Your Data When You Quit Your Job
  124. Learn About Cybersecurity with These 11 Essential Videos
  125. WSJ News Exclusive | Google’s Secret ‘Project Nightingale’ Gathers Personal Health Data on Millions of Americans
  126. 5 keys to protect your supply chain from cyberattacks
  127. NCR blocked Mint, Quickbooks after attackers take over, drain accounts | SC Media
  128. IBM: Face Recognition Tech Should be Regulated, Not Banned | SecurityWeek.Com
  129. Alexa, Siri, Google Assistant smart speakers – they're all open to remote laser attacks | ZDNet
  130. Greed is good... for this phishing scam | SC Media
  131. Russia Tests New Disinformation Tactics in Africa to Expand Influence
  132. Perspective | What is fingerprinting? The online tracking you can’t avoid.
  133. Facebook sues surveillance tool provider and hosts of hacking websites
  134. Data breach causes 10 percent of small businesses to shutter | SC Media
  135. Cyber awareness starts with vulnerability awareness | SC Media
  136. Stop ignoring printer security: It's time for CSOs to take control
  137. What Is Tor and How Does Onion Routing Protect Privacy?
  138. Amazon Just Announced an Incredible New Feature That Most People Are Going to Love. There's Only 1 (Pretty Big) Problem
  139. UN, NGOs targeted by ongoing phishing attack | SC Media
  140. Cyber defense is a team sport -- Train accordingly | SC Media
  141. 5 reasons users hate cybersecurity awareness training, and how to make them love it
  142. A scam targeting Americans over the phone has resulted in millions of dollars lost to hackers. Don't be the next victim.
  143. Why Keybase Doesn't Offer Two Factor Authentication
  144. U.S. Government, Military Personnel Data Leaked By Autoclerk
  145. Adobe exposed nearly 7.5 million Creative Cloud accounts to the public
  146. How 18 Malware Apps Snuck Into Apple's App Store
  147. Why Keybase Doesn't Offer Two Factor Authentication
  148. Phishing alert: This fake email about a bank payment delivers trojan malware | ZDNet
  149. Tips for those of all ages interested in pursuing a career in cybersecurity | SC Media
  150. IT pros go back to school to advance their careers
  151. Top cloud security controls you should be using
  152. Equifax allegedly used insecure password "admin" to protect portal
  153. It's Time to Outsource Your Passwords to an App
  154. Alexa and Google Home devices leveraged to phish and eavesdrop on users, again | ZDNet
  155. 10 risk factors no one talks about
  156. The Creators Of Pokémon Go Mapped The World. Now They're Mapping You
  157. WAV audio files are now being used to hide malicious code | ZDNet
  158. What is the Tor Browser? How it protects your identity online
  159. Teens find circumventing Apple’s parental controls is child’s play
  160. Deepfakes and their potential impact on society | SC Media
  161. A Controversial Plan to Encrypt More of the Internet
  162. Turn Bluetooth Off When You're Not Using It
  163. 11 top cloud security threats
  164. Permanent Record (autobiography) - Wikipedia
  165. How to Prevent Apple Employees From Listening to Your Siri Commands
  166. No One Knows About Two-Factor Authentication, and It's Putting Their Security at Risk
  167. Never Trust a Platform to Put Privacy Ahead of Profit
  168. 7 ways 5G mobile networks will change IoT security, and how to prepare
  169. Justice Department takes another run at encryption backdoors with ‘lawful access’
  170. Decryptors developed for new Muhstik and HildaCrypt ransomwares
  171. Tomorrow's attacks today: How to defend against next-generation cyberattacks | SC Media
  172. Kernel privilege escalation bug actively exploited in Android devices
  173. 5 OT security takeaways CISOs need to communicate to stakeholders
  174. The courts have ruled: Mobile sites must be accessible. But why did enterprises ever resist?
  175. VPNs won't solve these 3 problems for you
  176. How to Avoid Airbnb Scams
  177. FBI’s Use of Foreign-Surveillance Tool Violated Americans’ Privacy Rights, Court Found
  178. FBI warns about attacks that bypass multi-factor authentication (MFA) | ZDNet
  179. Russian hackers modify Chrome and Firefox to track secure web traffic
  180. Google launches leaked-password checker, will bake it into Chrome in December
  181. Rethinking Cyberisks amid a rapidly evolving threat environment | SC Media
  182. How Can I Find Out If Someone’s Stealing My Wifi?
  183. Technology and social change: How government CIOs can improve outcomes for citizens and society | ZDNet
  184. The four big US carriers want to help you get rid of passwords, but you’ll have to wait
  185. Google launches Password Checkup security tool | SC Media
  186. Linux to get kernel 'lockdown' feature | ZDNet
  187. Malware that can't be detected by Windows Defender is spreading by the thousands - MSPoweruser
  188. New SIM Card Attacks: Both Android And iOS Impacted—Are You Vulnerable?
  189. Amazon may soon be able to track your phone’s location even if you don’t use any of its products or services
  190. Apple Issues New Warning For Millions Of iPhone Users
  191. You Need a Password Manager. Here Are the Best Ones
  192. Unfixable Exploit Is the Latest Apple Security Upheaval
  193. Google Draws House Antitrust Scrutiny of Internet Protocol
  194. To use Alexa, you have to trust Amazon
  195. What a security career will look like in five years
  196. 'Right to be forgotten' by Google doesn't apply worldwide, Europe's top court rules
  197. The top 5 email encryption tools: More capable, better integrated
  198. 10 signs you're being socially engineered
  199. My Surprising Career as an Amazon.com "Fake" Reviewer | Anonymous
  200. Millions of medical records exposed online | SC Media
  201. In cybersecurity speed kills, but faster saves | SC Media
  202. Gamification: A winning strategy for cybersecurity training | SC Media
  203. Ransomware: 11 steps you should take to protect against disaster | ZDNet
  204. The ransomware crisis is going to get a lot worse | ZDNet
  205. The Air Force Will Let Hackers Try to Hijack an Orbiting Satellite
  206. 'Simjacker' Attack Can Track Phones Just by Sending a Text
  207. LastPass bug leaks credentials from previous site | ZDNet
  208. Sidewalk Labs' controversial data collection project is now a company
  209. Google collects face data now. Here's what it means and how to opt out
  210. Crypto-Gram: September 15, 2019 - Schneier on Security
  211. 2fa explained: How to enable it and how it works
  212. Wave goodbye to passwords: Soon you could unlock your PC just by holding up your hand | ZDNet
  213. US Govt. plant USB sticks in security study, 60% of subjects take the bait
  214. Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users
  215. How to Delete Online Accounts You No Longer Need
  216. Wipe Data From Your Car Before Selling It
  217. The zero trust model explained | SC Media
  218. Facebook will no longer scan user faces by default
  219. Forget email: Scammers use CEO voice 'deepfakes' to con workers into wiring cash | ZDNet
  220. Cyberwar: The Complete Guide
  221. Face It -- Biometrics To Be Big In Cybersecurity
  222. The World's First Cyber Crime: The Morris Worm [KERNEL PANIC]
  223. The Myth of Consumer-Grade Security - Schneier on Security
  224. More than 400 police forces working with Ring to view doorbell cam footage
  225. Capital One hack shows difficulty of defending against irrational cybercriminals
  226. Microsoft: Using multi-factor authentication blocks 99.9% of account hacks | ZDNet
  227. Examining and addressing threat detection and response challenges
  228. The bogus-check scam is back, in the form of a car-wrap offer
  229. The most stressful aspects of being a cybersecurity professional
  230. 10 Best Password Manager Apps (2019 Updated) | Drippler - Apps, Games, News, Updates & Accessories
  231. The growing backlash against facial recognition tech
  232. Hackers Found a Freaky New Way to Kill Your Car
  233. Check your access control permissions before hackers do
  234. DNS hijacking campaign targets national security organizations
  235. Microsoft Office now the most targeted platform, as browser security improves
  236. Opinion | We Built an ‘Unbelievable’ (but Legal) Facial Recognition Machine
  237. Wipro clients hit after firm falls for phishing attack | SC Media
  238. Data on Thousands of Law Enforcement Personnel Exposed in Breach
  239. Is Using Public WiFi Still a Bad Idea?
  240. Tracking Phones, Google Is a Dragnet for the Police
  241. Future-proof cybersecurity: Addressing implementation challenges in quantum cryptography | SC Media
  242. Crypto-Gram: April 15, 2019 - Schneier on Security
  243. Use Your Android Phone as a Security Key for Signing into Websites
  244. Inside an Epic Hotel Room Hacking Spree
  245. Incognito mode won’t keep your browsing private. Do this instead
  246. Google Offers Built-In Security Key Feature for Android Phones
  247. Three lessons from the top cybersecurity threats of 2018 | SC Media
  248. How to Fight the Threat of USB Thumb Drives
  249. Call to delay use of Police Scotland data devices
  250. Facial recognition can speed you through airport security, but there's a cost
  251. How the EverCrypt Library Creates Hacker-Proof Cryptography | Quanta Magazine
  252. Facial recognition raises real ethical questions
  253. What Sony's robot dog teaches us about biometric data privacy
  254. Insurance Companies collaborate to offer Cybersecurity ratings | SC Media
  255. How to Protect Your Enterprise PCs Against Fake Updates
  256. Why 2019 will prove biometrics aren’t a security “silver bullet” | SC Media
  257. Crypto-Gram: March 15, 2019 - Schneier on Security
  258. Amex, Netflix customers targeted in phishing campaign | SC Media
  259. Here's how to view, download, and delete your personal information online
  260. Facebook Stored Millions of Passwords in Plaintext—Change Yours Now
  261. Facial recognition: Apple, Amazon, Google and the race for your face
  262. Locking More Than the Doors as Cars Become Computers on Wheels
  263. US Government Forging Ahead With Airport Facial Recognition Plans | Transportation | TechNewsWorld
  264. The Five Most Dangerous New Attack Techniques
  265. Will PSD2 Finally Kill The Password? | SC Media
  266. These are the 12 most common phishing email subject lines cyber criminals use to fool you | ZDNet
  267. 3 ways to monitor encrypted network traffic for malicious activity
  268. Phishing attacks: Half of organisations have fallen victim in last two years | ZDNet
  269. The NSA Makes Its Powerful Cybersecurity Tool Open Source
  270. Are employees the weakest (cybersecurity) link? Sometimes | SC Media
  271. Linux servers targeted by new Chinese crypto-mining group | ZDNet
  272. Fool ML once, shame on you. Fool ML twice, shame on... the AI dev? If you can hoodwink one model, you may be able to trick many more
  273. Microsoft wants to use blockchain to secure your identity
  274. Hackers Can Slip Invisible Malware into Some Cloud Computers
  275. NATO Group Catfished Soldiers to Prove a Point About Privacy
  276. Password manager flaws can expose data on compromised devices, report says | SC Media
  277. Using the zero trust model to prevent phishing | SC Media
  278. Explainer: What is quantum communication?
  279. The Wired Guide to Your Personal Data (and Who Is Using It)
  280. What is a man-in-the-middle attack? How MitM attacks work and how to prevent them
  281. What is phishing? How this cyber attack works and how to prevent it
  282. Scammer groups are exploiting Gmail 'dot accounts' for online fraud | ZDNet
  283. Major DNA testing company is sharing genetic data with the FBI
  284. Your digital identity has three layers, and you can only protect one of them
  285. Why Data Privacy Is About More Than Just Security
  286. Phishing attacks posing as missed voicemails nab credentials | SC Media
  287. What is a supply chain attack? Why you should be wary of third-party providers
  288. How WhatsApp Merger With Facebook Messenger Puts Your Privacy At Risk
  289. 12 Simple Things You Can Do to Be More Secure Online
  290. How Enterprises Need to Handle Today’s Threat Landscape
  291. Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security
  292. What is spear phishing? Why targeted email attacks are so difficult to stop
  293. Why Enterprises Need to Crack Down on Lazy Logins
  294. Why Marriott Breach Includes Some Valuable IT Lessons
  295. Data breaches can sucker-punch you. Prepare to fight back
  296. Marriott breach exposes more than just customer info | SC Media
  297. Hackers target Dell customer information
  298. Lawmakers call for data security legislation in wake of Marriott breach
  299. Cybercrime and cyberwar: A spotter's guide to the groups that are out to get you | ZDNet
  300. Cyberwar predictions for 2019: The stakes have been raised | ZDNet
  301. Survey shows IT professionals concerned about cyberwarfare, end users, and conducting international business | ZDNet
  302. Little FYI: Wi-Fi calling services on AT&T, T-Mobile US, Verizon are insecure, say boffins
  303. Mobile Phone Security: All You Need to Know | Cybersecurity | TechNewsWorld
  304. Be Warned: Customer Service Agents Can See What You're Typing in Real Time
  305. New cryptominer seeks out root permissions on Linux machines | SC Media
  306. The FBI Created a Fake FedEx Website to Unmask a Cybercriminal
  307. USPS fixes 'Informed Delivery' flaw that exposed 60M users | SC Media
  308. Career advice: Good enough security trumps best security
  309. Surveillance Kills Freedom By Killing Experimentation
  310. IRS Issues Urgent Warning On Tax Transcript Scam
  311. What network pros need to know about IoT
  312. Utilizing the Human Element to Mitigate Today’s Sophisticated Cyber Threat Landscape
  313. Crypto-Gram: November 15, 2018 - Schneier on Security
  314. With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes
  315. Apache Struts vulnerability would allow system take over | SC Media
  316. Worst malware and threat actors of 2018 so far
  317. National biometric database could be on the way (and in private hands) | ZDNet
  318. Hackers are increasingly destroying logs to hide attacks | ZDNet
  319. Mobile device security: A guide for business leaders - Tech Pro Research
  320. How to keep your data secure and private, step by step
  321. ​ The day computer security turned real: The Morris Worm turns 30 | ZDNet
  322. Cyber threats fueled by AI: Security's next big challenge
  323. DDoS and ransomware tools for starter and experienced cybercriminals exposed | SC Media
  324. Thieves steal a Tesla Model S by hacking the entry fob
  325. Free decryption tool released for multiple GandCrab ransomware versions | ZDNet
  326. Most consumers have cyber security concerns, but a fraction take action | ZDNet
  327. Create an Alias For Your iCloud Address to Maintain Your Online Privacy
  328. Tim Cooks warns of ‘data-industrial complex’ in call for comprehensive US privacy laws
  329. Latest Firefox takes aim at tracking cookies and promotes the use of VPN
  330. Every minute for three months, GM secretly gathered data on 90,000 drivers' radio-listening habits and locations
  331. U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections
  332. Six tips to stop phishing attacks | SC Media
  333. Securing Middle America: small towns more at risk of ransomware, phishing and more | SC Media
  334. 3 top multi-cloud security challenges, and how to build a strategy
  335. Facebook reportedly aims to buy a 'major' cybersecurity company
  336. 5 reasons eSignatures are the must-have tool you don't think about
  337. How to Stay Anonymous Online | Digital Trends
  338. 17 penetration testing tools the pros use
  339. Securing risky network ports
  340. Why CISOs Fumble With Understanding Security Needs
  341. Why Supply Chain Security a Serious Enterprise Problem
  342. Expanding attack surfaces and difficulties obtaining the right people worry NCSA panelists | SC Media
  343. Despite proposed solutions, DNS security issues remain in tech industry
  344. Crypto-Gram: October 15, 2018 - Schneier on Security
  345. 'Flash update' scam serves up legit software, but with a side of cryptominer | SC Media | SC Media
  346. Ransomware hits Madison County Idaho government | SC Media | SC Media
  347. It Only Took 9 Seconds to Guess a DOD Weapons System Password
  348. What is IAM? Identity and access management explained
  349. Apple, Amazon deny servers affected by China microchip plot | SC Media
  350. Five Trends in Attacks on Industrial Control Systems
  351. Apple, Amazon deny report that Chinese spy chips infiltrated their hardware
  352. China Used a Tiny Chip in a Hack That Infiltrated Amazon and Apple
  353. Digital IDs Are More Dangerous Than You Think
  354. Security News This Week: The Feds Can't Force Facebook to Wiretap Messenger
  355. Quantum computers could break encryption, so it’s going quantum too
  356. Everything We Know About Facebook's Massive Security Breach
  357. 5 biggest cybersecurity challenges at smaller organizations
  358. Trump's Immigration Cops Just Gave America's Hottest iPhone Hackers Their Biggest Payday Yet
  359. Four Security Questions Healthcare Organizations Must Address When Moving to the Cloud | SC Media
  360. Mobile Carriers Join Together for Project Verify Authentication Effort
  361. Five security settings in iOS 12 you should change right now
  362. What is Zero Trust? A model for more effective security
  363. Crypto-Gram: September 15, 2018 - Schneier on Security
  364. You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it
  365. A Decade-Old Attack Can Break the Encryption of Most PCs
  366. For safety’s sake, we must slow innovation in internet-connected things
  367. 6 ways companies fail at security fundamentals
  368. How to Send a Secret Image in Plain Sight
  369. Facebook launches Clear History feature that should have been there all along | ZDNet
  370. Mark Zuckerberg Says It Will Take 3 Years to Fix Facebook
  371. Everything Facebook Announced Today at F8
  372. Cyber security: Don't leave it to your tech team or you'll get breached, warns data protection chief | ZDNet
  373. Private web browsing doesn’t mean no one is watching
  374. Worse Than Y2K: Quantum Computing And The End Of Privacy
  375. Nine Best Practices for Keeping Bad Actors Out of a Database
  376. Crypto-Gram: April 15, 2018 - Schneier on Security
  377. The One Router Setting Everyone Should Change (But No One Does)
  378. How quantum computing could wreak havoc on cryptocurrency
  379. DNS Security with DNSCrypt | OpenDNS
  380. Amazon Advances Cloud Security, Storage Tools at AWS Summit
  381. How to Create Secure Passwords That Aren't Impossible to Type
  382. How to use Cloudflare's DNS service to speed up and secure your internet | ZDNet
  383. 10 Ways to tell if that email is legitimate...or not
  384. Are you ready? This is all the data Facebook and Google have on you | Dylan Curran
  385. StumbleUpon
  386. GitHub Survived the Biggest DDoS Attack Ever Recorded
  387. FBI's Use of Paid Best Buy Informants Goes Deeper Than We Knew
  388. IT pros don't learn from cyberattacks, study
  389. Apple App Store Scam Stealing Credit Cards: What to Do
  390. FTC warning users to do homework before using VPN apps
  391. DoubleDoor Botnet Chains Exploits to Bypass Firewalls
  392. Study shows which phishing attacks most successful
  393. Microsoft is trying to kill passwords. It can't happen soon enough
  394. Add a PIN to Your Smartphone Account
  395. Why Linux is better than Windows or macOS for security
  396. Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders
  397. Many businesses still using outdated security, says Troy Hunt
  398. Your Sloppy Bitcoin Drug Deals Will Haunt You for Years
  399. What Is Bitcoin, and How Does it Work?
  400. How does Bitcoin work? - Bitcoin
  401. New to Bitcoin?
  402. Best Password Managers 2018
  403. The Best VPN Services and Apps of 2018
  404. To Improve Cybersecurity, Start with Improving Human Behavior
  405. Watch a 10-Year-Old's Face Unlock His Mom's iPhone X
  406. Cybersecurity is dead – long live cyber awareness
  407. Google: Our hunt for hackers reveals phishing is far deadlier than data breaches | ZDNet
  408. Update Your Tor Browser to Prevent It From Leaking Your Real IP Address
  409. Know the risks of Amazon Alexa and Google Home
  410. 7 steps for crafting the perfect password
  411. T-Mobile Alerted ‘A Few Hundred Customers’ Targeted By Hackers
  412. Phishing Attacks: Which Departments Are Most at Risk?
  413. KRACK Attack Hacks All Wi-Fi Networks: What to Do
  414. How to Secure Your (Easily Hackable) Smart Home
  415. Security experts air concerns over hackers using AI and machine learning for phishing attacks
  416. Intelligence Experts Say Cyber-Thieves, Nation-State Hackers Teaming Up
  417. Cleartext passwords, and worse found among top 21 financial trading apps
  418. Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too
  419. Quantum Computing Poses Risks to Cryptography and Bitcoin

  420. DDoS protection, mitigation and defense: 7 essential tips
  421. Must-have Wi-Fi troubleshooting and management tools
  422. BlueBorne Bluetooth Flaws Put Billions of Devices at Risk
  423. Discovery Channel - The Secret History Of Hacking
  424. What’s the Difference Between a Fraud Alert, Security Freeze and Credit Lock?
  425. New Social Security Scam Targets Benefit Check Recipients
  426. Equifax breach: How to protect yourself
  427. Top secret data on former U.S. military personnel exposed on Amazon S3 repository
  428. Data breach exposes about 4 million Time Warner customer records
  429. Google Removes Malicious WireX DDoS Botnet Apps from Play Store
  430. Hacking Retail Gift Cards Remains Scarily Easy
  431. If Your Email Address Is On This List, Change Your Password Right Now
  432. TunnelBear: Secure VPN Service
  433. WannaCry Helps Push Cyber-Crime Attacks to New Heights in 2Q17
  434. Fuzzing Analysis Shows ICS, IoT Industries Most at Risk of Zero Days
  435. The Very Best Hacks From Black Hat and Defcon
  436. An Obscure App Flaw Creates Backdoors In Millions of Smartphones
  437. The Best VPN Services
  438. Galaxy S8 face recognition already defeated with a simple picture
  439. Private Internet Access, a VPN provider, takes out a full page ad in The New York Time calling out 50 senators.
  440. Here's how to wipe your old iPad/iPhone/iPod touch ready for resale | ZDNet
  441. A hacker explains why Trump using his old Android phone for Twitter could be a huge security threat
  442. For True Cyber Security, Using a USB Firewall Is Essential
  443. Say Hello to the Super-Stealthy Malware That’s Going Mainstream
  444. Abbrase - Abbreviated Passphrase Password Generator - Darknet
  445. Here's how protect your privacy from hackers and spies
  446. Sophisticated Phishing: Beware the Latest Gmail Phishing Attack | NewsFactor Network
  447. Hardening the Linux server
  448. 20 Linux Server Hardening Security Tips
  449. How to See Everything Your Browser Knows About You
  450. Online Security Made Easy
  451. This $5 Device Can Hack Your Locked Computer In One Minute
  452. Chinese company installed secret backdoor on hundreds of thousands of phones
  453. Beware, iPhone Users: Fake Retail Apps Are Surging Before Holidays
  454. Online Threats Still Rising as Mobile Malware Subsides: Kaspersky
  455. This evil office printer hijacks your cellphone connection
  456. After You Strengthen Your Passwords, Here’s How to Store Them
  457. Trending Mobile VPN Technologies That You Know Of - Information Security Buzz
  458. Information security set for steep trajectory, says (ISC)2
  459. Ethical Hacking Tutorials, Tips and Tricks
  460. Hacksplaining: Learn to Hack
  461. Internet Providers Could Be the Key to Securing All the IoT Devices Already out There
  462. Google's AI created its own form of encryption
  463. Forget the Touch Bar. The MacBook Pro’s Most Important New Feature Is Touch ID
  464. Better safe than sorry: 5 apps for encrypting and shredding files
  465. Attackers Hiding Stolen Credit Card Numbers in Images
  466. Federal Regulators Want Banks to Follow Better Cybersecurity Practices
  467. Crash: how computers are setting us up for disaster | Tim Harford
  468. No endgame for cyber security, says Mikko Hypponen
  469. 10 Tips for Identifying and Dealing With Phishing Email
  470. Tech Support Scams Evolve to Target Broader Range of Users
  471. Microsoft: Tech Support Scams Hit Two-Thirds of Consumers
  472. Hacking demo(messing with loud neighbors) - YouTube
  473. Feds Walk Into A Building. Demand Everyone's Fingerprints To Open Phones
  474. How a chunk of the web disappeared this week: GlobalSign's global HTTPS snafu explained
  475. Remove ransomware infections from your PC using these free tools | ZDNet
  476. Artificial intelligence-powered malware is coming, and it's going to be terrifying
  477. Rethinking Data Protection, Recovery in a Multi-Cloud World
  478. This Hacked Kids’ Toy Opens Garage Doors in Seconds
  479. Lack of IoT Security Is Huge Risk for Critical Enterprise IT Systems
  480. If you've ever created a Yahoo account, take these steps immediately to protect your data
  481. Yahoo under fire over data breach affecting 500 million users
  482. Security News: Cyber, IT, National Security | WIRED
  483. Cloud computing: Four reasons why companies are choosing public over private or hybrid clouds | ZDNet
  484. Dropbox Breach Exposes 68 Million Passwords
  485. Create a Strong Password Using These Tips and Tools
  486. LastPass Authenticator Two-Factor App Launch
  487. FedEx: Amazon would have to spend 'tens of billions' to compete with us
  488. 10 Great Security Tools You Should Be Using
  489. A Journey in the Life of an Encrypted Email
  490. 9 Facts About Computer Security That Experts Wish You Knew
  491. P0wned plug-in puts a million WordPress sites at risk of attack
  492. Why Security Awareness Alone Won't Stop Hackers
  493. The Top 8 Mobile Security Risks: How to Protect Your Organization
  494. 10 Security Apps to Help Your Android Device Fend Off Malware
  495. Schneier on Security: My Conversation with Edward Snowden
  496. Schneier on Security: January 15, 2015
  497. The Five Best Password Managers
  498. LastPass releases Open Source command line client • The Register
  499. Planning Considerations for BYOD and Consumerization of IT (Part 6)
  500. How To Use John The Ripper To Crack Passwords-BackTrack Tutorials For Beginners - Learn With Pranshu
  501. How to Tap Your Network and See Everything That Happens On It
  502. How to Hack Your Own Network and Beef Up Its Security with Kali Linux
  503. Google goes beyond two-step verification with new USB Security Key | Naked Security
  504. YubiKey Authentication | LastPass User Manual
  505. Frequently Asked Questions
  506. POODLE attack takes bytes out of your encrypted data – here’s what to do | Naked Security
  507. With This Tiny Box, You Can Anonymize Everything You Do Online | WIRED
  508. The Ultimate Wireshark Tutorial
  509. Apple Pay security: Hope abounds, but questions linger
  510. http://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf
  511. The Start-to-Finish Guide to Securing Your Cloud Storage
  512. Google’s Location History is Still Recording Your Every Move
  513. Nearly Half Of Americans Claim They've Changed Their Behavior Due To NSA | Techdirt
  514. The Beginner’s Guide to iptables, the Linux Firewall
  515. Here's Everywhere You Should Enable Two-Factor Authentication Right Now
  516. Introduction to Wireshark (Part 1 of 3)
  517. Following Best Coding Practices Doesn't Always Mean Better Security - Slashdot
  518. Aging networking protocols abused in DDoS attacks - security, Prolexic - Computerworld
  519. The 7 elements of a successful security awareness program - Network World
  520. SANS NewsBites
  521. Supply chain 2013: Stop playing whack-a-mole with security threats - Network World
  522. Schneier on Security: Pinging the Entire Internet
  523. Book Review: The Death of the Internet - Slashdot
  524. Review: OpenPuff steganography tool hides confidential data in plain sight | PCWorld
  525. 15 (FREE!) security tools you should try
  526. We suck at security, study says [infographic] | VentureBeat
  527. Hacker 10 – Security Hacker | Computer security tutorials, encryption and privacy software.
  528. Metasploit Helpful Tips | SOA World Magazine
  529. Dropbox Rolls Out Two-Step Verification; Use It
  530. Android Passwords are stored in plain text on Disk ~ THN : The Hacker News
  531. The 5 Biggest IT Security Mistakes | PCWorld
  532. Cellular network hijacking for fun and profit • The Register
  533. Forget Anonymous: Evidence Suggests GOP Hacked, Stole 2004 Election : politics
  534. Use Lion's FileVault 2 to encrypt your Mac's internal drive | Storage | Macworld
  535. Why you shouldn't trust Google (or any cloud service) with your data | ZDNet
  536. Default Router Passwords - The internets most comprehensive router password database
  537. Beware the All-Powerful Administrator - PCWorld
  538. Security Secrets the Bad Guys Don't Want You to Know
  539. Timeline: The History of Hacking

Strategy

  1. US and EU reportedly set to team up on limiting power of big tech companies
  2. EU rules to force USB-C chargers for all phones
  3. No More Apologies: Inside Facebook’s Push to Defend Its Image
  4. Amazon is going to release Kindle Paperwhite 5 Signature Edition Soon
  5. How Apple is changing MDM in iOS 15
  6. Jaw-dropping moments in WSJ's bombshell Facebook investigation
  7. Is remote working good or bad? Big tech companies just can't seem to decide | ZDNet
  8. Everything Must Go! The American Car Dealership Is for Sale.
  9. Amazon's cashierless 'Just Walk Out' tech is coming to Whole Foods stores | Engadget
  10. An App Called Libby and the Surprisingly Big Business of Library E-Books
  11. Apple Backs Down on Its Controversial Photo-Scanning Plans
  12. Amazon Just Announced a New Policy and It's Pure Genius
  13. Apple's new privacy feature will change the web. And not everyone is happy about it | ZDNet
  14. Your iPhone apps are tracking you. iOS 14.5 lets you turn that off. Here's how
  15. The New iOS Update Lets You Stop Ads From Tracking You—So Do It
  16. Why Lawmakers Are So Interested in Apple’s and Google’s ‘Rents’
  17. Samsung launches software update to turn older Galaxy phones into IoT devices | ZDNet
  18. Europe proposes strict regulation of artificial intelligence.
  19. Here's why you should care about Facebook's news blackout in Australia
  20. Walmart Is Opening Dozens of Local Fulfillment Centers Staffed by Robots
  21. An “Angry Mob” On Reddit Is Pushing Up GameStop's Stock Price And Pissing Off A Bunch Of Wall Street Firms
  22. Google threatens to remove its search engine from Australia if new law goes into effect
  23. Arm Macs are a big gamble, and Apple is all in
  24. Quantum computers are coming. Get ready for them to change everything | ZDNet
  25. Lawsuit Reminds Us We Don't Own Content Purchased on Amazon Prime Video
  26. Companies Are Rushing to Use AI—but Few See a Payoff
  27. Google sued by US Department of Justice and 11 states in landmark antitrust case
  28. 6 ways Android 11 just turned up the heat against Apple's iPhone
  29. Publishers worry as ebooks fly off libraries’ virtual shelves
  30. Amazon’s Alexa app will soon work as an in-car display for the Echo Auto
  31. Buy YubiKeys at Yubico.com | Shop hardware authentication security keys
  32. Google Maps is getting a dedicated car mode UI
  33. How MariaDB achieves global scale with Xpand
  34. Twitter will ask everyone if they read an article before they retweet it
  35. The Ring drone is just the latest Amazon privacy puzzle box
  36. Amazon Sidewalk is coming to your neighborhood. Here's what that means
  37. The 4 Top Artificial Intelligence Trends For 2021
  38. We Need to Talk About Audible
  39. Can Australia Force Google and Facebook to Pay for News?
  40. Amazon wins FAA approval for Prime Air drone delivery fleet
  41. Google Offers to Help Others With the Tricky Ethics of AI
  42. Powell’s says it won’t sell books on Amazon anymore: ‘We must take a stand’
  43. What the T-Mobile and Sprint Merger Means for You
  44. Meg Whitman says Quibi reached 1.7 million downloads in first week
  45. Walmart Is Setting A Smart Example For The Rest Of The Grocery Industry To Follow
  46. Researchers’ AI recommends lockdown strategies to curb coronavirus
  47. COVID-19 has exposed serious food-security issues in the US. Technology can help.
  48. A Supermarket Chain Was One Of The First To Anticipate Coronavirus. Then It Made A Truly Thoughtful Gesture To Help Local Restaurants
  49. Ten years in, a look at the iPad killers that weren't
  50. Silicon Valley Is Saving Us—for Now
  51. AI Can Help Us Fight Infectious Diseases In A More Effective Way
  52. Leaked screenshots reveal what Apple’s new CarKey feature is going to look like
  53. We visited a small Virginia town where drone deliveries have begun for real
  54. Best Buy moves to curbside pickup only as it sees surge in orders for home office equipment
  55. Amazon Offers Its Cashierless Tech to Other Retail Stores
  56. How Facebook’s new AI system has deactivated more than 100M fake accounts
  57. 5 sneaky ways Costco gets you to spend more | Considerable
  58. Amazon makes its same-day delivery service faster in select U.S. cities – TechCrunch
  59. AT&T launches new online TV service as video customers fall
  60. Business process re-engineering - Wikipedia
  61. Boston Dynamics Robot Dog Goes on Patrol at Norwegian Oil Rig
  62. Google's Mapping Chief Says Maps' Future Goes Beyond Driving
  63. Google calls out Samsung for 'unnecessary' Android changes - 9to5Google
  64. The 5 Hottest Technologies In Banking For 2020
  65. U.S. Tech Lead Over China May Not Matter
  66. Apple's iPad Filled a Crucial Gap in a Product Line and Our Psyches
  67. Google’s US antitrust worries could be entering a more serious phase
  68. Perlego giving last word to Pearson, Wiley and Cengage textbooks
  69. 2020 is the year Apple gets serious about augmented reality | Cult of Mac
  70. Don't Break Up Big Tech
  71. Bloomberg: Apple will start making a smaller, cheaper iPhone in February
  72. Amazon is working to develop biometric scanners to link handprints to credit cards, allowing shoppers to buy with the swipe of their palm
  73. Inside the Feds’ Battle Against Huawei
  74. Latest AI acquisition shows Apple isn’t sacrificing privacy for smarts
  75. AI Is Biased. Here's How Scientists Are Trying to Fix It
  76. Manipulating Machine Learning Systems by Manipulating Training Data - Schneier on Security
  77. Surveillance on steroids: How A.I. is making Big Brother bigger and brainier | Digital Trends
  78. The state of AI in 2019
  79. Instagram explains how it uses AI to choose content for your Explore tab
  80. FCC formally approves the T-Mobile-Sprint merger
  81. Has shopping died?
  82. Google wants to give doctors web-like searches for medical records
  83. Google’s Big .New Thing Is Here to Simplify Your Life
  84. HBO Max to Be Free for HBO Subscribers and AT&T Customers
  85. Facebook launches a news section - and will pay publishers
  86. A face-scanning algorithm increasingly decides whether you deserve the job
  87. An Apple device like nothing we’ve ever seen before is launching next year
  88. Los Angeles Fire Department wants to double its drone fleet
  89. Facebook’s Mark Zuckerberg defends political ad rules, says digital speech is new ‘fifth estate’
  90. Surface Neo and Surface Duo tell you everything about Microsoft's future | ZDNet
  91. eBay, Visa and Mastercard pull out of Facebook's Libra cryptocurrency
  92. Apple Glasses: Release Date, Price, Specs, Leaks and More
  93. Google and Levi's built a new gesture-sensing smart jacket
  94. Apple Arcade and Google Play Pass will be totally different stores
  95. 10 most important tech trends of the decade
  96. Microsoft Surface: Saving the future of PCs
  97. Are Dropbox's Paid Plans Worth It?
  98. Microsoft doesn’t think Windows is important anymore
  99. Microsoft's new hardware strategy should worry Apple and Intel | ZDNet
  100. Dropbox launches Spaces, its ‘smart’ collaboration workspace
  101. Why is Dropbox reinventing itself? – TechCrunch
  102. Why Facebook and Amazon have joined the race to bring computing to your face
  103. As Amazon floods the market with Alexa devices, the business model is getting fresh scrutiny
  104. These are the huge differences between Apple Arcade and Google Play Pass
  105. Amazon's new Echo Frames smart glasses bring Alexa to your face for $180
  106. iOS 13: Apple's big BYOD improvements help enterprise pros
  107. Amazon creates a huge alliance to demand voice assistant compatibility
  108. Kodak Is Ready for an Instant Camera Comeback
  109. The iPad Can Finally Replace a Laptop for Most People
  110. Google is bringing Assistant to people without internet access – TechCrunch
  111. Redesigning business processes for digital success
  112. Hands on with Apple Arcade in iOS 13
  113. Researchers: AI surveillance is expanding worldwide
  114. How Much Would You Spend on Streaming Services Per Month?
  115. Bill Gates Says Big Tech Companies Shouldn’t Be Broken Up
  116. Amazon Music rolls out a lossless streaming tier that Spotify and Apple can’t match
  117. The Shift to Electric Vehicles Propels a Strike Against GM
  118. Google Fi now offers an unlimited plan
  119. Apple as a service: One day you'll rent it all...
  120. Will Samsung kill the Galaxy Note series next year? - SamMobile
  121. Gartner sees blockchain as ‘transformational’ across industries – in 5 to 10 years
  122. Gartner: Get ready for more AI in the workplace
  123. Artificial intelligence today: What’s hype and what’s real?
  124. Walmart takes its $98 Delivery Unlimited service nationwide
  125. Apple exec confirms cryptocurrency is on company radar
  126. The Most Incredible Gadget Apple Plans to Introduce This Fall Is Something You Never Saw Coming (Here's Why It's Brilliant)
  127. Amazon is planning to bring a biometric payment method to Whole Foods
  128. Steve Wozniak says Apple should have broken up years ago
  129. Wi-Fi 6 will double your network's range and triple its speed -- once you upgrade your router, phone, PC, and everything else
  130. Verizon automatically enrolling customers in free robocall-blocking service
  131. 8 technologies that will disrupt business in 2020
  132. Marriott to Expand Its Home-Sharing Business in a Challenge to Airbnb
  133. Restructuring IT for the digital age
  134. What iPhone? Apple's push toward services begins
  135. Smart TVs Are Cheaper Than Ever, and It's Because They're Selling Your Data
  136. Return your Amazon orders to any Kohl's store starting in July
  137. 7 steps to revenue-driven IT
  138. Apple settles with Qualcomm - the 5G iPhone looks more real (u)
  139. Will Apple need to spin out its services business?
  140. 3 signs you’re going overboard with cloud features
  141. 12 ways IT can create business value in 2019
  142. How AI is helping the help desk
  143. Google Needs to Grow Its Cloud Business—Very Carefully
  144. T-Mobile's streaming TV service will include Viacom channels
  145. Walmart partners with Google on voice-enabled grocery shopping
  146. Huawei's Problem Isn't Chinese Backdoors. It's Buggy Software
  147. The emerging 737 MAX scandal, explained
  148. Facebook Charged With Violating Fair Housing Laws
  149. What you should know about serverless computing before you start
  150. McDonald's Bites on Big Data With $300 Million Acquisition
  151. Google appoints an “AI council” to head off controversy, but it proves controversial
  152. Apple event 2019: Apple Card, TV Plus, News Plus, Arcade and everything just announced
  153. XaaS: Making the shift to services-oriented IT
  154. Top IT spending priorities for 2019
  155. Google's Netflix-like Stadia instantly makes it a video game powerhouse
  156. Google unveils Stadia cloud gaming service
  157. Google Spent Years On a Secret New Plan to Attack a $140 Billion Industry. It All Starts Tomorrow
  158. What customer-centric IT really looks like
  159. 4 takeaways from Apple and Qualcomm's big patent fight
  160. Apple dealt legal blow as jury awards Qualcomm $31 million
  161. How a 50-year design came back to haunt Boeing with its troubled 737 Max jet
  162. Here's how New T-Mobile plans to disrupt the current US in-home broadband market — and why it will be successful
  163. Amazon took over the $176 billion market for cloud computing. Now it's using the same playbook in logistics.
  164. Fitbit CEO James Park talks lessons learned from the company’s struggles
  165. Amazon Almost Killed Best Buy. Then, Best Buy Did Something Completely Brilliant
  166. New Wearables Cut Health Care Costs With Better Monitoring
  167. Facebook sues Chinese companies for selling fake accounts
  168. Facebook faces backlash over users' safety phone numbers
  169. No, Data Is Not the New Oil
  170. AT&T Breaks Up Turner, Bulks Up Warner Bros. in Major WarnerMedia Overhaul
  171. WSJ: Amazon to open new US grocery chain separate from Whole Foods
  172. Google looks to leave passwords behind for a billion Android devices
  173. Walmart Joins Amazon in Chase for Ad Dollars
  174. J.P. Morgan to launch a U.S. dollar-backed cryptocurrency
  175. Microsoft Wants Part Of This $180-Billion Industry
  176. AI, machine learning, and deep learning: The complete guide
  177. AR and VR bring a new twist to collaboration
  178. Information Technology Outsourcing Market (ITO) report for 2019 made available by top research firm
  179. Amazon Gobbles Up Eero to Round Out Its Smart Home Plan
  180. FDA approves AI-powered diagnostic that doesn’t need a doctor’s help
  181. T-Mobile/Sprint merger turns two disruptors into one “mega company,” Dems warn
  182. Maybe Ron Johnson Was Right About J.C. Penney After All -- The Motley Fool
  183. IoT for retailers: opportunities and challenges
  184. IBM Buying Open Source Specialist Red Hat for $34 Billion
  185. IBM's acquisition of Red Hat is huge news for the Linux world
  186. Forget Watson, the Red Hat acquisition may be the thing that saves IBM
  187. IBM to acquire Red Hat in deal valued at $34 billion
  188. 5 ways AI is transforming customer experience
  189. How Enterprises Can Help Build Ethical AI Strategies
  190. Amazon's Echo devices get redesign on the way to world domination
  191. Tech Disrupted the World. Who Will Shake up the Next 25 Years?
  192. Fitbit buddies up with Google for better health
  193. How to build a business case for Artificial Intelligence
  194. Sprint and T-Mobile Are Officially Merging, and It's Terrible
  195. T-Mobile, Sprint agree to merge as America's national wireless carriers shrink from 4 to 3
  196. Ford will stop selling most of its cars in North America
  197. Battle between Apple and Microsoft is over | Cult of Mac
  198. Ford to stop selling every car in North America but the Mustang and Focus Active
  199. How Artificial Intelligence Will Revamp Education
  200. Artificial intelligence will wipe out half the banking jobs in a decade, experts say
  201. Car 'subscriptions' could make ownership obsolete
  202. How Artificial Intelligence Is Revolutionizing Business In 2017
  203. Five CIO tips for building an IT strategy in the digital age
  204. The psychological impact of an $11 Facebook subscription
  205. Gartner Worldwide IT Market Report Predicts Fastest Growth in Decade
  206. Developing the right IT strategy - Supporting business strategy with technology
  207. 4 Models Of The Shopping Mall Of The Future
  208. How blockchain will disrupt Google, Apple, Amazon, and Facebook

How-To

  1. How to Keep Your Car's Key Fob From Being Hacked
  2. It's Time to Clean Your Computer, Inside and Out
  3. Flip your computer monitor vertically. It will change your life.
  4. How to Find the Hidden Files on Your Phone or Computer
  5. 7 hidden MacBook features you should be using
  6. How to go incognito in Chrome, Edge, Firefox, and Safari
  7. Security camera hacking: Here's how to stop it from happening to you
  8. Don't panic! If you forgot your Mac password, you can still get back in
  9. Search operators you can use with Gmail - Gmail Help
  10. Hide TV wires: 7 simple solutions that instantly cut cord clutter
  11. How to Find and Delete All Your Old, Unused Accounts
  12. 7 Great Apps to Edit Photos on Your Phone
  13. How To Install macOS in a Virtual Machine on Ubuntu Linux
  14. How to Free Up Hard Disk Space on Windows 10
  15. 7 Apps to Make the Most of Your Streaming Music Subscription
  16. Top Zoom Tips for Better Video Calls
  17. How to Delete Almost All Junk Emails the Easy Way
  18. How to Make Your iPad More Like a Laptop
  19. When to use an abstract class vs. interface in C#
  20. The Best Smart Plugs to Help Modernize Your Home
  21. The Best Portable Chargers for All Your Devices
  22. 4 Ways to Convert Any Ebook File Format for Amazon Kindle
  23. How to Back Up Your Most Important Emails
  24. Deploying to the MyEclipse Tomcat Server
  25. How to Access Your Mac's Hidden Files
  26. Got a New PC? 11 Things to Do Right Away
  27. What is IFTTT? How to use If This, Then That services
  28. 14 Hidden Firefox Functions for Browsing Like a Boss
  29. Make your iPad more like a Mac. How to use Apple's new iPadOS 14 features
  30. Linux Fu: Simple SSH File Sharing
  31. How to Install Apache Cassandra on CentOS 8
  32. 12 ways Google Lens can make you more productive on Android
  33. How to Encrypt Files with gocryptfs on Linux
  34. 11 ways to list and sort files on Linux
  35. Single list of HOWTOs
  36. 9 Tips to Keep Your Cloud Storage Safe and Secure
  37. How to Figure Out What's Wrong With Your Internet Connection
  38. What's in the latest Chrome update? Tabs gather in groups
  39. You Can Now Check If Your ISP Uses Basic Security Measures
  40. How to See How Busy a Store Is Right Now with Google Maps
  41. Working from home? Here's how to make sure your Wi-Fi is up to speed
  42. Use Multitasking on your iPad
  43. You Need to Lock Down Your Router's Remote Management Options
  44. How to hide files and photos on your phone
  45. How to Convert a Document to PDF on iOS
  46. Manage your Location History - Google Account Help
  47. Your internet provider knows where you've been. How to keep your browsing more private
  48. How to Enable the Classic Mac Startup Chime
  49. How to Unlock Chrome's Hidden Bottom Toolbar in Android
  50. How to Use the awk Command on Linux
  51. How to convert any file to any format
  52. Explore the internet faster with these keyboard shortcuts
  53. 20 essential Mac keyboard shortcuts to save you a click
  54. Rethinking the PC: Why virtual machines should replace operating systems
  55. How to Enable Developer Options on Galaxy Note 10 and Note 10+
  56. How to buy a router
  57. How to find the best VPN service: Your guide to staying safe on the internet | ZDNet
  58. How to check on all the app subscriptions you’ve forgotten you’re still paying for
  59. How To See Who Uses Your Wi-Fi?
  60. How to Secure Your Wi-Fi Router and Protect Your Home Network
  61. How to choose a database for your application
  62. How to Automatically Delete Your Google Data, and Why You Should
  63. How to use Gmail labels to tame your inbox
  64. How to Create an RSS Feed from a Google Alert
  65. How to Tap Your Network and See Everything That Happens On It
  66. Storing your stuff securely in the cloud
  67. Trading in your smartphone could be a 'ticking time bomb' for your personal data — here's how one expert says you can protect yourself
  68. How to Control the Privacy of Your Facebook, Instagram, Twitter, and Snapchat Posts
  69. Charge your devices the right way
  70. How to Spring Clean Your Digital Clutter to Protect Yourself
  71. When You Electronically Sign Documents, Always Keep a Copy
  72. How to freeze and lock your Linux system (and why you would want to)
  73. How to Set up a Used Mac When You Don't Know the User Name or Password
  74. How to check if you've been hacked
  75. How to safely open any USB device
  76. You don't need a new computer, here's how to keep your old one running like new
  77. Workstation Pro - VMware Products : Windows Virtualization for Everyone
  78. Linux on your laptop: A closer look at EFI boot options | ZDNet
  79. How to remap the Bixby button on most recent Samsung Galaxy devices! | Drippler - Apps, Games, News, Updates & Accessories
  80. 12+ essential iPad productivity tips
  81. Outlook vs. Gmail: Which works better for business?
  82. G Suite now lets users work with Google Docs, Sheets, and Slides directly inside Dropbox
  83. How to manage your Linux environment
  84. How to create Servlet in MyEclipse IDE - javatpoint
  85. Two-Factor Authentication: Who Has It and How to Set It Up
  86. A short collection of Safari tips for iPhones, iPad
  87. How to Turn Off Email Trackers
  88. Here's how to securely wipe your Android smartphone for resale | ZDNet
  89. Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
  90. How to use your Mac safely in public places
  91. How to use the SwiftKey Keyboard
  92. Zipping files on Linux: the many variations and how to use them
  93. SQL tutorial: Learn SQL on MariaDB
  94. These secret settings instantly make any Android phone feel twice as fast
  95. How to See Which Facebook Advertisers Have Your Info
  96. How to Lock Down What Websites Can Access on Your Computer
  97. How To Stop Robocalls From Bothering You
  98. How to Set Up a Fake Phone Number
  99. Compiling and Installing - Apache HTTP Server Version 2.4
  100. 10 essential MySQL tools for admins
  101. bash howto debug - Google Search
  102. How to Get the Most Out of Gmail’s New Features
  103. Google’s light search app Go can now read you articles and web pages
  104. Gmail Update Helps Protect Businesses from Phishing, BEC Threats
  105. How to Protect Your Identity, Personal Data and Property
  106. Get the Fastest Wifi on Your Wireless Network With Wifi Explorer for Mac
  107. Learn Basic Javascript For Free With This Google App
  108. Build Free Databases
  109. How to build your own Alexa skills with the new Alexa Blueprints
  110. MySQL :: Download MySQL Community Server
  111. MySQL :: MySQL 5.7 Reference Manual :: B.5.3.2 How to Reset the Root Password
  112. Google Keeps a Record of Your ENTIRE Search History
  113. How to Manage Your Google Privacy Settings
  114. How to Check If Cambridge Analytica Could Access Your Facebook Data
  115. Get the Most Out of Your Kindle iOS App
  116. How to Manage All of Facebook's Privacy and Security Settings
  117. How to Group Mac App Icons More Prominently in Your Dock
  118. Google Lens Now Available for iOS: How to Get It
  119. Android Oreo: 18 advanced tips and tricks
  120. Here’s how you access the super creepy data Facebook has on you
  121. 12 tips to free up storage space on your Android phone or tablet | Drippler - Apps, Games, News, Updates & Accessories
  122. Constant Field Values (Java Platform SE 6)
  123. New Feature In Google Drive Improves Interoperability with Microsoft Office
  124. Top 32 Nmap Command Examples For Linux Sys/Network Admins - nixCraft
  125. How To Recover Linux Grub Boot Loader Password - nixCraft
  126. Cortana explained: How to use Microsoft's virtual assistant for business
  127. The Cognitive Biases That Convince You the World Is Falling Apart
  128. What is IFTTT? How to use If This, Then That services
  129. How to Keep Your Home Wi-Fi Safe From Hackers
  130. Ditch Your Smartphone Keyboard For Gboard
  131. How to Install Packages with Homebrew for OS X
  132. How to Customize Your Android Phone Exactly How You Like It
  133. How to Delete the Voice Data That Amazon Echo and Google Home Are Storing
  134. VMware shared folders - Google Search
  135. VirtualBox share folders - Google Search
  136. How to tweak the new Firefox 57 Quantum browser to suit your preferences | ZDNet
  137. How to Send Email to Any Cell Phone (for Free)
  138. build a computer - Google Search
  139. How to install or compile GIMP filters/plugins/extensions on Linux
  140. New Theory Cracks Open the Black Box of Deep Neural Networks
  141. How to Download Your Kindle Notes and Highlights and Export Them | The Digital Reader
  142. How to Stop Hackers From Ransoming Your Mac or iPhone [Updated]
  143. How to Turn Off App Ratings Requests in iOS 11
  144. Install Fedora Linux in Just 10 Steps
  145. 11 Ways to Upgrade Your Wi-Fi and Make Your Internet Faster
  146. Must-have Wi-Fi troubleshooting and management tools
  147. The Complete Guide to Speeding Up Your Virtual Machines
  148. IFTTT / Incompatible Browser
  149. IFTTT / Incompatible Browser
  150. Transfer Photos from Android to Mac OS X
  151. How to Create Shareable Download Links for Files on Google Drive
  152. 14 Practical Examples of Linux Find Command for Beginners
  153. The Best Keyboard Shortcuts for Bash (aka the Linux and macOS Terminal)
  154. How to install Bash shell command-line tool on Windows 10
  155. How to Snoop-Proof Any Phone or Tablet
  156. How to make the dock the most powerful part of your launcher | Drippler - Apps, Games, News, Updates & Accessories
  157. How to install Ansible on Apple MacOS X using command line
  158. Here's how to access the iPhone's hidden mode that turns the camera into a magnifying glass
  159. The Privacy Enthusiast's Guide to Using Android
  160. A Guide to Getting Past Customs With Your Digital Privacy Intact
  161. The travel-only Gmail account: A practical proposal for digital privacy at the US border
  162. Want to Sharpen Your Focus? Science Says to Drop These 5 Habits
  163. How to legally cross a US (or other) border without surrendering your data and passwords
  164. How to stop seeing your Amazon searches everywhere
  165. Vim Editor Modes Explained
  166. Automatic Backup in Linux using bash script / Linux data backup solution
  167. How to Schedule Tasks in Linux with Cron and Crontab
  168. How to Schedule Tasks on Linux: An Introduction to Crontab Files
  169. Quick HOWTO : Ch14 : Linux Firewalls Using iptables - Linux Home Networking
  170. Linux Server Security and Linux Network Security and How To Use Snort Intrusion Detection
  171. How to See Other Devices Logged in to Your Google Account
  172. How to Create a Bootable Backup of Your Entire Mac on an External Drive
  173. Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely « Null Byte
  174. Stop HTML5 autoplay videos in Chrome, Firefox, Opera (but not Edge, Explorer, Safari) | PCWorld
  175. How to Unlock Your Phone Without Pressing the Home Button | TIME
  176. There's a hidden map in your iPhone of everywhere you've been
  177. 4 Great Firefox Addons For Anonymous Surfing and Improved Privacy - Make Tech Easier
  178. How to Start a WordPress Blog - Make Tech Easier
  179. Unlock the Hidden Power of Preview to Better Manage PDF Files [Mac] - Make Tech Easier
  180. How to Make a Bootable macOS Sierra USB Flash Drive
  181. Escaping from Zip Ties
  182. Easily Edit Documents with PDF Expert 2.0 for Mac
  183. How to Fix iOS 10's Biggest Annoyances
  184. Neural networks are powerful thanks to physics, not math
  185. 7 Tips and Tricks for Google Maps on Android - Make Tech Easier
  186. How to Add Blank Spaces to Your Mac's Dock - Make Tech Easier
  187. DeskDock shares your computer's mouse and keyboard with your Android device | Drippler - Apps, Games, News, Updates & Accessories
  188. 39 Brilliant Camping Hacks To Try On Your Next Trip
  189. How to Tame Your Negative Talk in Your Mind
  190. How To Use Google Photo Service in 7 Steps
  191. The Best Wireless Routers of 2016
  192. Convert File Formats on Linux with FF Multi Converter
  193. 10 Super Efficient Ways Inbox by Gmail Saves You Time
  194. 25 Google Search Hacks to Make Life Easier
  195. How to Remove a Service From the Context Menu on Mac
  196. 7 Creative Uses for Amazon Echo and Alexa
  197. How to Change the Launchpad Layout on Your Mac
  198. How to Hide the Menu Bar in OS X El Capitan
  199. 4 Tips to Make Your Mac Run Faster
  200. The Beginner's Guide to Creating Virtual Machines with VirtualBox
  201. How to install WordPress with Apache, MariaDB and PHP 7 on Arch Linux
  202. Linux Mint: The right way to react to a security breach | ZDNet
  203. How to Use a USB Flash Drive with Your Android Phone or Tablet
  204. symless/synergy
  205. 5 Favorite Ways to Collect Content in Evernote
  206. 11 Advanced Searches To Bookmark To Become A Google Power User
  207. Convert Virtual Machines from VMware to VirtualBox
  208. Evernote Can Encrypt Bits of Text to Keep Your Notes Private
  209. 15 Things You Didn’t Know You Could Do with Dropbox
  210. 4 very common Macbook problems—and how to fix them
  211. How to Play DVDs and Blu-rays on Linux
  212. How To Use a USB Stick To Securely Log In to Gmail
  213. How To Move Emails From One Gmail Account To Another
  214. How to see all the companies tracking you on Facebook — and block them
  215. How to use multi-app multitasking on the iPad Pro
  216. How to track your Linux laptop
  217. 10 of the best network and server monitoring tools
  218. Trim Will Find Your Subscriptions, Cancel Those You No Longer Want
  219. How to Play Classic Retro Games on Android
  220. Setting Up IP and Port Based Virtualhost Apache
  221. How to Activate GodMode in Windows 10
  222. How to do image steganography on Linux
  223. How to Export or Save All Pictures from MMS Text Messages on Android
  224. How to Enable and Use iCloud Drive on Your iPhone or iPad
  225. How to trigger commands on File/Directory changes with Incron on Debian
  226. How to Download YouTube Movies & Music on Android | Drippler - Apps, Games, News, Updates & Accessories
  227. 3 Powerful New Features to Try in iOS 9 | PCMag.com
  228. iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode
  229. Who gives the best advice about password security? | Naked Security
  230. How to Make a Program Run at Startup on Any Computer
  231. How to Save Google Maps Offline | PCMag.com
  232. How to Make Cool Gmail Signatures Right from Google Drive
  233. How to Convert Any File Format Online with Free Tools
  234. Collecting Ubuntu Linux System Information
  235. How to Mount a NTFS Drive on CentOS / RHEL / Scientific Linux
  236. How to Create Windows 10 USB Installer in Mac
  237. Google Classroom Launches Chrome Extension So Teachers Can Instantly Share Links With The Entire Class | TechCrunch
  238. Here are the best Gmail hacks to keep you on track
  239. Get the Best of MakeUseOf with Our New Android App, and Win a Samsung Galaxy S6 Edge!
  240. How to Fully Control Your Android Device from Any Computer | Drippler - Apps, Games, News, Updates & Accessories
  241. How and Why to Encrypt Your Text Messages
  242. How to monitor your system performance on (Ubuntu) Linux
  243. How To Organize Your Apps Using LaunchPad in OS X
  244. How to Encrypt and Decrypt Files on an Android Device
  245. The only technique to learn something new
  246. The ultimate guide to staying anonymous and protecting your privacy online - Slideshow | ExtremeTech
  247. Amazon's voice-guided speaker juggles your IFTTT tasks
  248. IFTTT Recipes That Help You Save Money
  249. 5 secret ways you can control your phone using Google search on your computer | Drippler - Apps, Games, News, Updates & Accessories
  250. Snap and edit pictures like a pro with these great Android photo apps | Drippler - Apps, Games, News, Updates & Accessories
  251. 9 Amazing ES File Explorer Features That Can Replace Other Android Apps | Drippler - Apps, Games, News, Updates & Accessories
  252. Here’s How to Download and Delete What Google Knows About You
  253. Use Your Mac’s Notification Center for Widgets, Scripts, and Notifications
  254. How to Enable CMD + n Shortcuts in Safari for Easy Tab Switching
  255. Securing tomcat - OWASP
  256. 4 "About:Config" Tricks to Extend The Functionality Of Firefox
  257. If you lose your Android phone, just Google 'Find My Phone' and it will
  258. Easily Create KVM Virtual Machines on Linux With GNOME Boxes
  259. How to Install Hardware Drivers on Linux
  260. How to Remove Bloatware on Android Without Rooting
  261. HiddenMe Hides all Your Mac Desktop Icons in One Click
  262. How to Use Your Mac’s Disk Utility to Partition, Wipe, Repair, Restore, and Copy Drives
  263. How to Convert a Physical Windows or Linux PC to a Virtual Machine
  264. How to Clear Your Dropbox Cache in Windows and Linux
  265. Configuration Mania Adds a Ton of Hidden Options to Firefox
  266. 6 Tricks You Can Use To Increase The Range Of Your Home Wi-Fi Router
  267. Five tips for cleaning and speeding up your Mac - CNET
  268. How to Disable Your Webcam (and Why You Should)
  269. Why You Really Want a Linux Virtual Server Instead of a Private Server
  270. How to Safely Share Your Smartphone, Computer, or Tablet With a Guest
  271. Google quietly backs away from encrypting new Lollipop devices by default | Ars Technica
  272. How to monitor server log files with Logwatch on Debian and Ubuntu
  273. Singapore’s Lee Kong Chian School of Medicine develops curriculum across time zones, with help from Dropbox for Business
  274. Review: Ring Video Doorbell | WIRED
  275. Featured: Top 10 Backup Apps For Android | Drippler - Apps, Games, News, Updates & Accessories
  276. Kindlebox Automatically Sends Books from Dropbox to Your Kindle
  277. Use Manual Refresh to Save Battery Life on Any Tablet or Smartphone
  278. What To Do If You Lose the Master Password to Your Password Manager
  279. Anyone With Your Mac Can Bypass Your Password Unless You Do This
  280. 4 tips to keep your business data private
  281. How to Make Macs and iOS Devices Work Together Seamlessly with Continuity
  282. Easily Share Files Between Windows 7, 8 and Mac OS X
  283. How to Use Bluetooth File Transfer Between OS X and Android 5.0 Devices
  284. Using secure shell (ssh) for login and secure copy (scp) for data transfer on Linux
  285. The Best Built-In Mac Tips You've Never Heard of, According to Reddit
  286. Everything You Can Do to Free up Space on Your Mac
  287. 4 Things You Didn't Know You Could Do With Google Earth Pro
  288. Repair Linux Boot failures in Grub 2 rescue mode
  289. How to Make a Smart Home From a Dumb One | PCMag.com
  290. How to Run a Full Linux Desktop in a Browser Tab on Your Chromebook
  291. ifttt Review & Rating | PCMag.com
  292. How to install Django on Ubuntu 14.04
  293. GRUB 2 boot menu basics and how to add a custom splash image
  294. 3 Common SQL Mistakes You are Probably Making as a Java Developer | DZone
  295. How to Power Up OS X's Spotlight with Flashlight
  296. 22 tips, tricks and shortcuts for Android Lollipop
  297. How to Anonymize Everything You Do Online | WIRED
  298. How to configure an NFS server and mount NFS shares on Ubuntu 14.10 | HowtoForge - Linux Howtos and Tutorials
  299. How do You Password Protect a Folder on Linux/Unix without Encryption?
  300. How to Unlock Hidden Settings In Your Favorite Software
  301. Learn to Build Android Apps with This Curated Collection of Courses
  302. Your Mac Logs Everything You Download, Here's How to Clear It Out
  303. Beginner's Electronics: 10 Skills You Need to Know
  304. Apple releases web tool to deregister phone numbers from iMessage | The Verge
  305. How to Find and Remove Duplicate Files on Mac OS X
  306. How To Safely Store A Password | codahale.com
  307. How Inbox by Gmail Works, and How to Use It for More Productive Email
  308. How to Use Handbrake to Convert Any Video File to Any Format
  309. How to Identify and Solve your Android Battery Problems | Drippler - Apps, Games, News, Updates & Accessories
  310. Hands On With Google Inbox: Useful Email Triage Tools For A Mobile Workflow | TechCrunch
  311. Useful SystemD commands (hints for systemctl or systemctl vs chkconfig and service)
  312. I Want to Write Android Apps. Where Do I Start?
  313. How to configure a host intrusion detection system on CentOS - Xmodulo
  314. Secure Your Linux Desktop and SSH Login Using Two Factor Google Authentication
  315. How to Organize Your Linux File System for Clutter-Free Folders | Linux.com
  316. mamp - Google Search
  317. How to Set Up Family Sharing in iOS 8 | News & Opinion | PCMag.com
  318. How to Save the Net | Magazine | WIRED
  319. DIY NAS: EconoNAS 2014
  320. The Apps You Need to Deauthenticate Before Selling Your Devices
  321. Plan Your Free Online Education at Lifehacker U: Fall Semester 2014
  322. How to make your email address as hard to guess as your password
  323. Stop Thieves From Recovering Your Data After A Factory Reset
  324. Creating Bibliographies & Footnote Citations Is Easier With Bookends for Mac
  325. How To Install Tomcat On CentOS 7 | HowtoForge - Linux Howtos and Tutorials
  326. 7 Tips For Less Terrible Smartphone Photos
  327. How to Easily Encrypt Files on Windows, Linux, and Mac OS X
  328. Troubleshoot Your Mac With These Hidden Startup Options
  329. ISC Diary | Stop, Drop and File Carve
  330. Evernote Food Saves, Organizes, and Helps You Find Great New Recipes
  331. How to create a VPN shortcut in OS X | MacFixIt - CNET Reviews
  332. What to Do (If Anything) About a Cluttered OS X Desktop | Gadget Lab | Wired.com
  333. Google Drive Blog: Bringing people together in Drive
  334. The Best Experimental Chrome Features You Should Check Out
  335. Use nettop command to check per-application network activity in OS X | MacFixIt - CNET Reviews
  336. Use OS X Finder shortcuts in Open and Save dialog boxes | MacFixIt - CNET Reviews
  337. Mac OS X Easter Eggs - Business Insider
  338. Give Your Laptop and Smartphone a Spring Cleaning
  339. How to Set Up Your Own Private Cloud Storage Service in Five Minutes with OwnCloud
  340. ISC Diary | The HTTP "Range" Header
  341. Multiboot Linux distributions from one USB key - LinuxBSDos.com
  342. How to Make Windows 8 Look and Feel Like Windows 7
  343. Mac Remote Controls Your Mac from the Comfort of Your Android Phone or Tablet
  344. Apple Adds Two-Factor Authentication to Apple ID, Here's How to Set It Up
  345. How to Boot Into Linux from Your Android Phone
  346. Instantly Hide Any File in OS X by Putting It In Your Library Folder
  347. Apache Tomcat 6 Installation on OS X 10.7 Lion and Eclipse Integration | Whatta-Whatta
  348. Cool User File Systems, Part 1: SSHFS | Linux Magazine
  349. What To Do After You've Been Hacked | Gadget Lab | Wired.com
  350. Nova Launcher
  351. How to install Google Play Store apk & Launcher on Kindle Fire HD/2
  352. [ROOT] How To: Root the Kindle Fire 7" HD or 2 with Linux/MAC - Noob (Simple) Version - xda-developers
  353. Make Your Own Pocket-Sized, Grid-It-Style Organizer for $2.50
  354. Daemonize a bash Script
  355. Linux Daemon Writing HOWTO
  356. How to Create a Strong Password in Wake of Twitter Hack Episode - CIO.com
  357. Hackers release iOS 6.1 jailbreak utility - Network World
  358. Build a Computer This Weekend
  359. Encrypt Your Data With EncFS (Fedora 18) | HowtoForge - Linux Howtos and Tutorials
  360. Turn a Raspberry Pi into a Personal VPN for Secure Browsing Anywhere You Go
  361. Video: The Philips uWand Is All I Want in a Smart TV Remote Control | Gadget Lab | Wired.com
  362. Learn Beginner and Advanced HTML/CSS Skills for Free
  363. Five Best Desktop Media Servers
  364. review-linux-live-usb-creator-makes-it-easier-to-install-linux.html
  365. This Is the Best of Lifehacker 2012
  366. Most Popular How-To Guides of 2012
  367. Set Up a Raspberry Pi as a Personal Web Server
  368. Automatically Create Evernote Template Notebooks with AppleScript
  369. Five Best Deal Sites
  370. MySQL 5.5 Admin Cheat Sheet from DZone Refcardz - Free, professional tutorial guides for developers
  371. The Perfect Desktop - Ubuntu 12.10 (Quantal Quetzal) | HowtoForge - Linux Howtos and Tutorials
  372. iPhone 5 Setup and Security Guide
  373. How to Secure and Encrypt Your Web Browsing on Public Networks (with Hamachi and Privoxy)
  374. Inotify: Efficient, Real-Time Linux File System Event Monitoring
  375. Remote MySQL Performance And Query Monitoring | HowtoForge - Linux Howtos and Tutorials
  376. http://www.networkworld.com/research/2012/110612-pc-security-your-essential-software-264010.html
  377. Turning the smartphone from a telephone into a tricorder | ExtremeTech
  378. Lifehacker.com Updates: QuickLock Is A Better Way To Lock Your Mac
  379. 20 Linux Server Hardening Security Tips
  380. Coffee Table Pi
  381. How to install Google's Chrome OS | ZDNet
  382. When You Need to Remember Something You Can't Write Down, Think of Something Crazy
  383. PSA: The Dot In Your Gmail Address Doesn’t Matter | TechCrunch
  384. Sleeping On Difficult Problems Actually Helps Solve Them
  385. How to fix drive-permissions problem in OS X | MacFixIt - CNET Reviews
  386. Amazon's Remote Wipe of Customer's Kindle Highlights Perils of DRM | Gadget Lab | Wired.com
  387. Insync - Your Google Docs backup and sync tool
  388. how_to_adjust_settings_in_vlc_to_permanently
  389. How to Break Into a Mac (And Prevent It from Happening to You)
  390. The Ultimate Beginner's Guide To AppleScript | Mactuts+
  391. HTC Security Flaw Found on Multiple Android Phones
  392. iPhone, iOS 6 Apps to Monitor Your Network, Find WiFi
  393. Making Your own Custom Linux Distro - YouTube
  394. How do I select which folders to sync to my computer?
  395. Site44 Creates Web Sites from Dropbox Folders, Perfect for Personal Landing Pages and Resumes
  396. SSH tip: Send commands remotely | MacFixIt - CNET Reviews
  397. freedesktop.org - Software/systemd/FrequentlyAskedQuestions
  398. Lock down your social media with essential security add-ons | PCWorld
  399. If Your Android Phone Is Stolen, This App Photographs the Thief - Yahoo! News
  400. How a Secret Sequence of Doorbell Buzzes Can Unlock Your Home With
  401. [SAMSUNG GALAXY S3 QCOM TOOLKIT V2.3] Drivers Backup Root CWM BusyBox + MORE [SPR] - xda-developers
  402. Cracked! Hacker Claims to Jailbreak the iPhone 5. - Mike Isaac - Mobile - AllThingsD
  403. How to add and arrange Home screens on the Galaxy S3 | Android Central
  404. How to Root U.S. and Canada Galaxy S3 SGH-T999/SGH-I747/SPH-L710! [Fail-Proof][Noob-Proof][U.S. Cellular] | GalaxyS3Root.com
  405. Here's the List of iOS 6 Compatible Jailbreak Tweaks
  406. Kindle Fire HD 7-inch rooted in spite of Amazon, unstoppable force meets the unhackable object (video) -- Engadget
  407. How to root the Sprint Galaxy S3 L710 without increasing flash counter
  408. [VIDEO] How to Root the Amazon Kindle Fire HD Tablet - xda-developers
  409. Managing Multiple MySQL Servers From One phpMyAdmin Installation (Using SSL Encryption) | HowtoForge - Linux Howtos and Tutorials
  410. Get Google and iOS Living Together in Perfect Harmony
  411. WiFi Pineapple Mark IV | jwz
  412. HakShop — WiFi Pineapple Mark IV
  413. Got a BMW? Thicko thieves can EASILY NICK IT with $30 box • The Register
  414. Customizable Shortcuts for Firefox Lets You Create Key Commands for Anything
  415. Google releases new Java to iOS source code translator -- Engadget
  416. Evernote For Education: Citelighter Teams Up With Cengage To Take The Pain Out Of Online Research | TechCrunch
  417. How to quickly create an encrypted archive in OS X | MacFixIt - CNET Reviews
  418. Computer Hacking/Security Testing with BackTrack5
  419. How to Install Dropbox on the Kindle Fire
  420. Spec Comparison: Apple's iPhone 5 vs. Samsung Galaxy S3 - The Mac Observer
  421. Installing Apache2 With PHP5 And MySQL Support On OpenSUSE 12.2 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  422. Backtrack 5 : How to Bypass Antivirus and Hack Window Systems / SET – (Tutorial) « Connection Reset By Peer
  423. Lifehacker top 10 News, Videos, Reviews and Gossip - Lifehacker
  424. Videos | Tenable Network Security
  425. Tenable Network Security: Enabling Nessus on BackTrack 5 - The Official Guide
  426. Pinpointing Your Security Risks - IT Security
  427. How to create and use Live USB - FedoraProject
  428. Turn Any Laptop Into a Money-Saving Wi-Fi Hotspot For Your Hotel Room
  429. 18 great IT tools for Android
  430. Norton Utilities 15 Review & Rating | PCMag.com
  431. Welcome to SecurityTube.net
  432. Parallels Desktop 8 and VMWare Fusion 5 announced | MacFixIt - CNET Reviews
  433. Learn to Code a Basic iPhone App
  434. How to Dual Boot Linux on Your Mac and Take Back Your Powerhouse Apple Hardware
  435. The Twilight Desktop
  436. iBuildApp :: Create Free iPhone App Using Online Interface Builder| Android, iPad
  437. How Technology Helps Keep This 3,000-Student Class Engaged | Digg Technology
  438. Delete Dropbox cache to recover drive space | Macworld
  439. Master MySQL in the Amazon Cloud | PCWorld Business Center
  440. Pick the right shutter speed for every photographic situation | Macworld
  441. Why Mosh is better than SSH? - LinuxScrew: Linux Blog
  442. Speed Up Dropbox's File Syncing with a Simple Tweak
  443. How to hack your own Wi-Fi network
  444. Just Show Me: How to read Microsoft Office files on your Kindle Fire | Technology News Blog - Yahoo! News
  445. Easily Shake The Eggshells Off A Bunch of Boiled Eggs
  446. The Best Online Backup App for OS X
  447. How to Customize Any Folder or App Icon Using Any Image in OS X
  448. Review: 7 password managers for Windows, Mac OS X, iOS, and Android
  449. 16 ultimate SSH hacks
  450. Sync iPad to Multiple Computers - Guides of Syncing iPad with Multiple Computers - StumbleUpon
  451. how to hack video screens on times square - YouTube
  452. Thanks, Dev-Team! New iPad Already Jailbroken [Updated] | PCWorld
  453. Tweaking Lion's firewall | Macworld
  454. USB Outlet Quattro-”the Gadget Plug”
  455. Read Later Brings Instapaper, Read It Later to Your Mac's Desktop
  456. How to Create a Custom Theme for Your WordPress Blog with Minimal Coding Required
  457. Sync Files and Folders Outside Your My Dropbox Folder
  458. CyberKiko | Dropbox and multiple sync folders
  459. Ubuntu for Android | Ubuntu
  460. Creating A Portable MySQL On CentOS 6 And Ubuntu 11.10 Linux From Sources | HowtoForge - Linux Howtos and Tutorials
  461. Secrets
  462. Mac OS X Lion — Changing SSHD port | .: A Blog To Be Named Later :.
  463. See How SugarSync Stacks up to the Competition - SugarSync
  464. File Sync & Online Backup - Access and File Sharing from Any Device - SugarSync
  465. MyEclipse UML | Eclipse UML diagrams | UML Modeling Capabilities :: MyEclipse
  466. my_laptop_was_stolen_but_dropbox_is_running_and_i
  467. The MacPorts Project -- Download & Installation
  468. Ten OS X Command Line Utilities you might not know about
  469. Handy Mac OSX Command Line Tricks | Snipe.Net
  470. How to Crack WPA2 WPS WiFi password
  471. 6 Ways to Defend Against Drive-by Downloads | PCWorld
  472. macosx - Full guide for installing tomcat on OS X - Server Fault
  473. How To: Upgrade a Wall Outlet to USB Functionality
  474. Changing Apache Server Name To Whatever You Want With mod_security On Debian 6 | HowtoForge - Linux Howtos and Tutorials
  475. Pimp Your Facebook: How to Create a Badass Timeline Banner
  476. Four ways to make the Dock more powerful | Macworld
  477. MySQL Reference for OS X
  478. 14 Practical Ways to Use Evernote
  479. How to Unlock Padlocks Without a Key Using Cheap DIY Shims
  480. SSH tricks
  481. Pro Tips for Regular People: Five Photography Tricks Anyone Who Owns a Camera Should Know
  482. How to Roll Your Own Awesome Drag-and-Drop File Sharing Service
  483. diary.html
  484. Five Best Ways to Stream Live TV
  485. WiFi garage door opener makes forgotten keys a thing of the past - Hack a Day
  486. How to use your iPad or iPhone as a second monitor — Mac Tips
  487. Be a Grown Up Boy Scout: The Wilderness Survival Skills Everyone Should Know
  488. Using Bash To Output To Screen And File At The Same Time
  489. AssistantExtensions Is an All-In-One Siri Hack Manager
  490. MyEclipse UML Tutorial
  491. De-Mystifying the Dark Corners of Windows: The Registry, DLLs, and More Explained
  492. How To Maintain and Use Collaborative Grocery Lists
  493. Remove Unnecessary System Preferences Icons in OS X to Simplify Your Settings
  494. Everything You Thought You Knew About Learning Is Wrong | GeekDad | Wired.com
  495. How To Install Siri on iPad 2 -Video
  496. My Top 10 Jailbreak Tweaks
  497. The Best Wi-Fi Articles for Securing Your Network and Optimizing Your Router
  498. 7 Things I Learned From Building My First Desktop PC | PCWorld
  499. Install A Hard Drive Or SSD In Your Notebook's Optical Bay : Tiered Storage In A Single-Bay Notebook
  500. Evi one-ups Siri for iOS and Android
  501. How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive
  502. Online Tool Converts JavaScript Bookmarklets into Chrome Extensions | PCWorld
  503. Deleting Files Within Lion's Applications Folder | PCWorld
  504. iPhone 4S and iPad 2 Finally Get Proper, Untethered Jailbreaks
  505. The Always Up-to-Date Guide to Jailbreaking Your iPhone, iPod touch, and iPad [iOS 5.0.1]
  506. Going Google-Free: The Best Alternatives to Google Services on the Web
  507. Installing Apache2 With PHP5 And MySQL Support On Fedora 16 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  508. 7 Essential CSS3 Tutorials For Web Developers | Digg Technology
  509. MiniPwner Is a Cheap Penetration Tester and Portable Wi-Fi Node
  510. 35 MacGyver Tips, Clever Uses, and Other Life Hacks in One Infographic
  511. How to Prevent WordPress Site From SQL Injection Attack
  512. Performance Upgrades; FireWire USB SATA Storage; Memory, more at OWC
  513. Apple - OS X Lion Recovery - Introducing Lion Recovery
  514. Troubleshooting: My computer won't turn on
  515. iMac G5: How to Reset the SMU
  516. The Best Jailbreak Apps for iOS 5
  517. Add a Custom Message to Your Mac OS X Login Screen to Help People Contact You If Your Mac is Lost
  518. How to Boost Your Reading Comprehension by Reading Smarter and More Conscientiously
  519. EncFS 1.7.4 installer for Mac OS X available - BoxCryptor Blog
  520. Encrypted Filesystem for Mac OS X
  521. Best of Lifehacker 2011 News, Videos, Reviews and Gossip - Lifehacker
  522. Five Best Video Editors
  523. The Best System Tweaker for Linux
  524. External desktop hard drives buying guide | Macworld
  525. File Management Apps : How and Why to Root your Android: 15 Worthwhile Apps
  526. How to Root Kindle Fire for Mac OSX or Linux! | RootKindleFire.com
  527. The Get More Out of Google Infographic Summarizes Online Research Tricks for Students
  528. Finally, Some Privacy! Cool LCD Monitor Hack Helps Keep Your Secrets | PCWorld
  529. How to Choose A Cloud Storage Provider: Security - storage Blog
  530. Headphones buying guide | Macworld
  531. Best SSDs For The Money: November 2011 : Best SSDs For The Money: November Updates
  532. Macs, Kindle Fire, and managing files | Macworld
  533. Best Chrome Extensions
  534. Virtualization With KVM On Ubuntu 11.10 | HowtoForge - Linux Howtos and Tutorials
  535. Download a Free Dynamic DNS Update client for your dynamic IP
  536. How to Fix Your Family’s Computer This Holiday So the Rest of the Year Is Easy
  537. How to Securely Wipe Your Data from Any Phone on Any Platform
  538. How to Improve Your iPhone's Battery Life
  539. Enabling and disabling cookies | How to | Firefox Help
  540. Disable AutoRun to Stop 50% of Windows Malware Threats
  541. Apple’s Cloud-Based Music Service Now Live On iTunes | Gadget Lab | Wired.com
  542. HOWTO: SSH Tunneling Made Easy
  543. ArchBang Brings Arch Linux's Greatest Features to Your PC Without the Stressful Installation
  544. How to Make (and Sustain) a Good First Impression Every Time
  545. How to Use Photoshop to Pop Pimples, Change Facial Expressions, and Alter Reality As We Know It
  546. abyssoft - teleport
  547. Apache/NCSA Custom Log Format
  548. Best 5 monitors for professionals | Crave - CNET
  549. 5 More PC Upgrade Mistakes (And How To Avoid Them) | PCWorld
  550. Synergy
  551. Replace Your Keychain w/Technology, Convenience, & Style - Keyport Slide and Blades | Keyport, Inc.
  552. iOS 5 Shortcut Feature Enables A Hilarious Prank
  553. Microsoft Lync client for Linux ~ MyTricks
  554. Compare directories via diff - Mac OS X Hints
  555. Five Best Disk Defragmentation Tools
  556. How to Crack a Wi-Fi Network's WEP Password with BackTrack
  557. Top 10 Ways to Unlock the Unlockable
  558. WinX DVD Ripper Platinum Preview | PCMag.com
  559. How to Break Into a Windows PC (and Prevent It from Happening to You)
  560. Making UEFI Secure Boot Work With Open Platforms | The Linux Foundation
  561. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  562. A Guide to Sniffing Out Passwords and Cookies (and How to Protect Yourself Against It)
  563. What to Do When You've Forgotten Your Smartphone's Passcode
  564. How to bypass the iPad 2 password in five seconds : technology
  565. A Gadget for the Home Learns by Degrees - Katherine Boehret - The Digital Solution - AllThingsD
  566. Bump Key HOWTO
  567. Silence Noisy Neighbors by Transmitting Your Music to Their Speakers
  568. Pick Locks - Wired How-To Wiki
  569. The Perfect Desktop - Ubuntu 11.10 (Oneiric Ocelot) | HowtoForge - Linux Howtos and Tutorials
  570. Installing Apache2 With PHP5 And MySQL Support On Ubuntu 11.10 (LAMP) | HowtoForge - Linux Howtos and Tutorials
  571. TonidoPlug - Tiny, Low Power, Low Cost, Linux Home Server | Access your files, music and media from anywhere
  572. More ways to move data to a new Mac
  573. Groovy - Home
  574. Learn How to Pick Locks from a Competitive Lockpicker Who Truly Loves Locks
  575. BackTrack Wiki
  576. The Best Disk Cloning App for Mac OS X
  577. Spool Is Instapaper On Steroids | TechCrunch
  578. Open Security Screws with a Rotary Tool
  579. The Always Up-To-Date Guide to Rooting Any Android Phone
  580. Synapse Is a Super-Fast, Tightly Integrated Application Launcher for Linux
  581. Cartoonify Photos with the GIMP
  582. What Settings Should I Change on My Wi-Fi Router? [Ask Lifehacker]

OS

  1. 2021 Is the Year of Linux on the Desktop
  2. Every Multitasking Feature in iPadOS 15 Worth Knowing About (and How to Use Them)
  3. How to Set JAVA_HOME in Ubuntu Linux Correctly
  4. How to Change / Set up bash custom prompt (PS1) in Linux
  5. Linux turns 30: ​Linus Torvalds on his "just a hobby" operating system | ZDNet
  6. 10 Smart Option-Key Shortcuts You're Not Using on Your Mac
  7. Linus Torvalds: Get ready for another 30 years of Linux | ZDNet
  8. Linux 101: How to easily view real-time log entries with tail
  9. 6 Rust Commands to Use in Place of Traditional Linux Commands
  10. Not-a-Linux distro review: SerenityOS is a Unix-y love letter to the ‘90s
  11. How password hashing works on Linux
  12. How to Use the fsck Command on Linux
  13. 7 Tips to Customize the Look of Your Linux Terminal
  14. University of Minnesota banned from contributing to Linux kernel
  15. The Best Linux Distributions Without systemd
  16. 18 advanced tips for Android 11
  17. Linux Mint 20.1 is a desktop anyone can love
  18. Looking into Linux user logins with lslogins
  19. 11 Things You Can Do in macOS Big Sur That You Couldn't Do Before
  20. A quick guide to DNF for yum users
  21. 10 Things to Do After Installing Fedora 33 - debugpoint.com
  22. Best Linux server distributions of 2020
  23. KDE Plasma 5.20 Looks Like an Awesome Update - OMG! Ubuntu!
  24. 20 years of Linux on Big Iron | ZDNet
  25. How to Use the sed Command on Linux
  26. Windows 10 is getting Linux files integration in File Explorer
  27. How to use the dig Command on Linux
  28. How to Use Linux’s man Command: Hidden Secrets and Basics
  29. Best Linux Desktop Distributions Overall
  30. Tricks for getting around your Linux file system
  31. How to Use Regular Expressions (regexes) on Linux
  32. Best Linux GUIs for every type of user
  33. Filesystem Hierarchy Standard
  34. How to Use the fold Command on Linux
  35. Snowflake is the Linux SSH GUI you didn't know you needed
  36. How to Install and Dual Boot Linux on Your Mac
  37. Linus Torvalds, creator of the Linux operating system, warned developers not to use an Oracle-owned file system because of the company's 'litigious nature'
  38. My Search For The Perfect Linux OS Just Ended — With An Unexpected Surprise
  39. iOS 13.2 tips: Check these security and privacy settings today | ZDNet
  40. MacOS 10.15 Catalina Review: More Mobile Features, More Security, and No More iTunes
  41. One of Linux's most important commands had a glaring security flaw
  42. Decoding Apple’s Touch Bar philosophy
  43. Apple Confirms Serious MacBook Pro Problems In MacOS Catalina
  44. How to find out if your apps are compatible with macOS Catalina
  45. All the Best iPadOS Features That You Don't Get in iOS
  46. Here’s What Sets iPadOS Apart from iOS - TidBITS
  47. iOS, iPadOS and tvOS 13.1 updates are now available – TechCrunch
  48. An introduction to the Linux boot and startup processes
  49. Apple iOS 13 Has 25 Great Secret Features
  50. How to take full advantage of Android 10's privacy-reclaiming powers
  51. 21 Best Kali Linux Tools for Hacking and Penetration Testing
  52. Take These Steps Before Installing Android 10 on Your Phone
  53. Linux on your laptop: Here's what you need to know about UEFI firmware | ZDNet
  54. The best Android file manager apps
  55. Microsoft wants to bring exFAT to the Linux kernel – TechCrunch
  56. Working with variables on Linux
  57. The best Android keyboard apps for on-the-go productivity
  58. Two thirds of Android antivirus apps don't work properly
  59. Know When Malware Tries to Access Your Mac's Camera or Mic With This App
  60. What is Linux? Everything you need to know about the open-source operating system
  61. How to identify shell builtins, aliases and exe files on Linux systems
  62. Command-Line Tip: Put Down the Pipe | Linux Journal
  63. Testing openSUSE, Manjaro, Debian, Fedora, and Mint Linux distributions on my new laptop | ZDNet
  64. How to Speed up Your Mac | Digital Trends
  65. Android security: Analysis, advice, and next-level knowledge
  66. Project Ubuntu: Getting Linux Running on Your Mac
  67. systemd unit file basics - Fedora Magazine
  68. 13 Best File Managers for Linux Systems
  69. systemd-analyze plot - Google Search
  70. Microsoft Pledges to Protect Linux and Open Source With Its Patents
  71. Understanding Bash: Elements of Programming | Linux Journal
  72. 10.6. Creating and Modifying systemd Unit Files Red Hat Enterprise Linux 7 | Red Hat Customer Portal
  73. systemd file locations fedora - Google Search
  74. With Linux’s founder stepping back, will the community change its culture?
  75. bash howto - Google Search
  76. The Best New Features to Try in iOS 12
  77. 10 best email apps for Android
  78. Microsoft’s bid to secure the Internet of Things: Custom Linux, custom chips, Azure
  79. The best Android file manager apps
  80. Fedora 28 Set to Deliver New GNOME Linux Desktop for Workstations
  81. Why not the best? Why not Linux Mint?
  82. 21 keyboard shortcuts Mac users need to know
  83. 10 Ways KDE Is a Better Linux Desktop Than GNOME
  84. How to Install Software on Linux
  85. 7 Useful macOS Tricks You Might Not Know
  86. How to mount an ISO image/file under Linux - nixCraft
  87. Five hidden features of Android 8.0 Oreo you should be using
  88. Home - FUSE for macOS
  89. Mingis on Tech: All about Android 8.0 'Oreo'
  90. 24 Things You Can Do in iOS 11 That You Couldn't Before
  91. iOS 10 Tips and Tricks for iPad - Apple Support
  92. iOS 11 improvements that Apple wants to tell you about
  93. Apple shows you how to use iOS 11 on iPad Pro
  94. Linux Operating Systems for The Paranoid: What Are The Most Secure Options?
  95. How to run multiple commands in sudo under Linux or Unix
  96. OpenSnitch: The Little Snitch application like firewall tool for Linux
  97. The 10 Best Launchers for Android | Drippler - Apps, Games, News, Updates & Accessories
  98. The Best Email Client for MacOS
  99. How to Use Your Bash History in the Linux or macOS Terminal
  100. Apple Clips (for iPhone)
  101. Mac Users Should Ditch Google Chrome for Safari
  102. Bixby Brings Samsung Smartphones Into the Personal Assistant Era
  103. Linux Commands - Overview and Examples
  104. Parrot Security OS 3.5 Improves Linux Security Tools Distribution
  105. All the Folders You Can Probably Exclude From Your Mac's Backups
  106. What’s the Difference Between Bash, Zsh, and Other Linux Shells?
  107. How to create Kali Linux bootable USB live in windows 10
  108. WiFi Pineapple NANO: Kali Linux 2.0 Internet Connection Sharing
  109. Which Linux File System Should You Use?
  110. How to find all hard links in a directory on Linux
  111. How to setup a Linux server on Amazon AWS,
  112. 5 Interesting New Photo Viewing and Editing Apps to Download
  113. The Most Used Linux Terminal Commands and What They Do
  114. Five Tools for Beginners that Power Up the Command Line
  115. Linux command line navigation tips/tricks 3 - the CDPATH environment variable
  116. How to Copy Multiple Things to Your Mac’s Clipboard at Once
  117. Advanced Bash-Scripting Guide
  118. My First 10 Minutes On a Server - Primer for Securing Ubuntu
  119. How to split a large archive file into multiple small files using Split command in Linux
  120. GNU GRUB Manual 2.00
  121. Android 7.1's Keyboard Is Hiding a Handy New GIF Search Tool
  122. Pixel Phones Bought From Google Will Have Unlockable Bootloaders
  123. 7 Reasons Why You Should (and Shouldn’t) Dual Boot Linux
  124. Systemd - FedoraProject
  125. SysVinit explained: starting and stopping of services | linuxvoodoo.com
  126. Boot process, Init and shutdown
  127. Meet systemd, the controversial project taking over a Linux distro near you
  128. systemd - Wikipedia, the free encyclopedia
  129. The Story Behind 'init' and 'systemd': Why 'init' Needed to be Replaced with 'systemd' in Linux
  130. linux startup systemd vs systemv - Google Search
  131. 10 Most Valuable Features in Apple's macOS Sierra
  132. Apple to fix backup security vulnerability in iOS 10
  133. Top 10 iOS 10 Features for iPad
  134. 12 hidden features in iOS 10
  135. Top 10 Terminal Tricks in macOS
  136. Kali Linux 2016.2 Delivers New Security Testing Options
  137. linux distro comparison - Google Search
  138. Bash Guide for Beginners, Free Machtelt Garrels Guide
  139. 5 of the Best Antivirus Programs for Ubuntu - Make Tech Easier
  140. Linux Took Over the Web. Now, It’s Taking Over the World
  141. LinuxCon: Tracing Linux's Roots, Mapping Its Future
  142. Linux at 25: What's Behind Its Success and Where It's Going
  143. How To Create ISO Files In Linux
  144. How Net Neutrality Works, And How It Affects You
  145. What You Must Know About Linux Rootkits
  146. How to Install Encfs and Encrypt Files in Mac OS X - Make Tech Easier
  147. Three Ways to Password Protect Folder on Mac OS X(El Capitan Included)
  148. How to Lock A Folder on Mac for Free without Software(El Capitan Included)
  149. Run Android Apps on Linux with Shashlik
  150. Cyborg Hawk Linux - Penetration Testing Linux Distro - Darknet - The Darkside
  151. Parallels, VMware, VirtualBox & Boot Camp face off
  152. Fedora 23 Improves Security, Desktop and Cloud
  153. 11 Hidden OS X El Capitan Features You Might Not Know About
  154. How to Use OS X’s New Split Windows View
  155. How to Enable Android 6.0’s Experimental Multi-Window Mode
  156. How to Easily Select Your Default Apps in Android 6.0
  157. How to Use Android 6.0’s Built-in File Manager
  158. How to speed up your internet connection on Linux
  159. 14 Things You Can Do in Android Marshmallow That You Couldn't Do in Lollipop
  160. How to Install and Configure CSF (Config Server Firewall) on CentOS 7
  161. How to Change a USER and GROUP ID on Linux For All Owned Files
  162. The Beginner’s Guide to Shell Scripting: The Basics
  163. systemd
  164. How To SSH Run Multiple Command On Remote Machine And Exit Safely
  165. BackBox Linux - Penetration Testing LiveCD - Darknet - The Darkside
  166. Top 3 Online Resources For Learning The Command Line
  167. Debugging Bash scripts
  168. Bash Shell PS1: 10 Examples to Make Your Linux Prompt like Angelina Jolie
  169. Intel's New Processors Bring 'Most Significant Advancements in Computing'
  170. Linus Torvalds Talks Linux Security at LinuxCon
  171. 5 YouTube Videos to Help You Get Started with Linux
  172. 4 of the Best Markdown Editors for Linux
  173. 5 Cool Android Camera Tricks with Camera360 Ultimate
  174. VirtualBox error "VT-x is disabled in the BIOS. (VERR_VMX_MSR_VMXON_DISABLED)"
  175. 22.9. Enabling Intel VT-x and AMD-V virtualization hardware extensions in BIOS
  176. virtualbox.org • View topic - Error after upgrade:VT-x is not available. (VERR_VMX_NO_VMX)
  177. Pentoo - Gentoo Based Penetration Testing Linux LiveCD - Darknet - The Darkside
  178. Rosetta Stone for Unix
  179. Linux Vs Unix: The Crucial Differences That Matter To Linux Professionals
  180. What Really Happens When You Delete Something from Your PC
  181. Android Lollipop: Taking mobile security to a new level
  182. Linux File Systems: Ext2 vs Ext3 vs Ext4
  183. General overview of the Linux file system
  184. Comparison of Linux distributions - Wikipedia, the free encyclopedia
  185. Linux Journal | The Original Magazine of the Linux Community
  186. How To Easily Enable Silverlight, And Watch Netflix, on Linux
  187. netfilter/iptables project homepage - The netfilter.org project
  188. I have a SysV init script on Fedora 18. How can I make it start after the network is ready? - Stack Overflow
  189. KDE System Administration/Startup - KDE TechBase
  190. Glx-Dock / Cairo-Dock - Home
  191. LibreOffice Review & Rating | PCMag.com
  192. Using Linux in a Windows world
  193. The Best Navigation App for iOS
  194. Demystifying Android 4.2 Jelly Bean | ExtremeTech
  195. CheatSheet Instantly Displays All the Keyboard Shortcuts for Mac Apps
  196. Buzzblog: EXCLUSIVE: Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  197. Bartender Cleans Up Your Mac’s Menubar
  198. Opening the OS X Firewall for your Server
  199. Top 10 Downloads That Enhance Mac OS X's Built-In Tools | Digg Technology
  200. NTFS-3G for Mac OS X: NTFS-3G 2009.4.4
  201. Mounting remote filesystems on OSX Leopard using sshfs, MacFuse and Macfusion
  202. Mac Os X: Mount NFS Share / Set an NFS Client
  203. 10.6: Mount remote Linux sshfs disks in 64-bit 10.6 - Mac OS X Hints
  204. The MacPorts Project -- Home
  205. The Best News Reader Application for Linux
  206. Eight tips for OS X's Quick Look | Macworld
  207. The Best Virtual Assistant for Android
  208. SlingPlayer (Kindle Fire Edition) Review & Rating | PCMag.com
  209. 15 Apps and Tweaks That May Convince You to Jailbreak Your iPhone
  210. OSXFUSE for Mac
  211. The best tidbits from the Steve Jobs bio - CNN.com
  212. Linux Desktop Faceoff: GNOME 3 Shell vs Ubuntu Unity
  213. 15 Free Apps for Personalizing Your Android Phone
  214. Systemd - FedoraProject
  215. 18 ways to view the ~/Library folder in Lion | Operating Systems | Macworld
  216. MacBook Air and OS X Lion synergy: A big hurdle for Windows 8 | ZDNet
  217. Virtualboxes.org Helps You Discover Your New Favorite Linux Flavor with Tons of Virtualbox Images
  218. Top 10 Secret Features in Mac OS X Lion
  219. Linux 3.0 a Steady Step Forward | PCWorld
  220. Oracle VM VirtualBox
  221. Get the Linux Mint GNOME Menu in Ubuntu [Linux Tip]

Cool! / Interesting

  1. Best eReaders for every type of book lover
  2. 10 Free Computer Programs To Replace Expensive Alternatives
  3. Google Drive rolls out a nifty feature for offline access to everyone
  4. 30 Years of Browsers: A Quick History
  5. The Best USB Wi-Fi Adapters for 2021
  6. How to survive three days in the wild
  7. AI is An Ideology, Not A Technology
  8. I moved my family from California to Austin, Texas, and regretted it. Here are 10 key points every person should consider before relocating.
  9. Best vacuum cleaner: How to tidy up fast
  10. How open-source software transformed the business world | ZDNet
  11. One Year With ThinkPad and Linux (From Macbook Pro)
  12. Commit 1 million: The history of the Linux kernel | ZDNet
  13. Amazing Apple Card concept shows the power of augmented reality
  14. Everyone's Video Chatting! But Which Service Is Best for You?
  15. Facebook rolls out tool to make it easier to help during the coronavirus outbreak
  16. What to know before buying a smartwatch
  17. Bang For Buck: 2020 Quad-Core MacBook Air Vs MacBook Pro Vs The MacBook Of The Future — The 2020 12.9-Inch iPad Pro With Magic Keyboard (Specs, Benchmarks, Price)
  18. Switching from iPhone to Android was an excruciating breakup
  19. Google Maps just got an amazing new hidden feature
  20. The flying taxi market is ready for takeoff, changing the travel experience forever
  21. Do this with your old Android phone
  22. Google Assistant's Text-to-Speech Feature Goes Live Today on Android
  23. This hidden Google Maps trick just changed my life
  24. A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH
  25. Wikipedia Is the Last Best Place on the Internet
  26. Facebook pushes EU for dilute and fuzzy Internet content rules – TechCrunch
  27. Did the Early Internet Activists Blow It?
  28. I just dumped one of Apple's worst, most beautiful products | ZDNet
  29. Apple lays groundwork to use iPhone as a car key via NFC
  30. Sign-stealing scandal: Should MLB restrict the use of technology or embrace it?
  31. The iPad Turns 10: A Look Back at Its First Decade
  32. This Graphic Explains 20 Cognitive Biases That Affect Your Decision-Making
  33. A quantum computing future is unlikely, due to random hardware errors
  34. How blockchain will kill fake news (and four other predictions for 2020)
  35. Amazon Echo Studio review: finally, an Echo that sounds great
  36. The Internet Archive Is Making Wikipedia More Reliable
  37. As the internet turns 50, experts weigh future advances and emerging issues
  38. What's in the latest Firefox update? Firefox 70 stops social media trackers
  39. The latest version of Firefox shows the wild scale of web tracking
  40. Remember The Dress? Here’s Why We All See Colors Differently
  41. 7 ways to use augmented reality on your phone
  42. Master data analytics and deep learning with this $35 Python certification bundle
  43. USB-C Has Finally Come Into Its Own
  44. Samsung Galaxy Watch Active 2 review: ‘good’ is as good as it gets
  45. The best open source software of 2019
  46. Prepare for the Deepfake Era of Web Video
  47. What's Your Favorite News Aggregator or RSS Reader?
  48. What is JavaScript? JavaScript and ECMAScript, explained
  49. Everything Amazon Announced Today, From Speakers to Glasses
  50. The Best Fitness Trackers and Watches for Everyone
  51. Why Your Memory Sucks, and What You Can Do About It
  52. 10 weirdest things your Amazon Echo can do
  53. Edward Snowden in His Own Words: Why I Became a Whistle-Blower
  54. Why France and Germany fear Facebook’s cryptocurrency – and plan to block it
  55. Top 10 file-sharing options: Dropbox, Box, Google Drive, OneDrive and more
  56. Three words for a faster emergency response | what3words
  57. The Best Smart Displays for 2019
  58. Kernel Panic: Inside the World's Worst Cyberattacks
  59. Mathematicians Discover the Perfect Way to Multiply
  60. MicroLED is the first new screen tech in a decade. Can it beat OLED?
  61. Disney Plus will cost $7 a month and launch Nov. 12
  62. What Is 5G?
  63. 3 Reasons Brits Voted For Brexit
  64. Apple News+ has issues, but it's a great deal for casual readers
  65. The danger of “I already pay for Apple News+”
  66. Your Environment Is Cleaner. Your Immune System Has Never Been So Unprepared.
  67. The Most Beautiful Day Hikes In America
  68. Pilot Who Hitched a Ride Saved Lion Air 737 Day Before Deadly Crash
  69. AI Algorithms Are Now Shockingly Good at Doing Science
  70. Foldable phones are about to make the US very jealous
  71. Inside the High-Stakes Race to Make Quantum Computers Work
  72. The 20 Best Places to Go in 2019
  73. Confused By Expiration Dates? You’re Not Alone. Here’s What They Really Mean
  74. Apple's Radical New iPhone Suddenly Takes Shape
  75. The best e-reader you should buy
  76. 10 Breakthrough Technologies 2019, curated by Bill Gates
  77. Today's Companies Have A Technology Adoption Problem, Not An Innovation Problem
  78. Facebook’s promised Clear History privacy tool to launch later this year following delay
  79. Wi-Fi 6, explained: how fast it really is
  80. Do Not Disturb: How I Ditched My Phone and Unbroke My Brain
  81. 15 Moments That Defined Facebook's First 15 Years
  82. 15 Years of Facebook in 4 Charts
  83. What programming languages rule the Internet of Things?
  84. How a Vermont social network became a model for online communities
  85. Super Blood Wolf Moon in Pictures
  86. Tim Cook calls on FTC to let consumers track and delete their personal data
  87. How Ring's Neighbors app is making home security a social thing
  88. 190 universities just launched 600 free online courses. Here’s the full list.
  89. Explainable AI: Peering inside the deep learning black box
  90. 100 Websites That Shaped the Internet as We Know It
  91. Web Founder Launches Inrupt to Improve Internet Privacy
  92. The Birth of Google
  93. Amazon Wants Alexa to Hear Your Whispers and Frustration
  94. Reimagining of Schrödinger's Cat Breaks Quantum Mechanics--and Stumps Physicists
  95. 10 critical points from Zuckerberg’s epic security manifesto
  96. The WIRED Guide to Virtual Reality
  97. Microsoft Translator Uses AI to Break Language Barriers on Smartphones
  98. Here Are the Major New Features Google Added to Gmail Today (and What It Didn't)
  99. Google’s astounding new search tool will answer any question by reading thousands of books
  100. RSS is undead
  101. It's Time For an RSS Revival
  102. SpareFoot Acquires SiteLink to Drive Innovation for the Self-Storage Industry - The SpareFoot Blog
  103. How the iPad Pro with Smart Keyboard totally replaced my Macbook | ZDNet
  104. Augmented Reality Check: Why Businesses are Embracing AR in 2018
  105. Microsoft’s new open source tool lets you bring your own Linux distro to Windows
  106. How IBM Aims to Make AI Commonplace in AppDev, Business
  107. Why Blockchain Will Survive, Even If Bitcoin Doesn’t
  108. The Secret to a High Tech Concierge Medical Office? Data
  109. Why Artificial Intelligence Researchers Should Be More Paranoid
  110. Introducing AMP Stories, a Whole New Way to Read WIRED
  111. The hottest iPhone and Android accessory we’ve covered in 2018 so far is only $37 on Amazon
  112. Muse Auto smartens your car with Alexa
  113. What Is Bitcoin? | Cool History
  114. The Entire History of Bitcoin in a Single Infographic
  115. Should Data Scientists Adhere to a Hippocratic Oath?
  116. The Chrome Extensions We Can't Live Without
  117. Intel wants smart glasses to be a thing
  118. You can now use Alexa to send SMS messages
  119. Best Amazon Alexa Skills 2018 - Top 50 Cool and Useful Things Alexa Can Do
  120. You Need to Deal With Your Digital Legacy Right Now
  121. Facebook Local Might Be the Only Facebook App You Need
  122. StumbleUpon
  123. Twenty Years after His Death, Carl Sagan Is Still Right
  124. A history of hacking and hackers
  125. Here's what happened when 30 high school sophomores gave up their phones for a day
  126. Find Out Which Cognitive Biases Alter Your Perspective
  127. Life-hacking websites you didn’t know existed (10 photos)
  128. The 10 must-have Safari extensions of 2017
  129. The 12 must-have Firefox add-ons of 2017
  130. Google Earth Gets a Huge Redesign with Guided Tours, 3D View, and More
  131. USAFacts
  132. Is Evernote Premium Worth Its Money for You?
  133. Evernote Embraces MacBook Pro's Touch Bar for Faster Note Taking
  134. 15 fascinating facts you probably didn't know about Amazon
  135. The 15 Most Useful Google Apps You Never Knew Existed
  136. The Seven Best Things You Can Do With an Amazon Echo
  137. This Site Shows You Both Sides of Major Controversial Issues
  138. 5 Brilliant Kindle Apps and Sites Every Ebook Lover Needs
  139. The world's smallest USB-C laptop charger—I'm in love
  140. Google Maps lets you save and share favorite places with launch of Lists
  141. Physicists Just Showed That Quantum Entanglement Is a Physical Reality
  142. Top 10 Free Alternatives to Expensive Software
  143. Apple CarPlay: everything you need to know about iOS in the car
  144. Comparing Microsoft's New Surface Book to Apple's MacBook Pro
  145. A Free Open Source Alternative to Microsoft Visio
  146. Massive banks are ripping off Americans. There is finally an alternative.
  147. REVIEW: Google Home is a win (and better than the Amazon Echo)
  148. These Skills Are Hard To Learn But Pay Off For The Rest of Your Life – The Mission
  149. Millennials changing the face of cybersecurity
  150. 10 Powerful Habits That Will Boost Your Intelligence
  151. The real-world uses for virtual reality - BBC News
  152. This Week's Top Downloads
  153. Amazon Launches New Prime Reading Program
  154. QuickSafes.com
  155. The AI disruption wave
  156. How people are using the Amazon Echo: New study reveals surprising patterns
  157. United States set to Hand Over Control of the Internet to ICANN Today
  158. US hands over control of internet on schedule - despite last-ditch protests | ZDNet
  159. Google Allo: Everything you need to know | Drippler - Apps, Games, News, Updates & Accessories
  160. A Gorgeous—and Unsettling—Video of Evolution in Action
  161. Top 10 Places to Download or Stream Movies For Free, Legally
  162. 11 basic Excel tricks that will change your life
  163. The Ultimate Road Trip Has Been Planned By Scientists. THIS Is What It Looks Like
  164. 6 literary classics you should listen to as audiobooks
  165. Three essential coding languages you can learn today
  166. IBM's Watson analyzed all the 'Harry Potter' books and movies — and the results are fascinating
  167. 35 Most Popular Facebook Pages in the Geek World
  168. A Simple Explanation of What Net Neutrality Is All About
  169. See 11 of the Year's Best Wildlife Photographs
  170. How Much Digital Media Can Fit on History's Storage Devices
  171. What’s Up With That: Why Does Sleeping In Just Make Me More Tired?
  172. 6 Websites to Download eBooks For Free and Legally
  173. Offline over the weekend? Read all the tech news you missed here
  174. 10 Best Channels for STEM Education on YouTube
  175. Programming Languages - Hyperpolyglot
  176. Google's New Flight Search Tool Helps You Find The Best Price
  177. Total Knee Replacement: A Patient's Guide | UW Orthopaedics and Sports Medicine, Seattle
  178. Automagic: 4 Dropbox-connected apps that do the work for you | Dropbox for Business blog
  179. Google Translate Now Does Real-Time Voice And Sign Translations On Mobile | TechCrunch
  180. 10 CES Themes Likely to Resonate for Some Time
  181. Viva Las Vegas!
  182. 15 Documentaries About The Internet, Hacking, Startups & Cyberculture [Stuff to Watch]
  183. What File System Should I Use for My USB Drive?
  184. Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
  185. Best Computer Monitors: October 2014 - Best Monitors For The Money
  186. What You Should Know About the Amazon Kindle Voyage
  187. Most Popular Place to Buy Computer Parts: Newegg
  188. Plastc wants to replace your entire wallet with a single card
  189. Logitech K480 Multi-Devices Bluetooth Keyboard
  190. 50 Little-Known Ways Google Docs Can Help In Education | Edudemic
  191. Amazon.com: Business Analysis: Best Practices for Success (IIL/Wiley Series in Business Analysis) eBook: Steven Blais: Kindle Store
  192. Mozilla launches Open Badges 1.0, delivers virtual kudos for real skills
  193. Visual Network Simulator To Teach Basic Networking?

Blockchain

  1. Why the Fed is considering a cash-backed cryptocurrency
  2. Utah county moves to expand mobile voting through blockchain
  3. IBM launches blockchain-based supply chain service with AI, IoT integration
  4. Why Wells Fargo plans to pilot its own cryptocurrency
  5. How pharma will soon use blockchain to track your drugs
  6. Why wearables, health records and clinical trials need a blockchain injection
  7. FedEx CIO: It’s time to mandate blockchain for international shipping
  8. How blockchain is becomming the 5G of the payment industry
  9. IBM launches global blockchain-based payments network
  10. The difference between blockchain and a database explained
  11. Blockchain: The complete guide
  12. Sharding: What it is and why many blockchain protocols rely on it
  13. W. Va. says mobile voting via blockchain went smoothly
  14. Blockchain for business: 6 promising pilots
  15. Walmart, Sam’s Club tell suppliers to get on blockchain network
  16. 1. How Blockchain Works
  17. Here's what two executive surveys revealed about blockchain adoption
  18. W. Va. to use blockchain-based mobile app for mid-term voting
  19. What is blockchain? The most disruptive tech in decades
  20. New blockchain ledger will let you sell personal healthcare data
  21. BMW, GM, Ford and Renault launch blockchain research group for automotive industry
  22. Blockchain growth makes developers a hot commodity
  23. Will privacy be a stumbling block for blockchain?
  24. Someone wrote a kids' book to explain bitcoin and blockchain
  25. Can Blockchain Fix the Opioid Epidemic? Intel Wants to Find Out
  26. Hackers steal over $150,000 in cryptocurrency with DNS scam
  27. How blockchain can give readers more power on the internet
  28. Explainer: What is a blockchain?
  29. Bank Of America Seeks Patent On Blockchain-Based Data Storage System
  30. Blockchain to ‘radically’ transform anti-fraud, anti-money-laundering efforts
  31. How blockchain could solve the internet privacy problem
  32. Google will soon bring a blockchain-like system to the cloud
  33. Startup Xage Launches Blockchain-Protected IIoT Security
  34. IFTF: Blockchain Futures Lab
  35. Why Blockchain Will Serve New IT Purposes in 2018
  36. As blockchain heats up, so do job prospects for devs
  37. UpNest Featured in ABC 6 News
  38. 5 ways blockchain is the new business collaboration tool
  39. IBM sees blockchain as ready for government use
  40. Looking To Integrate Blockchain Into Your Business? Here's How
  41. Looking To Integrate Blockchain Into Your Business? Here's How
  42. Microsoft to test blockchain-based self-sovereign ID system
  43. Blockchain: The Complete Guide
  44. How blockchain can secure the IoT
  45. Blockchain - Wikipedia
  46. The Basics of Blockchain Technology, Explained in Plain English
  47. How Amazon Is Quietly Entering The Blockchain And Cryptocurrency Boom
  48. Blockchain and cryptocurrency may soon underpin cloud storage
  49. What Is Blockchain?

Cloud Computing

  1. IBM Opens Up Series of Security, AI and Cloud Initiatives
  2. What is a data lake? Flexible big data management explained
  3. 4 hidden cloud computing costs that will get you fired
  4. IT Turning to the Cloud to Handle Growing Big Data Demands
  5. Cloud Storage Comparison 2018: Compare Security & Features
  6. The 3 reasons CIOs have become cloud-first
  7. How Cloud Computing Impacts Corporate Security for Better or Worse
  8. What is cloud computing? Everything you need to know from public and private cloud to software-as-a-service | ZDNet
  9. How the Internet of Things will affect security & privacy
  10. Lima: Your Personal Cloud Storage Review
  11. Opinion: The FCC's Net Neutrality Victory Is Anything But | WIRED
  12. Best practice for using cloud computing in Europe 2013 (Part 1)
  13. 8 questions that will dominate enterprise cloud adoption
  14. Apple iOS 6 iCloud enhancements bring new enterprise problems
  15. Cloud computing is entering its teen years | Digg Technology
  16. VMware's WSX Does Virtual Desktops With HTML5 | Cloudline | Wired.com
  17. Dropbox just integrated with Facebook, making it easy to invite friends to shared folders | Digg Technology
  18. Jolicloud Me to Integrate Content From Multiple Online Services | PCWorld Business Center
  19. Jolicloud Me Delivers Personal Cloud Search, More | Cloudline | Wired.com
  20. What the cloud really means for your IT job
  21. 'Personal Cloud' to Replace PC by 2014, Says Gartner | Cloudline | Wired.com