Free Tools to Wipe Your Drives Securely – If your drives are encrypted and you trust the encryption protocol (full disk encryption is pretty safe), all you have to do is delete your encryption keys. If you want to safeguard your privacy further–and prevent data theft down the road–here are a few cheap and simple tools designed to wipe your hard drive, solid-state drive, or USB flash drive thoroughly before you dispose of it.
10 Fantastic Websites You Need Now – From tips for shopping or gambling to business and travel resources and reality checks while browsing, here is a roundup of great sites that are largely under the radar (until now).
Disable comments on most Web sites with Shut Up – Commenters can be cruel and stupid as often as they can be witty and insightful. The aptly named Shut Up extension for Chrome hides the comments section of most sites.
Labyrinth Gone HTML5: Google Unleashes Maps Cube Game – Ever wanted to roll through the streets of Las Vegas as a giant marble? Google’s new Cube game makes your wish come true.
Tech Movie Guide for 2012 – The season technically kicks off this week, so check out the superheroes, vampires, secret agents and more that will invade movie theaters this summer.
Flashback malware exposes big gaps in Apple security response – A pair of high-profile malware attacks have given Apple a crash course in security response. Based on recent actions, 70 million current Mac owners have a right to expect much more from Apple than they’re getting today.
Back Up a Bootable CD or DVD – Without the word bootable, the answer would be a no-brainer. You’d simply copy all of the files and folders on the disc into a .zip archive file. Then, when you needed them on disc, you’d copy them back. The problem, of course, is that the new disc wouldn’t be bootable. Not good with a Windows or Linux disc. So instead, create an .iso file. This is basically an image backup of an optical disc–a compressed record of every bit on the CD or DVD. When you restore it, you make an exact copy of the original, including its ability to boot a PC.
CISPA: 4 Viewpoints You Should Hear – Parties with strong opinions are weighing in on the controversial Cyber Information and Security Protection Act making its way through Congress, raising a plethora of questions along the way.
First Consumer 802.11ac Wi-Fi Router Will Ship From Netgear Starting Next Month – Announced on Thursday, the R6300 will start shipping in May, and is capable of speeds up to 1.3Gbps on the 5 GHz band, assuming of course you have a compatible 802.11ac device on the receiving end.
Who’s the King of Smartphone Sales? – Is Apple or Samsung leading the pack? It depends on whose numbers you believe and what you’re counting.
Company News:
IBM Gets Behind Snort, Expands Anomaly Detection – Since its debut in 1998, the open-source Intrusion Prevention System (IPS) known as Snort has become a popular platform for security signatures to protect enterprise IT assets. Today, IBM announced support for Snort signatures as part of an expanded security threat analytics capability that is designed to alert organizations to suspicious outbound traffic from infected “zombie” computers.
Apple highlights job creation in tax-dodge response – Rebuttal comes in the wake of a report claiming the tech giant goes to great lengths to avoid paying billions of dollars in taxes.
Dell says XPS 13 sales exceed expectations – Dell’s first ultrabook is off to a strong start, offering some hope for the new class of skinny laptops.
Pinterest sees user base double in three months – Launched a little more than two years ago, the social photo-sharing service has doubled its number of daily unique visitors to 4 million since January, according to new data from social media marketer Tamba.
Nvidia Announces GeForce GTX 690 Dual-GPU Video Card – Nvidia claims that the GTX 690, which fuses two Kepler GPUs and introduces a number of new design elements, is the fastest video card ever created.
Webopedia Daily:
Blacklist – In Internet terminology, a generic name for a list of e-mail addresses or IP addresses that are originating with known spammers. Individuals and enterprises can use blacklists to filter out unwanted e-mails, as most e-mail applications today have filtering capabilities. Also referred to as a blackhole list, the blacklist also can include ISPs that allow known spammers to use their services. Compare with RBL, a blackhole list maintained by MAPS LLC.
Off Topic (Sort of):
Hey, kids, more moms want iPads for Mother’s Day – A survey suggests that tablets and smartphones are swiftly catching up to jewelry and flowers as gifts that mothers crave (or, at least, feel they deserve) for Mother’s Day.
Gear4 Renew SleepClock Review: It Knows When You’re Sleeping – Over the last six nights, I’ve learned that I’m not a great sleeper. I need at least a half hour to doze off, and I’m likely to stir from my slumber a few times or more during the night, which in turn prevents me from getting enough deep sleep. Although I’ve suspected those things for some time, Gear4′s Renew SleepClock has delivered irrefutable evidence: charts of my sleep patterns, appearing every morning on a companion app.
iPhone-carrying bra is no bust – Some of us are slaves to technology while others are slaves to fashion, but for those of us who are indentured to both, this iPhone-carrying bra could be the path to liberation. Even if, like me, you don’t possess an iPhone or breasts, it’s still a wonder to behold.
GM concept car is an electric-networked vehicle – What is the car of tomorrow? A flying space car a la the Jetsons? The once popular people mover in Disneyland’s Tomorrowland? Or is it, as GM envisions, an electric-networked vehicle which you leave the driving to for the most part while you catch up on the digital daily and drink your coffee on the commute to the office?
Today’s Quote:
“The key to being a good manager is keeping the people who hate me away from those who are still undecided.”
– Casey Stengel
Today’s Free Downloads:
CloneSpy 2.63 – CloneSpy can help you free up hard drive space by detecting and removing duplicate files. Duplicate files have exactly the same contents regardless of their name, date, time and location. Also, CloneSpy is able to find files that are not exactly identical, but have the same file name.
Dictionary .NET – Dictionary .NET is a tiny, easy and smart multilingual dictionary translating from/to 52 languages using Google´s services. Integrates Google Dictionary, Translate, Search, Suggest, Wikipedia 5-in-1 without installing them.