Your Android BYOD Toolbox: 15 Apps, Services, and Products – The “bring your own device” trend is taking the U.S. workplace by storm. A recent survey by BYOD service provider Enterasys found that 81 percent of U.S. workers are using at least one personal electronic device for business purposes. If you plan on using your personal handset for work and play, here are 15 handy tools that will help to secure your data and keep you more productive at home and in the office.
The Browser Wars – Chrome, Firefox, Internet Explorer—which one is the best these days? You might be surprised at how well up-and-comer Maxthon does in our testing.
Notes for Gmail Adds Sticky Notes to Your Messages – Though still in early beta, this Chrome plug-in (coming soon for Firefox) has the makings of one of the handiest Gmail tools ever.
Dictation Is a Free, Easy-to-Use Speech-to-Text App for Chrome – Google Chrome has a built-in speech recognition system, but you can only use it in certain places. Dictation is a webapp that uses Chrome’s speech recognition engine, but allows you to dictate much larger chunks of text right inside a simple webapp.
Does powerline networking nuke radio hams? – Paul Ockenden upsets the amateur radio community by plugging powerline networking. It would appear that, at least from a technical point of view, there are valid arguments on both sides, but even if you ignore these technology arguments, the debate still doesn’t have any clear winner.
Add Quick Launch shortcuts to your Android lock screen – Looking for a new way to get quick access to your apps and missed notifications? This app will replace your current lock screen with a more useful one.
Tips for college students to deter identity theft – Research from Javelin Research & Strategy identifies 18-24 year olds as consumers who are most likely to engage in risky electronic behavior. From public Wi-Fi through smart phone usage, this group tends to put itself in harm’s way when it comes to identity theft.
7 Tips for Using System Information – System Information provides a centralized location to get all kinds of details about your computer’s hardware configuration, computer components, and software, including drivers. As such, System Information can come in extremely handy as a starting point for troubleshooting problems related to your system configuration. In this gallery I will provide detailed screen shots illustrating 7 tips for using the System Information tool in Windows 7.
Put a Second Windows Environment on Your PC – There are several ways to set up a second Windows environment on your primary computer. But let me start with one that doesn’t work: You can’t install Windows on an external drive and boot from that. Windows only works from an internal drive. But here are a few things you can do.
Opt-in to Google’s Account Chooser for easier multiple account log-ins – “YES!” was my out-loud reaction to Google’s latest update to its multiple account sign-in feature. Currently an opt-in tool, new Account Chooser simplifies the login process, greatly reducing the number of times you have to re-enter your usernames and passwords throughout the day. First spotted by The Next Web, the Account Chooser applies to both personal accounts and Google Apps, and works with most popular Google services, like YouTube, Gmail, and Google Plus.
Get Organized: 7 Tips for Cleaning Up Your Blog – Blogging gets messy quickly, and we all know that there’s no way anyone with an active blog can thoroughly clean up the whole thing. But you can still fix up your blog in a way that increases traffic by following the tips and checklist in the latest edition in our Get Organized series.
Bogus “MS Cyber-Crime Department” warnings lead to phishing – Emails purportedly sent by the Microsoft Cyber-Crime Department warning all Internet users that their email account may be deleted from the “world email server” has been hitting inboxes around the world. Following the embedded email will take the victims to a page where they are asked to supply their email address, username and password. Unfortunately, the inputed information is sent directly to the phishers.
Citadel Trojan targets airport employees with VPN attack – Trusteer have recently discovered a sophisticated Man in the Browser (MitB) enterprise attack that targets VPN users at a major international airport hub. Using the Citadel Trojan, criminals are targeting employees to steal their credentials for accessing internal airport applications.
Researchers release ways to detect Gauss malware – See if your system is infected by the new “cyberespionage toolkit” with tools from Kaspersky Lab and CrySyS Lab.
WikiLeaks endures a lengthy DDoS attack – Under a barrage of more than 10GB per second in a DDoS attack, the document-leaking organization’s Web site has been either inoperable or sluggish since the beginning of the month.
RadioShack Plan for Carrier Service Leaked – The retailer is apparently moving from simply selling handsets to providing mobile service in partnership with Cricket.
Google Acquires Frommer’s Travel Business – Google has acquired Frommer’s, according to John Wiley & Sons Inc., which owns the travel brand. Wiley signed a deal with Google on Friday, the company said today, to sell all of its travel assets, which includes the Frommer’s brand. Terms of the deal were not disclosed.
Apple Talks Licensing Fees, ‘Shock’ Over Samsung Devices – Samsung and Apple this week continued to reveal juicy company secrets in filings for their ongoing patent trial, from how much Apple demands in licensing fees to why customers selected Android over iPhone.
Judge tosses trio of Samsung phones from Apple case – Three of Samsung’s allegedly infringing “world phones” have been excluded from U.S. case. Samsung scored a minor victory in court this afternoon when the judge in its patent fight with Apple excluded three of its allegedly infringing phones from the case against the two U.S.-based parts of its business.
RIM chief: Rivals could license BlackBerry 10 – Research In Motion’s boss says the forthcoming operating system could be licensed across non-BlackBerry devices, if RIM should choose to do so.
Duty Cycle – In print and copy terminology, duty cycle refers to the number of copies or prints that the device can reliably produce on a monthly basis. Exceeding the duty cycle number on a regular basis can lead to equipment malfunctions and breakdowns over time. Alternatively, not printing or copying in numbers close to the duty cycle could mean you have over-purchased on equipment.
Off Topic (Sort of):
The Five Biggest Myths About Saving Energy in the Summer – This summer has already set temperature records around the nation, and we’re still in the dog days of August. With money tight, and temperatures high, there’s a temptation to test out unconventional ways to beat the the heat. But these odd home remedies can end up wasting energy and costing more money. Here’s how to know what really works when you want to keep cool for cheap.
Raising user awareness about privacy issues – In this Help Net Security podcast Catalin Cosoi, Chief Security Researcher for Bitdefender, talks about the company’s efforts for making users aware of the privacy issues on the Internet, and warns about the fact that even if you’re avoiding using social media, there might be information about you on the Internet that you would prefer not to be available to everyone.
Does Moore’s Law Still Apply to Desktop Speeds? – Is Moore’s Law still relevant? The actual term refers to a prediction by Intel’s Gordon Moore back in 1965 that transistor density will double every 18 months (later changed to every 24 months). That doubling of transistors every two years is still on pace, even though it seems like the industry keeps needing new technology to make it happen.
15 Fast Facts About Microsoft – They were teenagers then, but they would eventually go on to create something far, far larger: Microsoft. Those founding teenagers, Bill Gates and Paul Allen, were inspired by an issue of Popular Electronics to create the Altair BASIC interpreter as Microsoft’s first product in 1975. Today, Microsoft Office, the Windows operating system, Bing, Xbox 360, MSN, the Microsoft Surface tablet, Windows Phone and countless other products are now associated with the brand.
Tweet from a Commodore 64? We Do That and More to Celebrate the Beloved PC’s 30th Birthday – Our intrepid computer historian uses the Commodore 64 to tweet, visit websites, and do other PC tasks invented long after the famous gaming computer launched three decades ago.
Family of potential network hackers thwarted by Australian telco engineers – Network integrity maintained, potential denial of service attack thwarted, change control committee happy… For once, a hacker story with a happy ending!
Highest-Resolution Photo Printer Makes Microscopic Color Prints – This 100,000-dpi photo printer makes nano-sized full-color images on a canvas that’s as wide as a human hair.
“The only function of economic forecasting is to make astrology look respectable.”
– John Kenneth Galbraith
Today’s Free Downloads:
CrystalDiskInfo 5.0.1 – CrystalDiskInfo is a HDD health monitoring utility. It displays basic HDD information, monitors S.M.A.R.T. values and disk temperature.
Comodo BackUp 18.104.22.168 – Comodo BackUp is the straightforward and powerful utility that allows users to quickly and easily create backup copies of critical data. Protect yourself against ever losing those critical files that took hours to create. Schedule backups to run automatically at a time that suits you.