Tech Thoughts Daily Net News – February 5, 2013

Top 10 tips to keep your kids and teens safe onlineToday is Safer Internet Day. And with 86% of 7-11 year olds and 96% of 11-19 year olds communicating online it’s important everyone knows how to stay safe. So here are some tips for you to pass on to youngsters to make sure they’re clued up about their online safety.

Infographic: Password Protecting Your Relationships – Nearly two-thirds of smartphone owners keep personal and intimate information on their mobile devices, but only 40 percent keep their phones password-protected.

Jailbreak any iOS 6 device – At long last, a jailbreak method has been released for iOS 6 and higher, which makes this the first jailbreak for the iPhone 5.

Make Office 2013 more powerful with 10 killer apps – There’s no dictionary, geographic mapping or flow chart tool baked into the core Microsoft Office 2013 software, but you can still get all these functions for free or a small fee. Developers from Microsoft and beyond have created a variety of apps that you can embed within Word, Excel, PowerPoint or Outlook to work faster and more intelligently.

Tech Thoughts Daily Tech News 2

New Linux distro will target disabled users – There are more than a billion people around the globe living with some sort of disability today, yet software in general and operating systems in particular are just beginning to address their computing needs. Microsoft’s Windows 8 reportedly brought with it some accessibility improvements, and now a new project on the Linux side aims to take such efforts even further with a brand-new Linux distribution specifically targeting disabled users.

Get Organized: Tips for Arranging Windows 8 Tiles – Got Windows 8? If you know what you can and cannot do to adjust the display of your app tiles, you’ll be much more adept at setting up your start screen. Check out our tips.

The ultimate guide to tweaking your GPU’s most arcane settings – This guide will walk your through the various settings in the control panels supplied by AMD and Nvidia. We won’t try to cover every possible setting; instead, we’ll offer rules of thumb to help you understand what to tweak and what to leave alone. When possible, we’ll show the same settings on the different control panels, side by side, since AMD and Nvidia often use different terminology for the same setting.

Chrome, Firefox now on speaking terms – New developments in HTML5 let people using the two browsers talk to each other, without third-party apps.

Top 10 tech upgrades to make your small business run faster – If you’re lucky enough to have extra funds in this year’s IT budget, or if you’re planning to invest in incremental improvements, here are 10 tech upgrades that will help your employees get things done faster in 2013.

$25 Raspberry Pi Model A ships in Europe and soon the world – Priced at $25, the Raspberry Pi Model A went on sale in Europe today, although that restriction will be lifted “very soon,” according to a blog at the Raspberry Pi Foundation website.

Security:

Energy Department Confirms January Hack – The Department of Energy on Monday confirmed that it was the victim of a cyber attack in mid-January that resulted in the disclosure of personally identifiable information from employees and contractors.

Anonymous posts over 4000 U.S. bank executive credentials – Anonymous appears to have published login and private information from over 4000 American bank executive credentials its Operation Last Resort, demanding US computer crime law reform.

Google Blocks High Profile Sites After Advertising Provider NetSeer is Hacked – Google Chrome users, among others, couldn’t access some of the most popular Web sites Monday after an advertising network’s corporate Web site was injected with malware. But, according to the ad company’s chief executive, those sites were safe.

Welcome to bullyware: Malware gets more aggressive in money hunt – Cybercriminals are using malware to go beyond merely swiping passwords and actually “bullying infected users into paying,” according to a Fortinet quarterly report on emerging threats. Fortinet’s fourth quarter report walks through the methods cybercriminals are using to extract dough from victims. The gist: Fortinet is arguing that money making malware will take threats to a new level in 2013.

Report: Obama Can Authorize Pre-emptive Cyber Attack – Intelligence officials have determined that the president of the United States has the power to launch a pre-emptive strike if a major cyber attack is imminent, according to the New York Times.

Wireless Carriers Put on Notice About Providing Regular Android Security Updates – Activist Chris Soghoian, whom in the past has targeted zero-day brokers with his work, has turned his attention toward wireless carriers and their reluctance to provide regular device updates to Android mobile devices.

Company News:

Intel shrinks its SSDs, aims for tablets, smartphones – The diminutive new line could help raise Intel’s profile in the mobile marketplace—despite its desktop and laptop dominance, the company has not seen its processors widely used in smartphones and tablets, and could benefit from an improved reputation among mobile OEMs.

Google Extends Windows Phone Exchange ActiveSync Support Until July – Google has agreed to delay the removal of support for Microsoft’s Exchange ActiveSync protocol (Google Sync) until July.

Amazon Drops Kindle Fire HD 8.9″ Price Ahead of Valentine’s Day – Amazon is once again offering a discount on its 8.9-inch Kindle Fire HD, shaving $30 off the Wi-Fi version and $50 off the 4G LTE tablet.

Report: Twitter buys social TV analytics company BlueFin Labs – According to Business Insider, the social media giant’s acquisition would be its largest ever. Such a deal would give Twitter strong insight into how users mix TV and social media.

Apple wins California credit card privacy case – Court finds that Apple and online retailers, unlike their brick-and-mortar counterparts, can collect personal information when processing credit card transactions.

Webopedia Daily:

Backronym – A type of acronym that is made by deciding on the letters to create a word, and then creating a name or title to fit the acronym. Similar to acronyms, a backronym can be pronounced as a word (those which are pronounced as separate letters and not a word are called abbreviations). In computers, Internet and technology there are a number of famous backronyms. The Apple Lisa was named after Steve Jobs’ daughter but was later said to be an acronym for “Local Integrated Software Architecture.” The BASIC programming language is also believed to be a backronym. The language was called BASIC, and then the acronym of “Beginner’s All-purpose Symbolic Instruction Code” was created.

Off Topic (Sort of):

The privacy cliff and how not to fall off it – The differences between the EU and the U.S. threaten the global interoperability of e-commerce; companies operating under U.S. law will fail to satisfy proposed EU law and may find Europe’s doors barred to them—with fines mounting, revenues dwindling, and economies eroding. This is the privacy cliff.

Hardware neutrality: UEFI strikes again and again – The latest UEFI snafu involved the bricking of Samsung laptops. It’s time that hardware vendors knew consumers and IT pros demand the right to hardware neutrality.

Cracked: 29 Conspiracy Photos Crazy People Will Be Forwarding Next – For every calm, sound, rational theory behind what’s going on in a photo, there are about 100 bat-crazy other theories that get more attention. We asked you to take some seemingly normal photos and show us just what is actually going on.

The Complete Guide to Selling Your Unwanted Crap for Money – We’ve shown you how to kick your clutter habit, but why trash all of those things you don’t need when you could make some money off of them? In this guide, we’ll walk you through how you can appraise your items, where to sell them to make the most cash, and how to avoid getting screwed in the process.

How adventure games came back from the dead – Clearly, adventure games are far from dead; instead, this classic genre that defined early PC gaming is finding a second wind and a new audience hungry for a story-driven experience. It’s a good time to look back and remember why adventure games failed in the first place, then talk to some experienced PC game designers about what’s next for the genre in the wake of The Walking Dead’s surprising success.

Job seeker victim of job scam – Cindy Cliff is looking for work, and if there is any justice in the world she’ll soon find something. She’s smart, thorough, and as you’ll see by the end of this column, has a pretty good understanding of what work means. A few days before Christmas, she thought she had found a job. After months of searching, she had applied for an “Executive/Personal Assistant” position on Monster.ca. (suggested by Aseem S.)

Today’s Quote:

“I find that a great part of the information I have was acquired by looking up something and finding something else on the way.”

–      Franklin P. Adams

Today’s Free Downloads:

SlimComputer – New computers come pre-loaded with promotional software, ad links, toolbars and trial offers. SlimComputer removes unneeded programs, start-up entries and services and slims down your new machine to make it run fast and clean like it’s supposed to.

neoSearch 2.50 – A tiny and light program that puts YOU in control. Advanced algorithms make indexing a breeze – literally! Searching happens in the blink of an eye – technically, the program can run up to 25 distinct searches in a blink – if you could type that fast!

Advertisements

Comments Off on Tech Thoughts Daily Net News – February 5, 2013

Filed under downloads, Internet Security Alerts, Tech Net News

Comments are closed.