GeekLikeMe.net

GeekLikeMe

(home)
Insert quarter. Avoid Klingons.
Collected web clippings, ramblings, and scribblings from me to you.

Thursday: October 15, 2009

Some Kindle tricks and features that you not have previously known about.Some Kindle tricks and features that you not have previously known about.

Yes, it's quite possible to take screenshots and play games with your beloved Kindle. Who knew?

Posted to Weekdaily filed in Strange @ 7:52 AM | Tags (9) | amazon | kindle | tricks | tips | secrets | ars | weird | strange | neat |  | Discuss (0) |  | facebook | twitter | 32 Clicks | Posted by Vin


A list of the top seven technology disasters of the decade.A list of the top seven technology disasters of the decade.

In what has been called the largest credit card crime of all time, earlier this year, Heartland Payment Systems announced that hackers had broken into the computers it uses to process about 100 million transactions each month for 175,000 merchants.

Posted to Weekdaily filed in Security @ 7:49 AM | Tags (7) | breach | data | disasters | flaws | hacks | security | technology |  | Discuss (0) |  | facebook | twitter | 37 Clicks | Posted by Vin


Tuesday: October 13, 2009

Five ways that you are secretly being monitored.Five ways that you are secretly being monitored.

Yes, it is quite possible that your printer may be used against you in a court of law. The is technology embedded in newer printers from Xerox, Dell, Canon, Lexmark. So, next time you have a top secret document - write it down.

Posted to Weekdaily filed in Security @ 7:45 AM | Tags (5) | bigbrother | cracked | monitored | paranoid | security |  | Discuss (0) |  | facebook | twitter | 64 Clicks | Posted by Vin


Wednesday: October 7, 2009

The first rule of hacking PayPal is you don't talk about hacking PayPal.The first rule of hacking PayPal is you don't talk about hacking PayPal.

The hacker confirms he offered a class to penetration testers that taught them everything they'd need to test and carry out attacks on SSL certificates, and as part of that, he included a proof-of-concept certificate.

Posted to Weekdaily filed in Security @ 7:39 AM | Tags (6) | banishment | hacking | paypal | security | ssl | theregister |  | Discuss (0) |  | facebook | twitter | 15 Clicks | Posted by Vin


Tuesday: October 6, 2009

It might be time to think about changing your Hotmail password.It might be time to think about changing your Hotmail password.

A Microsoft spokeswoman confirmed that the company doesn't store passwords in the clear and said its security team has been investigating the leak since this weekend.

Posted to Weekdaily filed in Security @ 8:01 AM | Tags (7) | phishing | password | hotmail | windowslive | security | leak | theregister |  | Discuss (0) |  | facebook | twitter | 6 Clicks | Posted by Vin


The top eleven signs that Google knows way too much about you.The top eleven signs that Google knows way too much about you.

3. The feeding tube used while you're connected to the Google Collective has that minty flavor you love so much.

Posted to Weekdaily filed in Funny @ 7:53 AM | Tags (6) | bbspot | funny | google | information | privacy | security |  | Discuss (0) |  | facebook | twitter | 35 Clicks | Posted by Vin


Monday: September 28, 2009

Want to know which ten states get the most spam?Want to know which ten states get the most spam?

'Interestingly, the top three most spammed states were among the 10 least spammed states in 2008,' the company said in the report.

Posted to Weekdaily filed in Security @ 7:40 AM | Tags (7) | spam | email | security | interwebs | internet | junk | states |  | Discuss (0) |  | facebook | twitter | 12 Clicks | Posted by Vin


Friday: September 25, 2009

Microsoft would like you to know Google Chrome Frame plugin not all that secure.Microsoft would like you to know Google Chrome Frame plugin not all that secure.

Also, please disregard those news articles from yesterday claiming the plugin makes Internet Explorer ten times faster. That's just crazy talk.

Posted to Weekdaily filed in Security @ 7:57 AM | Tags (7) | microsoft | chrome | plugin | security | google | ie | explorer |  | Discuss (0) |  | facebook | twitter | 10 Clicks | Posted by Vin


Wednesday: September 23, 2009

Some details surface online about Microsoft's upcoming secret tablet device.Some details surface online about Microsoft's upcoming secret tablet device.

The tablet/booklet device is called Courier and it supports multitouch finger gestures as well writing styles for use with a stylus.  It looks like a giant Nintendo DS on steroids. There's also a demo video located on Gizmodo's site.

Posted to Weekdaily filed in Gadgets @ 7:47 AM | Tags (6) | booklet | device | gadget | microsoft | secret | tablet |  | Discuss (0) |  | facebook | twitter | 15 Clicks | Posted by Vin


Tuesday: September 15, 2009

Recent iPhone security fix reveals Microsoft Exchange security flaw.Recent iPhone security fix reveals Microsoft Exchange security flaw.

Thousands of users have been accessing e-mail, calendars, and contacts over Exchange connections through their iPhones or iPod Touches, not knowing they were compromising their corporate security.

Posted to Weekdaily filed in Apple @ 10:12 AM | Tags (9) | calendars | contacts | email | exchange | iphone | ipodtouch | it | secure | security |  | Discuss (0) |  | facebook | twitter | 47 Clicks | Posted by Vin


Monday: September 14, 2009

FTC orders Sears and Kmart to stop unathorized spyware activities.FTC orders Sears and Kmart to stop unathorized spyware activities.

...Sears and its data collection partner would have access to the 'contents of shopping carts, online bank statements, drug prescription records, video rental records, library borrowing histories, and the sender, recipient, subject, and size for web-based e-mails,' said the FTC.

Posted to Weekdaily filed in Security @ 7:44 AM | Tags (6) | sears | kmart | spyware | security | tracking | research |  | Discuss (0) |  | facebook | twitter | 9 Clicks | Posted by Vin


Friday: September 4, 2009

A list of the top ten computer worms and viruses for your sickly pleasure.A list of the top ten computer worms and viruses for your sickly pleasure.

The Da Vinci virus curiously not on this list. Someone must have gotten a hold of that garbage file again.

Posted to Weekdaily filed in Security @ 7:52 AM | Tags (4) | worms | viruses | security | hackers |  | Discuss (0) |  | facebook | twitter | 34 Clicks | Posted by Vin


Wednesday: September 2, 2009

A list of ten secret menu items at some of your favorite fast food chains.A list of ten secret menu items at some of your favorite fast food chains.

If you’re at Wendy’s and you’re really hungry – like, three-patties-just-won’t-cut-it hungry, go ahead and order the Grand Slam, which is four patties stacked on a bun. It’s also known as the Meat Cube.

Posted to Weekdaily filed in Interesting @ 7:48 AM | Tags (7) | burger | grandslam | items | mentalfloss | menu | secret | wendys |  | Discuss (0) |  | facebook | twitter | 104 Clicks | Posted by Vin


Friday: August 28, 2009

FYI, burglars are targeting victims using their Facebook and Twitter accounts.FYI, burglars are targeting victims using their Facebook and Twitter accounts.

'I call it 'Internet shopping for burglars.' It is incredibly easy to use social networking sites to target people, and then scope out more information on their actual home ... all from the comfort of the sofa,' said Fraser in a statement.

Posted to Weekdaily filed in Security @ 7:37 AM | Tags (6) | security | twitter | facebook | burglars | targets | robberies |  | Discuss (0) |  | facebook | twitter | 20 Clicks | Posted by Vin


Thursday: August 27, 2009

Your wi-fi encryption key can be cracked in under a minute thanks to latest threat.Your wi-fi encryption key can be cracked in under a minute thanks to latest threat.

The encryption systems used by wireless routers have a long history of security problems. The Wired Equivalent Privacy (WEP) system, introduced in 1997, was cracked just a few years later and is now considered to be completely insecure by security experts.

Posted to Weekdaily filed in Security @ 7:21 AM | Tags (6) | attack | decryption | encryption | security | threat | wifi |  | Discuss (0) |  | facebook | twitter | 33 Clicks | Posted by Vin


«« First 2 3 4 5 Last »»