I’ll admit I’m pretty good about protecting my privacy as well as I’m a large fan of Google. This one however slipped under my radar and I was rather alarmed by the amount of data my smartphone had given Google on my Travels. No the Map above is NOT my travels, however it just may as well have been.
Zillow®, the leading real estate information and home-related marketplace, now allows homeowners to see an immediate change to their Zestimate® home value when they edit facts about their home on Zillow. Previously, it took as long as several weeks for the Zestimate to update.
Lenovo, the world’s largest PC manufacturer, has been installing a dangerous piece of adware on its consumer laptops. The software, called Superfish, leaves computers vulnerable to man-in-the-middle attacks in which hackers steal data as its sent from a user’s computer to a supposedly secure server. (more…)
Quick and small update to the Online Library. Starting a collection of useful Unix/Linux/BSD commands that we felt was worth sharing as we use them more and more. The library can be found from the Main Menu located just under our header graphic.
As noted, we experience an outage for a bit today as we relocated our service provider.
Some may note that a few articles are missing as we restored from a previous backup.
We apologize for the downtime and are glad to be back online. If something is missing please let us know via the contact form located on our about page.
Some new features may be on the way for commuters. For those relying on public transportation such as bus and subways, a recent patent may reveal Apple’s upcoming plans for addition’s to Apple’s MAPS app.
Management of one’s personal devices, applications and security settings for everyone in a large organization can become an overwhelming task and time consuming. Google has released something that can make IT manager’s breath a bit easier. Their announcement today of a new set of security tools to help Google Apps users take back control of their security online.
Agree or disagree, you will have to wait for 20 years to find out if the software was right or wrong.
I always hoped to be a silver fox. But, I’ll approve of the diet I’ve obviously been on hehehe…
Experts don’t know where it came from, and aren’t quite sure what it does.
But they do know this: a newly-uncovered cybersecurity threat appears to have been designed by a government, and is “groundbreaking and almost peerless.”
Scientists using the atom-smashing machine known as the Large Hadron Collider on Wednesday said they had observed two never-seen-before particles, a discovery that refines physicists’ understanding of how elementary particles interact and the forces between them.