18 items | 8 visits
List of links to be shared with current CS105 course.
Updated on Mar 31, 12
Created on Jan 30, 12
Category: Computers & Internet
URL:
Everything related to the Bourne Again Shell (BASh). Beginning and Advanced topics.
Learn Top Notch Web Development and Graphic Design Online 100% Free
Textbook Style Courses Covering Popular Web Development Technologies.
High Quality Video Tutorials On Web Application Programming Logic.
Elite Vector Art Training, 3D Graphics and Web Animation Training.
Steady Supply of Educational Material As Technologies Evolve
Television is going the way of the dinosaur, and the deadly comet is called BitTorrent Live. Today, Bram Cohen, the author of the BitTorrent peer-to-peer sharing protocol, demoed his latest creation at the SF MusicTech Summit.
Upstart social network Path was discovered uploading users’ complete address book to its servers. Completely inexcusable in today’s privacy-sensitive society.
Microsoft’s Windows 8 and Vista will have several things in common: Both are unwanted operating system updates that will flop in the marketplace.
Stuxnet is a computer worm discovered in June 2010. It initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment. While it is not the first time that hackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit.
Medical milestone or privacy invasion? A tiny computer chip approved Wednesday for implantation in a patient’s arm can speed vital information about a patient’s medical history to doctors and hospitals. But critics warn that it could open new ways to imperil the confidentiality of medical records.
As Internet access becomes more pervasive across the world, and each of us spends more time on the web, there’s no question that our attack surface — how ‘juicy’ a target we are — grows as well. Attackers in turn take advantage of this, and they use every tool and technique they have to try and attack us.
Deleted Facebook photos don't disappear but can still be accessed by anyone with a link to the images themselves
To combat that, 15 major technology and financial companies have formed an organization to design a system for authenticating emails from legitimate senders and weeding out fakes. The new system is called DMARC -- short for Domain-based Message Authentication, Reporting and Conformance.
It’s actually cheaper to go to another planet than to give an iPad to every child.
Malware makers are turning to quite sophisticated tricks to disguise the true purpose of rogue applications.
18 items | 8 visits
List of links to be shared with current CS105 course.
Updated on Mar 31, 12
Created on Jan 30, 12
Category: Computers & Internet
URL: