Skip to main content

Feb 03, 16

As a remote worker, I use quite a few of these, but not all. The ones I use all the time?


As well as things not on this list:

Google Drive

I may have to take a look at a couple of others on this list though.

What apps help you work remotely? What does your list look like?

Feb 01, 16

If you're like me, you might have utilize more than one cloud storage service. I use Google Drive most often, but I also use Dropbox and Box too. MultCloud is a service that allows me to tie them all together in one place. MultCloud does more than just provide a single log-in for all of the cloud services that I use. It also allows me to move files between services with a simple drag-and-drop.

By connecting your cloud storage services through MultCloud you create a single dashboard page on which you can view and access the files within all of your cloud storage accounts. To move a file between the services you just select a file from one service and drag it to the other.

This actually looks pretty cool. I might just have to check it out to help manage my various cloud accounts, some of which are work accounts and some personal. Working remotely means having stuff filed all over the place sometimes.

Has anyone out there used MultCloud or anything like it?

Jan 28, 16

"Until a year or 2 ago, the best-known program for creating and using encrypted container files was TrueCrypt, which was open source and widely supported with millions of users. Then the project was abruptly shut down. No one quite knows why, but rumours persist that the developers were formally discouraged from maintaining something that could allow law enforcement agencies to intercept information.

Luckily, the project now lives on in the form of VeraCrypt, which is based on the TrueCrypt code. It's still open source and it's still free, and it works just the same. It includes some minor new features, some bug fixes, and ongoing support. And it will work with your existing TrueCrypt container files if you have any."

Anyone used this fork of the Truecrypt code? I'm definitely going to check it out soon for some archived data I've got laying around. At least when I get home and have a chance.

Jan 23, 16

"Out in Atlanta, GA, Christina Lee and Michael Saba have been receiving a lot of knocks on their door for the past 11 months. These visitors all have one thing in common: they're looking for their lost/stolen smartphone. At least 12 visitors have shown up at the couple's Atlanta home, many with police officers, looking for their missing devices. The problem is that those lost iPhones and Android devices are not with Christina or Michael, meaning those device-location tools are wrong."

Oh man, that must suck.

Jan 23, 16

"Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.

The feed includes images of marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages, front gardens, back gardens, ski slopes, swimming pools, colleges and schools, laboratories, and cash register cameras in retail stores, according to Dan Tentler, a security researcher who has spent several years investigating webcam security.

"It's all over the place," he told Ars Technica UK. "Practically everything you can think of.""

Yikes. It's frightening how many people have webcams in use for security and leave them completely open for anyone to access because of the lack of built-in security. This is only going to get worse as we connect our homes to smart devices that are not secure. Imagine how many non-savvy consumers might have locks, garages, etc. connected to the internet and open to being hacked?

It's important that we get this right.

Dec 28, 15

"It's one aspect of a tech policy problem that has been plaguing us for at least 25 years: technologists and policymakers don't understand each other, and they inflict damage on society because of that. But it's worse today. The speed of technological progress makes it worse. And the types of technology­ -- especially the current Internet of mobile devices everywhere, cloud computing, always-on connections and the Internet of Things -- ­make it worse."

And yet, look at the current crop of candidates. Which one of them truly understands technology? Yeah, exactly. Which one of them is even talking about tech policy beyond scary stories about terrorists maybe using encryption instead of understanding why encryption protects us and our information?

As much as there are lots of political issues out there, it disappoints me that we continue to find it humorous when the people given the responsibility for setting the rules when it comes to technology and the law, instead of realizing how much harm their ignorance causes all of us.

Dec 02, 15

"NetClean's founder and CEO Christian Berg said that more effort should go into identifying paedophiles within the workplace because as many as two people in a thousand use work computers to view child sexual abuse material.

“While it may appear strange for people to do this at work, many people actually find their work computer to be the only truly private computer they own,” Berg said. “It is not shared with their spouses or children, it is often a laptop and they are the only person who uses it. Paradoxically, this makes them feel more secure to use it, even if it's for viewing illicit content.”

Last year the company published research which claimed that one in five corporate networks has been used to download child pornography. It interviewed 141 IT professionals at a conference and found that in only 3.5 percent of cases did the discovery lead to a criminal investigation, and in 69 percent of cases nothing was done. "

This is shocking, and the worst thing about it is that it shows how little organizations around the world pay no attention to network security. If there are people using your network, and your technology to download child abuse images, and you have no idea, how many people have hacked into your network and taken your data that you don't know about?

Seriously, just stop it. Do something. There's no excuse for not knowing what it happening over your own corporate network.

Nov 22, 15

This isn't a good thing, at all. I don't think it's just teens either. Advertising has become so prevalent on the web, and so embedded, that the difference between actual "news" and an ad is pretty blurred. That means that savvy marketers could influence public opinion with stories that seem to be news, but truly aren't.

I mean really, people already like and share things on social media that aren't remotely true, how much of a stretch is it to think they would see an ad and assume it's journalism?

Nov 18, 15

"The 19,000 hashes have been "given to five global internet companies [Facebook, Google, Microsoft, Twitter and Yahoo], who had volunteered to conduct a robust test on the list through their systems during the implementation period."

The hashes, created during the implementation stage, were sourced from images forensically captured on the Home Office Child Abuse Image Database, which in turn was sourced from police investigations.

Crucially, with the use of the hash list project, child sexual abuse images will be prevented from being uploaded in the first place, thus giving internet companies the power to stop people from repeatedly sharing the images on their services, said IWF."

This is a great use of this technology. I know there are hash lists in use by law enforcement, and I also know why their distribution has been limited, but it's great to see technology companies cooperating to test the hash lists and take what is essentially a pretty easy step to eliminate the images from their service. It won't eliminate all child abuse images, but the more people found sharing known images, the more likely we can find the people who are sharing the ones we don't already know about.

Nov 14, 15

"Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs, tablets, and computers.

The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. While the sound can't be heard by the human ear, nearby tablets and smartphones can detect it. When they do, browser cookies can now pair a single user to multiple devices and keep track of what TV commercials the person sees, how long the person watches the ads, and whether the person acts on the ads by doing a Web search or buying a product."

This really goes to show how much data about you is valuable to advertising companies, and to what lengths they will go to gather that data.

Nov 12, 15

"Following the installation of the November 10 2015 updates, users may have problems with Outlook crashing when they view HTML messages. Windows 7 64-bit is definitely affected; other versions of Windows may be affected as well. "

Haven't tried the fix yet, but I am definitely seeing Outlook crash since the updates installed last night on my work laptop. If you are too, thought I'd pass this on!

Nov 09, 15

"IT ALWAYS seemed improbable that Marriott was the only one. Last year the hotel chain paid $600,000 to America's Federal Communications Commission (FCC) to settle a complaint that it had blocked customers' personal wireless modems and hotspots at "at least one" of its hotels, forcing customers to sign up for expensive in-house internet access instead. Now Hilton has found itself in hot water over the same charge."

They just can't help themselves, but they really need to.

Nov 08, 15

Weird that while every other service is moving to add space to existing accounts, Microsoft goes the other way. I don't see how that is going to help encourage Office 365 use if I can use Google apps and get more storage space for the results.

Oct 18, 15

"Such concerns didn’t strike me as farfetched, but I was reluctant to air them in mixed company. I knew that many of my fellow citizens took comfort in their own banality: You live a boring life and feel you have nothing to fear from those on high. But how could you anticipate the ways in which insights bred of spying might prove handy to some future regime? New tools have a way of breeding new abuses. Detailed logs of behaviors that I found tame—my Amazon purchases, my online comments, and even my meanderings through the physical world, collected by biometric scanners, say, or license-plate readers on police cars—might someday be read in a hundred different ways by powers whose purposes I couldn’t fathom now. They say you can quote the Bible to support almost any conceivable proposition, and I could only imagine the range of charges that selective looks at my data might render plausible."

I don't necessarily recommend becoming paranoid, but it'd be silly to continue walking around without recognizing how much of our behavior, especially online, is being monitored, recorded, and interpreted out of context. Right now it's more likely that Apple, Google, Facebook et al, are using the information to push ads to you, but don't discount how much government agencies are doing the same tracking, and potentially making decisions about you based solely on that information.

The article is a long read, but worth the time. Unless you want to continue living in blissful ignorance.

Oct 17, 15

So many things to try....ACK! I don't know where to begin!

Any of you using some of the things on this list? Anything you would add?

Oct 14, 15

Yet another reason you should not, repeat NOT, just plug in a USB drive that you find laying around! Only use ones that you, or someone you trust, has used to store data.

Also, ones that your instructor gives you at training classes I teach should be safe too. I plug those into my laptop in order to copy the class files first, so if there's a massive problem, it'll hit me! ;-)

Sep 22, 15

Aside from passing off your location from somewhere else to get around blocks, get yourself some sort of VPN to use when you're on public wifi networks. One that's a browser plugin sounds like an easy to use one. Anyone installed these browser extensions yet?

What do you use to protect your data when browsing on a public network?

Sep 15, 15

As a blogger, I'm very much looking forward to the ability to have an article open with the Wordpress app next to you instead of constantly going back and forth between apps or Safari tabs on my iPad. It's closer to what I would normally do when writing on a laptop or at my desk with multiple monitors.

It might not be as cool as multiple monitors, but that solution doesn't travel well. ;-)

Also, better battery life and efficient use of storage on my 16GB iPhone is something else I'm looking forward to as well, assuming it works out that way.

Are you looking forward to iOS9?

Sep 04, 15

I haven't yet panicked, but this occurred during a time when I was traveling, and spending time in airports and various other places where finding something on Twitter on the iPad and wanting to save it for later would be incredibly useful. That's what Pocket is for, that's why I use it.

Unfortunately, those same services that we find very, very useful, and come to rely upon, can create quite a bit of havoc when they are not working, as we see in this article! Think about it, how would you react if you couldn't see your notes in Evernote, or couldn't bring up your itinerary in the Tripit app? What's the backup strategy for your important information? Do you keep it in two different services? Do you print it?

How do you avoid getting burned when a service is unavailable?

Aug 29, 15

It's coming, the tipping point where running a for-profit website based on advertising revenue is unsustainable, and I agree, publishers have only themselves to blame. The advertising, click-bait, crap that passes for news today is beyond annoying.

But what will be left? A few big players and a bunch of folks who do it for the love of writing, sharing, connecting, etc. That might be about it.

1 - 20 of 1854 Next › Last »
20 items/page

Highlighter, Sticky notes, Tagging, Groups and Network: integrated suite dramatically boosting research productivity. Learn more »

Join Diigo