Friday, October 12, 2012

How To Hide Your Personal Information On Facebook

In the age of the Internet, privacy is a luxury and you have to constantly be on your heels to maintain it. Facebook makes it particularly hard for users to guard their personal data. Despite many changes, Facebook privacy settings remain complicated. Moreover, past updates have unexpectedly made previously private information available to the public.

Well, no stranger needs to know your email address, phone number, or see your family pictures. In this article you'll see how you can check what the public can see of you on Facebook. Also explained is how you can control which of your information is visible. Read more

Hacker is sentenced in NASA, Pentagon break-ins | PCWorld

Romanian national Manole Razvan Cernaianu, known online as TinKode, received a two-year suspended prison sentence for hacking into computer systems owned by Oracle, NASA, the U.S. Army and the U.S. Department of Defense and was ordered to pay damages totalling more than US$120,000. Read more

25% of Adult Americans Own a Tablet

The number of adult Americans who own tablet computers continues to grow, hitting 25 percent in the first eight months of 2012, according to the Pew Research Center's Internet & American Life Project. In survey results released Thursday, Pew reveals the 6 percent increase in tablet ownership over the think tank's findings in January, and a 21 percent increase over tablet ownership in September 2010. Read more

Get Free Stuff, Give Away Your Junk & Save The Planet The Freecycle Way

Freecycle is the world’s largest network of recyclers who, instead of throwing away, selling or otherwise disposing of their unwanted goods, give it away instead. It’s both an environmentally and pocket-friendly way of picking up things you want and getting rid of things you don’t, and it’s completely free to join and exchange goods.

In addition being a great way to find bargains, it’s also a great way to rid your house of clutter that you no longer need. As opposed to putting an advert on Craigslist or Gumtree where it might sit for weeks before being buried beneath everyone elses, Freecycled goods generally don’t hang around long. Read more

How Does File Compression Work? [MakeUseOf Explains]

We’ve all heard of file compression. Anyone who regularly downloads files from the web is familiar with formats like ZIP and RAR, and anyone who edits media files knows that compression is necessary to share images, music and videos on the web without using up all of your bandwidth. File compression is at the core of how the web works, you might argue, because it allows us to share files that would otherwise take too long to transfer. But how does it work. Read more

Thursday, October 11, 2012

The MUO Security Checklist: What You Need To Do Right Now To Be Safe

Security can be an overwhelming subject – there are so many potential problems we need to think about when securing our computers, our online accounts, and our wireless networks. This list should help simplify things – follow this checklist and you’ll be well on your way to staying safe on a dangerous Internet. Read more

How Safe Is Your PIN?

Ah, the trusty PIN number, the 4 digits that separates you from your money. We use our bank PIN number in a wide variety of situations, whether it’s taking money out of the ATM machine or paying with our card in a shop. But you would be amazed (or perhaps not) at the stupidity of some people when it comes to the 4 digits they need to keep secret the most. For it seems that a lot of people seem to have this irresistible urge to tell everyone their number or make it extremely easy to figure out. Then they probably wonder where their money disappeared to. Read more

Wednesday, October 10, 2012

What Search Engine Poisoning Is & How It Spreads Malware [MakeUseOf Explains]

If you thought malware popups and relentless email spam were the worst of it, think again. There’s a new contender on stage and it’s spreading malware like butter in desert heat. It’s called search engine poisoning and hundreds of thousands, even millions, of people have fallen victim to it all over the globe. Read more

Monday, October 8, 2012

How to buy a tablet

Any tablet will let you email, browse Web pages, read books, play music and games, and watch movies and videos. And any tablet can run apps for handling everything from balancing your checkbook to writing the next great American novel. Before choosing a tablet, you should determine whether you’re already committed to a particular app and entertainment ecosystem. Read more

5 Common Security Mistakes That Can Put Your Privacy & Money At Risk

Privacy and money are arguably the two most important things when it comes to the whole concept of security. We all want to protect our identities, our privacies, and definitely our financials. No one looks forward to the day when they check their bank statements and sees nothing but zeroes – or even worse, negatives.

Here are some of the most common security mistakes that are committed by computer users all over the world. Neglecting any of these will open you up to a world of vulnerability and put you only one or two steps away from identity theft, malware infections, or worse. Read more

Friday, October 5, 2012

The Internet & The World Wide Web Are Not the Same Thing [MakeUseOf Explains]

The two terms “Internet” and “World Wide Web” have been used interchangeably ever since the Internet itself became a household “utility” as common as electricity or cable TV. People talk about “surfing the web” and “searching the Internet” like the two terms are one and the same.

Are you one of those people? It may be surprising for a lot of people to learn that the basic foundation of the two terms are very distinct. They were defined at a time when the Internet was first being formed, and despite the fact that people use them to refer to the same thing, they are actually very different pieces of the overall network we call the World Wide Web. Read more

Tuesday, October 2, 2012

What Is The Difference Between A Netbook, Notebook, Ultrabook, Laptop, & Palmtop?

In a time not so long ago, the only choice to make between computing devices was between a hulking great desktop, or a laptop … which was still fairly huge. The constant miniaturation of technology and need for manufacturers to differentiate their products has now given us a smorgasboard of sizes; each with their own name. Let me show you the differences. Read more

Monday, October 1, 2012

Passwords reused by 6 of 10 consumers

Passwords remain a brittle security blanket when wielded by many consumers, a new survey has found. Despite routine web breaches, six out of ten continue to reuse the same few passwords over and over. The survey results from US fraud-detection vendor CSID shouldn't be surprising. As well as risky password re-use which makes multiple sites vulnerable from a single breach, 54 percent of respondents had only five passwords or fewer while 44 percent changed these once a year or less. Read more

US banks sustain hackers' denial-of-service attacks | PCWorld

US banks sustain hackers' denial-of-service attacks | PCWorld