13 New Articles on MakeUseOf | ![]() |
- Cool Websites & Tools – Send Twitter Private Links, Make Screencasts On Mac OSX, & Trade Your Video Games
- Batman And The History Of The Batsuit
- The Raspberry Pi B+ Is Here. What’s Changed?
- Want To Learn Linux? These Four Distros Will Take You From Beginner To Pro
- What Is Data Corruption And How To Prevent It
- 7 Free Online PDF Tools That Could Save You A Lot Of Work
- Miss Melee? Transform Super Smash Bros. Brawl Into A Melee-like Game With Project M
- How To Spot A Compromised ATM, & What You Should Do Next
- Flying To The US, Canada or UK? Here Are The New Rules Regarding Flying With Electronics
- Change DNS Presets On The Fly With ChrisPC DNS Switch
- What Is A Man-In-The-Middle Attack? Security Jargon Explained
- A Shine In The Clouds: The New Google Drive Gets A Redesigned Look
- Amazon Testing Kindle Unlimited, Driverless Cars Are Lethal Weapons, And More… [Tech News Digest]
Posted: 17 Jul 2014 09:31 PM PDT ![]() Privatize – Twitter is a very effective communications platform but sometimes there is no way to send a private message. Twitter’s existing private messaging requires that both recipients are following one another. Privatize is a way to tweet someone a private link and anyone else will be told that the link isn’t for them. But will the other person click on it? That’s the question. ClassDo – is an educational start-up founded by a group of technology professionals who believe in the transformative power of the internet in education and in bringing together people from across the world for the... Read the full article: Cool Websites & Tools – Send Twitter Private Links, Make Screencasts On Mac OSX, & Trade Your Video Games |
Batman And The History Of The Batsuit Posted: 17 Jul 2014 07:30 PM PDT ![]() Yesterday, we explored how the Batman’s bat symbol on his suit evolved over time. Today, we’ll take a look at the batsuit in its entirety. Various batsuits have appeared in comics, movies, television, video games and graphic novels. This infograph will take you through the history of the batsuit — note the various utility belts, gloves, and inside-out briefs. Click to enlarge. Via Read the full article: Batman And The History Of The Batsuit |
The Raspberry Pi B+ Is Here. What’s Changed? Posted: 17 Jul 2014 06:30 PM PDT ![]() The Raspberry Pi Model B has been a hugely successful product, having shifted hundreds of thousands of units, and becoming an important platform for the education of computer science in schools. And it’s just received a much needed upgrade. The new configuration of the Raspberry Pi Model B is known as the Model B+, and will be sold concurrently with the older model at exactly the same price point of $35. It represents a major (and the last) upgrade of the aging Model B, before it eventually gets replaced with an entirely new board. So, what’s changed, and why should you... Read the full article: The Raspberry Pi B+ Is Here. What’s Changed? |
Want To Learn Linux? These Four Distros Will Take You From Beginner To Pro Posted: 17 Jul 2014 01:00 PM PDT ![]() If you’re really interested in learning about Linux, there are some distributions that are better than others at helping you out. Depending on how deep you want to go, there are different distros that are ideal for you. Just be sure that you know what level you’re really at. Packaged Distributions Packaged distros like Ubuntu, the most popular Linux desktop, and Fedora, a more advanced and purely open source Linux desktop, are the best distributions to use if you consider yourself to be a beginner or slightly experienced at using Linux. Out of the two, Fedora may be a bit more... Read the full article: Want To Learn Linux? These Four Distros Will Take You From Beginner To Pro |
What Is Data Corruption And How To Prevent It Posted: 17 Jul 2014 12:00 PM PDT ![]() Data corruption is among the most common computer errors. Unlike a bug, which occurs because of improperly written or executed code, data corruption happens when code is intentionally or unintentionally changed from its original, correct form. Corruption can be systematic or random, and even a small change can fundamentally break a program or render a file useless. Here’s how it happens – and what you can do stop it. What Causes Corruption The universe is not a friendly place for data. Stray particles can literally zap a zero to a one, or vice versa, introducing random corruption even when a computer is turned... Read the full article: What Is Data Corruption And How To Prevent It |
7 Free Online PDF Tools That Could Save You A Lot Of Work Posted: 17 Jul 2014 11:00 AM PDT ![]() Ever been frustrated by a PDF file? It’s funny how the PDF file format is so prevalently used, yet for most of us, it causes a lot of undue stress. Reading a PDF is easy enough. Creating and editing a PDF file is a big harder since the process isn’t as straightforward as it could be. But if you want to do anything more than that, you may find yourself stuck. Fortunately, the Web is full of awesome little tools that can help you alter PDF files without breaking a sweat. We won’t be covering any of the common PDF... Read the full article: 7 Free Online PDF Tools That Could Save You A Lot Of Work |
Miss Melee? Transform Super Smash Bros. Brawl Into A Melee-like Game With Project M Posted: 17 Jul 2014 10:00 AM PDT ![]() Super Smash Bros. Melee was a huge success, but many of the hardcore players didn’t feel that Brawl lived up to the hype. It was slower and more dumbed down, making combos and quick attacks nearly impossible. Thus, Project M was born. Project M is a mod for Super Smash Bros. Brawl that changes a number of things, but the most notable being an adjustment to the speed to make it feel more like Melee. And the best part? You don’t even need to hack your Wii (or Wii U) to run it. What Is Project M? For the best description... Read the full article: Miss Melee? Transform Super Smash Bros. Brawl Into A Melee-like Game With Project M |
How To Spot A Compromised ATM, & What You Should Do Next Posted: 17 Jul 2014 09:00 AM PDT ![]() You probably know that you should take care when using an ATM, but how can you know for sure that the device has been compromised – and what should you do upon realising this? What Is ATM Crime? ATMs in the wall of banks, railway stations, hotels, supermarkets and other locations contain a lot of money. Attempting to remove the money by force will result in the notes being dyed, becoming easy to trace alongside the perpetrators. This has more or less ended the practice of physical brute force attacks on ATMs, as well as attempts to steal the whole... Read the full article: How To Spot A Compromised ATM, & What You Should Do Next |
Flying To The US, Canada or UK? Here Are The New Rules Regarding Flying With Electronics Posted: 17 Jul 2014 08:30 AM PDT ![]() Flying to the UK or US? Make sure your laptop and cell phone are sufficiently charged, as new, tighter security checks could see passengers potentially separated from their gadgets. The new rules were brought in as a result of a security request by the US authorities, and affect flights in and out of the US from all airports, in addition to randomly selected routes to the United Kingdom. Passengers may be required to power on their laptops, tablets and cell phones before boarding a flight. Devices that fail to power on will not be permitted to be brought on to the... Read the full article: Flying To The US, Canada or UK? Here Are The New Rules Regarding Flying With Electronics |
Change DNS Presets On The Fly With ChrisPC DNS Switch Posted: 17 Jul 2014 08:00 AM PDT ![]() DNS servers are the intermediate agents that resolve human-readable URLs to IP addresses. By using alternate DNS servers that are geographically closer, or that use more efficient caching methods, you can significantly speed up your browsing. DNS Tunnelling, on the other hand, is a great way to access region-blocked content. If you’re using Windows as your operating system, there’s just one catch. Changing your DNS settings is a needlessly convoluted task. Configuring it once is worse enough, but switching between different DNS profiles frequently is almost out of the question. Luckily, third-party tools like ChrisPC DNS Switch are able to introduce much-needed flexibility. ChrisPC DNS Switch ChirsPC... Read the full article: Change DNS Presets On The Fly With ChrisPC DNS Switch |
What Is A Man-In-The-Middle Attack? Security Jargon Explained Posted: 17 Jul 2014 07:00 AM PDT ![]() A man-in-the-middle attack is difficult to identify and defend against. MITM attacks generally don’t depend on infecting computers on either end of the system. Instead, they depend on controlling the communications equipment between two systems. For example, a malicious router offering free Wi-Fi in a public location may perform a man-in-the-middle attack. An Offline Man-in-the-Middle Attack Man-in-the-middle attacks were around before computers. This type of attack involves an attacker inserting themselves in between two parties communicating with each other. Man-in-the-middle attacks are essentially eavesdropping attacks. For example, let’s say you’re communicating with someone over physical mail — you’re writing letters to each other.... Read the full article: What Is A Man-In-The-Middle Attack? Security Jargon Explained |
A Shine In The Clouds: The New Google Drive Gets A Redesigned Look Posted: 17 Jul 2014 06:00 AM PDT ![]() Who doesn’t like change. When it comes to software, most of us do if it’s for the better. Like the New Google Drive. With a generous 15 GB of free space, it is a personal cloud for many. What it needed was a fresh makeover. The “new look” Google Drive brings that. The new Google Drive is more simplified and importantly – speedier. It is gradually being rolled out for a first glimpse. Give it a try if you see something like the screenshot below. An Example Of Google’s New Design Philosophy? Is this an embrace of Google’s ‘Material Design‘... Read the full article: A Shine In The Clouds: The New Google Drive Gets A Redesigned Look |
Amazon Testing Kindle Unlimited, Driverless Cars Are Lethal Weapons, And More… [Tech News Digest] Posted: 17 Jul 2014 04:30 AM PDT ![]() Also, Apple and IBM get into bed together, BlackBerry is getting its own virtual personal assistant, a former dictator is suing over a Call Of Duty game, and Futurama is reimagined in 3D, with truly eye-popping results. Amazon Testing Kindle Unlimited Service Amazon is currently testing Kindle Unlimited, a $9.99-per-month subscription service offering unlimited access to more than 600,000 Kindle eBooks and audiobooks. References to the upcoming service were removed after being spotted by people on the Kindle forums and detailed on GigaOM. The video above at least confirms Kindle Unlimited is real. Of the 600,000+ books due to be... Read the full article: Amazon Testing Kindle Unlimited, Driverless Cars Are Lethal Weapons, And More… [Tech News Digest] |
You are subscribed to email updates from MakeUseOf To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
No comments:
Post a Comment