background preloader

Tips

Facebook Twitter

Tips2

Tipps1. ShortcutFoo: Master keyboard shortcuts in no time. If you find yourself reaching for the mouse too often, Web app ShortcutFoo ($5, free demo with feature limitations) can help you start using the keyboard for everything. That’s right. Not just in Gmail, but in Photoshop, Microsoft Visual Studio, Eclipse, and more. So, put your mouse out of reach, and let your fingers do the talking. Unlike KeyRocket, a shortcut learning application that teaches you while you work, ShortcutFoo works as a dedicated learning environment. You go to the website to learn.

Keyboard shortcuts for every application are organized into bundles of related functions, each with just a handful of keys to master. ShortcutFoo offers two learning modes, Practice and Drill. Practice mode is for learning shortcuts you don't know yet. Drill mode is for when you already know the keys but need some help committing them to muscle memory.

ShortcutFoo is very responsive and fast, and its interface is free of advertising, pop-ups, and other annoyances. Review: Parallels Desktop 8 vs. VMware Fusion 5. When Apple switched to Intel processors, Windows switchers as well as Mac users who needed to run the occasional Windows app rejoiced. That’s because the chip switch was soon followed by the release of virtualization software that would let those users run Windows as if it were just another application on their Macs. While those first virtualization apps didn’t support all of Windows’s features and weren’t terrifically fast, they were miles better than the Windows-emulation programs that had previously been available for the PowerPC chip. Since then, however, virtualization apps for the Mac have matured a lot. Four main options are now available: two commercial virtualization apps (Parallels Desktop for Mac and VMware Fusion), an open source alternative (VirtualBox), and another solution that lets you install Windows apps without installing Windows (Crossover).

Those first two options are the most popular—and, for most users, the most sensible—alternatives. ) and VMware Fusion 5 ( Protect Your Devices From Web and Email Threats. By now you should already know the basics of online security: Don’t send money to a Nigerian prince, don’t click on that picture of Britney in a bikini, and don’t run your PC without a security suite. All those basics still apply, but as technology moves forward, so do threats to your privacy and your devices.

Today, we need to protect not only our computers, but also our smartphones and tablets. Fortunately, protecting yourself and all your devices can be easy with the help of some sound practices and good software. The first step, however, is to understand what threats are out there. Never forget that your smartphone or tablet is actually a full-fledged computer in a smaller package. You can surf the web with it; check email; and use it to download and upload documents, photos, mp3s, videos, and software in the form of apps.

That’s why we love handheld devices, of course, but it also means they are susceptible to attacks just like PCs are. Know The Threats Why You Should Care. How to Buy a Digital Camera. Once upon a time, cameras competed with other cameras. Now, with the rise of smartphones as everyday photography devices, cameras have had to evolve quickly to compete with those mobile devices. Compared to just a few years ago, there are many more types of cameras to choose from; manufacturers are building specialized cameras for different types of shooters, a growing number of which have Wi-Fi sharing capabilities and phone-like features. There are a lot of different styles of cameras to choose from these days: ruggedized point-and-shoots, high-zoom pocket cameras, premium compact cameras, mirrorless interchangeable-lens models, and full-fledged DSLRs.

Depending on your budget, your size requirements, and your shooting style, any one of those cameras may be the best fit. We're here to help you pick the perfect camera for your needs. A choose-your-own-adventure camera selector Narrow down your options by clicking your way to a new camera in this interactive buying guide. Top-rated DSLRs.

Zooka's Bar-Shaped Speakers Crank up Gadgets' Sound. The Zooka wireless sound bar has a small footprint but its audio packs a powerful kick. What's more, it can also serve as a microphone for Bluetooth devices. The Zooka ($99), a Kickstarter project by Carbon Audio that started selling at retail last week, combines a pair of powerful speakers and a microphone in a rounded medical-grade silicone bar that's colorful and measures only 9-by-2-inches. Although being marketed as an iPad and iPod accessory, it works with any device with Bluetooth wireless support. Meet Zooka The Zooka is a rounded silicone bar with a speaker at each end. One side of the unit is slotted so you can slip an iPad or iPod Touch into the device.

There's also a notch in the slot so front-facing cameras won't be obscured by the unit. The other side of the bar contains controls for power, volume, and Bluetooth connectivity. The USB port is used for charging Zooka. Zooka's mic allows the unit to be used as a speaker phone. Set-up is a Treasure Hunt. 10 Gmail tools to supercharge your inbox. Can You Trust Your Browser With Your Passwords?

Having your Web browser remember your passwords and/or credit card details can be convenient, but it poses some security risks. How much of a risk depends on which browser you’re using, whether you sync with other devices, and whether you’re using any of the browser's extra security features. Here are the main vulnerabilities in some of the most popular browsers—Internet Explorer, Google Chrome, and Mozilla Firefox—and ways you can protect against those weak spots. Common Security Risks The biggest problem with having your browser save your passwords involves prying eyes.

As you’ve may have noticed, banking sites—and many others that deal with highly sensitive information—don’t let your browser save your password. Some browsers let you (or, potentially, thieves) view a list of your saved login credentials, including the site, username, and password. Internet Explorer 9 Internet Explorer 9 offers the most basic password-saving functionality of the three browsers we’re covering. Firefox 14. Reports ::Buyer's Guide: Cloud Storage, Backup and Synchronization Vendor Responses.

9 Google Apps Security Secrets For Business - Security - Attacks/breaches. After journalist's life hack, is your business protected against nosy rivals and even hacktivists? It's time to strengthen your Google security plan. In the wake of the hack of technology journalist Mat Honan, many users of cloud-based services are running scared. Forget Twitter-hacking attackers named "Phobia" who managed to compromise a well-known technology journalist's Google credentials and Twitter account. What about competitive intelligence experts who might want to hack rivals' Gmail accounts to siphon away corporate secrets?

Or hacktivists seeking a reprise of the Anonymous attack against HBGary, which copied and then deleted the firm's Gmail accounts? To help stop "life hack," competitive intelligence, or hacktivist attacks that come gunning for corporate data, all Google Apps for Business users--and especially corporate administrators--should pursue the following nine security strategies: 1. 2. 3. 4. 5. 1 of 2 More Insights. How to Protect Your Social Network Accounts from Hackers. August 08, 2012, 5:10 PM — If you haven’t read about Wired reporter Mat Honan’s ordeal at the hands of malicious hackers, take some time and read it now. (I’ll wait.) His story about how a passel of juvenile hackers managed to get into his Apple account and wipe all the data off his iPhone, iPad, and Mac -- as well as hijack his Google, Twitter, and Amazon accounts – should be required reading for anyone who uses those services, and especially those of us who’ve blithely linked our social media accounts together using the same email address.

Honan didn’t do anything to tick those hackers off. He was targeted simply because they coveted his @mat Twitter handle. Which means that the same thing could happen to you or me just as easily, and we wouldn’t know we’d been jobbed until far too late. One thing Honan notes with regret is his failure to turn on two-factor authentication for his Gmail account. So your first order of business for today: Setting up two-factor authentication for Google. How to Fix Your Wi-Fi Network: 7 Tips. Wireless Internet networks afford us the luxury of browsing the Web cable-free, but a connection that relies on radio waves is subject to failure due to interference, signal range limits, hardware problems, and operator error.

With that in mind, we've put together a quick guide to the most common Wi-Fi troubles and how to fix them. If you're struggling with your Wi-Fi network at home or in the office, read on to discover a few different ways to troubleshoot your Wi-Fi woes and restore your wireless network. Check Your Laptop for a Wi-Fi Button or Switch Having trouble connecting to Wi-Fi in your favorite coffee shop or airport lounge? The problem might be right under your fingertips. Reboot Your Computer and Your Wireless Router If you still can't connect a computer or device, reboot it. Change the Wi-Fi Channel on the Router Most Wi-Fi routers and devices use the 2.4GHz radio band, which has 11 channels in the United States. Check and Reposition the Wireless Router.

4 Facebook Security Tips to Stay Safe in 2012 CIO. CIO — Once again, Facebook founder Mark Zuckerberg was hacked. Earlier this week, 14 private photos of Zuckerberg were leaked to photo-sharing site Imgur under the headline, "It's time to fix those security flaws Facebook. " The social network later confirmed that the flaw was the result of a recent code push and was live "for a limited period of time"—affecting not just Zuckerberg's account, but also an undetermined number of others. This latest security problem comes one week after Facebook agreed to settle the charges with the FTC that it deceived consumers by telling them they could keep their information on Facebook private, then allowed it to be shared and made public.

Unfortunate timing for Facebook, no doubt. "Hackers are getting more and more sophisticated with their attacks," Geide says. As hackers up the ante with attacks, Facebook users need to take extra precautions and exercise better judgment to ensure their accounts—and their personal information—stay safe. 1. 2.