background preloader

Bookmark

Facebook Twitter

How to Get Mac OS X's Best Features on Windows - Lifehacker. Top 10 Awesome Things You Can Do With Text. I appreciate what you're saying here, but I tend to disagree with most of it. I think things like text expansion actually offer an alternative to the shorthand writing conventions that have been ushered in with the era of SMS and Twitter. Text expansion is able to yield identical results in fewer keystrokes. This promotes efficiency, not laziness. In fact, I would argue that text expansion actually serves to mitigate some of the adverse effects of laziness. I'm curious as to whether you use predictive text on your phone.

Naturally, I would expect you to respond that there are certain circumstances and modes of communication among which "laziness" is excusable, if not appropriate, and I'd have to agree. I can't agree with your comparing the writer to a musician playing an improper chord either. K thx 4 reading thru that ^ =p lol P.S. Yes, writing is crafting sentences and love of language and fashioning patterns and weeping over beauty. Lighten up, Mr Angsty One True Writer. Top 10 Secret Agent Security Tips and Tricks. When dealing with computer security, an often overlooked security risk is so-called "deleted files". When files are deleted, nothing is actually done to them aside from marking them as "free-space". The OS may get around to overwriting them sometime when it needs the space, but a deleted file could sit on a drive completely intact for weeks of usage (the bigger it is the bigger the chance it will be at least partially overwrited).

Encryption applications that do not involve real-time decoding (a special driver decrypting files on-the-go vs an application decrypting and re-encrypting files), often do not have secure methods of wiping files (or the user is unaware of them), and hence the files are left in an unencrypted state on the drive when deleted. The only way to assure deleted files remain that way (or at least make their recovery very difficult and time-consuming) is to have an application overwrite the drives free-space with random 0s/1s, ideally multiple times. How it works - Accounts Help. Why you should use 2-Step Verification 2-Step Verification adds an extra layer of security to your Google Account, drastically reducing the chances of having the personal information in your account stolen.

To break into an account with 2-Step Verification, bad guys would not only have to know your username and password, they'd also have to get a hold of your phone. How it works 1 Enter your password Whenever you sign in to Google you'll enter your username and password as usual. 2 Enter a code from your phone Then, you'll be asked for a code that will be sent to you via text, voice call, or our mobile app. Keep it simple During sign in, you can tell us not to ask for a code again on that particular computer. Learn more about 2-Step Verification.

CopyTrans Manager Frees Your iPod or iPhone from iTunes. If you love your iPhone or iPod Touch but simply hate iTunes, you do have some options that let you manage your device without having to use it. Most of those apps tend to skimp a little on features, and are often broken as soon as there's an iPod or iPhone software update.

CopyTrans Manager is a new jukebox application for Windows that's fast, lightweight, does just about everything iTunes can do including access the iTunes Music Store, and does it all for free. CopyTrans Manager still requires iTunes to be installed unfortunately, because iTunes also installs the drivers needed to operate your iPod or iPhone. That doesn't mean you have to use iTunes however; once it's installed and CopyTrans Manager is installed you're free to use CopyTrans Manager for everything. CopyTrans Manager also allows you to add podcasts, audio books, and video to your iPod or iPhone directly, and will synchronize with your selected playlists and files whenever you tell it to.

[via Lifehacker] How to Activate Two-Step Verification on Your Google Account. Posted 08/09/2012 at 7:01am | by J.R. Bookwalter If there's anything to be learned from Wired reporter Mat Honan being hacked last weekend, it's that we're never as safe as we think we are. For those of us with a Google account, however, there is still hope. You may have heard about Google's "two-step verification" process a lot in the last few days, which was highlighted by Wired journalist Mat Honan as a way to have helped block the hacker who gained access to his Twitter, Gmail and iCloud accounts last weekend and remotely wiped his iOS devices. Two-step verification won't help protect your Amazon, Twitter, iCloud or other online services -- but it will protect your Google account and help prevent a complete wipeout of your online presence should the worst happen.

So what is two-step verification and why should you consider it? SMS/Voice Setup To get started, you'll need to sign into your Google account from a desktop web browser and head to the two-step verification settings page. Patently Apple. In early December, China Labor Watch (CLW), an organization who educates the international community on supply chain labor issues including poor working conditions in Chinese factories, reported that Shi Zhaokun, a 15-year old worker, died of severe pneumonia on October 9 in Shanghai Shuguang Hospital. When Shi took the pre-employment physical examination on September 4, the results indicated that he was in good health. Pegatron denied fault in Shi's death. A few days later, medical exports sent to the factory by Apple Inc. noted that the death of a 15-year-old worker was not caused by working conditions at a Pegatron's factory.

Despite the initial statements made by Pegatron, it was reported recently that they ended up paying the Shi Family close to $25,000. Continue reading "Pegatron Settles with Family of Underage iPhone 5C Worker who Died in October" » Continue reading "Egg on Samsung's Face: Docomo Dumps the Official Launch of Tizen OS Smartphones at the Last Moment" » GSMArena.com Mobile - Home. Untitled. Once you have located the source of your problem, it can become much easier to fight back. In desperate times like these, it would help to go completely natural . Do not trust chemical products since they might cause more harm than good. To put your panicking soul to rest, here are 15 different ways to reduce hair loss:Take a glass of water with flaxseed (alsi) in an empty stomach.

This will provide you with the omega 3 acid that you need for hair growth.Begin every day with one amla. Women generally use hair oil made of amla to get those lustrous curls, didn’t you know? Tech. Editor’s Picks: The Best Free Apps of the Week. Incoboto Mini (4.5 stars with 418 Ratings) iPhone App $1.99 →Get Free Promocodes via Starbucks Please Note: This is an offer from Starbucks that is available only on the US App Store. To get this game for free, you must follow this link to redeem the game via a promocode, or follow the link on your Starbucks app to get a promocode. If you’re in the market for a highly unique gaming experience, filled with imaginative graphics and addicting gameplay, then this is the app for you. You live in a world where The Corporation has caused the sun to go out, and it’s up to Inco, a small boy, and his strange friend to go on a galaxy-spanning quest to help light up the skies and restore the balance.

How to jailbreak iOS 6 and install Cydia. iOS 6 was just released a while ago, and now we’re going to show you how to jailbreak it. First of all, please note that this is a tethered jailbreak, and it only works with A4 devices like the iPhone 4. Secondly, since there currently isn’t any jailbreak tool that will install Cydia just yet, we’re going to have to go about installing Cydia using a manual process. Still game after all of those asterisks?

Then come inside, as we show you how to jailbreak iOS 6 final… Step 1: Install iOS 6 on your device. Step 2: Download RedSn0w 0.9.13dev4 from our downloads page. Step 3: Run RedSn0w, and click Extras > Select IPSW, then select your iOS 6 firmware file. Step 4: Click Back, and then click Jailbreak. Step 5: Your iPhone will now proceed through the jailbreak process. Step 6: Once the jailbreak is completed, and you are back on your Lock screen, place the device back info DFU mode. Step 7: Click Back, and then click Just boot. Step 5: Once connected, paste the following into the terminal: