background preloader


Facebook Twitter


Home Network. File Sharing. Images and Animation. Applications Associated with the Intelligence Community. Why Microsoft is Evil. Virtual Machines. Buddy. YouTube Video Processing. Linux. Challenges. Hardware Technology. People. DRM. Development Tools. Cloud. IBM. Hardware Controllers. Tracking. Languages. Mobile Platforms. Backup and Restore. Internet - Alternatives, Meshnet, Neutrality. Architecture.

HTML5. Quantum Computing. Communication. Encryption and Back Doors.


Hacks. Processes and Methodology. Visual Style. Jobs. Utilities. Courses for Tim. Business. Souce Code Control. Functional. Microsoft. Database. Games. Using Windows 8′s “hidden” backup to clone and recover your whole PC. NetworKing. <center><div class="site_errors"><div class="floatType_site_error_top"></div><div class="floatType_site_error"><table summary="layout table"><tr><td bgcolor="#000000"><font color="#ffffff"><h2><img src="/templateimages/redesign/modules/overlay/site_error.gif" title="Site Error" alt="Site Error"/>There's a problem with your browser or settings.


</h2></font><font color="#ffffff"><p>Your browser or your browser's settings are not supported. To get the best experience possible, please download a compatible browser. If you know your browser is up to date, you should check to ensure that javascript is enabled. Google Teen Coding Contest Launches Nov. 26. Google has announced that its third annual Google Code-In contest for teenagers will kick off Nov. 26.

Google Teen Coding Contest Launches Nov. 26

Course Library. The growing field of computer science: Where are the jobs? The level of employment for computer scientists is expected to grow 19 percent in the next eight years.

The growing field of computer science: Where are the jobs?

Check out who's hiring and what the average salaries are. According to the U.S Department of Labor, the level of employment for computer scientists is expected to increase 19 percent from now until 2020 and this increase correlates directly with the demand for college graduates with a degree in this field. According to, the average salary for the most in demand job titles for computer science majors is approximately $88,909.

5 Reasons Why Responsive Design Is Not Worth It. After the huge debate this original post created, we decided to refine and build upon the original article, bearing in mind the thoughts of some very insightful feedback left by some commenters.

5 Reasons Why Responsive Design Is Not Worth It

You can find the new article here. “We’re just now starting to think about mobile first and desktop second for a lot of our products.” ~ Kate Aronowitz, Design Director, Facebook “[The shift to mobile design] is even bigger than the PC revolution.” ~ Kevin Lynch, CTO, Adobe In 2014, more people will be using mobile devices to access the internet than desktop PCs. Accessibility for mobile devices has become a huge priority for web developers.


M-DISC « The First Permanent File Backup Disc That Lasts Forever. Now the M-DISC™ comes in a 25GB Blu-ray!

M-DISC « The First Permanent File Backup Disc That Lasts Forever

With all of the longevity benefits of our original DVD, the Blu-ray gives you over five times the storage capacity on one disc. Previous IOCCC Winners. Attack against Microsoft scheme puts hundreds of crypto apps at risk. Researchers have devised an attack against a Microsoft-developed authentication scheme that makes it trivial to break the encryption used by hundreds of anonymity and security services, including the iPredator virtual private network offered to users of The Pirate Bay.

Attack against Microsoft scheme puts hundreds of crypto apps at risk

The attack, unveiled by Moxie Marlinspike and David Hulton, takes on average just 12 hours to recover the secret key that iPredator and more than 100 other VPN and wireless products use to encrypt sensitive data. The technique, which has been folded into Marlinspike's CloudCracker service, exploits weaknesses in version 2 of a Microsoft technology known as MS-CHAP, short for Microsoft challenge-handshake authentication protocol. It's widely used to log users into VPN and WPA2 networks and is built into a variety of operating systems, including Windows and Ubuntu. CrowdStrike: You don't have a malware problem, you have an adversary problem!™


Government. For $74, a Mini-Android Computer. Ars Technica and others report on a cool miniature Android computer that can plug directly into your TV.

For $74, a Mini-Android Computer

The whole thing is housed in a 3.5-inch plastic case, weighs in at 200 grams, and measures roughly the size of a USB thumb drive (a tiny bit bigger, actually.) ELPaaS from Heirloom Computing. How to sideload apps (even the Android Market) on the Amazon Kindle Fire. The Amazon Kindle Fire may look like a tablet designed only to access apps, music, movies, books, and periodicals from Amazon.

How to sideload apps (even the Android Market) on the Amazon Kindle Fire

But under the hood it’s an Android tablet, which means that it can run most apps designed for Android 2.3 and earlier. And it turns out it’s quite easy to install most of them. Most users will probably be content with the Amazon Appstore, which offers about 20,000 apps and counting. But there are hundreds of thousands of apps for Android, and if you’re looking for an app that Amazon doesn’t offer, it may be easier than you think to install it.

Getting started guide. Gravatar - Globally Recognized Avatars. - Hire Freelancers & Find Freelance Jobs Online. Go Daddy really and truly opposes SOPA now. GlobalWeather: GetWeather Operation. API Directory - ProgrammableWeb. LimeJS HTML5 Game Framework.