Internet Alternatives, Meshnet
Encryption and Back Doors
Processes and Methodology
Courses for Tim
Souce Code Control
Using Windows 8′s “hidden” backup to clone and recover your whole PC When it comes to backing up and restoring your PC, Windows 8 took a few steps forward and a few steps back. Your settings and apps in the new tablet-y interface (yeah, we're still calling it Metro ) are automatically backed up if you use a Microsoft account. That means when you restore your PC, all of the Metro stuff comes back exactly the way you remember it.
NetworKing <center><div class="site_errors"><div class="floatType_site_error_top"></div><div class="floatType_site_error"><table summary="layout table"><tr><td bgcolor="#000000"><font color="#ffffff"><h2><img src="/templateimages/redesign/modules/overlay/site_error.gif" title="Site Error" alt="Site Error"/>There's a problem with your browser or settings.
Google Teen Coding Contest Launches Nov. 26 Google has announced that its third annual Google Code-In contest for teenagers will kick off Nov. 26. Google Code-In is an international contest to introduce 13- to 17-year-old pre-university students to open-source software development. Prizes include certificates and T-shirts, and 20 grand-prize winners will win an all-expenses-paid trip to Google headquarters in Mountain View, Calif., next spring for themselves and a parent or legal guardian.
September 24, 2012, 8:13 AM PDT The growing field of computer science: Where are the jobs?
After the huge debate this original post created, we decided to refine and build upon the original article, bearing in mind the thoughts of some very insightful feedback left by some commenters. You can find the new article here . "We're just now starting to think about mobile first and desktop second for a lot of our products." ~ Kate Aronowitz, Design Director, Facebook 5 Reasons Why Responsive Design Is Not Worth It - ManageWP
M-DISC « The First Permanent File Backup Disc That Lasts Forever | Millenniata Whether you’re a scrapbooker, a business owner, a genealogist, a photographer, or all of the above, you can’t afford to lose your priceless memories or data.
Previous IOCCC Winners
Researchers have devised an attack against a Microsoft-developed authentication scheme that makes it trivial to break the encryption used by hundreds of anonymity and security services, including the iPredator virtual private network offered to users of The Pirate Bay. The attack, unveiled by Moxie Marlinspike and David Hulton, takes on average just 12 hours to recover the secret key that iPredator and more than 100 other VPN and wireless products use to encrypt sensitive data. Attack against Microsoft scheme puts hundreds of crypto apps at risk
CrowdStrike: You don't have a malware problem, you have an adversary problem!™
For $74, a Mini-Android Computer Ars Technica and others report on a cool miniature Android computer that can plug directly into your TV.
ELPaaS from Heirloom Computing
How to sideload apps (even the Android Market) on the Amazon Kindle Fire Email The Amazon Kindle Fire may look like a tablet designed only to access apps, music, movies, books, and periodicals from Amazon. But under the hood it’s an Android tablet, which means that it can run most apps designed for Android 2.3 and earlier.
getting started guide
Go Daddy has decided to stop flirting with Congress' SOPA bill. Go Daddy really and truly opposes SOPA now
GlobalWeather: GetWeather Operation
API Directory - ProgrammableWeb