3 Spam Free Ways to Share Your Contact Information. My husband was my inspiration for this post.
He wanted to share his contact information on Twitter and was 2 seconds away from posting a tweet with his actual email address, until I stopped him. I let him know that he was just asking for trouble (lots of spam) by doing that. I then helped him search for a better alternate: a way of posting his contact information without having to actually post his email address. He decided upon Scrim, but along with that service here are 2 other quick and easy spam free ways to share your contact information on the Web.
Scrim With Scrim you enter your email address and can optionally customize your URL. EmailCover.
Why the Navy Likes Google+ The United States Navy has been quietly coaching sailors, personnel, and their families on proper use of social media.
But that's not all--they also seem to be major fans of Google+. A presentation on how to get started on Google+ was recently made available to Navy personnel; copies have also been published online by the Navy's Chief of Information office. The guide is full of plans for specialized Navy pages to be created once Google allows them for businesses and institutions. In the Navy's words: "Google+ will be launching profiles for businesses very soon adding new ways to reach, engage and serve Navy stakeholders. " Best practices and safety are discussed in military-specific terms focused on keeping fellow sailors and shipmates safe.
However, no official announcement has been made regarding the opening of naval (or military, for that matter) pages on Google+. The Navy appears to be in the process of shifting their social media strategies. How Does Google Work? Top 100 Network Security Tools. HTML Cheatsheet &124; Webmonkey&&124; Wired.com - StumbleUpon. Chat with Your Friends through ms dos Command Prompt - StumbleUpon. 25 Best SSH Commands / Tricks - StumbleUpon. OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is.
OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. Digital Inspiration: A Technology Blog on Software and Web Appli.
Network World. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.
A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. GRM n00bs. 64 Things Every Geek Should Know « Caintech.co.uk. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.
The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. News. Opinion. Advice. Research. Ophcrack. CSM: Computer Science and Mathematics Division. Krebs on Security. Top 100 Network Security Tools.
Cryptome. The Anonymous Press. InformIT: The Trusted Technology Source for IT Pros and Developers. Your Anon News. Schneier on Security. Ross Anderson's Home Page.
Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New Security protocols and evidence: where many payment systems fail analyses why dispute resolution is hard.
In a nutshell, the systems needed to support it properly just don't get built (blog). In Why bouncing droplets are a pretty good model of quantum mechanics, we solve an outstanding mystery in physics (see blog posts, three previous papers and older blog posts). Reading this may harm your computer – The psychology of malware warnings analyses what sort of text we should put in a warning if we actually want the user to pay attention to it (blog). 2013 highlights included Rendezvous, a prototype search engine for code; a demonstration that we could steal your PIN via your phone camera and microphone; an analysis of SDN Authentication; and papers on quantum computing and Bell's inequality.
Tom Dunigan's Security page. Tom Dunigan's UTK/CS security course Security pointers NIST computer security and resources/conferences Yahoo Security and Encryption and hacker news security mailing lists and infosec news newgroups: sci.crypt comp.security.unix comp.security.misc comp.risks cryptography archives.
Computer Security - Internet Security - Network Security - Anti Virus Information Portal - Anti Virus Hacking Alerts Bulletins - InfoSysSec. SecurityFocus. Cybersecurity News. History of Computer Security. Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98.
These papers are unpublished, seminal works in computer security. They are papers every serious student of computer security should read. They are not easy to find. The goal of this collection is to make them widely available. Table of Contents How To Use This Collection. Megapanzer. Switch on the Code.