background preloader

Tech Course

Facebook Twitter

Apple Pay setup detailed & retailers begin training as service launches at Apple HQ. The launch of Apple Pay, Apple’s NFC and Touch ID-based mobile payment solution, is upon us.

Apple Pay setup detailed & retailers begin training as service launches at Apple HQ

Apple has begun preparing for the launch by kicking off Apple Pay training programs for its own group of retail store employees and by working with retailers to prepare for the debut later this month. The training materials, shared by a reliable source, for the Apple Pay launch at Apple retail stores have also detailed some new specifics regarding the Apple Pay setup and transaction processes both on customer iPhones and in Apple retail stores… As can be seen in the image above, Apple Pay can be set up via the Passbook application through both the initial iOS 8 setup process or in a new Settings.app tab called Passbook & Apple Pay. Some of these details were previously revealed by internal settings in the latest iOS 8.1 beta seed for developers. Credit cards can be added to Passbook via an iTunes account or by using the iPhone’s camera to scan in details. How to Anonymize Everything You Do Online.

One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It’s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.

How to Anonymize Everything You Do Online

But it’s also possible to go a step closer toward true privacy online. Mere encryption hides the content of messages, but not who’s communicating. Use cryptographic anonymity tools to hide your identity, on the other hand, and network eavesdroppers may not even know where to find your communications, let alone snoop on them. “Hide in the network,” security guru Bruce Schneier made his first tip for evading the NSA. “The less obvious you are, the safer you are.” Though it’s hardly the sole means of achieving online anonymity, the software known as Tor has become the most vouchsafed and developer-friendly method for using the Internet incognito.

Email. It's Your Choice: The Top 10 Linux Desktop Environments. Don’t know which Linux desktop environment is for you?

It's Your Choice: The Top 10 Linux Desktop Environments

From Gnome to KDE, from MATE to Unity, there’s a lot of choice out there. Where should you start? Windows and Mac both basically offer one desktop interface: the default one. Linux is another beast entirely. You can choose whatever desktop interface you like. Gnome 3 Gnome is one of the two major desktop environments available, alongside KDE. Gnome 3 features Gnome Shell, a new paradigm for a computer desktop. Many disagree, but I still think it’s a good desktop environment to use. KDE is the other major desktop environment, alongside Gnome. Like I mentioned earlier, you do need a bit more muscle to run a KDE desktop at acceptable performance. Say goodbye to capitalism as we know it - Keynote Speaker. By Jeremy Rifkin Shutterstock.com A new economic system has entered the world stage.

Say goodbye to capitalism as we know it - Keynote Speaker

The Collaborative Commons is the first new economic paradigm to take root since the advent of capitalism — and its antagonist socialism. The Collaborative Commons is already transforming the way we organize economic life, with profound implications for the future of the capitalist market. The trigger for this great economic transformation is known as Zero Marginal Cost. Tech firms' cash hoard eases meltdown fear The two-month swoon in technology stocks has given investors flashbacks to the dot-com meltdown. Companies never anticipated, however, a technology revolution that might unleash “extreme productivity” bringing marginal costs to near zero, making information, energy, and many physical goods and services nearly free, abundant, and no longer subject to market exchanges.

 Password Haystacks: How Well Hidden is Your Needle? ... and how well hidden is YOUR needle?

 Password Haystacks: How Well Hidden is Your Needle?

Every password you use can be thought of as a needle hiding in a haystack. After all searches of common passwords and dictionaries have failed, an attacker must resort to a “brute force” search – ultimately trying every possible combination of letters, numbers and then symbols until the combination you chose, is discovered. If every possible password is tried, sooner or later yours will be found. The question is: Will that be too soon . . . or enough later? This interactive brute force search space calculator allows you to experiment with password length and composition to develop an accurate and quantified sense for the safety of using passwords that can only be found through exhaustive search.

The 50 Free Apps We're Most Thankful For. The best free online conference platforms - Freelancers Union. Source: Mike Licht Only half of freelancers work in their local cities and communities, so millions of independent workers across the country rely on online virtual meeting platforms to talk to clients and collaborate with other freelancers.

The best free online conference platforms - Freelancers Union

Turn an Old PC Into a NAS, VPN, Media Streamer, and More with Amahi. Why Ultra HD 4K TVs are still stupid. The flood of TVs with higher resolution than 1080p is inevitable, but at typical TV sizes, quadruple the pixels makes no difference in picture quality and are not worth the extra price.

Why Ultra HD 4K TVs are still stupid

As we all expected , the big news at CES this year was Ultra HD 4K displays.