background preloader

70 Things Every Computer Geek Should Know.

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know. How to become a real computer Geek? You may get the answer here:

Related:  WWW HealthshefalibhutaPrivacyAll things ComputerTechnology magazine and usefull websites

Hypertext Style: Cool URIs don't change. What makes a cool URI? A cool URI is one which does not change. What sorts of URI change? There are no reasons at all in theory for people to change URIs (or stop maintaining documents), but millions of reasons in practice. Critical thinking web We have over 100 online tutorials on different aspects of thinking skills. They are organized into modules listed below and in the menu above. Our tutorials are used by universities, community colleges, and high schools around the world. The tutorials are completely free and under a Creative Commons license. More info

9 Tips to Stay Safe on Public Wi-Fi Your bank calls you to verify your recent $750 bill at an out-of-state Taco Bell, but you haven’t left town in weeks. You quickly contest the charge and request a new credit card, but when you check your wallet the compromised card is still there. You try to think of shady ATMs or recent cashiers, but nothing comes to mind. Nothing, except the online purchase you made while browsing the Internet at your local coffee shop. The number of free public Wi-Fi hotspots is growing, but not every hotspot can provide the protection of a private home network.

100+ Google Tricks That Will Save You Time in School – Eternal Code [via] With classes, homework, and projects–not to mention your social life–time is truly at a premium for you, so why not latch onto the wide world that Google has to offer? From super-effective search tricks to Google hacks specifically for education to tricks and tips for using Gmail, Google Docs, and Google Calendar, these tricks will surely save you some precious time. How To Fix High CPU Usage In Windows If your computer fans frequently hit top speeds, it’s a sign that your CPU is fully loaded. Simultaneously, your computer may slow down. That’s annoying, especially if you’re not actually doing anything. The CPU (central processing unit), also known as processor, is the brain of your computer.

Detect How can you detect if your computer has been violated and infected with DNS Changer? An industry wide team has developed easy “are you infected” web sites. They are a quick way to determine if you are infected with DNS Changer. Each site is designed for any normal computer user to browse to a link, follow the instructions, and see if they might be infected. Each site has instructions in their local languages on the next steps to clean up possible infections. Free Online Tools to Create Infographics Infographics and data visualizations have become incredibly popular ways to impart information while keeping your audience engaged. As a result, a slew of user-friendly, free online applications have been created which enable users to create their own information graphics. Here are five such tools that I think are particularly valuable:

the radical transparency of DAVID BRIN The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? was published in May 1998 by Perseus Press (formerly Addison Wesley). This large nonfiction work concerns threats to privacy and openness in the information age. It won the Obeler Freedom of Speech Award from the American Library Association and was a finalist for the McGannon Public Policy Prize, and is still in print. Our society has one great knack above all others -- one that no other ever managed -- that of holding the mighty accountable. Although elites of all kinds still have many advantages over commonfolk, never before have citizens been so empowered.

Google's Safe Browsing Diagnostic Tool A week ago Google announced the release of a safe browsing diagnostic tool. To use the tool, just append a URL to the end of For example, to test this site, you would enter Google will then return four sets of security information about that page. (1) The current listing status of a site and also information on how often a site or parts of it were listed in the past. (2) The last time Google analyzed the page, when it was last malicious, what kind of malware Google encountered and so fourth. (3) Did the site facilitated the distribution of malicious software in the past?

10 Important Google URLs That Every Google User Should Know Which websites and apps have background access to my Google account? What does Google know about me? Where can I see all the ads that I’ve clicked on Google search? What does Google know about the places I’ve visited recently? How to Tell If A Website Is Dangerous These days it can be very difficult to tell if a site is trustworthy or not. Many nefarious sites are being designed to look respectable. Thus you should always make sure that a site is not dangerous by using multiple approaches. This is especially important to consider before providing a site with sensitive information such as credit card numbers, banking information, your email address, etc... In general you may want to be wary of a site if it asks you for unnecessary personal information, a credit card number, or a bank number when it's not necessary. This could be evidence of them phishing for your sensitive information.

Effective Digital Learning I was asked yesterday what I considered to be the four components of effective digital learning. (Why four? The person who asked me wanted four, there may be more but this is the parameters I was given.)

Related:  Knowledge BaseUseful InfoVibrationWebLifeHaxTechHACKING AND OTHER FUN STUFFComputer Related & Programming"OS" & Files Tools...Computer stuffDeveloperUseful...TechTechnologyInternetskycarterGeekinessComputer SciencerickmctrollProgrammingi'm not this clever yet (to play with later)Internet Tips and TricksiToolsParadigmsarinaeWeb tasarımCybersecurity