64 Things Every Geek Should Know - LaptopLogic.com The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. 1. USB – Universal Serial Bus GPU – Graphics Processing Unit CPU – Central Processing Unit SATA – Serial ATA HTML – Hyper-text Markup Language HTTP – Hypertext Transfer Protocol FTP – File Transfer Protocol P2P – Person to Person data sharing 2. If you rolled your eyes here, that is a good thing. 3. Here’s what one looks like: 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
Remove Time Limit From Trial Software With Time Stopper So you downloaded a trial software and loved it, now what? The next step would be to use this software forever, but how would you do so? Time Stopper(Update: New version link added, now it comes without ads) is a free tool for Windows that can stop any trial software’s time for you. For example you downloaded a software that comes with 15-days trial, you used for 3 days which means 12 more days are left before it expires. Below is the complete guide on how to stop a time of a trial software. Note: When this tool will stop the time for a trial software, it will not change or stop your system time. First click Browse and select the executable(.exe) file of the software whose trial limit you want to remove. On the right side of the screen you will be shown a system calendar so that you can know what date is today. If you have to open any trial software frequently using Time Stopper, you can create it’s desktop shortcut. Advertisement
Bouille: SOS DEPANNAGE informatique auto-entrepreneur Aujourd’hui, nous avons le plaisir de vous présenter Philippe, une bouille bucolique et Zen mais pas que. Il risque de pirater le blog actualité Auto-Entrepreneur si son profil de bouille ne lui plait pas ! 1) Qui êtes-vous ? Philippe dans la vraie vie, Zen Ethic sur le réseau. 2) Auto-entrepreneur depuis ? J’ai créé ma société en décembre 2010 et débuté réellement mon activité en septembre 2011. 3) Que propose votre auto-entreprise ? A tous les ordinateurs connectés sur Internet, un service de réparation à distance, d’optimisation et de sécurisation préventive. Elle est aussi spécialisée dans la lutte contre le piratage des pages et profils Facebook. Je propose deux formules à mes clients : une simple et une plus spécialisée que vous pouvez retrouver sur mon facebook ! 4) Comment ça se passe ? 5) L’article du blog auto-entrepreneur qui vous a le plus intéressé ? Tous vos articles dédiés à ce statut sont intéressants, ils représentent en effet une source inépuisable d’informations :-) !
How to jailbreak iOS 6 (with Cydia) for iPhone 4 and iPod touch 4G The Northern Hemisphere autumn is usually a slow time for jailbreaking. Apple releases new iOS firmware, along with a shiny new iPhone – and both typically need time before they can be hacked. The members of the iPhone Dev Team, however, have given us a pre-Halloween surprise: they updated the jailbreak tool redsn0w to simplify the hacking of A4 iOS devices. View all That means that owners of the iPhone 4, iPod touch 4G, and iPhone 3GS (pre-A4) are in luck. Update your device to iOS 6 The first (obvious) step is to be running iOS 6 If you aren't yet on iOS 6, this is the first step. Download Redsn0w Redsn0w 0.9.15b1 is available at the following links for Mac OS X and Windows. Follow the instructions redsn0w's instructions are straightforward and clear The directions in redsn0w are straightforward, so make sure your device is connected, open the app, and follow along. Install Cydia Now it's much easier to get Cydia on your iPhone 4 Booting This is a tethered jailbreak. Re-restoring
Microsoft SpyNet Microsoft Active Protection Service (abbreviated MAPS and formerly known as Microsoft SpyNet) is the network of Windows Defender and Microsoft Security Essentials users that help determine which programs are classified as spyware. The signatures created for any submitted programs by the users of the product are available to all users, displayed as a bar graph that shows the percentage of people who have allowed, blocked, or removed an item. This method of spyware classification allows rare, unknown, or new spyware to be categorized as most people choose to send their data. Basic membership The basic MAPS membership choice in Windows Defender or Microsoft Security Essentials does not alert the user of software, and changes made by software that has not been analyzed for risks. Advanced membership Opt out Users of Microsoft Security Essentials can opt out by left clicking on the task bar icon, chose settings, spynet and then choose opt-out. References
If we show you how to back up your PC for free, will you finally do it? If we show you how to back up your PC for free, will you finally do it? Beyond simple hard drive failure, your PC could fall prey to user error or all sorts of nefarious malware. The only way to ensure that none of your personal files or programs are lost in a catastrophe is to back up everything regularly. While backing up your data can be as simple as dumping critical files on a USB key or external hard drive every now and again, you’ll ideally want to make multiple backups and store them on different drives—preferably with the drives stashed at different physical locations. Creating Windows images with System Backup The built-in Windows imaging tool—which creates a backup of all the data on your drive, including Windows itself and your settings, programs, and files—is nowhere near as comprehensive as some premium solutions, and it sometimes has issues with restoring system images from one machine to another, but for maintaining a personal computer it’s acceptable. Put it in the Cloud!
Five Things You Should Know to Keep the Man from Snooping on Your Digital Stuff "Think of it it like leaving your doors and windows open and complaining when someone looks inside." I find this to be an iffy comparison. I understand what you guys are trying to explain but it misrepresents the problem. I'm entitled to leave my windows and doors of my house open, if someone steps onto my property to have a look without my permission than in most countries that's trespassing. If they were trying to take a peek from the sidewalk then sure, by all means, go ahead. It largely depends on what the guy accessed or not. If he saw it was open and decided to take a look and didn't delve into any emails, send any or whatever then sure, I can live with that, if he merely just looked at the page that was already being displayed. But if he went inside individual emails, started reading them etc, I find that should be comparable to going into someone's mailbox and opening up the letters, which is a federal crime.
Ca m’énèrve #libre #microsoft #NSA #hadopi #pellerin #peillon #maman Maman, ça craint. Ton PC est vérolé. Il y a un virus dedans que les antivirus ne t’enlèveront pas: une back door comme ils appellent ça, c’est à dire un point d’entrée pour le gouvernement US. Ah non, je n’ai pas bu. Bon tu me diras, à part nos photos de famille et le nombre de parties de réussites que tu as jouées depuis le 1 janvier 1970, que peuvent-ils scruter, pourquoi s’intéresseraient-ils à tes données personnelles? Et bien figure toi que ton armée a les mêmes PC troués que toi! Oui, oui, Barack a les clés de la maison, tous les ordinateurs de l’administration française, à commencer par l’armée sont piratés par les gentils américains. Comment les garants de notre « sécurité nationale » ont-ils pu se faire avoir à ce point? ça va couter beaucoup plus cher au contribuablevous allez installer des taupes américaines dans tous vos ordinateurs (c’est ouf non?) Donc évidemment … ils ont resigné avec Microsoft. Oui c’est à se frapper la tête contre les murs mais c’est comme ça, on est con.
DeleteMe Microsoft Forefront Da Wikipedia, l'enciclopedia libera. Microsoft Forefront è una linea di prodotti per la sicurezza sia per i client Windows sia per la parte server. Microsoft acquisì la tecnologia di sicurezza Forefront nel 2005, quando acquistò la Sybari Software Inc. La linea include i seguenti prodotti: Connected Business Computers[modifica | modifica sorgente] Microsoft Forefront Client Security (chiamato anche Microsoft Client Protection) Application Server Security[modifica | modifica sorgente] Microsoft Forefront Security per Exchange Server (chiamato anche Sybari Antigen per Exchange)Microsoft Forefront Security per SharePoint (chiamato anche Sybari Antigen per SharePoint)Microsoft Forefront Security per Microsoft Office Communications Server (chiamato anche Antigen per Instant Messaging) Network Edge Security[modifica | modifica sorgente] Voci correlate[modifica | modifica sorgente] Microsoft Security Essentials Collegamenti esterni[modifica | modifica sorgente]
How-To Find Files In Unprotected Directories We’ve all got a little voyeurism in us. That’s a big reason why the post, Clearing Google Search History to Maintain Your Privacy sent my visitor counts off the charts :). In this article, I’m going to show you how to create search queries that will list the contents of unprotected directories on the internet. You’ll be able to play the music files, watch the videos, look at photos and more. I have to say, it’s really addicting. First of all, what’s an unprotected web directory? I have to say I have not had this much fun with Google for a while! So let’s get to the nitty gritty details. The words “Index of /” are common to these pages, and they end up in the “title” of the page. So, for starters here is a query that will give you a search results page of unprotected directories: [-inurl(html|htm|php) intitle:â€index ofâ€ +â€last modifiedâ€ +â€parent directoryâ€ +description +size] But, this is kind of boring. Let’s say that we wanted to find any movie files in WMV or AVI format:
The absurdly simple guide to backing up your PC The first rule of PC Club is: Always, always back up. Thankfully, backing up your most important data is a cinch. It’s the getting off your rear to actually do it that stymies most people, myself included. We’ll discuss emotional motivation later. The options Method A: Fork over the $50 to $100 a year and back up the data from all your PCs and mobile devices to an online storage service such as Carbonite, Google Drive, iDrive, iCloud, Mozy, or SkyDrive. Of course, this method works only if you have regular access to enough upstream bandwidth to handle all your essential data. Method B: Consolidate the data from your mobile devices onto your primary computer. Using Method A, Method B, or a combination of both will protect 99 percent of PCs 99 percent of the time, though it’s worth noting that local backups restore far more quickly. You can stop reading now—unless, of course, you’re a seeker of the perfect backup plan, or you want some practical advice. The platinum rule What to back up
Expat Shield How to protect your PC in the web's worst neighborhoods Your data. Your wallet. Your identity. Install security software No, seriously. Viruses and malware A lot of people see viruses and malware as something that malicious hackers slip onto your computer. Hackers especially like to serve up viruses on seedy websites, such as those claiming to offer movies, music, commercial software, and porn for free. To fend off malware, download programs only from trusted websites. Sometimes, shady websites disguise malware downloads as fake update or error warnings. “Drive-by” viruses Most viruses come from files downloaded off the internet, but an insidious variant called a "drive-by” virus can infect you if you simply visit certain websites. Make sure you have Windows updates turned on, and if you ever get a notice that one of your plugins is out of date, take care of it right away. You can prevent some infections by disabling Java in your browser—to do this just search in the Start Screen for “Configure Java.” Using Sandboxie Email But wait, there's more