30 Cool Open Source Software I Discovered in 2013 These are full-featured open source software products, free as in beer and speech that I started to use recently. Vivek Gite picks his best open source software of 2013. #1 Replicant – Fully free Android distribution Replicant is entirely free and open source distributions of Android on several devices including both phones and tablets. WikiLeaks: Anonymous hierarchy emerges They were described as a leaderless, anarchic group of "hacktivists" who briefly brought down MasterCard, Visa and PayPal after those companies cut off financial services to WikiLeaks. But inside Anonymous, the Guardian has found that the organisation is more hierarchical – with a hidden cabal of around a dozen highly skilled hackers co-ordinating attacks across the web. The secretive group that directs the Anonymous network was also behind the assault on the Gawker websites in the US at the weekend, according to documents seen by the Guardian. That led to email addresses and passwords of more than 1.3 million Gawker users being made public, and spawned a spam attack on Twitter that is now being investigated by the FBI.
The Egg Author's Note: The Egg is also available in the following languages: The Egg By: Andy Weir Bypass the Great Firewall with 12vpn - Personal VPN Review After the Beijing 2008 Olympics most people anticipated that internet censorship in China would ease but contrary to expectations the situation continues to get worse with more sites being blocked by the week (see whatblocked.com for the latest). Traditionally people bypassed the blocks using anonymous proxies and other free services but many of these have also been barred by the government and those which remain are usually so overwhelmed that service is patchy and slow at best. The best solution for foreigners in China and anyone wanting to access sites such as YouTube, Twitter and Facebook these days is to get a personal VPN account using one of the commercial services available.
3 Google Tricks When You Don’t Know What to Search For However more often than not, you have to try dozens of various search phrases to accidentally come across a good result. Today’s short search tutorial will show some Google search tricks you can use to search when you actually don’t know what you are going to find. The tips will turn useful in a number of cases: When you are looking for random inspiration and thus have no idea which words to use to search (actually what you really need to get inspired is to know those words);When your topic is broad and you are unsure which one of related words and synonyms best describes your question;When you have found a page, can’t define it properly but need more of the kind (especially, if you have landed on some wicked tool and want to know if there are more tools like this).
99 of the Best Windows Freeware Programs You May Not Know Of Because of the popularity of my previous article on Help Desk Geek entitled 99 ways to make your computer blazingly fast, I’ve decided to write another list post with 99 items, but this time on Windows freeware programs that you may have not heard of. If you search for “best freeware programs” or “top freeware apps”, you’ll get lots of lists, but mostly with programs everyone has already heard of: AVG anti-virus, 7-zip, Firefox, OpenOffice, etc, etc. That’s all nice and fine, but what about all those little gems programs that work great, but don’t get all the headlines? In this article, I will try my best to mention as many small name freeware programs as I can that can help make you more productive!
The darkness at the heart of Anonymous Louise Mensch, the Conservative MP, didn't react as perhaps the sender of the threatening email she received on Monday had hoped. She came out swinging - as anyone who knows her even a little might have been able to predict. "Had some morons from Anonymous/LulzSec threaten my children via email.
Remote Access for Vendors BIDMC works with many external technology vendors which need access to our internal systems. I've been asked how we provide such access in a secure and HIPAA compliant fashion. We provide vendors two methods of remote access for the purposes of supporting their equipment on our networks. The first is the traditional Lan to Lan tunnel model. If they choose the Lan-to-Lan model we required that they define the TCP/UDP ports required. We then restrict the tunnel down to those ports and to the specific IP address(s) required.