background preloader

Computer Stuff

Facebook Twitter

Geek-meditation.jpg (JPEG Image, 500 × 438 pixels) Awesome Geek Chic Finds We Love. Geekin’ Ain’t Easy. Posted by Jillian Madison on August 27, 2011. Organization.jpg (JPEG Image, 1024 × 768 pixels) - Scaled (76%) 70 Things Every Computer Geek Should Know. | Arrow Webzine. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness.

As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

How to become a real computer Geek? 1. 2. 3. 4. 5. 6. 7. 8. 9. Error Goblin. Free Programming Books - StumbleUpon. Here is an uncategorized list of online programming books available for free download. The books cover all major programming languages: Ada, Assembly, Basic, C, C#, C++, CGI, JavaScript, Perl, Delphi, Pascal, Haskell, Java, Lisp, PHP, Prolog, Python, Ruby, as well as some other languages, game programming, and software engineering.

The books are in various formats for online reading or downloading. This list will be updated daily. Scroll downn, or use the shortcuts below. This Giant Chunk of Metal Is 4 Kilobytes of Memory. How to fix any computer. True joke.- All Lol. Kids These Days. What Your Email Address Says About Your Computer Skills. Instant Messaging Frustrations. Zombie Horror Story. Why We Update Software. Siri On Your Friends iPhone? Tumblr_lrc4ssa3YD1qzofah.jpeg (JPEG Image, 500x500 pixels) Pizzaquee-n.jpeg (JPEG Image, 500x375 pixels) Six Deadly Security Blunders Businesses Make. Small, subtle mistakes can lead to big security breaches Sometimes it's the unknown or overlooked little mistakes that leave an organization wide open to attack: a missing hash mark in a server configuration, a long-forgotten PBX user account, or an embedded Web server in an office printer.

With compliance pressures, increasingly cagey malware, and the fear of being the next front-page data breach victim, it's no wonder that enterprises might not notice potential problems with their lower-profile devices, or make subtle configuration mistakes. Even so, ignorance is no excuse when the bad guys hone in on an inconspicuous weakness, like a few older, rarely used desktops that haven't been updated with the latest patches.

It takes only one weak link for an attacker to gain a foothold into an organization and steal valuable data, or set up shop for long-term cyberespionage. Spooked yet? 1 of 7 More Insights. GlenBroganMariosClosetSmallforWeb.jpg (JPEG Image, 650 × 488 pixels)