In 1996, Dr. Thomas Pabst, a German MD then living in England, created a web page where he talked about motherboards, video cards, and a then little-known phenomenon called overclocking. Dubbed Tom’s Hardware Guide, it spawned a long list of imitators, creating a new industry: PC hardware enthusiast sites.
Irving Gould was a Canadian financier and chairman of Commodore International. Although it’s an oversimplification, journalist Robert X. Cringely dismissed the once high-flying computer company, which had 60% of the market in 1984, as Irving Gould’s stock scam.
Insurance companies are starting to offer discounts if you plug one of their devices, often called a RightTrack or SnapShot, into your car’s ODB2 port.
One of my college buddies asked me about them when his insurance company offered his family a 5% discount to plug these into their cars, and then make them eligible for up to another 25%. Those are compelling numbers. So what are the potential drawbacks?
Yesterday, after reading a post in which I cautioned about a popular security podcast, someone asked me what cyber security podcasts I do listen to. I wrote this up a long time ago and never posted it for some reason, so now I’m correcting the oversight. Here’s my collection of the best of the best security podcasts.
These are the security podcasts I’ve been listening to for several years now and continue to recommend. Security podcasts are a good way to keep in touch with current issues, and also a good way to get continuing education.
I got e-mail the other day from Turbotax saying someone had filed my taxes for me. Obviously a cause for concern, right? Here’s how I determined the message was fake in about three minutes. You can spot phishing e-mails with Outlook the same way.
Some people will tell you not to even open a message like this, but if you’re a computer professional, at some point someone is going to want you to prove the message was fake. I think this is something every e-mail administrator, desktop support professional, security professional, and frankly, every helpdesk professional ought to be able to do.
So here’s how you can get the proof. And generally speaking, Outlook 2010’s default configuration is paranoid enough that this procedure will be safe to do. If you want an extra layer of protection, make sure you have EMET installed and protecting Outlook.
A former journalist whose track record includes being fired from the Tribune Co. and from Reuters is facing two decades in prison for giving the hacking group Anonymous credentials to log into a Tribune web site and change stuff.
Anonymous changed one headline, and it took about 40 minutes for someone at Tribune Co. to notice and change it back.
It reminds me of something that happened at the newspaper where I used to work.
Veteran IT journalist Guy Wright advises not to buy any more computer than you need. Wright was a prominent Commodore journalist, so he’s been thinking this way for literally decades. I grew up reading the magazines he edited in the 1980s and 1990s–yes, really–so it’s not surprising that I would agree with him.