by ray | Feb 17, 2015 | Tech News
Article by Ted Greenwald In the 1990s, Microsoft became identified with the Death Star partly by enticing developers to build applications (such as WordPerfect and Lotus 1-2-3) on its platform and then releasing copycat versions that ran more smoothly, thanks to...
by ray | Feb 16, 2015 | Cloud Tools
Article by Eric Ravenscraft Android: Google’s finally released an Android counterpart to its Chrome-based remote desktop application. Install the Chrome Remote Desktop extension for Chrome and now you can log in to your computer remotely from Android. The app is...
by ray | Feb 16, 2015 | Security
Article from CNN Apple has finally expanded an extra security feature to guard iMessages and FaceTime video chats. The feature, called two-step authentication, provides an added layer of protection against hackers. With two-step authentication enabled, logging into...
by ray | Feb 13, 2015 | Cloud Tools, Google, Google Workspace
Article by Dara Kerr Dropbox pricing plans.Screenshot by Dara Kerr/CNET As Dropbox hosted its first developer conference on Tuesday, conjuring up images of a future without hard drives and announcing its plans for cloud domination, some users still aren’t happy....
by ray | Feb 13, 2015 | Security
Article by Thorin Klosowski Shellshock, the newly discovered vulnerability that allows attackers to inject code into your machine, puts your Mac or Linux at a serious risk for malicious attacks. Here’s how to test if your machine is vulnerable. Shellshock uses a...
by ray | Feb 13, 2015 | Security, Wordpress
Article by Lisa Hoover McGreevy WordPress has struggled in recent weeks with a spate of security issues ranging from malware infections to denial-of-service vulnerabilities. It’s not a big surprise then that Automattic, the open source development company behind...