2015년 2월 23일 월요일

How (and why) GPS directions lead you astray


How (and why) GPS directions lead you astray | PSA: Grab an easy 200GB of free OneDrive cloud storage
ITworld Personal Tech
Google Plus LinkedIn Facebook Twitter


11 chic chargers: Portable power that's dressed to impress 
These stylish portable battery chargers can keep your mobile devices running through the day -- and attract envious looks at your next power lunch. Read More 

WHITE PAPER: DomainTools

Using DNS Intel in Cybersecurity Investigation and Forensics 
Threat investigators need to use all the tools at their disposal in order to identify who is behind an online attack. DNS Intelligence and Whois data can help to identify the perpetrator, build a profile of a cyber-attack, and proactively protect your data, infrastructure and intellectual property. Learn more >>


WHITE PAPER: DomainTools


Mapping Domain Ownership in Cybersecurity Investigations 
As the Internet has matured, the tactics and networks of cybercrime have grown in sophistication. Using DNS Intelligence and Whois data, cybersecurity teams and threat investigators can establish verifiable connections and build a Forensic Domain Map, allowing for proactive measures to be taken. Learn more >>

How (and why) GPS directions lead you astray 
GPS apps and portable navigation devices often provide unbearably bone-headed, and sometimes dangerous, directions. GPS experts explain how the technology works, offer reasons why GPS leads you astray, and share insight on how technology could improve in the future. Read More 

PSA: Grab an easy 200GB of free OneDrive cloud storage 
Even if you sign up for Bing Rewards right now only to claim the free OneDrive storage, you can get it. You can also grab a separate free 100GB for one year if you use Dropbox, too. Read More 

How to unlock your smartphone 
As of February 11, carriers must allow consumers to unlock their phones – but there are rules and caveats. Here’s what you need to know. Read More 


WHITE PAPER: DomainTools


Domain Attribution: Piercing the Veil of Masked Ownership 
Cybercrime organizations and threat actors have become increasingly more sophisticated in hiding their identities in Whois records. This guide will show you how DNS tools can be applied in an investigation to bypass this veil to identify the perpetrator and build a profile of a cyber-attack. Learn more >>

With $15 in Radio Shack parts, 14-year-old hacks a car 
A 14-year-old boy taking part in a cyber-hacking challenge -- after just one night with $15 worth of Radio Shack parts -- was able to communicate wirelessly with a vehicle's internal bus and control some mechanical functions. Read More 

Drawing in OneNote finally comes to the iPad 
At long last, iPad users can ink in OneNote Read More 

Got an old Surface? Microsoft's taking trade-ins 
From now until March 8, you can trade an old Surface for up to $650 in credit toward a new Surface Pro 3. Read More
 
12 things you miss about your dumbphone 
Your fancy new smartphone is far better, but there are still a few things about your dumbphone you wish you could go back to. Read More 

BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide

댓글 없음:

댓글 쓰기