Oh boy, for a while one company had in their terms and conditions that the first person to email a certain address with a certain subject line would receive $1000 from them.
It took months for anyone to find it.
EDIT: Source and some other hilarious clauses.
My wife always puts her phone on silent and then forgets about it and will go for hours without answering her phone or text messages. So I set up Tasker to let me send her a text message to turn the sound back on.
Tasker helps me fix my wife's inadequacies.
Pro-tip: An easy way for Windows users to make sure that metadata is removed before you share a photo is to right-click the file and select "Properties", then the "Details" tab, then near the bottom click "Remove Properties and Personal Information". More info here.
Something a lot of people should do, is install the browser extension for like:dislike previews. It shows you how much a video is liked/disliked on the thumbnail, so you don't have to click it first:
The other thing on this topic, is I don't feel these videos should be "taken down" for too many dislikes - they should just stop appearing in the related videos though. Likes should be more important than views in ranking videos.
Well considering you still have that number you could engage in one of my favorite pastimes when it comes to calls like this, randomly feeding their number into prank call auto-dialers. Only works if you have a legit callback number for them, but I like returning the favor when I can. Also another fun one if they ask you for a contact number is to give them (202) 326-2222, which is the phone number for the FTC Office.
These are just stretches really. It's not like you're lifting weights. Also it's easy to tell when part of your article is stolen when the other part is poorly written. [link] Both 2nd paragraphs are almost identical except Tina Sieber wrote hers 2 years ago.
To everyone suggesting that this should be done by earthquake-monitoring systems, <strong>it is already available from USGS</strong>.
It's free and has worldwide coverage. Create an account, add whatever email you prefer, or by text messages (via your phone provider's SMS gateway), and sign up for whatever regions you want.
For instance, any earthquake over 6.0 worldwide causes me to receive an email, and anything over 5.0 in my region is also sent to my phone, but that config is easily changed.
I liked the one where a kid and her mom were under witness protection, and the dad used the "ah lost ma kid" routine on FB to find them. It worked.
makeuseof.com is kinda similar. Focus is slightly different, but might be what you want.
(Declaration of interest: I know a couple of people who write for them.)
Edit: They had a poll which listed a few other alternatives. (Poll results, if you're interested).
It isn't a mattress store, it is a furniture and mattress store.
Look at photo 2 in your set. Style 632 Burg.
The picture matches exactly.
Looks like a pretty shitty furniture store though. The pictures on the walls are just posters and the walls have a terrible paint job in that they go around all of the electrical conduits.
But if these are in your drop box see if you can extract location data from them.
I got my copy of Windows 8.1 from Dreamspark, and I haven't received a notification for reserving Windows 10. Is there a way to force it?
EDIT: I found out that you have to have an update installed to get the notification. It's an optional update, so I had to go into Windows Update and install it manually. I still haven't gotten a notification, but I'm trying out some things. I used this tutorial
My guess is that he is monitoring traffic over the router.
The best solution I advise is approaching him about it in a calm manner, don't blame or point fingers, and state what have observed and how it makes you feel uncomfortable.
EDIT: In the event that you would like to keep your data secure, you can encrypt it. (Also, just so the mods know, I wasn't offering relationship advice. Just a simple solution of user action.)
Here's a very simple explanation of encryption.
Encryption is like putting a massive wall with a huge steel door around your information. Only you would be able to access it, as you'd have the only key. The ONLY way he'd be able to gain your information again is if he used on of his forensic/security tools, which you said you're confident that he wouldn't use them.
Here are some simple(slightly) articles on encryption of the devices you mentioned.
iPhone This will encrypt your data stored on your phone.
Mac This will do the same for the data on your Mac.
Unfortunately I don't believe there is a way you can keep him from monitoring your traffic over the monitor, short of locking him out of it.
EDIT: I'm so stoked right now! My first relatively high rated fix!
Also, it's open, as in any dev. can make a plugin to support their app's content:
Let me point you in the right direction: Here
It's on you mate. it's your decision to leave this hell hole. Why not give yourself a 6 month trial. Go shave off your head, actually hit the gym and eat healthy and try to socialize as best you can.
Come back in 6 months and update us.
If you manage to change for the better, you will always know you've left this place and can do it again. If it doesn't get better, you're back to square one and nothing has changed so it doesn't matter at all.
OP posted this on a forum on a different site as well, and there he or she stated that the daughter used the ipad app Ink Pad. After reading the following article, I think it's plausible that an intelligent, artistically inclined 11 year old could have created this. Kids are raised from a very young age using complex technology that you or even I (at 27) could not have fathomed using at age 11.
Although I don't use it, Annotations on the Kindle appears to be just that, although there must be more serious comments than humorous.
Personally, I prefer un-marked up. Annotations by readers make me feel like I'm being told how to feel/think about something (not necessarily true, but I feel that way).
The location of the file, the camera you used etc is generally stored by default and you can wipe it. But these days what is worse is that smartphones, they will GPS tag your photos with the location they were taken (as well as GPS smart cameras). Wipe it before you put it on the internet. I wrote a big blog post about it but unfortunately it was a work blog.
“Genuine love is rarely an emotional space where needs are instantly gratified. To know love we have to invest time and commitment...'dreaming that love will save us, solve all our problems or provide a steady state of bliss or security only keeps us stuck in wishful fantasy, undermining the real power of the love -- which is to transform us.' Many people want love to function like a drug, giving them an immediate and sustained high. They want to do nothing, just passively receive the good feeling.”
― Bell Hooks
EDIT: Not as good, but also good: [link] Rejection Online
Some funny ones here: [link]
> I get assholes, but not really thieving... it's their patent, and their protecting it legally.
you know, when you buy a car, you're allowed to use third-party/aftermarket components. the manufacturer can't forbid you or force you to use original parts, or void your warranty for using aftermarket parts (unless the aftermarket part directly caused the failure). that's actually the law.
so why is this different for the coffee machine? you buy a coffee machine and the manufacturer forces you to use their coffee? what legitimate right do they have to do this?
and what exactly did keurig invent? what is their patent?
they didn't invent the capsule coffee machine, those have existed for decades, and there's no patent on the cups or requirement to get manufacturer-approved cups from either the competition, or even from keurig on their original machine.
they're simply doing it because they can and because they thought the consumer would be stupid enough to swallow this shit.
except it kinda backfired
Here's a list:
You'd probably want to host it yourself or find a .onion host that accepts bitcoin. Here's a tutorial for hosting yourself. And yes, I'm sure there are occult groups on Deep Web.
I don't know why everyone is bashing the cloud/chromebook, at least in this scenario. I am sure there are valid reasons to bash both, but in this situation it was all OPs fault. There are other devices OP could have used. He could have used someone's phone or he could have used a pad of paper, for starters, and then there are apps that do not require internet connectivity on the chromebook that can make local text files. [link]
I actually just wrote an entire article about how to strip formatting when pasting text. There are a few different ways depending on what you prefer.
As an ex Facebook Employee, here are the things that you need to do:
Retrieve the hotmail account... this is obvious, if it's not possible, though...
You can still retrieve your facebook account though:
After doing that, lock down the account hardcore:
Account Settings -> Security
This means that you will get an SMS on new logns to the account, and if the device is not recognized it will require an SMS authentication as well.
Not trying to be super self-promoting, but I see a lot of people talking about other SMS-and-PC apps. I recently did a writeup on some big names and compared them, so if you're interested, give it a look and let me know what you think!
They've also done some stuff in the name of security that really, really make things difficult for developers and hackers (of the good variety).
I was trying to install some unsigned drivers for a SDR device, couldn't do it without going through a long, involved, undiscoverable process. You need to go through this process every time you update the driver, which is still in development and updated often.
I eventually gave up and just ended up going back to another Windows 7 machine to play with anything experimental.
To any future RPDR prospect drag queens who lurk these threads to read about themselves being talked about, I hope hookers all know that there are multiple ways to automate your social media accounts when you're away from it. You're welcome.
These guys do a good cover of it. There were other smaller forums/blogs talking about this since 2011, but these guys were the first big group that wasn't afraid to talk about it.
You do realise that any device on a network reports the IMEI once you put a SIM card in it....right? [link]
Simply put, an IMEI does also say what type of device you have, so from a logistical standpoint, T-Mobile can easily tell you have a Tablet. Systems like this were the reason that AT&T was able to crack down on people on old MediaNet plans who had unlocked smartphones that they didn't put onto their plans. AT&T read what device was accessing their network and was able to update the system.
MacKeeper? No way.
Seriously, do not use this garbage-ware. It is utterly unnecessary and can lead to speed hits and system instability.
EDIT: apparently there was supposed to be sarcasm here.
shouldn't they be named this way instead?
"02 IF FOUND.txt"
"03 PLEASE CALL.txt"
"05 THANK YOU.txt"
Depending on the files in the main directory, I think you'd like to make sure they show up first. If it's on a camera, the files might be in a folder or they might just be named via the time/date-stamp when taken in the root folder.
Excellent tip by the way. I have my owner information on the lock screen of my phone to protect it but make it recoverable for others to find me. HowTo. For my flash drive I use: geek.menu. There's bunch of settings to tweek where you can enter owner information that displays on "unknown computers". You can also encrypt your files and do a bunch of other things. Lifehacker article on it
Zip files work by a system of "lossless compression". Nothing in this is lost, however, the system works by the removal of redundant information.
[link] (This is a good article describing the concept.)
You have a file. The data represented shows:
>11111111111111111111112222222222222222222223333333333333333333 This is my text.
The set of numbers, contain repeated redundant information that can be squeezed down and represented in another format.
>1x10, 2x12, 3x11, This is my text.
This is my text. is a set of unique information, that wont need redundancy removal, so it would be left alone.
Again, no data is destroyed, simply recompiled into less redundant and more compact packages.
Sorry but the term 'build' hardly applies here. He put a TV and an NES console into a backpack, possibly with some sort of mobile energy source.
Here are some examples of people who have actually 'built' their mobile console
Edit- on second look, thats not even a NES in the backpack, looks like some sort of NES computer
>Most webcams have some kind of LED that indicates when it’s on, but depending on the hardware this can be bypassed – so you wouldn’t even know.
You're making an awful lot of assumptions. You're assuming that everybody online only ever interacts with each other once; that somebody's screenname isn't susceptible to the same repeated attacks that somebody's real identity is; that people online don't hold their online personae as dear as their real-world social personae. And most importantly, you're assuming that "free speech" and its use on the anonymous internet is limited to just verbal insult rather than, say, the dissemination of personal information (including financial, geographical, social, psychological, etc.), the widespread and easily-publicized dissemination of somebody's pictures, the release of passwords, the sharing of intellectual property. There are so many new and wonderful ways to hurt somebody in front of large audiences- all made possible by modern technology.
But if I take all of your premises at face value, I'd still disagree. I think it depends on the person. On either end. If somebody is good enough with words, or suggests something damaging in a way that tricks a stranger into taking their advice, that's incredibly dangerous. If somebody on the receiving end is particularly vulnerable, either emotionally or intellectually, they can take the same damage from words from a stranger online as they would in real life. Words are really, really powerful.
FYI you can do this without DDG in Firefox or Chrome.
For Firefox what you want to do is add "[link]" (if you are in NA) as a bookmark. Then you want to edit that bookmark and add a keyword, for example carry.
Now, whenever you type "carry feedl0rd" in your adress bar it will take you to [link]
It's pretty neat, I have similar setups for subreddits (r leagueoflegends takes me to this sub) and op.gg, champion.gg and others.
For chrome you can follow this guide: [link]
Absolutely do not reformat the drive in any way shape or form. Do not write anything to it. Reformatting it again will just scramble it more. Writing to it will destroy data. Even putting it in your system to look at it can cause data to be written to it. Look at this article [link]
Secondly, professional recovery services may not be as expensive as you think. Contact a few and get a price estimate. A friend recently had a hard drive that died and the recovery price was surprisingly affordable.
their video player is pretty weird though, but its actually a youtube video (incase its just weird, but still not working i gave you the above link)
Doing a quick Google on "Nexus 9 hot back behind camera" seems like I'm not the only person:
It's a dual core processor that has to work very hard at times when rendering web pages and such.
I read this in Google Speaks for a class project.
Not that this is a very credible source but you can see the same information here.
I maintain this is a bad idea. In order to support that kind of scale, you're going to need to throw things under the bus that you really, really want. Furthermore, while I know this is the minority opinion, I think history will bear me out on this: having a billion people in the same virtual world is a dumb idea. Being confronted by an unfiltered firehose of randoms is less valuable than having a system that's aware of your social network and can instance intelligently to reflect that social graph. Crowds aren't pleasant in real life. There's absolutely no reason you'd want to reproduce them in VR.
Anything that "fixes" the registry. There are several sites that state that even if the software does clean up the registry, there is little to no speed improvement. One link, and another.
I feel for you, man. It's true, iTunes runs better on OS X. Still just as bloated, but at least useable. To this day, I have Winamp as my media player/library manager on my Windows drive. If all you want out of iTunes is media playback and device syncing, take a look here - click
There are also a few processes that you can disable, such as iTuneshelper.exe (AFAIK it's only used for launching iTunes when a device is connected, if you have that option enabled)
Iteresting read.I dont think a magnet would cause direct hardware failure .
You can easily remove that metadata.
Personally I just screenshot the image preview and put it through mspaint.
There are actually tools for this very idea! /u/StuartPBentley mentioned that XFCE (a linux desktop manager) has this built in, but chances are, even if you're using linux you probably use either unity or GNOME.
But, since you didn't mention which OS you're using, here are your options:
Windows: 3 options in there, they all do what you're asking, but some of them have more advanced features.
Linux: 5 options in there, same deal as the above.
OSX: 10 options in this one. I didn't put them in ascending order on purpose, it just happened.
I hope this helps boost you're productivity! Honestly though, this really should be a feature for modern operating systems by now.
Ahh, this is actually an easy one. You don't need to do anything in the BIOS. Just plug in the new HDD and boot up Windows. The disk should already be partitioned coming from the factory; possibly already formatted as well. If it isn't formatted, when you boot into Windows it'll either pop up asking you if you want to format and run you through the wizard, or you can follow the steps here:
I have to say, personally, one of my biggest worries of closing my Facebook account is that I will lose all the tagged pictures I'm in. Nobody gets pictures printed and puts albums together anymore. I want to have those pictures in a tangible album that I can look back on and remember and show my future children. I possess no actual photos of myself after maybe... 16? Everybody uploads pictures onto Myspace or Facebook, and that's how we share. If someone deletes their profile, or an album, my pictures are gone. If Facebook finally crumbles, pictures gone. And after reading so much controversy within Facebook, I feel that it's a good chance something may happen. So, I Googled, and found this site: [link] ... took 4 minutes, and now all of my pictures are on my computer. If anyone feels the same way, visit the site and get your pictures. I'm sure there are other ways probably widely known to do such a thing, but being that I had never heard of any, I thought I'd share in case anyone else was feeling the same way.
Plenty of sources say it does, including me, so it's worth a shot. I have had success with this a few times on people's Plasma's.
Better than clearing browser history, show him private browsing / incognito mode. It's an essential skill for internet safety - it prevents possibly shady websites from putting tracker cookies on you, as one example. Teach him to recognize risky searches (page 7 here) and other potential uses for private browsing. No mention of porn is required, but he'll get the point and it will make him safer on the internet.
Z68 is the new chipset for Intel' second gen processors. on the 1155 socket. It enables ssd caching (having a low cap. ssd serving as a cache for your HDD. Commonly used files and pathways are faster and run smother. you do lose the ability to use the ssd normaly if you chose to set up this type of config.) it also enables the use of the new integrated graphics on the processor (this is not a big deal if you have any aftermarket GPU). And lastly it has "quick sync" ( this one is harder to explain so, here is an article about it Also, since most mobo manufactures are moving to this new chipset, it will be easier to find boards with the newest tech (more usb 3, front usb 3, sata 6gb/s per board). So really these new boards are a bit more future proof, but only if you are going to use these features. ALSO PLEASE NOTE: ssd caching is only used for improving a HDD, it DOES NOT keep you from using a SSD as a boot drive or other storage drive and having a separate HDD.
There's also a rather cool, almost free method. It involves a Pringles can. From what I've read, it can work pretty well. Good luck! :)
(this is all new to me...)
supposedly it is better to actually RESET (secure erase) the SSD versus using traditional writes of zeros to format an SSD.
A secure erase program like HDDerase will "reset all areas of the NAND, including ones not visible to other software tools such as cells reserved for wear-levelling or ones marked as bad blocks."
if you use the traditional write/nuke format programs on an SSD it may skip blocks that are marked bad and also decrease the lifetime of the drive itself on an SSD.
This might be as simple as just deleting the partition and then adding a new one which on the hardware level will reset the drive completely wiping it.
Yes we can! Essentially the benefit comes from balancing the load that each connection uses. For torrenting, it works very well, because you're already connecting to multiple sources. But for connecting to one source (streaming media, or a direct download) it wouldn't improve it at all, and should default to use the fastest connection to receive what you're getting. However, if you're trying to get two large files from single sources, then yes, you may be able to use the maximum bandwidth from both connections to receive both files at the same time at maximum speed.
Unified Remote does everything ootb. Full version has more apps premade, but the free version includes spotify, vlc, wmp, standard keyboard+mouse etc.
To wake the pc you need to enable wol (Wake-on-lan) in your BIOS . There's apps to do that also - I've never used it, but it should be trivial if your computer supports wol. First google hit for me searching android wake on lan.
Have you tried using the Nightly Tester Tools? They can be used to override the compatibility check on extensions. While some of them won't work, many of them will anyway.
If you don't want to install it, you can just go to about:config, and set all the keys starting with extensions.checkcompatibility to false.
I'd actually hold off for another 18 months until standardization on the 4Ks start to settle down, and everyone isn't quite so concerned about how their proprietary software etc etc is so much better than the other manufacturers.
The last half of this first article is where the meat is.
Yup. But you need a laptop 2.5 inch hard drive, not a 3 inch desktop.
The Fat was the easiest hard drive to upgrade, the super slim the hardest.
You will also need an external hard drive to backup your data and restore it.
I'm also interested in details about why it happens. I tried searching but couldn't find an exact "why", just a bunch of sites saying that it happens.
while searching I found this link with some other interesting bugs
i like this one
>If you save a file with the same name and extension of a critical Windows file or process, even if it is not in the Windows directory, it will essentially “overwrite” this critical file. If you save the file “explorer.exe” directly to the path “C:\”, Windows Explorer will not launch when you reboot and your Windows is practically useless.
Did you click on any of the links that were returned?
Legally there's no way they should have known that you googled them.
There are some sites you can make a profile on, and if someone clicks on that profile it will send an email notification saying a) When you were searched for, b) What key words were used to find you, and c) Where the search originated (city) by IP address.
Otherwise, they shouldn't know if you just did a Google search and didn't click anything. If they do know that, then they might be hacking your computer, using a key logger, or taking snapshots of your screen.
Horny state? That sucks.
BTW [link] has all the safe sites indexed.
Also use noscript/script no and adblock with [link] malwaredomains to block at least some of the crap on the internet.
KEEP EVERYTHING UPDATED. To prevent exploits.
Also comodo firewall. with a real time legit antivirus like microsoft security essentials + malwarebytes for manual scans
And UAC set to maximum if you want but seeing as you let this run it might just annoy you.
Might also try EMET if ultra paranoid/you can get a guide.
You might find this and this useful.
A task killing app? Uninstall that straight away!
Why RAM boosters & Task killers are bad for Android
Restart your phone, see if it helps.
I'm not sure about the ccd noise pattern(although I doubt much other than adding your own noise would mask that) however screenshotting the picture would be a way to get a copy without the metadata. The only problem is then whether or not your screenshot program adds meta data.
This may also be interesting to you.
It's not speculation.
What everyone else in this thread is looking for is a dead drop type access point that serves anti material. This is brilliant, and it could probably be accomplished anonymously with a raspberry pi and minimal expense.
Found one: [link]
We need car dash cameras. Is anyone aware of good quality ones available here in India? I just don't see any listed on the online portals. Go pros cost a fuckin ton and are a thief magnet. I saw the mobius action cam, that seemed like a good deal, again not available here.
Also found this link that details apps that help people convert their old unused android phones into dash cams.
EDIT: Option 2 is to carry a nice, reinforced, hockey stick.
I'm looking at them right now. What kind of subtle hints do you think there are? I just googled and found [link]. It looks like a heart shaped necklace.
If you are the only user that will use them, you can just leave them in your home directory. But to answer your question, it's best practices to put stuff like this under /usr/local/ or /opt/.
But if it was me, I wouldn't compile anything from source until I was sure that I couldn't find a binary package. It's likely that a PPA will have a package you can use. Try Googling "maven ppa" or something along those lines until you find what you want.
yeah, and run your computer through a few virus checks (you might have a keylogger), check out some of these to run just the one time or anytime you have suspicious symptoms and feel like you could use a second opinion. People seem to love Malwarebytes especially for this purpose.
Branching from Tilo15, definitely use Lubuntu for the XP computer because with 512 MB of RAM, Unity will destroy it.
My best advice for learning more about Ubuntu is to burn a Live CD of it and mess around with it. The basics won't be hard to grasp, but you may be hesitant because it is different.
I fount this website to have some very good info for starting off:
Ubuntu: A Beginner's Guide
My biggest recommendation is to learn about the common terminology to get more use from the abundance of help there is around the internet, so this may be of some use.
The Pi has always been a great companion to the Arduino, but they are 2 different animals, 2 different applications. Since a Pi is event stack based, inputs and outputs are processed as the CPU has time, so if it is overloaded or busy doing something else, this can be a major problem for something like servos or IO tasks that rely on very specific timings. The Arduino is a single application loop program, specific to the programmed task, and never changes or varies on how and when IO are processed
However, combine the two of them and you get an platform for almost any project
I found this page for more details: [link]
Hawkthorne doesn't natively support the USB NES controllers yet. I, too bought one, only to find it's a literal joystick.
That being said, I do have an experimental branch of code with joystick support that I am actively working on finishing. Hopefully to be done within the next week or two.
In the meantime, you can use a piece of software in the middle that will allow you to map joystick input to keystrokes. Here is an article talking about how to do it in Windows
I still don't count creating a Facebook event as an "elaborate scheme", but then I do set my standards rather high for that sort of thing.
hey, 10 minutes of googling and i found this article:
seems like the cheapest way to go, and I've found variations on this solution in many other pages as well. All you need is a Linksys router that can support the DD-WRT firmware, and a free account here [link]
It's worth a shot... it's a hell of a lot cheaper than buying a Cisco wireless controller or something of that nature lol
*I have not tried any of them yet, these are just what I found after some googling.
Google grew out of Larry/Sergey's work at Stanford and was connected from the start. Lets not pretend this was a "garage" operation.
Edit: See this blog post on the "garage" myths of Apple, HP, and Google: [link]
assuming x86 - you can install android-x86 which is possibly based on cm? iirc it doesn't have all the standard cm features but you could probably find a way to install xposed/something
alternatively there's intel's x86 imgs of android which should be pretty much aosp
assuming the tablet only has usb micro-b, you will need a usb otg adapter and a hub for a usb flash drive +a keyboard as you're going to have to disable secure boot.
tl;dr: a kernel bridges the gap between the hardware of a device and the operating system. usually when manufacturers ship a device, the stock kernel is the most stable one at the moment, something that will stand up to most user demands with phone interaction.
advantages to having these on your phone include but are not limited to:
there's not a reason persay why you shouldn't install one. many people are fine running a stock ROM with a stock kernel. if you're looking to squeeze more battery life or if you feel like your phone is lagging a bit with games and want to squeeze more power, then a custom kernel should fit that need. the biggest dangers include changing the settings so that your phone overheats while overclocked or even setting the minimum voltage so low that your phone has trouble waking. installing a kernel and using the default configuration should be perfectly safe. the USER ultimately decides what's considered safe for their phone.
on the short list of recommended kernels for the Nexus 6: francoKernel, leanKernel, Chroma kernel, hellsCore kernel, Zen kernel, Despair kernel.
some additional reading on kernels and other Android basics
It should a bit bigger, but it depends on how much is you saved offline from google drive. I have 16gb and have 8 on a new install with all my stuff installed. The recovery would make sure anything from chrubuntu is removed.
EDIT: "Instigating a full recovery on your Chromebook will not only delete all your locally saved data, but it will also install an entirely new version of the Chrome operating system on your machine. This is also the only way to re-partition your hard drive back to its factory state, meaning if you installed Linux using ChrUbuntu this is the best method to follow."
Yes. Most of the time they're just killing processes, making the phone load them up again. Some might help at identifying rogue apps that use the cpu. I'm talking about android here. More about the subject here [link]
Michael moorcock's, the mad God's amulet.
There's a site for searching for books. And I think a subreddit for it too. They're pretty great at piecing together mixed memories which I think is the case here. It sounds like there mightve been but since time has passed, things are a little skewed. And if it's really popular in his town, why can't he find it?
Here is a list of a few resources:
That's a bit overkill for email. Instead, just do "<myusername>+<nameofsite>@gmail.com". Then it's very easy to see which sites are giving your information away, voluntarily or otherwise.
Check out Tip #2 on this site for a little more info. (I actually didn't know about the other option mentioned with periods, and question if that still actually works.)
There are lots of examples if you google "legal uses of BitTorrent", such as the ones in this article - getting out-of-copyright content from the Internet Archive is a good example.
I switch to Window XP to Linux(Simply Mepis) back in 2003. Not once was I thinking to put an anti-virus program on my Linux system. Been surfing the web for 11 years under Linux. Not once got a slow down, hiccup, or any kind of virus. And I don't tip-toe while surfing. I explore everything on the Internet while using Linux and still no sight of a virus. There are over 1 million known viruses to hurt Windows. There are on 47 known rootkits that can harm Linux at this time. Not, once seen any rootkit harm. Linux is safe so don't worry about viruses.
But, if you must.... [link]
I'm just trying to save you some wasteful moments. Playing with an antivirus program in Linux.
You can play it in VLC.
Though, you make a great point. It is bloody annoying to play it on Linux, and then no menu either. That being said, I have no doubt that now with SteamOS inbound their will be a Bluray player. Hell, I wouldn't be surprised if it was added to SteamOS itself. They are trying to make it your "living room" system. So, yeah, could be. Would be smart of them. Even if you have to buy it from their store (so they could pay for the licensing).
Here is another guide, including video [link]
Also, you may want to check out /u/SNESdrunk youtube video for English friendly Super Famicom games [link]
I have the same Chromebook and love it. That said many people have issues with Microsoft Word and Google Docs not playing nice together. i.e. formatting is lost between formats. The better solution would be to signup for a free Office365 account from Microsoft and then use the free online version of Microsoft Word.
Free Office 365 for Students - [link]
Best Android Apps - MakeUseOf
Best Android Games - MakeUseOf
Lifehacker Pack - our list of the best Android apps
A pc with a nice front end like plex or xbmc. I control mine with either a remote, my xbox 360 controller or my android. Mine does everything from playing downloaded shows from my library, streaming from hulu, netflix and freetv, Watching OTA with a tv card, displaying 5 day weather with detailed maps, to playing nes,sega,snes,and n64 roms and my entire steam library with artwork. Here are some pics of an XBMC setup
VPN cost money? I lawled.
Actually just use OpenVPN over at [link] and it's FREE! You and said friend will share the same network like you were on a lan (online lan party son or for online lan parties I'd use Hamachi ((it works better)).
If you are techie enough and own the router you can install Open-WRT or DD-WRT on your router and use a free VPN service and have it all run on your router.
At this point you and your friends are secure enough (use RSA keys) and do not have to worry about your ISPs knowing what files are being transferred, except that you are using large amount of bandwidth.
Here is a link for other free vpn software.
Using VPN is pretty easy once you use a howto read on the software and the options you and your friends have are limitless. Good luck to you all and don't get caught with them pirates :P
Use a VPN to encrypt your traffic. The link is for informational purposes only and does not constitute an endorsement of any of the applications listed. I personally use newsgroups and highly recommend you go that route as torrents are inherently unsafe.
This is a great guide: [link]
Essentially, you're creating a text file with all the lines and the times to show up on the screen. For example
00:04:08.759 --> 00:04:11.595
So the 1 means, "This is the first subtitle to show" then the times when to show up and the time when to end, and then finally the one or two lines of text you want to display.
Once you're done, name it the same as the source video but change the extension to .srt Most advanced video players, like VLC, will automatically search for .srt files with the same file name of the video and display those subtitles. Alternatively, you can upload that file with any video you post to YouTube and it'll parse the .srt file and display captions correctly.
If you don't want to drive to the provider, you can see if the IMEI number is printed on the device (like behind the battery) and just call the provider. They may not be able to give you info but may be able to contact the owner somehow.
If the phone isn't locked, the easiest thing to do would be to just open the contacts and send someone a message. I don't think that would be considered "tinkering" if you're not going through emails/photos/etc.
Bittorrent is used by quite a few big companies (including facebook) to distribute big files to their servers and end users.
extra source for Facebook
By knowing the answer already. Google crawls other websites way in advance of you searching. This is then processed in such a way that given a word or short phrase, the answers are computed ahead of time (an index, just like at the end of a book, except with all the words and their locations on pages; plus a few other things). When you search, it just goes and looks at the list for the word you searched and returns it to you. Phrases are processed by combining these lists "smartly". Then, just keep the index in memory (along with the short summaries shown). There is plenty more going on, but thats the ELI5 version. You can find more at [link]
Edit: an ELI5 link: [link]
Really? You're linking your own article in which you simply say 3 words and then link the original article?
That's a pretty cheap way of tricking people into visiting your site.
original article here [link]
It's possible to get a basic calendar in notification centre, I've got one at the moment that looks like this: [link]
The easiest way is to follow the steps in this link: [link]
I remember having to play around with it a bit to get the three months showing simultaneously but just let me know if you want me to post the script for it.
Short answer is it probably doesn't have to be. Just realize that 2FA is not infallible to determined hackers, as shown by this . But that's an extreme case. If you want a more thorough discussion, check this thread