Google Reader is closing down pretty soon. If you are still searching for a new home for your feeds and you prefer a self-hosted solution, then Tiny Tiny RSS is the best choice for you.
Latest Articles in Web
When the news that the NSA are keeping records of your phone calls and web data transfers broke out, people start to worry if they are really safe online and some of them switched to Tor to protect their privacy online. The question is, is Tor really safe? Does it really protect you from the NSA’s clutches?
LinkedIn has recently introduced two-step verification to protect users’ privacy and data. If you are having trouble enabling it for your account, follow these simple steps.
Peer discovery is an essential part of the BitTorrent protocol. It’s how its downloads happen so quickly: You connect to multiple people, and each of them upload a little piece of the file to you. This article explains how the whole BitTorrent DHT peer discovery process works.
You probably have seen a threatening message from ransomware. So what is ransomware and how is it dangerous? This article explains it all.
There are plenty of Google Reader alternatives, but if you are looking for one that look just like Google Reader, CommaFeed is the one for you.
Google Drive vs Office Web apps: You probably have heard of both of them. We’re going to put them head-to-head and see which one takes home the trophy.
Do you loathe creating passwords because you cannot remember them right after you created it? However, most people don’t realize that it is actually very easy to crack passwords. Here we will unveil the various password cracking methods used by hackers and how you can protect yourself.
The web browser is the most used piece of software on most of our computers, and there are quite a few of them vying for our attention. In this web browsers comparison guide, we will show you the features of the various popular browsers and which one is the best for you.
Cookies are a major part of what makes websites work. However, there are certain aspects about them that could be used maliciously, particularly in the case of third-party cookies. We will dive into the differences between first- and third-party cookies and examine how they act maliciously on some websites.