One of the best social networking sites is Twitter. The only problem I have with it is that it just does so many things. While most know how to do the basics on Twitter, there exists some useful commands and keyboard shortcuts that make it even easier and better to use.
Latest Articles in Web
Gmail comes with 15GB of storage space free of charge, but while you might think that will last you forever, as soon as you start to receive attachments, this space is very quickly eaten into. By using Attachments.me you can automatically back up your Gmail attachments so you are protected in case emails are accidentally deleted, or you need to free up a little space.
With the death of Google Reader now all but assured, it is time to move on, Rolio looks to grab your attention and become your new RSS friend.
Mobile privacy is almost non-existent. Telecommunications providers know when we place a call, the number we dial, and how long the conversation lasts. If this makes you uncomfortable, here are 5 changes you can make to reduce how much your phone carrier knows about you.
We’re very comfortable with our own Internet usage at work or at home that it’s easy to adopt those same rules on a public network. The following is a list of places to be sure to not take your Internet privacy for granted, as there is possible danger lurking and waiting.
Most of us know that piracy is illegal, but when it comes to download torrents, people are confused whether it is legal or illegal. What we will discuss here is what makes downloading torrent legal or illegal and what could possibly get you in trouble, in addition to some words about privacy with regards to torrents.
Google Reader is closing down pretty soon. If you are still searching for a new home for your feeds and you prefer a self-hosted solution, then Tiny Tiny RSS is the best choice for you.
When the news that the NSA are keeping records of your phone calls and web data transfers broke out, people start to worry if they are really safe online and some of them switched to Tor to protect their privacy online. The question is, is Tor really safe? Does it really protect you from the NSA’s clutches?
LinkedIn has recently introduced two-step verification to protect users’ privacy and data. If you are having trouble enabling it for your account, follow these simple steps.
Peer discovery is an essential part of the BitTorrent protocol. It’s how its downloads happen so quickly: You connect to multiple people, and each of them upload a little piece of the file to you. This article explains how the whole BitTorrent DHT peer discovery process works.