Index | Recent Threads | Unanswered Threads | Who's Active | Guidelines | Search |
![]() |
World Community Grid Forums
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
No member browsing this thread |
Thread Status: Active Total posts in this thread: 303
|
![]() |
Author |
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Many thanks keep them coming
![]() |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
There’s something about learning a funny technological word that brings out the geek in everyone! Today’s subject is one that will help everyone work more efficiently while searching on the Internet. It’s called “Boolean”.
Say you’re looking for a specific thing on the web, but every time you search it seems as though there are too many results, and to go through all of them would take hours! Boolean operators can streamline this process; giving you a more refined search. Here are a few to try out: Quotes: Yes, putting quotes around your search terms looks for the words or phrase exactly as typed. If you put in “Granola Bars” the sites returned will have only those words in their exact order. This is my favorite one to use when I’m looking for a specific file or subject and want to skip all the browsing around. And: The operator “and” is used to combine search terms so that information is only retrieved if all terms occur in the same document. So if you’re looking for “Doctors and Lawyers”, type in that phrase, and what will be returned are documents with both keywords in them. Not: “Not” prevents retrieval of documents in which specified terms occur together. This operator is also good to use when a keyword has multiple meanings. So the search “milk not butter” will find documents where “milk” occurs but “butter” doesn’t. Or: “Or” combines keywords so the retrieved documents contain any or all of the keywords. Most search engines don’t need this though, as they assume this as the operator being used already. |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Windows Media Player users looking for some keyboard shortcuts? Well, load up WMP 11, open a video and follow along, because here’s a bevvy of them to try out!
----------------------------------------Switch to full mode – CTRL+1 Switch to skin mode – CTRL+2 Switch to the first view in a media category – CTRL+7 Switch to the second view in a media category – CTRL+8 Switch to the third view in a media category – CTRL+9 Play the previous item – CTRL+B Move the focus to the search box in the library – CTRL+E Play the next item – CTRL+F Turn shuffle on or off – CTRL+H Eject CD or DVD (won’t work on PCs with two or more CD or DVD disc drives installed) – CTRL+J Show or hide the Menu Bar (full mode only) – CTRL+M Create a playlist – CTRL+N Open a file – CTRL+O Play or pause a file – CTRL+P Stop playback – CTRL+S Rewind video – CTRL+Shift+B Turn subtitles on or off – CTRL+Shift+C Fast-forward – CTRL+Shift+F Play faster than normal speed – CTRL+Shift+G Play at normal speed – CTRL+Shift+N Play slower than normal speed – CTRL+Shift+S Repeat the playlist – CTRL+T Specify either a URL or path of a file – CTRL+U Close or stop playing a file – CTRL+W [Edit 1 times, last edit by Former Member at Nov 24, 2011 11:26:17 PM] |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Seems that the holiday shopping season comes earlier and earlier each year. Luckily, in the digital age, you can ditch the long lines of Black Friday and join the Cyber Monday crew by doing all your shopping online. However, even though shopping online is quick and convenient, there are risks involved.
According to Forrester Research, online shopping this holiday season is expected to generate almost $59.5 billion. And 90% of consumers will shop online, according to PriceGrabber’s winter holiday shopping survey. This increased traffic turns the virtual marketplace into a winter wonderland for hackers, who are gearing up to swipe credit cards and personal information to commit fraud and identify theft. Cybercriminals exploit the holiday season and target Internet users through a variety of methods, including online shopping scams, fraudulent emails, e-card and phishing schemes and more. One of the main focuses for hackers this holiday season is social media. Beware of fake profiles on social networking and ecommerce sites that are meant to mimic well-known corporate brands and coax users into clicking on their content. Malicious content can easily hide in Facebook links and Twitter posts. So how do you keep naughty hackers at bay this holiday season? Follow these 10 tips to protect yourself while shopping online. 1. Install, update and activate your security software At a minimum, use a firewall and antivirus software to protect you from malware that gives cybercriminals easy entrance into your computer and accounts. There are many free options. If you only use antivirus, be sure to add a two-way firewall to block hackers from entering your computer and using it to send out attacks and spam. 2. Use strong, unique passwords Always create strong passwords (read: not these ones) for all online accounts and include letters, numbers and symbols. Longer passwords are more secure and harder to crack. Hackers employ special password-cracking software to guess their way into your accounts. Avoid using the same password for every account — it makes it easier for hackers. 3. Only connect to legitimate Wi-Fi networks Before you connect to a network and start shopping online, verify that the Wi-Fi network name (SSID) you are connecting to is from a legitimate service. Do not connect to random, unsecured Wi-Fi networks. It increases your security risks. 4. Make sure it’s the real site Scammers often target users through phishing on email and social media. These messages include a link or popup that encourages you to click on it for “special deals” or to verify some sort of information from a seller or courier, such as FedEx and UPS. The site may look similar to a real site, such as Amazon, but is actually a trap meant to steal your login or financial information. When shopping online, do not click links. Instead, access a legitimate company’s website by typing the company’s information directly into the web browser. And never enter personal information on a popup screen — this is another way for thieves to steal personal information. 5.Only shop from secure sites When paying online, verify that you are on an SSL secured site — the web address will start with https:// and have a little padlock icon next to it. Websites that are SSL-secured will encrypt sensitive information such as credit card numbers during the transaction. You can also click on the padlock icon to verify the identity of the certificate owner. 6. Look for third-party seals of approval If you see a Better Business Bureau or TRUSTe symbol, it means the site must adhere to certain standards regarding business practices and personal information. 7. Beware of deals that are too good to be true The holiday season means some goods and gift cards are hot properties on the market, and cybercriminals will exploit consumers trying to get their hands on them. For example, one known Facebook scam promotes a free $1,000 Wal-Mart gift card. But you must first share the link with your friends and take a survey, which collects personal information. You are then re-routed to a seemingly legitimate website that requires you to participate in various promotions and purchase subscriptions, fees or products — all are ploys to get your banking and personal information. Stick to legitimate retailers and avoid these types of gimmicks. 8. Use a dummy email account Many sites require accounts/email logins to use. If you set up an additional email account to be used only for marketing, newsletters or online shopping, your personal correspondence and information won’t be at risk (and you won’t get as much unwanted spam). 9. Use a credit card Shopping with a debit card online puts your checking and savings account at risk if the information is stolen. Credit cards offer protections that debit cards don’t, and you can dispute charges if needed. Some banks also offer virtual credit card numbers to use. These are temporary credit card numbers with an expiration date and a purchase maximum, which can be very useful for some transactions. 10. Read privacy agreements If you don’t want to increase the chances of your information being accessed online, keep an eye out for websites that sell your information to third parties. Carefully review all privacy agreements and decide for yourself whether you’re willing to click “Agree.” If you do encounter fraud, contact the Federal Trade Commission and submit a complaint form on the FTC website. Bottom line: The holiday shopping season means more security threats. If you follow these tips, take the proper precautions and trust your gut, you will greatly decrease your chances of being scammed by hackers. Happy Cyber Monday! |
||
|
mikaok
Senior Cruncher Finland Joined: Aug 8, 2006 Post Count: 489 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
8. Use a dummy email account Many sites require accounts/email logins to use. If you set up an additional email account to be used only for marketing, newsletters or online shopping, your personal correspondence and information won’t be at risk (and you won’t get as much unwanted spam). Thanks JP for a good summary of privacy related info. If some site asks your email address and you need it just for 10 minutes then 10 minute mail is what you need. No registrations required, the email address is instantly ready to use.
to infinity and beyond
![]() |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
thanks , good
![]() handy keystroke time-savers: Ctrl-Backspace will delete the previous whole word; Ctrl-Left & Right Arrow Keys will move by words instead of by spaces; Ctrl-Up & Down Arrow Keys will move by paragraphs; and, Ctrl-Left-Click on links in your browser will open that link in a new tab. All handy tips that I personally use every day! |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
20 thinks i learned about browser & the web
What’s a cookie? How do I protect myself on the web? And most importantly: What happens if a truck runs over my laptop? For things you’ve always wanted to know about the web but were afraid to ask, read on.open the book |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Background-less Bing
Microsoft’s Bing search engine has made a name for itself on the Internet, not only by being one of the most used Internet searches, but also by being one of the prettiest. It seems that every time I navigate over, there’s always some new and Interesting background image for me to gawk at. But maybe you don’t want a background image. Maybe you find it distracting, or all of the fact blocks that pop up are annoying you. Whatever the case, if you want to go to a version of Bing without a background, simply copy and paste this address into your web browser: http://www.bing.com/?rb=0 it this way, make sure to bookmark Bing with this address and you’ll never have to see a background image again! |
||
|
GeraldRube
Master Cruncher United States Joined: Nov 20, 2004 Post Count: 2153 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Tor Browser Bundle
----------------------------------------The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser, and is self-contained. The Tor IM Browser Bundle additionally allows instant messaging and chat over Tor. If you would prefer to use your existing web browser, install Tor permanently, or if you don't use Windows, see the other ways to download Tor. https://www.torproject.org/projects/torbrowser.html.en--- https://www.torproject.org/index.html.en ![]() [Edit 1 times, last edit by GeraldRube at Dec 12, 2011 10:09:57 PM] |
||
|
GeraldRube
Master Cruncher United States Joined: Nov 20, 2004 Post Count: 2153 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Try kismet for detecting hidden 802.11 wireless networks--- Takeaway: Kismet is an open source tool similar to netstumbler, and it’s particularly good for discovering hidden wireless networks that might be adversely affecting your network.
----------------------------------------Kismet is an open source tool for discovering wireless networks. It can be used to troubleshoot a wireless network and detect network intrusions. It is a similar tool to netstumbler (which is used in the Windows world) but it does have some differences. One area in which kismet is superior is the ability to detect hidden 802.11 wireless networks.--- http://www.techrepublic.com/blog/opensource/t...networks/3245?tag=nl.e011 ![]() |
||
|
|
![]() |