Web Standards

HTTP Protocol

The web is run on port 80. You are probably wondering what "port 80" is, right (whether you actually are or not is irrelevant)? Well, the answer is easy (not really). See, the Internet and the web are different. The Internet is the infrastructure (ie the physical wires, the server hardware, etc) and the web is the ideas and the software. I say ideas because before the web the Internet was a mess of wires and powerful computers using POP3 and SMTP for communication, FTP for file transfer, and TELNET for remote shell access, among others. Then the web came along, and Internet use spread to the home and all across the world. See, in plain terms, a web server broadcasts HTML to all connected clients on port 80, so port 80 is the "HTTP port." HTTP is the protocol, or set of standards for port 80 and its software. The client software is your browser, (ie probably Internet Explorer but hopefully Firefox), and the server is something like Apache or IIS(uug). This relates to hacking, as you will see later, but first you need to know more about HTTP. (the spaces before the < & > are put in so this isnt thought of as HTML)

< html >

< body >

< img src="image.png" >< br >

< div align="center" >text< /div >

< /body >

< /html >

If Apache is serving that, and Firefox picks it up, It will replace the < img src... etc with the image found at image.png relative to the working directory of the page requested, (ie ./, current dir), and the < div... is turned into text printed in the middle of the page. Since the code is processed from top to bottom, the br means that the browser should skip down one line and start the rest from there. The top two and bottom two lines tell the browser what part of the page it is reading. You migh have noticed the < /div >, the < /body >, etc. They "close" the tag. Tag is a term for anything in s, and they must be opened (ie introduced) and closed (ie < /tag >). If you want to learn HTML tagging, just head over to our close friend Google and do a search.

Since you haven't gotten to the programming section, and currently I have not even wrote it, I will show you a web server example in the simplest form I can think of that will work on any OS you are currently using. So the obvious choice is JAVA:

import java.net.*; import java.io.*; import java.util.*;

public class jhttp extends Thread {

Socket theConnection;

static File docroot;

static String indexfile = "index.html";

public jhttp(Socket s) {

theConnection = s;

}

public static void main(String[] args) {

int thePort;

ServerSocket ss;

// get the Document root

try {

docroot = new File(args[0]);

}

catch (Exception e) {

docroot = new File(".");

}

// set the port to listen on

try {

thePort = Integer.parseInt(args[1]);

if (thePort < 0 || thePort > 65535) thePort = 80;

}

catch (Exception e) {

thePort = 80;

}

try {

ss = new ServerSocket(thePort);

System.out.println("Accepting connections on port "

+ ss.getLocalPort());

System.out.println("Document Root:" + docroot);

while (true) {

jhttp j = new jhttp(ss.accept());

j.start();

}

}

catch (IOException e) {

System.err.println("Server aborted prematurely");

}

}

public void run() {

String method;

String ct;

String version = "";

File theFile;

try {

PrintStream os = new PrintStream(theConnection.getOutputStream());

DataInputStream is = new DataInputStream(theConnection.getInputStream());

String get = is.readLine();

StringTokenizer st = new StringTokenizer(get);

method = st.nextToken();

if (method.equals("GET")) {

String file = st.nextToken();

if (file.endsWith("/")) file += indexfile;

ct = guessContentTypeFromName(file);

if (st.hasMoreTokens()) {

version = st.nextToken();

}

// loop through the rest of the input li

// nes

while ((get = is.readLine()) != null) {

if (get.trim().equals("")) break;

}

try {

theFile = new File(docroot, file.substring(1,file.length()));

FileInputStream fis = new FileInputStream(theFile);

byte[] theData = new byte[(int) theFile.length()];

// need to check the number of bytes rea

// d here

fis.read(theData);

fis.close();

if (version.startsWith("HTTP/")) { // send a MIME header

os.print("HTTP/1.0 200 OKrn");

Date now = new Date();

os.print("Date: " + now + "rn");

os.print("Server: jhttp 1.0rn");

os.print("Content-length: " + theData.length + "rn");

os.print("Content-type: " + ct + "rnrn");

} // end try

// send the file

os.write(theData);

os.close();

} // end try

catch (IOException e) { // can't find the file

if (version.startsWith("HTTP/")) { // send a MIME header

os.print("HTTP/1.0 404 File Not Foundrn");

Date now = new Date();

os.print("Date: " + now + "rn");

os.print("Server: jhttp 1.0rn");

os.print("Content-type: text/html" + "rnrn");

}

os.println("< HTML >< HEAD >< TITLE >File Not Found< /TITLE >< /HEAD >");

os.println("< BODY >< H1 >HTTP Error 404: File Not Found< /H1 >< /BODY >< /HTML >");

os.close();

}

}

else { // method does not equal "GET" if (version.startsWith("HTTP/")) { // send a MIME header os.print("HTTP/1.0 501 Not Implementedrn"); Date now = new Date(); os.print("Date: " + now + "rn"); os.print("Server: jhttp 1.0rn"); os.print("Content-type: text/html" + "rnrn"); }

os.println("< HTML >< HEAD >< TITLE >Not Implemented< /TITLE >"); os.println("< BODY >< H1 >HTTP Error 501: Not Implemented< /H1 >< /BODY >< /HTML >"); os.close(); }

}

catch (IOException e) {

}

try { theConnection.close(); }

catch (IOException e) { }

}

public String guessContentTypeFromName(String name) { if (name.endsWith(".html") || name.endsWith(".htm")) return "text/html"; else if (name.endsWith(".txt") || name.endsWith(".java")) return "text/plain"; else if (name.endsWith(".gif") ) return "image/gif"; else if (name.endsWith(".class") ) return "application/octet-stream"; else if (name.endsWith(".jpg") || name.endsWith(".jpeg")) return "image/jpeg"; else return "text/plain"; }

}

I learned the basics of JAVA web server programming from "JAVA Network Programming" by Elliotte Rusty Harold. Now you don't need to know JAVA to be able to understand that, even though it might not seem like that at first. The important thing to look for when examining the code it the os.print("") commands. There is nothing fancy being used to get the data to the browser, you don't have to mutate the data, its sending plain HTML via a simple command. The plain and simple truth is that the browser is doing the majority of the difficult stuff, when speaking about this simple server. But in complicated servers there is server-side scripting, etc. Webs are much more complicated than just a simple server and Internet Explorer, such as Flash and JAVA Applets (run on clients machine in browser) and server-side stuff like PHP and PEARL (displayed on clients browser as plain HTML but executed as scripting on the server). T

he code above is a good way to learn the HTTP standards, even though the program itself ignores most of the regulations. The web browser not only understands HTML but also knows that incoming connection starting with 404 means that the page is missing, etc. It also knows that when "image/gif" is returned the file is an image of type gif. These are not terms the stupid server made up. They are web standards. Generally speaking, there are two standards. There is the w3 standard (ie the real standard based on the first web servers and browsers) and the Microsoft standard (ie the Internet Explorer, IIS and NT standards). The standards are there so anyone can make a server or client and have it be compatible with (nearly) everything else.

Hiding your Connection

If you have a copy of Visual Basic 6, making a web browser is easy, thanks to Winsock and the code templates included, so I will not put in an example of that. Instead I will explain cool and potentially dangerous things you can do to keep yourself safe. I know those words put together doesn't make sense (ie potentially dangerous and safe), but you will see in a moment. I'm talking about PROXIES. (anonymous proxy servers, to be exact). You connect to the internet on port 80 through the proxy server, thus hiding your real IP. There are many obvious applications for this, but it is also the only really potentially dangerous thing so far, so I will restate what I have written at the top: Whatever you do with this info is your responsibility. I provide information and nothing more. With that said, there is nothing illegal about using an anonymous proxy server as long as it is free and you are harming no one by using it. But if you think you are completely safe using one, you are deadly wrong. They can simply ask the owners of the proxy what your IP is if they really want to find you. If you join a high anonymous server, the chance of them releasing your IP is pretty low for something like stealing music, but if you do something that would actually warrant jail time, they probably will be able to find you. www.publicproxyservers.com is a good site for finding these servers.

The last trick related to web servers and port 80 is a simple one. First, find a free website host that supports PHP and use the following code:

If the address of this file is http://file.com/script.php, to download the latest Fedora DVD you would go to the following address: http://file.com/script.php?destfile=linuxiso.org/download.php/611/FC3-i386-DVD.iso &password=passwd

You can change "passwd" to whatever password you want. This will make any onlookers think you are connected to http://file.com. You are still limited to the speed of your connection, but you are using the bandwidth of the web host

Whatever you do with the above information is solely your responsibility.

Mike Vollmer --- eblivion
http://eblivion.sitesled.com

In The News:

Facebook Did Not Securely Store Passwords. Here’s What You Need to Know.  The New York TimesFacebook said it had found no evidence of abuse and it was not requiring users to change their passwords, but you should do it anyway.
I Deleted Facebook Last Year. Here’s What Changed (and What Didn’t).  The New York TimesOur personal tech columnist didn't lose touch with his true friends — but strange things did occur, including Instagram thinking he was a woman.
Talking to Taffy Is Low Tech. And Intense.  The New York TimesArmed with an Olympus recorder, she's spent time with Gwyneth Paltrow and Bradley Cooper. Here's how Taffy Brodesser-Akner of The New York Times ...
Goodbye console? Google launches game-streaming platform | Personal Tech  The Oakland PressNEW YORK>> Google on Tuesday unveiled a video-game streaming platform called Stadia, positioning itself to take on the traditional video-game business.
Limiting Your Digital Footprints in a Surveillance State  The New York TimesTo protect himself and his sources from prying eyes in China, Paul Mozur, a technology reporter in Shanghai, leaves just an “innocent trace” of digital exhaust.
Kim Kardashian West Puts Her Spin on the Tech Bro Fleece  VogueWhen it comes to references for her personal style, Kim Kardashian West knows no bounds: she'll take fashion cues anywhere from Cher to Marilyn Monroe to a ...
Spending Is as Easy as Pushing a Button. The Hard Part? Keeping Track.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Tara Siegel Bernard, a personal finance reporter, discussed the tech ...
Century Tech signs deal to put AI in 700 schools in Belgium  QuartzThe future of classrooms is coming to Flanders. Today, the Flanders region of Belgium signed a deal with Century Tech, a British AI platform for schools and ...
Tesla is accusing a former employee of stealing self-driving tech and giving it to a Chinese rival  CNNHong Kong (CNN Business) Tesla is accusing a former employee of stealing intellectual property worth hundreds of millions of dollars and sharing it with a ...
Actually, I want to hand over even more of my data to big tech  Fast CompanyBut thanks to Facebook and Google, even good-intentioned tech companies are now afraid to get to know me too well.
Guesty, a tech platform for property managers on Airbnb and other rental sites, raises $35M  TechCrunchThe growth of Airbnb — and likewise other platforms like Booking.com, VRBO and HomeAway for listing and renting short-term accommodation in private homes ...
What Facebook's 'privacy vision' really means | Personal Tech  The Oakland PressNEW YORK (AP) — Mark Zuckerberg's abrupt Wednesday declaration of a new "privacy vision " for social networking was for many people a sort of Rorschach ...
Dyson launches a vacuum with better battery, a desk lamp and a personal air purifier  TechCrunchDyson's got a very specific way of doing things. The British company makes super-high-quality products for a world where price isn't an option. Using their ...
8 tips to improve your password security | Personal Tech  The Oakland PressLet's talk about passwords. While necessary for our digital security, they remain without a doubt one of the most annoying parts of our digital lives both at work ...
What’s Next for Smartphones? Samsung’s New Galaxy Line Offers a Few Answers  The New York TimesOne of the company's newly unveiled models works with 5G wireless networks. Another folds up like a book.
Where a TV Pro Goes for Video When YouTube Just Won’t Do  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Liz Day, a senior story editor for The Times's new television show, ...
New Zealand, John McCain, N.C.A.A. Tournament: Your Thursday Briefing  The New York Times(Want to get this briefing by email? Here's the sign-up.) Good morning,. We're covering newly announced gun restrictions in New Zealand, a gloomier outlook ...
This Tech Makes D.I.Y. Key Duplication Easy. Maybe Too Easy.  The New York TimesYou can now take key duplication into your own hands using kiosks and apps from start-ups. Our columnist explored whether the benefits of this outweigh the ...
How to Take Music Lessons Whenever (and Wherever) Works for You  The New York TimesYou're never too old to learn to play a musical instrument, but finding a tutor and the time for lessons is another matter. If working with a personal teacher isn't an ...
US disaster agency exposed private data of 2.3m hurricane and wildfire survivors  The GuardianReport finds Fema unnecessarily shared personal information, including bank details, with outside contractor.
YouTube suspends comments on videos of kids | Personal Tech  The Oakland PressSAN FRANCISCO (AP) — YouTube said Thursday it will turn off comments on nearly all videos featuring kids — potentially affecting millions of posts on the site ...
Facebook says service hindered by lack of local news  The Oakland PressNEW YORK (AP) — Facebook's effort to establish a *service* that provides its users with local news and information is being hindered by the lack of outlets where ...
Samsung Galaxy S10 Plus Review: A $1,000 Smartphone With Compromises  The New York TimesDespite being an excellent phone with an innovative wide-angle camera, Samsung's new flagship device lags Apple in biometrics.
Steve Bannon, WH Staff Accused of Using Personal Email to Discuss Sending Sensitive Nuclear Technology to Saudi Arabia  NewsweekA letter from the House oversight committee's chairman alleges that Trump administration staff used personal email to discuss transferring sensitive nuclear ...
You Give Apps Sensitive Personal Information. Then They Tell Facebook.  The Wall Street JournalMillions of smartphone users confess their most intimate secrets to apps, including personal health information. Unbeknown to most people, in many cases that ...
High Tech High: How a robotics team teaches students to navigate tech and people  The Journal News | LoHud.comSee how Tappan Zee High School's 76-member robotics team got ready for a competition this weekend.
From closets to cooktops, tech aims to bring efficiency home  The Oakland PressLAS VEGAS (AP) — Closets that freshen clothes, cooktops that won't let pots boil over, faucets told to dispense just enough water to fill the coffee maker.
Users should protect internet-connected doorbells, speakers and more  The Oakland PressIn some households there's likely to be multiple internet-connected devices working off the home's wifi. While many of the obvious devices — computers, ...
Personal information of more than 800000 blood donors exposed online by tech vendor: HSA  Channel NewsAsiaSINGAPORE: The personal information of 808201 blood donors in Singapore was left exposed on the Internet for a period of nine weeks from Jan 4, ...
Guttenberg Attacks US Tech Companies  theTrumpet.comFormer economics minister and defense minister expresses distrust for the U.S. and China.
The reason Black in Tech Nashville's leader fights for girls of color is personal  The TennesseanFallon S. Wilson grew up in a family where men beat women -- and now she wants to use technology to empower black girls to avoid growing up like she did.
Change your screen habits from time-wasting to money-saving  The Oakland PressApple's Screen Time feature can tell you more about your iPhone usage than you may care to know.
UK wants tougher rules for Facebook's "Digital gangsters"  The Oakland PressLONDON >> British lawmakers issued a scathing report that calls for tougher rules to keep Facebook and other tech firms from acting like "digital gangsters" and ...
Google’s Nest hub has a microphone it forgot to mention  Vancouver SunIt's been inactive since its launch, and requires customer to activate — but this isn't the company's first privacy oversight.
Tangled wires, digital photos: Here's how to declutter your personal tech  Economic TimesEveryone has a drawer full of ancient cellphones, tangled-up wires and earphones that are never touched.
Cathay to mine personal data to tailor to premium flyers - Tech News  The Star OnlineCathay Pacific Airways Ltd is doubling down on mining customer data.
How to Declutter and Organize Your Personal Tech in a Few Simple Steps  The Indian ExpressAccessories and data may not take up much physical space, but they contribute to frustration and anxiety. Here are ways to keep e-junk at bay, Marie ...
When a Phone App Opens Your Apartment Door, but You Just Want a Key  The New York TimesResidents of a Manhattan building where tenants must use an app to open the lobby door have filed a lawsuit challenging the practice.
Apple's hardware blitz continues as it rolls out first update to the iMac desktop in almost two years  Vancouver SunThe new iMacs are Apple's second product launch this week, following the new iPad Air and iPad mini introduction on Monday.
Apple analysts skeptical that a foray into video will do anything to power up earnings  Vancouver SunThe skepticism about Apple Video comes at a time when Apple has been struggling with weak demand for the iPhone.
I'm an Asian American graduate of Brooklyn Tech. Please don't use me as a wedge in your education lawsuit.  Chalkbeat New YorkI am a lawyer, and every day I use the law to fight for social justice. I am also an Asian American graduate of Brooklyn Technical High School, one of the ...
Hey, Google, Siri or Alexa: Which voice assistant handles these 100 questions best?  USA TODAYWe asked Amazon's supplied questions to Google, and vice versa; Siri joined the experiment as well. The results: Each platform showed their flaws.
Apple's new product launch continues with updated AirPods ahead of March 25 event  Financial PostThe new AirPods are powered by Apple's new chip, will have better battery life and include the option of a new wireless charging case.
Popular Apps Cease Sharing Data With Facebook  The Wall Street JournalPopular health and fitness apps scrambled to stop sending sensitive personal information to Facebook after The Wall Street Journal reported Friday many were ...
Virginia Tech starts fast and holds off Saint Louis to advance  The Washington PostSAN JOSE — Virginia Tech Coach Buzz Williams was transfixed by a stat sheet as he walked off the floor at halftime of the Hokies' 66-52 win over Saint Louis in ...
Netflix is experimenting with different episode orders for ‘Love, Death & Robots’  TechCrunchYou probably know that Netflix is big on data and personalization — it tailors the shows and movies recommended to each user, and even tests different images ...
Strong Day for Jackets During Florida State Relays  Georgia Tech Official Athletic SiteFinal Results. TALLAHASSEE, Fla. — On the first and final day of the Florida State Relays for the Yellow Jackets, the Georgia Tech track and field team saw ...
Instagram will now let you buy things directly through the app  Financial PostAfter years of ogling beautiful images of food, fashion and design on Instagram, people will now be able to buy things they see and like directly through the app ...
We’re giving away more personal data than ever, despite growing risks  VentureBeatDespite the Cambridge Analytica scandal and major data breaches, we're more willing than ever to trade our data for "better" and cheaper services.
Game Review: Third time proves not to be the charm for Kingdom Hearts III  Digital News AsiaThe game however, does indeed deliver on the promise of greatly enhanced graphics.
Alleged victims settled. Then why’s U.S. Trustee going after this Philly fin-tech boss?  Philly.comThe U.S. Trustee says this fintech boss "fraudulently transferred" funds, under-reported income and fudged facts, all to get free of repaying his creditors.
In surprise move, Apple launches a new 10.5-inch iPad, updates Mini ahead of its March 25 event  Financial PostApple Inc, in a surprise move on Monday, launched a new 10.5-inch iPad Air and updated its iPad Mini ahead of a March 25 event where it is expected to launch ...
Jack Dorsey is recruiting his own personal bitcoin posse  MashableIf reporting directly to an eccentric billionaire and getting paid in bitcoin sounds like your cup of tea, then does Jack Dorsey have an offer for you. On March 20 ...
‘The Effects Cannot Be Overstated’: When Tech Invaded Media  The New York TimesJim Rutenberg reflects on the convergence of technology with media, and how that has changed his consumption habits and coverage. (Warning: iPhone ...
Devices That Will Invade Your Life in 2019 (and What’s Overhyped)  The New York TimesA.I. that responds to your voice. Next-generation wireless networks. If this year's biggest consumer technology trends have a familiar ring, there's a reason for ...
What Is 5G? Here’s What You Need to Know About the New Network  The New York TimesThe transition to new fifth-generation cellular networks, known as 5G, will affect how you use smartphones and many other devices. Let's talk about the ...
The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing  The New York TimesFrom Facebook to creepy online ads, the worst tech of the year made the internet feel like an unsafe place to hang out. Yet there were some products that were ...
He Reported on Facebook. Now He Approaches It With Caution.  The New York TimesNick Confessore, an investigative reporter who has written about social media and data privacy, has changed his tech habits after what he has learned.
Here are the data brokers quietly buying and selling your personal information  Fast CompanyYou've probably never heard of many of the data firms registered under a new law, but they've heard a lot about you. A list, and tips for opting out.
Digital Privacy Is a Big Concern in Europe. For This Reporter, Too.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Matt Apuzzo, an investigative correspondent in Brussels, discussed ...
Foldable device, 5G join the chorus of hype at MWC  Digital News AsiaHuge stalwarts trumpet their wares and stake their claims to be the leading innovators in a highly competitive industry.
iPhone trends going 'from bad to worse,' as Apple struggles with slow demand  Financial PostAnalyst says lack of a rebound in iPhone sales creates risk and shifts more focus to Apple's March 25 event.
In a Stumble for Apple, a FaceTime Bug Lets iPhone Users Eavesdrop  The New York TimesA glitch in the video and audio calling app, which the company says it will fix, can turn the device into one perhaps better suited for espionage.
Finnish authorities to investigate Nokia-branded phones sending data to China  The VergeThe Finnish data protection watchdog has confirmed it's investigating HMD Global's Nokia-branded phones over reports they were found to be sending ...
Facebook is back up after what some say was the platform's longest outage ever  Financial PostFacebook Inc said on Thursday it had restored *service* to its main app and Instagram, after the world's largest social network suffered a major outage that ...
Setting Up Your Tech on the Assumption You’ll Be Hacked  The New York TimesSheera Frenkel, who writes about cybersecurity for The Times, explains how she safeguards her devices, and why passwords remain a weak link for more ...
Facebook and Instagram are down for users across the globe  Montreal GazetteIt's not just your Facebook page that's down. Users of Facebook Inc. and two of its popular side shoots, Instagram and Messenger, are experiencing technical ...
New York Requests Documents from Facebook, Apps on Data Sharing  The Wall Street JournalA New York regulator is ramping up a promised investigation of how Facebook Inc. FB -0.39% gathered sensitive personal information from popular smartphone ...
My home tech setup for 2019  Business InsiderTechnology can vastly improve the quality of your home and life. I've listed the computers, gadgets, and accessories I'm using on a personal basis in 2019 ...
From town square to living room: Zuckerberg announces sweeping changes to Facebook in new focus on privacy  Financial PostFacebook will shift to a platform where people communicate with smaller groups and their *content* disappears after a short period of time.
To Cover China, There’s No Substitute for WeChat  The New York TimesLi Yuan conducts much of her work on the WeChat mobile app, including spotting trends — and prodding sources to get back to her.
The Most Important Kitchen Tools This Holiday (or Any Season, Really)  The New York TimesTech has brought innovation, convenience and smarts to the kitchen. Here's what Melissa Clark uses and the tools she finds indispensable.
SoftBank Eyes Blockchain to Solve Issues With Online Authentication  CoinDeskJapanese telecom SoftBank is exploring blockchain tech as a way to improve upon current centralized and fragmented ID and authentication services. The firm ...
Blue Devils Take to National Stage in Pittsburgh  GoDuke.comNCAA Championship Action Gets Underway March 21.
How to declutter and organise your personal tech in a few simple steps  TODAYonlineWith a new year and a new Netflix show that features the Japanese organising guru Marie Kondo on the art of “Tidying Up,” many of us are experimenting with ...
The Easy (and Free) Way to Make a Budget Spreadsheet  The New York TimesWith a little time, typing and easy-to-use software, you can quickly see your financial picture much more thoroughly and better plan for the future.
The Sun Sets. The Wind Dies. But Energy Data Is Relentless.  The New York TimesAlternative power sources have upended the electric grid. Ivan Penn, who covers the beat, discusses the changes and how he keeps track of them.
It’s Her Job to Get More People to Act Like You Right Now  The New York TimesMillie Tran, the first global growth editor at The Times, discusses how she tries to understand and nurture a worldwide audience. “So many dashboards and data ...
iPhone prices slashed in China for second time this year amid sinking sales  Financial PostSHANGHAI — Chinese online retailers have started discounting iPhones for the second time this year as Apple Inc wrestles with a prolonged sales slowdown in ...
You Don’t Have to Be a Journalist to Want to Keep Chats Private  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Kate Conger, a technology reporter for The Times in San Francisco, ...
Quirky but Useful Gifts: Rob Enderle's 2018 Personal Tech Product Guide  TechNewsWorldThis is the time of year for a product guide, and this year I thought I'd list my favorite unusual products as gift ideas. I'm a big fan of products most people don't ...
How to Save on Your Next Apple Purchase  The New York TimesGadgets like Apple's iPhone have become so powerful and durable that you can wait many years before buying a new one. The bad news is that your next ...
Facebook employees angry at treatment of moderators, who have one of internet's most dystopian jobs  Financial PostIn the wake of the 2016 presidential election, Facebook Inc. rushed to expand efforts to police its platforms, trying to keep political misinformation, graphic ...
When the Tools of the Trade Are the Keyboard and Mouse  The New York TimesFor Daisuke Wakabayashi, who covers Google, computer accessories are important. Very important.
An Arsenal of Skype, Voice Recorders and FOIAs  The New York TimesEmily Bazelon, an investigative reporter at The New York Times Magazine, craves easy-to-use tools, whether for interviews, Freedom of Information Act records ...
Germany Is Wary of a Digital World (but Loves Its E-Toothbrushes)  The New York TimesMelissa Eddy, a Berlin reporter, explains how privacy laws have led to blurred Google Street View pictures, and why WhatsApp, Instagram and Facebook are ...
Are Your Children Racking Up Charges From Mobile Games? Here’s How to Fight Back  The New York TimesParents are often surprised by unauthorized credit card charges. The culprit: Bait apps, which lure children into buying virtual junk online. Preventing these ...
The Benefits (and Limits) of Using Tech to Plan a Wedding  The New York TimesOur newly engaged tech columnist tried to use tech to plan his wedding. He was immediately overwhelmed by the complexity of the process.
When a Tech Reporter Doesn’t Use Much Tech  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? David Streitfeld, a technology reporter in San Francisco, discussed ...
Social Media’s Re-engineering Effect, From Myanmar to Germany  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Max Fisher, a reporter based in London who co-writes The ...
Just Embed a Phone Into This Editor’s Mind, Already  The New York TimesChoire Sicha, who runs The New York Times's Styles desk, has such a close relationship with his smartphone, he says, it may be time to “punch the circuitry into ...
Hurricanes. Shootings. Fires. Time for an Editor’s Emergency Kit.  The New York TimesWhen news of natural disasters or man-made ones break in the U.S., Julie Bloom taps a variety of tools to communicate with reporters, edit stories and get them ...
How to Make a 3-D Model of Your Home Renovation Vision  The New York TimesBefore you get out the hardware, use software like free floor-plan apps and augmented-reality tools to sketch out the ideas for your remodeling projects.
Apple iPhone XR Review: A Cheaper Phone Suited to Most of Us  The New York TimesGood news, Apple loyalists: You won't have to burn $1,000 on your next iPhone. That's because for about $750, you can have the iPhone XR, which is just as ...
So about that Atari reboot console... you might want to sit down. It's going to be late, OK?  The RegisterSure enough, with the annual Games Developers Conference upon us, the outfit behind the nostalgia-baiting Atari VCS has recommended backers don't hold ...
Samsung introduces the Galaxy Fold  Digital News AsiaThe smartphone is a new foldable device creating a new mobile category.
Samsung slings the skinny on its 12GB GötterDRAMmerung for next-gen smartmobes  The RegisterSamsung has unveiled a 12GB cellphone DRAM module it hopes will be part of next-generation smartphones. It was way back in April 2016 that Sammy ...
Staying Plugged In (for Hundreds of Miles) on the Campaign Trail  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Sydney Ember, a politics reporter for The Times, discussed the tech ...
The Essentials for Covering Silicon Valley: Burner Phones and Doorbells  The New York TimesReporting on secretive technology companies sometimes means finding people who don't want to be found. Jack Nicas, who covers Apple, relies on some ...
CEO Pulse: Is Personal Tech Helping Or Hurting Your Company?  chiefexecutive.netAccording to 57.5% of CEOs, personal tech is helping the quality of interpersonal relationships and culture at their company—42.5% say it's an impediment.

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

The Best MP3 Players Under $100

You don't have to fork out $250 for a super-diggy-whizbang... Read More

Help, I Need a New HDTV! (Part 3 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Portable DVD Players - Things To Know

In my humble opinion nothing makes a long trip easier... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Best PC Pocket GPS

Stop Getting LostOne of the greatest uses for a pocket... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

Cisco CCNA Candidate FAQ

CCNA FAQQ. What exams do I have to take to... Read More

Refurbished Computers on the Internet

What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More

Home Electronics: The Facts About Plasma TV

Not so many years ago, homes across the country watched... Read More

Temporary Fixes to Spyware, Ad-ware, and Virus Infections

So you've got some spyware, ad-ware, or viruses on your... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

Toshiba Wins Hollywood Support for the HD DVD format

What led them to this choice, as all four studios... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix... Read More

Help, I Need a New HDTV! (Part 5 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Looking For an MP3 Player?

If you don't have an mp3 player, and even if... Read More

Help, I Need a New HDTV! (Part 1 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

The DNS (Domain Name System) servers are what your computer... Read More

Digital Cameras Ratings Abolish Camera Comparison Guesswork

Digital cameras ratings are great tools for deciding which camera... Read More

How To Have Two (Multiple) Copies Of Windows

Having two operating systems is not as difficult as many... Read More

Why Using an Ad Blocker Can be a Bad Idea

Ad Blocking is getting to be a common sport on... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More