A Tour of Risky Web Sites

Wednesday, June 4th, 2008

Just over 4% of all Web sites are dangerous, according to a new report. But all bad sites aren’t created equal: Cyber bad guys are more likely to build their sites where it’s easy to do so. The report out today from McAfee, a tech-security company that’s trying to position itself ...

How to Harden Your Mac

Wednesday, June 4th, 2008

If you're a quasi-sophisticated Mac user and have been looking for advice on how to better safeguard your machine from hackers or local prying eyes, look no further: Apple has released a massive, 240-page guide that describes various methods for securing the operating system. According to SecurityFocus.com, the manual includes an ...

Pandora Desktop Beta

Wednesday, June 4th, 2008

We've always wanted to find a simple way to deliver Pandora as a desktop application -- it's probably been on our to do list longer than any single feature. Today we're dipping our toe into those waters for the first time with the release of a Beta version of Pandora ...

Making The Move To Multiple Browsers

Tuesday, June 3rd, 2008

For a while now I’ve been using different web browsers to compartmentalize my risk. Most of my primary browsing is in one browser, but I use another for potentially risky activities I want to isolate more. Running different browsers for different sessions isolates certain types of attacks. For example, unless ...

Goosh, a Google Command Line

Tuesday, June 3rd, 2008

Goosh.org hosts an unofficial Google interface which “behaves similar to a unix-shell,” as the author Stefan Grothkopp explains. For instance, entering n disney will result in a Google News search for the keyword “disney”. Type help to see some of the other available commands, like lucky (an “I’m feeling lucky” ...