Saturday, March 8th, 2008
Generating long, high-quality random passwords is not simple. So here is some totally random raw material, generated just for YOU, to start with. Every time this page is displayed, our server generates a unique set of custom, high quality, cryptographic-strength password strings which are safe for you to use.
https://www.grc.com/pass
Click your ...
Posted in Internet, Security, Software | No Comments
Saturday, March 8th, 2008
There's a famous scene in the classic movie Caddyshack in which Bill Murray (playing demented greenskeeper Carl Spackler) says that in order to defeat the gopher that's ruining his golf course, he must think like a gopher. Troubleshooting computers can be a bit like that: To recognize and fix what's ...
Posted in Hardware, Software | No Comments
Saturday, March 8th, 2008
RA and M4A are container formats for music used by Real Networks and Apple, respectively, in their downloads. The actually formatting of the music is done with AAC, which stands for Advanced Audio Coding. AAC, for these two brands, has taken the place of MP3s.
Many feel AAC will supplant MP3s. ...
Posted in Internet, Software | No Comments
Saturday, March 8th, 2008
Wondering if your favorite peer-to-peer file-swapping program has spyware bundled into it? Chances are good that it does.
The information on this page is believed to be accurate. However, if any program is listed under the wrong section, please let me know immediately. If you know of a file sharing ...
Posted in Internet, Privacy, Security, Software | No Comments
Saturday, March 8th, 2008
One of the things you will hear about spyware is that "it keeps free software free". The spin doctors and apologists go on about how you are able to install software for free because of the advertisements. To hear spyware companies tell it, they sponsor these poor, starving software developers ...
Posted in Internet, Privacy, Security, Software | No Comments