Tutorials

  • FREAK attack: How to keep your code secure

    <em>Bill Weinberg, Senior Director, Open Source Strategy,</em> <a href="http://www.blackducksoftware.com">Black Duck Software</a>

    05 March 15 07:21 Written by By Bill Weinberg, Senior Director, Open Source Strategy, Black Duck Software
  • Doxxing defense: Remove your personal info from data brokers

    Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.

    21 Nov. 14 05:55 Written by Ken Gagne
  • 10 more do's and don'ts for faster SQL queries

    Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database.

    17 Sept. 14 23:31 Written by Sean McCown
  • Automate image editing with GIMP

    For a project I was recently working on I needed to remove the white background from several hundred images in PNG format and replace it with transparency. I know you can automate Photoshop but that's like getting into a Sherman tank to go shopping at your local supermarket. Another constraint (other than my reluctance to wrangle Photoshop) was the need to be able to do this in the future as part of a process to be built into a virtual machine running Linux.

    08 Sept. 14 22:39 Written by Mark Gibbs
  • Hacking PingPlotter, Part 2

    In the previous column on hacking PingPlotter I discussed how you can use the tool's Web interface and the curl utility to add targets to be tracked, for example, to add a single host you would enter the following on the command line:

    24 July 14 22:45 Written by Mark Gibbs
  • How to protect yourself against privileged user abuse

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

    28 June 14 04:12 Written by By Michael Crouse
  • How to sort your Facebook feed by time on mobile

    Weddings. Job promotions. News articles. Facebook thinks it knows what the best stories are to drop in your news feed. But some users might want to see things their own way.

    24 May 14 04:00 Written by Zach Miners
  • 5 tips for data manipulation in Excel

    If you work with data much, you don't need a statistical model to predict that the odds of consistently getting data in the format you need for analysis are pretty low. Those who do a great deal of data cleaning and reformatting often turn to scripting languages like Python or specialty tools such as OpenRefine or R.

    04 March 14 14:05 Written by Sharon Machlis
  • Learn to build a PC in under two minutes

    Building a computer is a great way to get a custom configuration, save some money and have fun. In a how-to video, we'll show you how to build one in less than two minutes.

    25 Sept. 13 20:24 Written by Nick Barber
  • Saving YouTube videos for offline viewing

    Watching a YouTube video typically requires an Internet connection, but with a little preparation the videos can be saved for later offline viewing.

    23 Aug. 13 16:54 Written by Nick Barber
  • Secure location sharing with smartphone app

    Running late for a meet up with friends or an appointment? Share a location securely and for a limited time period with smartphone application Glympse. It's a free download for Android, iOS, Windows Phone and BlackBerry.

    12 July 13 19:45 Written by Nick Barber
  • Google Earth power user tips

    Google Earth users can do more than just fly around a virtual globe. The free mapping application can display real-time weather, help compose photographs and measure distances much more easily than its Maps cousin.

    24 June 13 19:41 Written by Nick Barber
  • Tech Tip: Advanced Google search functions

    Searching Google is a quick way to find information, but more advanced functions can help users find more helpful information faster.

    15 May 13 17:10 Written by Nick Barber
  • Cyberstalking with LinkedIn

    You just left cocktail hour or a networking event and forgot to grab a business card from the person you'd been chatting with. Don't kick yourself. Instead, log on to LinkedIn to do some cyberstalking. It's a much better resource than Facebook, because with just bits and pieces of information, you're still likely to be able to find your target.

    12 Feb. 13 22:28 Written by Nick Barber
  • Control your TV with your smartphone, tablet

    Using your smartphone or tablet to control your Tivo box is easy and offers a lot of flexibility in recording shows and channel surfing.

    22 Jan. 13 18:49 Written by Nick Barber
  • Market Place