Submitted by admin on Sat, 01/11/2014 - 15:23
After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Read the full article here.
Submitted by Daniel on Mon, 12/23/2013 - 22:50
Take up the President's call to code - create a a free account at Code Academy and learn to code. Stop complaining about buggy software and write your own health care exchange.
Submitted by Daniel on Tue, 12/10/2013 - 10:05
Submitted by admin on Mon, 12/09/2013 - 08:44
By Barton Gellman and Ashkan Soltani, Published: December 4
Submitted by admin on Sun, 12/01/2013 - 18:19
Submitted by Daniel on Sun, 09/01/2013 - 16:58
By Zoë Keating
September 1, 2013
This year marks the 10th anniversary of the day I quit my software job. There was nothing wrong with my job; it was rewarding and I liked it, but "information architect" was not my calling. I didn't want to sit at a computer all day. I wanted to make music.
Submitted by Daniel on Thu, 08/29/2013 - 18:46
Submitted by Daniel on Sun, 08/25/2013 - 13:47
A good tutorial on setting up Skype and Audio Hijack Pro to record telephone interviews. Includes detailed port forwarding to eliminate use of super-nodes and practical stereo channel setup for easy post processing. By Doug Kaye and Paul Figgiani on Slideshare.
Submitted by Daniel on Sun, 08/18/2013 - 18:55
Submitted by Daniel on Fri, 07/12/2013 - 00:00
• Secret files show scale of Silicon Valley co-operation on Prism
• Outlook.com encryption unlocked even before official launch
• Skype worked to enable Prism collection of video calls
• Company says it is legally compelled to comply