It's definitely related. There is no sense in using something for privacy's purpose, if the product is significantly lacking in functionality. I...
I've tried out a few search engines other than Google (particularly DuckDuckGo), and I'm sorry to say that their algorithms are nowhere near as...
The title of this thread is "Tablets will become the main computing device", not "Tablets will become mainstream". I do not question that tablets...
With developing / graphics I'd agree (although not entirely sure about graphics, as even non-geeks tend to play around with simple imaging...
I'm not sure even for non-geek users tablets can replace PCs. Tablets are good for some things - browsing the web and reading mostly. Things it...
Thanks for the share. It would be too much of a hassle for me though, I don't want something to disturb me while I'm at the PC, I prefer something...
Good point, thanks. I trust my VPN provider so much (I know the owners) that the thought of logs being stored never even entered my mind.
I would take this even further and say: even if there were more tablet units than PC units out there, that still would not mean that tables are...
http://stereopsis.com/flux/ Been using it for over a year now, really helpful and healthy for the eyes. Basically, it dims your monitor(s) to...
Could you elaborate a bit on why SSH over TOR is more anonymous than SSH over nested VPNs?
Does anyone honestly believe that wiretapping facebook, or whatever, will slow down or make life more difficult for terrorists in any way? I mean,...
At the risk of sounding ignorant :) I will press the subject a little further. We've established that when browsing to, say, VirustTotal.com,...
There are faster ways for buying bitcoins; there are online exchangers who will give you bitcoins in exchange for a Ukash voucher (you can buy it...
Yeah my point exactly with the tampering switch; although first I would like to confirm that heating the RAM actually does what we hope it would...
As everyone probably knows, reducing the temperature of RAM slows down the speed with which data diminishes from the memory modules. Does it go...
I just checked and you are right, sorry for the confusion. In the few encryption-related courses/books I have dealt with so far, substitution...
The idea is that using cascade encryption can potentially lead to significant weaknesses in the encryption due to bad implementation methods (the...
Yeah in some ways they are similar (as in, they are both extremely easy to crack :)). However, the Caesar cipher is a shift cipher, not a...
Hope you've got an image of that drive somewhere...:argh:
SpiderOak seems relatively fast; I've uploaded 200MB in about 15 minutes I think (I have 10Mb upload speed)
Same here, although I've had a USB fail on me once. Not sure though if it was an issue with the USB itself, or someone tampering with it.
Welcome to the forums rew89fr :thumb: What you are talking about is a form of a substitution cipher. This type of cipher is probably OK for...
I prefer backing up some data to BlueRay discs. The good ones (about $10 a piece) have an estimated life expectancy of 50 years. I personally...
The hacker did mention that he had a certain program in place which would turn his entire hard drive into "nothing more than a brick" after it has...
I've seen that episode as well. As far as I was able to deduce (although they did not say this directly and intentionally avoided giving out more...
Separate names with a comma.