Do Not Call List

How To : Solve the Rubik's Cube faster with shortcuts

As the best-selling toy of all time, the odds of you once playing with a Rubik's Cube are pretty high. And if you're like me, or even the cube's inventor Erno Rubik, your first attempts likely ended in futility. Every twist, every turn, the cube just gets more and more mixed u ...more

NR30 : 2019's Up & Coming AR Founders You Need to Know

The landscape of the augmented reality space is broad, diverse, and constantly shifting, perhaps more so than any other vertical in technology. At the same time, major players are attempting to standardize various hardware designs and delivery methods, while still others are r ...more

NR30 : The Augmented Reality Investment Leaders of 2018

People say that money makes the world go 'round. And it's no different in the world of augmented reality. If there are any doubts about the future of the AR industry, it doesn't seem like many venture capitalists or corporate investors share those doubts. According to Digi-Ca ...more

How To : A Smartphone User's Guide to Surviving Thanksgiving

The holidays are stressful. Between traveling, family, and dinner, Thanksgiving weekend can feel like weeks. Many families have traditions that make the days long, but some of us would rather curl up somewhere and watch our favorite shows. But all is not lost — our phones do s ...more

News : 15 Brilliant Google+ Female Photographers to Circle

In a previous article where I suggested 104 photographers to follow on Google+, I received a lot of criticism because over 90% of the listed photographers were men. While women are currently not a majority on Google+, they are a definite presence, and they are active. Today, I ...more

How To : Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

  • Hot
  • Latest