-
Unlimited Device Connections Now on PIA VPN? Yes, Please!
PIA now offers unlimited device connections. Enjoy the #1 VPN for digital privacy on all your devices at no extra cost. Read more
-
Hacker News vs Slashdot – Post Mortem Analysis
In March, two of our articles were featured on the frontpage of both Hacker News and Slashdot. After reading a recent post on HN with details of a post mortem analysis, we realized it was important that we share a bit of our analytics as well. We logged into our analytics account, and we were… Read more
-
Bitcoin War: The First Real Threat to Bitcoin?
For most Bitcoiners, it is a well known fact that there is a significant risk in the decentralized peer-to-peer currency pertaining to hashing power. In order to maintain a perfectly democratic internet currency, no one single entity should ever have control of 51%, or greater, of the total network hashing power. Today, one of our… Read more
-
Exclusive Interview with Suren Ter from YouHaveDownloaded.com
Your BitTorrent downloads are very public, and Suren Ter, the producer behind YouHaveDownloaded.com, has helped to raise public awareness on this reality. We sat down with our friend, Suren, to discuss the idea behind YHD, piracy, and the future of file sharing. • • • Please give the world a brief introduction about yourself, such… Read more
-
Secure Public WiFi: Wireless Security Tips
San Jose will be launching a free WiFi service to its residents starting in the summer of 2012. The free, unsecured municipal WiFi in San Jose will be free to the public and secured for the government. As the public facing free WiFi service is unsecured, it is up to the user to enable wireless… Read more
-
Pullin’ a Rabbit out of a Black Hat
Step 1 – Hack a computer. Step 2 – ? Step 3 – Profit. In the past, step 2 generally consisted of several intricate steps that required a significant amount of effort and skill. Even if a system was filled with valuable data, it was highly unlikely that any of said data was actually valuable… Read more