SEARCH

PAGE 362

Think you know the answer? Click through to see if you're right!

about 2 years ago - by  |  Comments (30)

We’ve seen magnetic cards and RFID cards used as keys before, but QR codes? Check out the video to see how a group of Cornell University students developed a visual key card.

about 2 years ago - by  |  Comments (2)

Staying on top of security breaches and how they may or may not affect you is time consuming. Sentry, a new and free addition to the LastPass password management tool, automates the process and notifies you of breaches.

about 2 years ago - by  |  Comments (1)

Recently we shared the video for a terrific Back to the Future GTA IV mod with you and today we are back with videos for a wicked Ghost Rider mod. One thing is sure, with Ghost Rider cruising through town the nights in Libert...

about 2 years ago - by  |  Comments (1)

Unclear about how the various social media networks are used? This comic clears up any confusion… with bacon.

about 2 years ago - by  |  Comments (8)

User Account Control is an important security feature in the latest versions of Windows. While we’ve explained how to disable UAC in the past, you shouldn’t disable it – it helps keep your computer secure.

about 2 years ago - by  |  Comments (64)

Think you know the answer? Click through to see if you're right!

about 2 years ago - by  |  Comments (48)

The e-ink display, network connectivity, and low-power consumption of Kindle ebook readers make them a perfect candidate for an infrequently refreshed high-visibility display–like a weather display. Read on to see how t...

about 2 years ago - by  |  Comments (18)

If you want custom and unique backgrounds without having to code your own image-generating engine, Ablaze makes it simple (and fun) to create abstract images.

about 2 years ago - by  |  Comments (2)