| Monday December 22nd 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘.edu’ Archives

How the different “map” services hide sensitive information

How the different “map” services hide sensitive information

(more…)

The Most Commonly Misused Words and Phrases

The Most Commonly Misused Words and Phrases

Last week, someone shared with me an article from Cracked.com about 9 words that most people use when they want to sound really smart, but actually almost always use them incorrectly. Misusing words makes you look less intelligent than you really are. If you misuse words in your writing, it can damage your credibility and diminish the point [...]

How Viagra spam works

How Viagra spam works

Speaking of \/1@grA, there's no escaping spam these days. Even with the best Bayesian filters, blacklists and other filtering techniques, most of us are still plagued with an endless stream of invitations for all sorts of weird and wonderful products and services. One of the most common forms is advertising for pharmacological products - and [...]

Why forced change password policies are ridiculous

Why forced change password policies are ridiculous

Forced password-changing policies lead to two things: More frustrated users locked out of their accounts, leading to more painful support requirements A huge number of unenecrypted text files on local filesystems called "mystupidnewpassword.txt" I study IT Security in the graduate program of UNC Charlotte. For the most part, UNCC is a [...]

XFS Filesystem: It’s worth the wait

XFS Filesystem: It’s worth the wait

In 1994, Silicon Graphics Inc., of Mountain View, Calif., (SGI) released a new journaled file system on IRIX, the company's System V-based version of UNIX. This advanced file system, called XFS, replaced SGI's old EFS (Extent File System) file system, which was designed similar to the Berkeley Fast File System. Coordinating with many other kernel [...]

RAID Write Back vs Write Through

RAID Write Back vs Write Through

To suffer or not to suffer?  That is the question. RAID Features Write Through Cache With Write Through Cache the data is written to both the cache and drive once the data is retrieved. As the data is written to both places, should the information be required it can be retrieved from the cache for faster access. The downside of this method [...]

The Hofmeister Kink: A Lasting BMW Design Detail

The Hofmeister Kink: A Lasting BMW Design Detail

Sometimes the smallest things can make the biggest differences. They can carry powerful associations that aren't immediately obvious. Some good examples are: How your computer displays text, The $300 Million Button, and The difference a headline makes. The idea that a detail can make a big difference has always been fascinating to me.  I've [...]

10 Privacy Settings Every Facebook User Should Know

10 Privacy Settings Every Facebook User Should Know

Facebook's new terms of service caused quite a stir this past weekend, prompting many users to drop their Facebook accounts altogether. Too hooked on Facebook to cut it off completely? It's time you learned more about your privacy settings. The Facebook obsessives at weblog AllFacebook round up 10 privacy settings every Facebook user should [...]

Unix Fundamentals

Unix Fundamentals

SECTION - I : FILE MANAGEMENT IN UNIX 1. How are devices represented in UNIX? All devices are represented by files called special files that are located in/dev directory. Thus, device files and other files are named and accessed in the same way. A 'regular file' is just an ordinary data file in the disk. A 'block special file' represents a [...]

Comprehensive excoriation of ebook stupidity

Comprehensive excoriation of ebook stupidity

Ars Technica's John Siracusa, a veteran of early ebook startup Peanut Press, does a fabulous job of cutting through the fuzzy thinking, excuse-making, bad history and missed opportunities of the past decade's worth of ebook ventures. This is a must-read essay for anyone thinking about the future of books and reading. You'd think that publishers [...]

Apparently, two spaces after a period is no longer correct… When did this happen?

Apparently, two spaces after a period is no longer correct… When did this happen?

I used to always use two (or three) spaces to take up more space on papers that need to be a certain length in pages. I guess this has changed over the years... I also heard they don't teach cursive handwriting either. ugh. Everyone who took typing class in high school learned that you always put two spaces after a period. The same goes for [...]

Linux. Stop holding our kids back

Linux. Stop holding our kids back

This is just epic. A teacher takes linux discs off a student because "no software is free" and writes to a Linux blog (that is somehow related to the student) to complain. I wonder what that school district's servers are running... If you think this is bad, imagine the people running our local, state, and federal governments. Ugh. "...observed [...]

Boston College Will Stop Offering New Students E-Mail Accounts

Boston College Will Stop Offering New Students E-Mail Accounts

The student mailboxes are a pain in the ass. The students never delete anything and they use them as spam accounts when they sign up for "stuff" online. Their mailboxes sit out on the SAN and just take up space. Reverting to just forwarding email would lower overhead drastically. This seems like a really smart move for once. Many students don’t [...]

Student points out school server security flaws and gets charged with 3 felonies

Student points out school server security flaws and gets charged with 3 felonies

A 15-year-old high school student in New York State has been charged with three felonies after he allegedly accessed personnel records on his school's poorly configured computer network and then notified his principal of the security weakness. The unnamed student of Shenendehowa Central School was charged Thursday with computer trespass, [...]

University Brings Charges Against White Hat Hacker

University Brings Charges Against White Hat Hacker

A university student at Carleton University is learning that no good deed goes unpunished. After hacking into what was probably a not-so-secure university network, this guy took the time to write a 16-page paper on his methods and sent it to the system admins. Sounds like White Hat behavior to me. Yes, he should have asked permission before [...]

We are “digitizing” the way high school students take tests. What could possibly go wrong?

We are “digitizing” the way high school students take tests. What could possibly go wrong?

“Wait a sec,” the Edutron Systems rep interrupted, cutting off the principal of River City High, “your students still use pencils and paper to take exams!?” The rep insincerely chuckled, adding “don’t tell me you’re still using slide rules to teach arithmetic!” As shifty as the sales rep was, he [...]

Computer Science majors lowest in a decade

Computer Science majors lowest in a decade

All Things Considered, March 12, 2008 · The number of students enrolled in computer science programs is at its lowest in at least a decade. "Comp Sci" was one of the hottest majors during the dot-com boom of the late '90s, but the numbers dropped after the bust of 2001. Now, despite a strong market for IT professionals and a resurgence [...]

Stanford Waives Tuition for Middle-Class Students

Stanford Waives Tuition for Middle-Class Students

Morning Edition, February 21, 2008 · Stanford University says it will no longer charge tuition to undergraduates whose parents earn less than $100,000 a year. For students whose parents make less than $60,000, the university will also waive room and board costs. Source

TurnItIn.com

TurnItIn.com

This is old news but still deserves a mention. In case you haven't been a student in awhile TurnItIn is a service for educational institutions. They make it compulsive for students to allow their paper to be submitted to Turnitin or receive a failing grade of 0. The service, a profit entity, operates by archiving student papers to detect [...]

Firefox = Detention

Firefox = Detention

 Page 2 of 3 « 1  2  3 »