Somewhere, nestled in the woods near Santa Rosa, California, Ryan Powers came across this relic from a time better left forgotten.
This Apple /// serves as a dark reminder of the days when computer science pioneers were outcasts, and forced to hide in the wild, with little more than a 6502 assembler to keep them warm.
Pioneering engineer Bill Atkinson was the lead designer/developer of the Apple Lisa graphical user interface, creator of MacPaint and QuickDraw, and part of the original team that developed the Apple Macintosh. In 1985, Atkinson dropped acid and came up with HyperCard, the groundbreaking multimedia authoring program that was really a precursor to the first Web […]
The Washington Post rounds up 15 privacy defaults that no one in their right mind would want to leave as-is, and provides direct links to change 'em (hilariously and predictably, Verizon/Oath/Yahoo's privacy settings dashboard times out when you try to load it) -- once you're done with that, go back and follow his links to […]
Last April, the Kremlin ordered a ban on the private messaging app Telegram, blocking millions of IP addresses that formed Amazon and Google's clouds in order to prevent users from accessing the service; not only was it an ominous moment in the evolution of the internet as a system for oppressive control, it was also […]
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]