Restore Privacy collects alternatives to Google products: "It’s been fun Google, but it’s time to say goodbye." And it's not just Firefox, DuckDuckGo and Tutanota; privacy-oriented options include NextCloud for storage, Matomo for web anaytics, Etar for calendars, and HookTube for relaying YouTube videos.
Back in January, Microsoft announced that they were “proud” to support ICE. Honestly, what company wouldn’t be? A U.S. federal contract, no matter how large your coffers and corporate reach might be, is a good get, due both to the amount of American lucre you’ll pocket and the visuals that come from being trusted by […]
The Washington Post rounds up 15 privacy defaults that no one in their right mind would want to leave as-is, and provides direct links to change 'em (hilariously and predictably, Verizon/Oath/Yahoo's privacy settings dashboard times out when you try to load it) -- once you're done with that, go back and follow his links to […]
June is Pride month. What better time to spruce up your rows and columns with the colors of the rainbow? David Murphy of Lifehacker shares an oldie-but-goodie Easter egg in Google Sheets that turns them into the colorful spreadsheets we all need. To check it out, simply pull up a new spreadsheet in Google Sheets. […]
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]