Bookmark
Berkeley Linux Users Group » Blog Archive » Where to Buy a Preinstalled Linux Desktop / Laptop
www.berkeleylug.com/?p=168, posted 2010 by peter in hardware linux list webshop
You can find Linux servers sold all sort of places, but where can you find Linux desktops for sale? Here is a list of places I have had good experiences with or have had heard good things about directly:
Bookmark
What's The Harm?
whatstheharm.net/, posted 2010 by peter in conspiracy list religion scam science
This site is designed to make a point about the danger of not thinking critically. Namely that you can easily be injured or killed by neglecting this important skill. We have collected the stories of over 670,000 people who have been injured or killed as a result of someone not thinking critically.
Bookmark
Guide to Most Useful Bookmarklets for Chrome, Firefox, Safari, etc.
www.labnol.org/internet/guide-to-useful-bookmarklets/7931/, posted 2010 by peter in bookmarking javascript list online
This guide will help you understand the advantages of bookmarklets over add-ons, how to install bookmarklets followed by a list of essential bookmarklets that should work across all popular browsers including Google Chrome, Firefox, Opera, IE and Safari.
Bookmark
8 Best Twitter Statistics and Analytics Tools | Tools | PelFusion.com
pelfusion.com/tools/8-best-twitter-statistics-and-analytics-tools/, posted 2010 by peter in list online social statistics
Almost everyone knows the power of twitter now but very few know how to get more out of it. To use Twitter fully and become successful, you must check statistics of your account and analyze it. But, the basic Twitter service does not provide full and advanced stats, you can get those only by using tools developed by others.
Here is the list of 8 useful twitter statistics and analytics tools.
Bookmark
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
cwe.mitre.org/top25/, posted 2010 by peter in development list reference security testing
The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.
The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software.
Bookmark
Tre Små Grisar - Jönköpingsbandets hemsida
www.grisar.net/, posted 2010 by peter in inswedish language list reference swedish
Med en ordlista med slang och dialektala uttryck.
Bookmark
Here comes the new cell phone etiquette
www.computerworld.com/s/article/9147558/Here_comes_the_new_cell_phone_etiquette?taxonomyId=15&pageNumber=3, posted 2010 by peter in list mobile opinion people
13. Be mindful about Facebook tagging
People differ on how open they want to be about their private lives on social networks like Facebook. They also vary in how wide their social circle is. Some only "friend" people who actually are their close friends. Others "friend" everyone, from co-workers and grandparents to strangers.
When you snap a photo with your phone and "tag" someone in it, you're showing the picture to all of his Facebook friends, and you don't know how open or selective he's been about "friending" people. Compromising pictures involving weird haircuts, drunkenness, partial nudity or silly behavior might not bother you, but you don't know how others feel about such things.
A good rule of thumb is to get permission to tag someone else's photo -- or at least never tag a photo unless you're sure that person wouldn't mind showing it to his mother, boss and children.
Bookmark
frequently used SSL commands
shib.kuleuven.be/docs/ssl_commands.shtml, posted 2010 by peter in howto list reference security
A few frequently used SSL commands
Bookmark
Make: Online : Open source hardware 2009 - The definitive guide to open source hardware projects in 2009
blog.makezine.com/archive/2009/12/open_source_hardware_2009_-_the_def.html, posted 2009 by peter in free hardware howto inspiration list
Welcome to definitive guide to open source hardware projects in 2009. First up - What is open source hardware? These are projects in which the creators have decided to completely publish all the source, schematics, firmware, software, bill of materials, parts list, drawings and "board" files to recreate the hardware - they also allow any use, including commercial. Similar to open source software like Linux, but this hardware centric.
Bookmark
95 Old School Games You Can Play Online | AMOG
amog.com/tech/gaming/oldschool-videogames/?ref=rss, posted 2009 by peter in free game list online retro
These games aren’t lost forever. You can still play many of them online. If you love the old classics, this list should have you busy for months. Below is a list of 95 old school video games that you can play online. Click on each title to link directly to the game. Also, we’ve reviewed and rated each game for you, our loyal AMOG readers.
|< First < Previous 71–80 (119) Next > Last >|