Monday morning links serving: The May 26th edition

–Best Free Ways to Protect Your Private Files When you’re saving sensitive files on your computer meant for your eyes only, make sure you’ve got the right tools on hand to keep them private. –42 Unusually Brilliant Business Card Designs In today‚Äôs world of short attention spans it is more important than ever to make […]

What books are must-reads for YOU?

By Mark O’Neill When I am not at the computer surfing the waves of the World Wide Web, I can normally be found in a chair reading a book and away in ImaginationLand. I am a huge book reader and collector and I currently have 114 unread books to get through (with more coming into […]

Problem with [GAS] – Can anyone help?

Edit 3: The Issue has been fixed on Saterday night. Thanks to everyone who helped! For those who want to know, we were not responsible. The redirect came from an external ad script. Edit 2: Removed additional scripts.. is it still doing it? Edit: I think we got the culprit. I only need to know […]

Jet-Powered Lawn Mower

And just when you thought you’d seen everything, the jet-powered lawn mower comes along to prove your wrong. Too bad the video doesn’t show it in a race against a F1 or something, it might have made the show a little bit more interesting.

Considering the Robot Romance

By JR Raphael Contributing Writer, [GAS] I’m thinking about trading in my girlfriend for a few really advanced robots. Hang on a sec — I know it sounds bad. But hear me out. Scientists are making leaps and bounds with these things right now. I mean, they’ve come up with artificial life that can conduct […]

Steampunk USB Drive

Here at [GAS], we think that steampunk devices are among the sexiest gadgets you can own. I mean, just check out this awesome steampunk USB drive, it looks amazing, doesn’t it? Unfortunately, this thing has been hand-crafted, so there’s no way you’ll be able to put your hands on one… unless you have the skills […]

Free e-Book: Vulnerability Management for Dummies

Here’s another freebie for you folks. An absolutely amazing 66-page security eBook named “Vulnerability Management for Dummies”. Vulnerability Management for Dummies will arm you with the facts and show you how to implement a successful Vulnerability Management program in your environment. Whether your network consists of just a handful of computers or thousands of servers […]

What does the British Government know?

By Mark O’Neill In the United States, the Freedom of Information Act has been around since the 1960’s but in Great Britain it has only been in force since 2000. Britain is quite a secretive country by nature with its Official Secrets Act and I think Brits are still finding it a novel concept to […]

The Science of Ball to Crotch

The poor fellow you are about to see signed up for a pretty disturbing televised science experiment. The sports science show wanted to test the reaction a male individual would have when receiving a blow to the groin. Gentlemen, be ready to cross your legs. This is serious psychological torture. [Via TechEblog]

Cool Invention: The Self-Repairing Plane

By JR Raphael Contributing Writer, [GAS] Imagine a plane that can heal itself the same way your body does. Turns out, it may not be as far-fetched as it sounds. Scientists at the University of Bristol have developed a new self-repairing aircraft. The plane’s materials allow it to “mimic healing processes found in nature” and […]

Order your Pizza Hut pizzas via your desktop

By Mark O’Neill All you lazy hungry geeks who can’t be bothered to tear yourselves away from the computer, despair no longer, because Pizza Hut has come to your aid! Yes, the Hut is the latest company to jump on the Adobe AIR bandwagon with their desktop ordering widget! But as usual with these new-fangled […]

Teacups Turned Into Hacking Tools

By JR Raphael Contributing Writer, [GAS] Engineers are putting a high-tech spin on some old-fashioned items. Researchers at UC Santa Barbara and Germany’s Saarland University have found ways to use cameras and telescopes to transform everyday objects into data hacking devices. It seems simple, but it’s actually a pretty complex process. The first concept uses […]