Google.com Dangerous Says Google (But Not Anymore!)

Google briefly labelled Google.com as “partly dangerous.” The automated warning appears to be a quirk caused by hosted content. The warning came on Google’s own Transparency Report page, which includes details of its Safe Browsing technology. That’s the database that gives warnings in Google’s search tools and the Chrome browser when pointing to a potentially risky […]





Farewell to the Internet, Welcome to the internet

The Associated Press has decided to switch from “the Internet” and “the Web” to “the internet” and “the web” from June 1. It’s provoked a mix of politeness, pedantry and philosophy. The changes will come in the AP stylebook. Not only does that determine the “correct” usage in the AP’s reports, but it’s also used […]

Netflix Admits Slowing Mobile Connections For Some Users

Netflix has revealed that it has intentionally varied mobile streaming bitrates based on the user’s cellphone service provider. It’s now dropping the policy amid claims of hypocrisy. The revelation came in a blog post that explained that its default bitrate for mobile viewing has been capped at a somewhat low-sounding 600 kilobits per second, something Netflix […]

Free eBook: “The Most Useful Keyboard Shortcuts for Popular Services”

For today’s free eBook, we’re offering you “The Most Useful Keyboard Shortcuts for Popular Services.” This eBook is about the most important and relevant keyboard shortcuts for skyrocketing your productivity. This neatly designed list is about that the most useful keyboard shortcuts for popular tools and online services. When we say ‘most useful’, we really […]

Free eBook: Implementing SSL/TLS Using Cryptography and PKI (Valued at $39.99)

Here’s our free eBook for today: Implementing SSL/TLS Using Cryptography and PKI (Valued at $39.99.) A hands-on, practical guide to implementing SSL and TLS protocols for Internet security! Coverage includes: Understanding Internet Security Protecting against Eavesdroppers with Symmetric Cryptography Secure Key Exchange over an Insecure Medium with Public Key Cryptography Authenticating Communications Using Digital Signatures […]