155 Results for

PKG

Article

Interview with a DDoS troll: Meet 'the Gods of the Internet'

DDoS attacks are a way to keep corrupt corporations honest, according to an anonymous member of DerpTrolling, who gives us an inside look at the self-proclaimed gods of the Internet.

By October 7, 2014

Article

How to make a VR headset out of a pizza box

A relatively cheap and fun do-it-yourself project to experience the joys of virtual reality without breaking the bank.

By August 19, 2014

Article

New year, new energy standards for fridges

Residential refrigerator and freezer energy standards are changing -- here's what you need to know.

By January 22, 2014

Article

Many consumers in the dark about rising lighting standards

Six out of 10 consumers are unaware that the most commonly used light bulbs are about to disappear from store shelves.

By December 28, 2013

Article

PetChatz dispenses video, treats, scents on command

The pet communication system not only features live two-way video, it also gives out tasty treats and a variety of scents to entertain your furry companion.

By October 16, 2013

Article

Repair disk permissions to speed up your Mac

It won't cure all of your Mac's ills, but a quick and easy first step toward bringing a sluggish Mac back to health is using OS X's Disk Utility to repair disk permissions.

By July 24, 2013

Article

Feds put heat on Web firms for master encryption keys

Whether the FBI and NSA have the legal authority to obtain the master keys that companies use for Web encryption remains an open question, but it hasn't stopped the U.S. government from trying.

By July 24, 2013

Article

NSA spying flap extends to contents of U.S. phone calls

National Security Agency discloses in secret Capitol Hill briefing that thousands of analysts can listen to domestic phone calls. That authorization appears to extend to e-mail and text messages too.

By June 15, 2013

Article

What is the NSA's PRISM program? (FAQ)

We now know that the NSA uses something called PRISM to monitor private Web data. Sounds like "1984." What does it really mean?

By June 7, 2013

Article

GSA vulnerability highlights dangers of SSNs as IDs

A recently fixed vulnerability at the U.S. General Services Administration highlights the dangers of using your Social Security Number for identification. Federal and state laws restrict use of SSNs by public and private organizations.

By March 23, 2013