WATCH: What Facebook ‘Likes’ really reveal about you

Watch this if you ‘Like’ pages on Facebook. Facebook ‘Likes’ say more about you than you might think.

Devise Passwords That Drive Hackers Away

Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self. It’s hard to maintain peace of mind when hackers remind me every day, all day, just how easy it is to steal my personal data.

Within weeks, I set up unique, complex passwords for every Web site, enabled two-step authentication for my e-mail accounts, and even covered up my computer’s Web camera with a piece of masking tape — a precaution that invited ridicule from friends and co-workers who suggested it was time to get my head checked.

But recent episodes offered vindication. I removed the webcam tape — after a friend convinced me that it was a little much — only to see its light turn green a few days later, suggesting someone was in my computer and watching. More recently, I received a text message from Google with the two-step verification code for my Gmail account. That’s the string of numbers Google sends after you correctly enter the password to your Gmail account, and it serves as a second password. (Do sign up for it.) The only problem was that I was not trying to get into my Gmail account. I was nowhere near a computer. Apparently, somebody else was.

Britain’s top 20 worst streets for broadband

Britain's slowest street for broadband offers a connection that would take 25 hours to download a film (Image: Fotolia)

Britain’s worst street for broadband is Cromarty Road in Stamford, Lincolnshire – with a 0.132mbps speed so slow it would take 25 hours to download a film.

The results of a nationwide survey pinpointed the road as the worst in the UK – with a connection 500 times slower than the fastest, Willowfield in Telford.

The results come from 2,261,336 speed tests conducted by uSwitch.com’s speedchecker.

The survey has highlighted entire counties that are blackspots for broadband speed.

Web Developer Economics: Monthly Service Costs

Dave Rupert once asked people on Twitter about all the web services they paid for and it looked like he received a lot of interesting replies. I thought I’d blog mine and get the ball rolling on sharing lists of these services. It’s interesting to consider the apps that have managed to cross our magical barrier to our pocketbooks. Perhaps looking at them as a whole we can see a pattern or at least have better mental grasp on our spending choices as developers. The following is a list of every web developer-y web service I personally pay money for.

The services that are marked with a *, for one reason or another, I don’t actually pay for. But it’s inclusion means I absolutely would pay for it.

Designs That Got Rejected By Clients

Oct 5 2012 by Martijn Oud

Websites, logos, user interface components and icons can — and often do — get rejected by clients and bosses for various reasons. But that doesn’t mean they’re not great designs.

In fact, I’d like to show my appreciation of some excellent designs on Dribbble (a community site for designers to show their work) that didn’t make the cut for reasons like “it doesn’t fit in our design” or “it’s not what we are looking for.”

By the way, if you’re interested in seeing more rejected designs, check out Dribbble’s#rejected keyword tag.

The Rejected Designs

Graphic designer Ross A. Whelan made the awesome badge logo concept for a food TV show and says that he was “a little heartbroken” when he found out that it was rejected.

The piece features great typography, creative use of a fork and knife referencing the nature of the show and has a nice vintage look.

Image source

Chinese hack attack on White House computer

Washington confirms Chinese hack attack on White House computer

By , Published October 01, 2012, FoxNews.com

White House sources partly confirmed an alarming report that U.S. government computers — reportedly including systems used by the military for nuclear commands — were breached by Chinese hackers.

“This was a spear phishing attack against an unclassified network,” a White House official told FoxNews.com. “These types of attacks are not infrequent and we have mitigation measures in place.”

A law enforcement official who works with members of the White House Military Office confirmed the Chinese attack to FoxNews.com on Monday, but it remains unclear what information, if any, was taken or left behind.

“This [White House Communications Agency] guy opened an email he wasn’t supposed to open,” the source said.

That email contained a spear phishing attack from a computer server in China, the law enforcement source told FoxNews.com. The attack was first reported by the conservative blog Free Beacon. Spear phishing involves the use of messages disguised to appear as valid; in fact, they contain targeted, malicious attempts to access sensitive or confidential information.

By opening the email, which likely contained a link to a malicious site or some form of attachment, the agency member allowed the Chinese hacker to access a system, explained Anup Ghosh, founder and CEO of security company Invincea.



Read more: http://www.foxnews.com/tech/2012/10/01/washington-confirms-chinese-hack-attack-on-white-house-computer/#ixzz2858Kqfi0

 

 

 

23 Great Examples of Illustrated Elements in Web Design

Illustrated Elements in Web Design | Inspiration.

Illustrated elements are great way to give a website a unique look. Whether its an illustrated background, a stylish sketched font, or hand drawn icons, using illustrated elements can give a design tons of personality. For this post, we’ve gathered 23 examples of illustrated elements in web design to inspire you for your next project.

, Smashing Magazine, October 1 2012