World Wide Web »
Here you will find detailed, unofficial reviews and recommendations on websites/web services that cover every different category, from Personal Information Managers, to Image Editors to Desktop Managers…and more!
Do people still use Yahoo? Apparently, seeing as Yahoo.com is still one of the top five destinations on the web. However, Yahoo is quickly losing its readers to the competition and new CEO Marissa Mayor wants to change that. One …Read More »
When I say “Google dominates search” no one is likely to disagree with me because it is true — Google is the most popular search engine around the world (on an aggregate basis — some countries, like China, prefer other …Read More »
2012 has seen Box.net offer various different promotions to entice users to pick its cloud storage/backup service over the competition, namely Dropbox and Google Drive. If you have not yet jumped on any of the previous promotions, there is another …Read More »
If you are tired of paying hundreds of dollars for Microsoft Office, don’t want a desktop office suite, or don’t like Google Docs then Microsoft Office Web Apps is for you.
What is it and what does it do
Main …Read More »
For a long time now Google has been showing ads to Gmail users, with many of these ads being specifically targeted based on the content of emails. Google has embedded this right to serve ads based on email content into …Read More »
YouTube modifies content removal system to be more pro-user, gives us hope in the age of excessive copyright claims
YouTube has a system in place called ‘Content ID’ which provides content/copyright owners an automated way to force the removal of YouTube videos (or monetization of the videos) that contain copyrighted audio or video. Up until now, it was very …Read More »
MPAA chief wants everyone to know four-strikes-you-are-out anti-piracy scheme lives on, even if SOPA and PIPA are dead
Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA) are two acts that were proposed in the United States Congress as an attempt to fight online piracy. Because of their ruthless nature, the acts met with a lot of …Read More »
The human population of Earth is estimated at just under 7 billion. (to be exact, the World Bank estimated our population at 6,973,738,433 in 2011.) 1 billion of these 7 billion humanoids are “actively” using Facebook. Wow.
In an interview …Read More »
Yesterday I posted a tip about how Google is the best spell checker, ever. As is typical of dotTechies, some of you posted tips related to using Google for spell checking purposes. One of these very useful tips is to …Read More »
I am notoriously bad at spelling. I heavily depend on spell check when writing articles. Most of the times, the spell checker built into WordPress and Firefox work well enough. However, there are times that I have absolute no idea …Read More »
Over the years people have accused Bing of copying Google, or at least making changes to Bing that make it appear to be more Google-ish. With a new change to Google.com, it may actually be Google copying Bing.
I was …Read More »
…by mistake, that is. The Canadian government’s Department of Finance has been running ads on the Internet in support of its “Economic Action Plan”. One on these ads made its way to The Pirate Bay. Since The Pirate Bay makes …Read More »
What happens when Apple stumbles with a product release? The competition take advantage of the opportunity, of course. One such example is everyone from Nokia to Samsung poking fun at the failure of iOS Maps. Apparently there is only so …Read More »
IEEE, a group of tech experts, leaks almost 100,000 usernames and passwords — login information for Google, Apple, and Samsung employees
The Institute of Electrical and Electronics Engineers (aka IEEE) describes itself as “the world’s largest professional association for the advancement of technology”. The IEEE is not only home to many big names in the scientific and engineering community but many …Read More »
Fake “Microsoft Windows Update” e-mail will steal your Gmail, Windows Live, Yahoo, or AOL passwords — be careful
E-mail threats are a non-stop nuisance. After the recent “Important Changes to Microsoft Services Agreement” malicious e-mail, we have another swipe at Windows users. This time the e-mail comes in the form of a phishing attack.
An e-mail from “email@example.com” …Read More »
For years, Microsoft has been secretly limiting online passwords to 16 characters — despite leading users to believe otherwise
When you register for a new Outlook.com e-mail address, you are told your password can be a maximum of sixteen characters. While there are, of course, security implications with limiting passwords to sixteen characters, what is worse is how Microsoft …Read More »
Thanks to the popularity of always-on broadband and mobile devices, Wikipedia is only a click away for many people. However, what if you want to be able to access Wikipedia offline. Or, maybe print Wikipedia articles. What do you do? …Read More »
Interactive chart tells you how major tech companies make money, such as selling your data or using ads
If a company is not directly selling products or serving ads, sometimes it can be difficult to figure out how a company is making money. An interactive chart by Seer Interactive looks to help you better understand how major tech …Read More »
Did you know it is legal to download copyrighted content (aka file sharing) for personal use in some countries?
As the noose tightens around file sharing in many countries, do you know there are some countries in which you can legally download movies, TV shows, music, programs, video games, etc. as long as it is for personal use? No, …Read More »
If I were to ask you how emoticons came to be, what would you say? Would you be able to tell me that emoticons came into being on September 19, 1982 when Professor Scott Fahlman of Carnegie Mellon University sent …Read More »
The scenario I present to you is simple. You are sitting at home or work and you receive an e-mail in your inbox claiming to contain nude videos or pictures of your favorite celebrity. Would you open it? Apparently 996 …Read More »
Whether it be through Windows or its online services, Microsoft touches the lives of many, many people around the world on a daily basis. So when an e-mail from “Microsoft <firstname.lastname@example.org>” with the subject of “Important Changes …Read More »
Google’s reverse image search is an extremely useful tool for finding the origin of images or photos
We all know about Google Images, the image search engine by El Goog. But do we all know about Google’s reverse image search engine? I for one didn’t until a day or two ago but once I learned of it, …Read More »
Last week researchers unveiled a new exploit that allows the hijacking of HTTPS connections, the type of connections the world relies on for secure data transfer over the Internet.
Dubbed CRIME (Compression Ratio Info-leak Made Easy), the hack exploits vulnerabilities …Read More »
On March 6, 2012 six British soldiers were killed in the Lashkar Gah area of Afghanistan by an improvised explosive device (IED). Two days after this incident Azhar Ahmed — a 19 year old from West Yorkshire — posted the …Read More »
TechCrunch, a technology blog, holds regular ‘Disrupt’ conferences where a bunch of geeks gather to talk about geeky stuff. At the most recent ongoing conference in San Francisco, TechCrunch interviewed Mark Zuckerberg, the founder and CEO of Facebook. The interview …Read More »
Google has a list of words it likes to censor from Google Search’s ‘Instant’ (i.e. how search results are shown as you type search queries) and ‘Autocomplete’ (i.e. how Google recommends search queries based on what you have typed so …Read More »
You might have noticed that large quantities of spam are becoming an issue with many Google Calendar accounts. Many users have complained about events showing up in their calendar that they don’t know about or never intend on attending. Thankfully, …Read More »
Big business gets security researcher booted off MediaFire for violating copyrights, something she denies doing
In today’s day and age, online piracy is done in one of two ways, torrents or file lockers. Either content is illegally shared via torrents or it is stored in an online file locker (aka cloud storage service) and downloaded. …Read More »
Phishing is when some scumbag attempts to trick someone into revealing some type of information, typically a username and password, by posing as a legitimate entity. Often times the best way to realize you are being phished is to note …Read More »
Do you enjoy the occasional movie off of The Pirate Bay? Or maybe you prefer a “private” torrent club? As it turns out, regardless of if you are torrenting off The Pirate Bay or exclusive, members-only torrent clubs, your IP …Read More »
You know that delightful service that allows users to scan files of up to 32 MB in size with 40+ anti-virus, anti-malware engines? Yeah, VirusTotal is what I am talking about. It seems like Google now owns them: according to …Read More »
During their “ongoing tests to measure our relevancy, assess customer feedback and satisfaction, and examine our product in many different ways”, Microsoft discovered that “Bing was beating Google in our search relevancy tests” (surprise, surprise). Microsoft says they followed the …Read More »
You’ve suddenly been made aware that your family owns an old farm at the end of the road above, and you decide (for some reason) to single-handedly bring it back up to operating condition. This is the premise behind Zynga’s …Read More »
Apple planning on launching streaming radio service, to take a bite out of the likes of Pandora and Spotify [Rumor]
Ever since my fiancee turned me on to Spotify, I’ve been hooked on streaming radio.
No, I didn’t come into it with Pandora like so many others. In fact, I’ve been known to resist new technologies and services until they’re …Read More »