World Wide Web »
Here you will find detailed, unofficial reviews and recommendations on websites/web services that cover every different category, from Personal Information Managers, to Image Editors to Desktop Managers…and more!
Google is in the business of information. Google is in existence today because Google Search allows millions upon millions of people to quickly, easily, and accurately find the information that is desired. After all, the bahamut Google empire has been built upon the success of Google Search and the cashflow [...]Read More »
Now that the “six-strikes” Copyright Alert System has gone live, and we know exactly how some of these alerts will look like, it’s about time that ISPs revealed how they’ll be implementing the system. Let’s go through each of the participating ISPs one by one and see how each of [...]Read More »
Apple is reportedly deleting any emails received in iCloud email accounts that contain the phrase “barely legal teen.” What makes things even more interesting is that the company is also deleting emails that are sent from iCloud accounts that contain the phrase… which is pretty much a form of censorship, [...]Read More »
Watching movies at 4K (3,840 x 2,160) resolution? Sounds great, doesn’t it? Too bad it’s gonna take quite awhile for most of us to download any movie if Sony COO, Peter Molyneux, is on-point about file size — 100GB each. Yikes.
Sony’s 4K movie service hasn’t launched yet, and we’re [...]Read More »
A couple of days ago, the “six-strikes” Copyright Alert System was officially launched in the US. But until now, all we’ve known about the system are the details of how it works and the ISPs that will be participating. We haven’t seen what an actual alert looks like.
Ars Technica[...]Read More »
We have seen plenty of accusations whirling around the interwebz blaming China for state-sponsored cyberattacks, the most significant being the report of US-based security firm Mandiant which detailes a specific unit in the Chinese military that is dedicated to cyberwar. Now China is hitting back at, claiming US-based hackers are [...]Read More »
You don’t want the super fast Internet speeds that services like Google Fiber can provide. Nope. You don’t really need that sort of thing. Only business customers do, for their business applications in their businesses. At least, that’s what Time Warner Cable thinks anyway.
Chief technology officer of Time Warner [...]Read More »
So you thought you would be safer with Flash gone and HTML5 taking over? Generally speaking, you are probably right — but not in this particular situation. Computer science graduate Feross Aboukhadijeh has demonstrated a proof-of-concept that allows websites to download unlimited amounts of data to your computer… until your [...]Read More »
Did you ever play Bomberman on the NES? There’s a good chance you have. But what you probably haven’t played yet is this new unofficial 1,000-player (yup, you read that right) online version of the game called Bombermine!
The game is just like the original, with destructible walls and tons [...]Read More »
I wouldn’t blame you if you were tired of Angry Birds. They’re everywhere! First it was just a little game on your phone, then a board game, then toys and t-shirts and all shorts of merchandise. And now, it’s finally a cartoon.
The show is called Angry Birds Toons that [...]Read More »
These are the top 20 countries that download torrents the most, and the artists whose songs are most pirated
Musicmetric, which bills itself as “the world’s most powerful artist analytics dashboard”, has recently released some interesting torrent activity data. They have compiled a list that shows the top 20 countries when it comes to downloading torrents. The list also shows the number of downloads in the past six months [...]Read More »
The Six-Strikes Anti-Piracy Program is here! We previously reported that the program was delayed to 2013, and we’ve talked plenty about how exactly it works, but the day has finally come for the system to finally go live. The bad news for those of you that hated the idea? If [...]Read More »
Nir Goldshlager runs a “Web Application Security Blog.” He’s also happened to find a variety of security holes and exploits on sites like Facebook, Twitter and PayPal. His latest discovery, however, was a glaring hole in Facebook’s OAuth system: Nir was able to find a flaw that gave him access [...]Read More »
Remember when North Korea’s only 3G carrier, Koryolink, planned to let foreigners use cellphones? It looks like they weren’t kidding, and international phone calls aren’t the only thing you’ll be able to do. Instagram-ing and tweeting from North Korea is now possible!
Read More »
My first tweet using #Koryolink’s new mobile #Internet
Music industry in New Zealand has spent $250,000 to catch illegal music downloaders. Too bad they have received only $616.57 for the effort.
In September 2011 New Zealand passed new laws that allows intellectual property owners (e.g, the music or movie industry) to send notices to New Zealand residents and citizens when suspected of illegal downloading or uploading of copyrighted content. After a person has received a third notice, the intellectual property owner [...]Read More »
We all have probably heard of so called legal extortion cases, where lawyers acting on behalf of intellectual property owners send letters to alleged illegal downloaders and ask for money or else face civil charges in court. While those types of letters may hover on the border of questionable, they [...]Read More »
60% of top 1000 YouTube videos are blocked in Germany due to aggressive copyright laws, according to study
A lot of countries get criticized for censoring the web, such as countries in Asia and the Middle East. And rightly so — censorship is not the answer for offensive or disliked content, education is. (I’m not even going to comment on using censors for political purposes.) However, not very [...]Read More »
Ever heard of six degrees of separation? It is the idea that everyone in the world is only six degrees (steps) away from each other. Professor Albert-László Barabási of Northeastern University has proposed something similar to the Internet. Except, instead of six, there are nineteen degrees.
According to Barabási, the [...]Read More »
We have had a lot of hacking stories lately on dotTech simply due to a sudden spike in public cybercrime incidents. However, by and large the most recent incidents were either low-key (e.g. Twitter attack hacked) or aimed at the corporate sector rather than ordinary citizens (e.g. Apple hack). That, [...]Read More »
What an awesome deal: ‘Deal of the Week’ at Buy.com (Rakuten.com) is Microsoft Office 365 for $99.00 instead of the regular $99.99! [Image]
From what I have read, most psychologists and other behavior experts agree that sales induce otherwise nonexistent demand. Generally speaking, when people see a product on sale or at a discounted rate, they are more likely to buy it then if it was at regular price… even if they don’t [...]Read More »
Most users today probably take for granted the fact that they can access the web at any given time with their smartphone. But there are many people out there who can’t afford to buy a smartphone, or a phone with a basic web browser.
Now, Wikipedia is aiming to bring [...]Read More »
Is China innocent? New reports claim cyber attacks on Facebook, Twitter, and Apple came from Eastern Europe
After recent cyber attacks on high-profile companies like Facebook, Twitter and then Apple, everyone seemed to be pointing fingers at China. But now reports have surfaced claiming that the attacks on those companies originated from Eastern Europe.
An Eastern European gang, that is determined to sell company secrets like research [...]Read More »
As part of CEO Marissa Meyer’s ongoing effort to bring Yahoo back to its once dominant ways on the web, the company has unveiled a newly redesigned homepage. It features a new look with cleaner lines along with a host of personalization options. They sure love redesigning stuff over there![...]Read More »
Anna Lamb-Creasey discovered that her had not only gone missing but died through the worst possible way. Local police in Clayton County for some reason decided that to inform a mother of her child’s death through a Facebook message.
Can you believe that it gets worse? They not only messaged [...]Read More »
Check out the hilarious trailer for ‘The Internship’, an upcoming movie about working at Google [Video]
The Internship is an upcoming comedy that stars Vince Vaughn, Owen Wilson and is directed by Shawn Levy. Why am I telling you about this? Because The Internship isn’t just your regular comedy, it’s a comedy that’s set in Google.
The plot sees Vaughn and Wilson’s characters losing their job [...]Read More »
Harlem shake is a dance from the 1980s from Harlem — with origins in Africa — that has recently gone viral on the web due to the countless parodies. When most people hear about something they don’t know about but want to learn, they google it. When you google a [...]Read More »
I am not sure how if the same holds true outside the United States or not, but here in the USA most Starbucks stores have free WiFi for the public to use. The idea is people can sit at Starbucks and use the WiFi on their laptops or mobile devices… [...]Read More »
Cyberattacks on the US have been traced, and all signs point to the Chinese military and a single building in China [Report]
According to report by the BBC, the origins of the unusually numerous and high-profile attacks on US companies has been found. It is indeed coming from somewhere in China — Shanghai to be exact. But it doesn’t stop there.
According to Mandiant, a US-based cyber security firm, believes that there’s [...]Read More »
Goodbye Hotmail: All Hotmail users are being forcefully moved to Outlook.com, which is now available worldwide along with its multimillion-dollar ad campaign [Video]
Microsoft is officially taking out Outlook.com’s “preview” label, and is launching the service worldwide. This also means that Hotmail users will be slowly transitioned to the new service, albeit gradually. The good news? They’ll get to keep their email addresses — whether that’s Hotmail.com, Live.com or even MSN.com, none of [...]Read More »
As I am sure most dotTechies know, a ‘CAPTCHA’ is a method used to verify that person logging in, posting, etc. is really a person and not a robot. There are various different types of CAPTCHAs but the most common is being given a picture and told to type the [...]Read More »
The Pirate Bay has filed police report against anti-piracy group for copyright infringement… because they took a little girl’s laptop
Looks like they weren’t kidding! Recall how anti-piracy group Copyright Information and Anti-Piracy Centre (CIAPC) literally copied The Pirate Bay’s (TPB) website. In response, TPB threatened to sue for copyright infringement. Now, TPB hasn’t gone as far as suing the CIAPC but, according to TPB, they’ve filed a police report [...]Read More »
Your internet slow? Check out the FCC’s study of real data speeds vs advertised speeds by broadband ISPs
The Federal Communications Commission has released its latest report on broadband ISPs in the US. The report contains some very interesting data on the the FCC’s analysis of real data speeds being provided to customers compared to the speeds being advertised by their service providers.
The download speed data provided [...]Read More »
The Singapore Police Force has reported a sudden rise in the number of “cyber blackmail” cases being reported. The cases are also similar in that the primary target are men, and that they are tricked through social media networks.
There have been 50 cases in the last year alone that [...]Read More »
As with most companies nowadays, Burger King has an official Twitter account. (Yes, even dotTech has a Twitter account even though I don’t consider us a company per se.) It is not entirely clear who did it or how they did it, but today Burger King’s Twitter was hacked… and [...]Read More »
Kim Dotcom advised his Twitter followers not to use US-based web services like Apple’s iCloud, Google Gmail and Skype because they ”provide (by law) secret & untraceable NSA backdoors to all your data.” So what will people use if they ditch those services? His next tweet provided the answer:
Read More »