YOU MAY HAVE TO COPY AND PASTE THE LINK SHOWN INTO YOUR BROWSER TO FOLLOW THE LINKS. SOMETHING IS HINKY, LATELY. TRY A RIGHT CLICK ON THE TINY BLUE TEXT..AND open in a new tab FROM THE DROP DOWN MENU.
SEQUIMTECH BLOG - a.k.a. STB
On line since JUNE of 2006.
USE SEARCH TOOL In top of column on the LEFT.
Thursday, April 30, 2015
Wednesday, April 29, 2015
Tuesday, April 28, 2015
Monday, April 27, 2015
Sunday, April 26, 2015
ARC Welder - Chrome Web Store
ARC Welder - Chrome Web Store
Introducing ARC Welder -- a tool to help you test and publish your Android Apps to Chrome OS using the App Runtime for Chrome (beta), ARC.
Saturday, April 25, 2015
Google's Subscription Ad-Blocking Service Arrives In Beta 04/24/2015
Google's Subscription Ad-Blocking Service Arrives In Beta 04/24/2015
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Wednesday, April 22, 2015
assets.lapdonline.org/assets/pdf/hobby_shops.pdf
assets.lapdonline.org/assets/pdf/hobby_shops.pdf
followed from From Communities Against Terrorism, Los Angeles
followed from From Communities Against Terrorism, Los Angeles
Project PM
Project PM Project PM operates this wiki in order to provide a centralized, actionable data set regarding the intelligence contracting industry, the PR industry's interface with totalitarian regimes, the mushrooming infosec/"cybersecurity" industry, and other issues constituting threats to human rights, civic transparency, individual privacy, and the health of democratic institutions.
Tuesday, April 21, 2015
Monday, April 20, 2015
Sunday, April 19, 2015
Take Your Productivity to the Next Level by Using Multiple Screens
Take Your Productivity to the Next Level by Using Multiple Screens
Nothing like an abundance of visual real estate.
Nothing like an abundance of visual real estate.
Saturday, April 18, 2015
Friday, April 17, 2015
Large scale Windows SMB vulnerability puts user login credentials at risk | Emsisoft Blog
Large scale Windows SMB vulnerability puts user login credentials at risk | Emsisoft Blog
While we wait for a patch, the simplest solution is to completely block outbound traffic from the ports TCP 139 and TCP 445 using a firewall. Hopefully Microsoft will take this major security issue seriously and release a fix soon.
While we wait for a patch, the simplest solution is to completely block outbound traffic from the ports TCP 139 and TCP 445 using a firewall. Hopefully Microsoft will take this major security issue seriously and release a fix soon.
New Cryptolocker copycat PClock2 discovered that targets over 2,500 file extensions | Emsisoft Blog
New Cryptolocker copycat PClock2 discovered that targets over 2,500 file extensions | Emsisoft Blog
Luckily PCLock2 is nowhere near as powerful as it claims to be and none of your files have actually been damaged. Our malware research team has designed a decrypter that will allow you to easily restore your locked files, without paying the ransom. You can download the decrypter here.
Luckily PCLock2 is nowhere near as powerful as it claims to be and none of your files have actually been damaged. Our malware research team has designed a decrypter that will allow you to easily restore your locked files, without paying the ransom. You can download the decrypter here.
Popular Chrome extension turns out to be Spyware! | Emsisoft Blog
Popular Chrome extension turns out to be Spyware! | Emsisoft Blog
To avoid any security check or detection mechanism from Google, Webpage Screenshot includes a sleep function, so that the spyware-like behavior will not be activated right away, but a week later.”
To avoid any security check or detection mechanism from Google, Webpage Screenshot includes a sleep function, so that the spyware-like behavior will not be activated right away, but a week later.”
Thursday, April 16, 2015
Wednesday, April 15, 2015
Monday, April 13, 2015
Sunday, April 12, 2015
Saturday, April 11, 2015
Thursday, April 9, 2015
Wednesday, April 8, 2015
Tuesday, April 7, 2015
Sunday, April 5, 2015
Saturday, April 4, 2015
Friday, April 3, 2015
Thursday, April 2, 2015
Wednesday, April 1, 2015
Subscribe to:
Posts (Atom)
Blog Archive
-
▼
2015
(991)
-
▼
April
(81)
- Upgrade Your Skills with the Best Microsoft Office...
- Getting Started with Audiobooks: How to Finally Fi...
- The best way to manage your photos online in 2015 ...
- Sarang Consulting Word Morphing
- 5 Sites to Encrypt and Share Photos, IMs, Emails, ...
- Why I'm Blocking Email For 6 Hours A Day
- The Best DIY YouTube Channels to Turn You Into a F...
- Dan Rodney: instructor, web developer, designer
- Clone Zone
- Computer Parts, Cables and Hard to Find Computer A...
- ARC Welder - Chrome Web Store
- What The Internet Thinks About - Interactive Infog...
- 5 GIF Search Engines & Tools You Haven't Heard Of Yet
- Google's Subscription Ad-Blocking Service Arrives ...
- Ubuntu 15.04 (Vivid Vervet) released
- Beyond PowerPoint: 4 Linux Presentation Tools
- The U.S.'s Century-Old Snail Mail Surveillance Spa...
- assets.lapdonline.org/assets/pdf/hobby_shops.pdf
- Project PM
- Blur - Google searches
- Watchkin - Watch videos without distractions
- Clear beta - App
- The 6 Best Sites for Keeping Up-To-Date with Finan...
- NirCmd - Windows command line tool
- How to Change Your Password on Any Desktop or Mobi...
- Keyboard Shortcuts TB | Thunderbird Help
- Ten Ways to Make Your Website More Mobile Friendly
- Typewolf → A Comprehensive Guide to Smart Quotes, ...
- Edit PDF Files (For Free) | Ubergizmo
- Google now lets you export your search history | V...
- Video Capture Software. Video, Webcam or Screen Re...
- Google's 'balloon-powered internet for all' is alm...
- New Toshiba Breakthrough Could Kill the Hard Drive...
- 4 Reasons Why Vinyl Is Better Than Digital
- Take Your Productivity to the Next Level by Using ...
- wd40 2000 uses
- Enrico Caruso Arias and Songs
- Large scale Windows SMB vulnerability puts user lo...
- New Cryptolocker copycat PClock2 discovered that t...
- Popular Chrome extension turns out to be Spyware! ...
- Instya MultiSearch
- Bina 48 Meets Bina Rothblatt - Part Two - YouTube
- Screen Capturing is Easy with These 4 Firefox Tools
- Who Are The Scammers? Following The Money Stolen a...
- 3D Printer for 449$
- What Makes a Good Programming Tutorial?
- Should You Refresh, Reset, Restore, or Reinstall W...
- 80 Twitter Tools for Almost Everything - Hongkiat
- Meegopad T01 – Q. How small can a Windows PC get? ...
- Forget Google Translate: 3 Ways to Get an Accurate...
- News and Publications | HathiTrust Digital Library
- How to Embed YouTube Videos Responsively without I...
- Doing Your Taxes? 5 Excel Formulas You Must Know
- 5 Reasons Why Developers Are Frustrated By The App...
- A few spy tools for your operating system (other t...
- dupeGuru - Duplicate file scanner
- Malware: How an accountant's computer might unknow...
- How Do You Know If Your New PC Is Secure?
- How to Use Twitter (with Cheat Sheet) - wikiHow
- WD: Frequently Asked Questions About Word Macro Vi...
- Yes, You Are Googling Yourself Stupid | GOOD
- This working computer is smaller than a grain of r...
- 4 Best Apps for Sharing Large Files Instantly
- Microsoft's new browser won't enable 'Do Not Track...
- Three Websites That Offer Free Fonts [FREEWARE] | ...
- All the World's Volcano Webcams | WIRED
- Share Your Smartphone's Internet Connection
- Amazon Mechanical Turk - Welcome
- How to Hide & Protect Your Data in Windows
- What's a NUC, And Why Would You Want One?
- Index of /roads
- NAS vs the Cloud: Which Remote Storage Is Right fo...
- Need More Time? Try These 7 Remarkable Chrome Time...
- FonteMutante
- Windows - Virtual x86
- Public apps
- AddALL book search and price comparison
- BooksPrice - Book Price Comparison - Compare Book ...
- The Best Ways to Sell Books Online
- Do You Know How to Create the Perfect Twitter Post?
- Google Gold: 15 Essential Chrome Extensions
-
▼
April
(81)