Just as you can drive a car without being a mechanic, you can also set up a website without understanding how all of the components under the hood work. While moving my sites to a new server (moved to a Hybrid server with WiredTree to reduce my costs), I was testing its performance and looked to optimize its speed. One place that popped out as an area that could be improved was … [Read more...]
Archives for May 2013
Product Review: Logitech G500s Laser Mouse
Following Logitech's announcement about the availability of their G line of products, they offered a G500s Laser Gaming Mouse to test and review. Until the G500s arrived, I have been using the Logitech G5 Laser Mouse for the past six years. It is durable, precise, corded, and works great. That actually set the benchmark higher for the G500s Laser Gaming Mouse in order for it to … [Read more...]
From Adobe MAX: say goodbye to Creative Suite, hello to Creative Cloud
Adobe's conference, Adobe Max 2013, began yesterday and there were a lot of announcements headed our way. The biggest announcement is that the Creative Suite line is fading away with CS6 being the last. In its place, Adobe is betting the company on the subscription model like Office 365 in the form of Adobe Creative Cloud. In addition, Adobe announced major updates to the … [Read more...]
Understanding the fine print in a Privacy Policy
Are you a compulsive liar? Do you consistently click 'I Agree' to having read the Terms of Service or Privacy Policy of a website or application even though you haven't? The Zero Knowledge Privacy Foundation provided a slideshow that covers the Privacy Policy that is very familiar to all of us yet still remains a mystery. For those of us who are not lawyers, understanding the … [Read more...]
Bug Hunters [infographic]
Bug bounties have become a big part of the strategy for companies to get security researchers on their side. While there are many bugs out there that fetch a higher price in the shady back channels than the bug bounties, at least the researchers are awarded something for responsibly disclosing the vulnerability to the company. Pwn2Own is one event we have seen is centered … [Read more...]



