Our Top Stories | IRS Helps Bust 105 People in Massive Identity Theft Crackdown The Internal Revenue Service and the Department of Justice teamed up for a coast-to-coast crackdown on identity thieves this week. Share: | Facebook Files for IPO, Reveals $3.7 Billion Revenue Facebook filed papers Wednesday to become a public company, in the most anticipated IPO in a decade. Share: | Root Your Android Phone: Tips and Tricks Sick of waiting for your wireless carrier to upgrade your Android phone's firmware? Here is how to do it yourself via rooting your phone. Share: | Apple Boycott Urged Over Foxconn Investigation Reports of mistreatment of workers at the company's manufacturing chain are prompting inquiries and objections. Share: | RFID Credit Cards Are Easy Prey for Hackers, Demo Shows With a simple hack and minimal equipment, a security researcher demonstrates how easily thieves can make your data their own. Share: | Apple Accused of Ignoring 'Human Cost' of Manufacturing Some former executives and contractors join in the chorus questioning the operations of Apple's international suppliers. Share: | 5 Key Points From Google's Privacy-Policy Letter to Congress Google sent a 13-page letter to Congress this week that can be summarized in a single sentence: "We're not being evil." Share: | Microsoft Office 15 Begins Technical Preview: Tablet Readiness Questioned As Microsoft readies its Office 15 suite (expected late 2012 or 2013) many wonder if the launch timeline hints to the arrival of Windows 8 tablets. Share: | 9 'University Researcher Approved' Tips for Awesome Tweeting Researchers from Carnegie Mellon, the Massachusetts Institute of Technology, and Georgia Tech have issued a list of 9 tips for better tweeting based on a study of Twitter usefulness. Share: | Security Slackers Risk Internet Blackout on March 8 If feds pull down temporary network as planned, machines infected with DNSChanger Trojan won't be able to access the Web. Share: | Android Isn't as Fragmented as You Think, Report Says On both smartphones and tablets, a few OS versions and hardware specs dominate the landscape, according to new data. Share: | Microsoft Researchers Say Anonymized Data Isn't So Anonymous Data routinely gathered in Web logs - IP address, cookie ID, operating system, browser type, user-agent strings - can threaten online privacy because they can be used to identify the activity of individual machines, Microsoft researchers say. Share: | 2012: The Year Storage Becomes a Celebrity While data storage has always been a necessary building block for technology, it's rarely garnered as much attention as it has in the past two years. Share: | VeriSign Admits Multiple Hacks in 2010, Keeps Details Under Wraps VeriSign, the company responsible for guiding most of the world's Internet users to the correct websites and once the largest encryption certificate issuing... Share: | Is Google Evil? The Jury Is Out Google's changes to its privacy policy should have been expected. It's what any corporation intent on maximizing value would do. But does that make it right? Share: | 4 Ways to Prevent Domain Name Hijacking A company's domain name is one of its most valuable assets, yet businesses do little to protect them from being hijacked. Here are four tips to protect your domain. Share: | Married to Your Desk? 5 Tips for a Better Relationship Optimize your work area for better productivity -- no 'standing desk' required. Share: | What Facebook's IPO Means for Users Facebook's decision to become a public company is seen as a bellwether for Web 2.0 stock offerings, but what will it mean for the social networking giant's 800 million users, and for the companies that build third-party apps for the site? Share: | For Sony's New CEO, a Big Challenge is in Your Living Room Sony's new CEO faces a myriad of problems -- stemming massive losses, snatching the momentum back from deep-pocketed rivals, unifying his firm's diffuse businesses. Share: | Buyer Beware: 6 Dead Giveaways that a Review Is Fake In the wake of revelations that some vendors may be buying good customer feedback, here are some tips to help you avoid being duped by fake reviews. Share: | | | Sponsored Downloads | Track Your TradesTake the drudge work out of completing Schedule D (Capital gains and losses). Created for investors, traders, and tax professionals, TYT supports stocks, options, mutual funds, short sales, wash sales, FIFO cost basis, LIFO cost basis and more. (Compatibility: Windows 95/98/ME,Windows NT/2000,Windows XP,Windows Vista,Windows 7) PCWorld newsletter subscribers use discount code TYT-DNW3 to get 30% off! | BackupChangesAutomatically backup changed or new files. With a variety of settings available you can specify what files to backup, where to put them and then easily run a backup every time you need to protect your work. (Compatibility: Windows 95/98/ME,Windows NT/2000,Windows XP,Windows NT/2000/2003/SBS2003,Windows Vista) 70% off for PCWorld newsletter susbcribers who use discount code AKSL-0J0E-BCUP! | | |
Newsletter Subscription Resources | You are subscribed to this newsletter as: irani.bharath.good@blogger.com To add or remove newsletters, change your address, or change your format (HTML or text-only), please go here. If you have questions or comments about PCWorld e-mail newsletters, please contact: webmaster@pcworld.com PCWorld Privacy Policy © 2012 PCWorld Communications, Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of PCWorld Communications, Inc. is prohibited. PCWorld is a registered trademark of International Data Group, Inc. All other trademarks used on PCWorld are the property of their respective owners. PCWorld Communications, Inc., 501 2nd St., San Francisco, CA 94107. | |
No comments:
Post a Comment