Evernote and Feedly Hacked, Attackers Hold Sites for Ransom
!Cool Resources
TweetDeck Vulnerability Opens User Accounts To Hackers
A "cross-site scripting" vulnerability apparently left the social media service interface open to attacks.
Circumvent Wi-Fi Time Limits at Coffee Shops by Spoofing Your MAC Address
It's great that coffee shops offer free Wi-Fi to customers, but many are starting to employ time limits to limit how long you spend in their establish
Feds swoop in, snatch mobile phone tracking records away from ACLU
Email Self-Defense - a guide to fighting surveillance with GnuPG
Email surveillance violates our fundamental
rights and makes free speech risky. This guide will teach you email
self-defense in 40 minutes with GnuPG.
Your Android phone, now with NSA-grade security
You now get NSA-grade encryption on your Android device in less than one minute.
'Squalid And Rancid' Government Spying Must Be Stopped, Says Stephen Fry
'Squalid And Rancid' Government Spying Must Be Stopped, Says Stephen Fry
7 Ways to Break Destructive Patterns - Leadership Freak
Lousy leaders solve the same problems over and over.
Why I'm sending 200 copies of Little Brother to a high-school in Pensacola,
The principal of Booker T Washington High in Pensacola FL cancelled the school's One School/One Book summer reading program rather than letting all the kids go through with the previously approved assignment to read Little Brother, the bestselling young adult novel by Cory Doctorow. With Cory and Tor Books' help, the teachers are fighting back.
Animal Farm: Watch the Animated Adaptation of Orwell’s Novel Funded by the
Built Not Bought #spurs #leadership #nbafinals
Now, before you Miami Heat folks freak out about the Spurs trouncing the Miami professional basketball team last night, or before the Spurs fans freak out that this post isn’t about them, I&#…
Guardian launches SecureDrop system for whistleblowers to share files
SecureDrop platform allows sources to submit documents and data while avoiding most common forms of online tracking
Research Reveals Why People Avoid Taking Positive Action
OpenSSL Flaw Discovered: Patch Now
In the wake of the Heartbleed flaw, a researcher finds new weaknesses in OpenSSL that could be exploited to launch man-in-the-middle attacks,
YesAllWomen and Ed-Tech Conferences, or Why ISTE is Unsafe
Update 6/11/2014: ISTE has added a Code of Conduct to the website for its 2014 conference#YesAllWomen in ed-techEarlier this week, Ariel Norling published an incredibly brave article — an inc...
The Five Dumbest Ways That People Defend NSA Spying
Over the past year, as the Snowden revelations have rolled out, the government and its apologists have developed a set of talking points about mass spying
Zombie Pedagogies: Embodied Learning in the Digital Age
The document explores the concept of 'zombie pedagogies' within the context of digital learning, emphasizing the intersection of physical and virtual spaces in education. It critiques the disembodiment of teaching and learning facilitated by technology, arguing for a more engaged and hybrid approach to pedagogy. The author, Jesse Stommel, invites educators to confront the complexities of technology and to recognize the ongoing relationships and decay inherent in both human and educational bodies.
Guest Post: Is Snowden Obliged to Accept Punishment?
This is Secretary of State John Kerry’s answer, given May 28 on CBS This Morning: “He should man up, come back to the United States. If he has a complaint about what’s wrong with American surveillance, come back here and stand in our system of justice and make his case. But instead, he’s just sitting […]
Leadership is Not What You Think it is
Leadership is not celebrating victory at the end of the battle. …it’s the sleepless nights mourning the lives your decisions cost. It’s not standing on stage in front of thousands of people. …it’s knowing others talk about you behind your back, to achieve their own objectives. It’s not having your name in the history books. …it’s the […]
5 Common Server Setups For Your Web Application
When deciding which server architecture to use for your environment, there are many factors to consider, such as performance, scalability, availability, reliability, cost, and ease of management. Here is a list of commonly used server setups, with a short description of each, including pros and cons. Keep in mind that all of the concepts covered here can be used in various combinations with one another, and there is no single, correct configuration.
Concealed-carry permits skyrocket, especially for women | Seattle Times Mob
Meet the Man Hired to Make Sure the Snowden Docs Aren't Hacked
N.S.A. Collecting Millions of Faces From Web Images
The National Security Agency’s reliance on facial recognition technology has grown as it has used new software to exploit images in emails, text messages, social media, videoconferences and other communications.
http://www.ascd.org/publications/educational-leadership/sept09/vol67/num01/Navigating-the-Cs-of-Change.aspx
The Best Teams Hold Themselves Accountable
It’s the boss’s job to make sure they can.
FullDiskEncryptionHowto - Community Help Wiki
Don't trust TrueCrypt anymore. Take a look at a few of the options available to you.
15 percent of U.S. consumers had their personal data breached last year, mo
According to a new survey by Consumer Reports, 15 percent of all U.S. consumers were victims of personal data breaches in 2013.
New Federal Database Will Track Americans' Credit Ratings, Other Financial
Syncthing: An Open Source Alternative for Dropbox and BitTorrent Sync
An Introvert's Guide to Networking
Andrea Deets is the Lead Writer at Crew, an invite-only network connecting short-term software projects with handpicked developers and designers. This post originally appeared on the ...