!Cool Resources

2425 bookmarks
Newest
PirateBox Delivers Brand New Anonymous Sharing Release
PirateBox Delivers Brand New Anonymous Sharing Release
In 2012 a device called PirateBox excited users with the prospect of anonymous wireless file-sharing anywhere, no Internet required, and at a cost of just a few dollars. Now the project has released PirateBox 1.0 and a brand new website. TorrentFreak caught up with PirateBox founder David Darts for the lowdown.
·torrentfreak.com·
PirateBox Delivers Brand New Anonymous Sharing Release
Excellent TED Ed Talks to Improve Students Writing
Excellent TED Ed Talks to Improve Students Writing
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
·educatorstechnology.com·
Excellent TED Ed Talks to Improve Students Writing
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
San Francisco - The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying – the government itself has admitted to it in recent court filings. In a brief filed today in response to this illegal...
·eff.org·
EFF to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
Why Chromebooks
Why Chromebooks
At the beginning of Term 1 2014, McKinnon Secondary College was involved in the first large scale roll out of Chromebooks in Australia. The role of technology in education is tough. It’s widely…
·medium.com·
Why Chromebooks
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
I remember fondly two years ago, when 2-Factor-Authentication (2FA) became popular and well used across major web applications (Google, Facebook, Yahoo and others). I found, my naive sixteen year old self unable to come to terms for why the genius idea had not been thought of before. At the time, I felt that 2FA was that golden shield you could cover yourself with and defend against some of the most sophisticated phishing attacks calmly. Whilst 2FA can still be that golden shield to the critica
·shubh.am·
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
Glenn Greenwald: how the NSA tampers with US-made internet routers
Glenn Greenwald: how the NSA tampers with US-made internet routers
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
·theguardian.com·
Glenn Greenwald: how the NSA tampers with US-made internet routers
The Four Pillars of Flipped Learning
The Four Pillars of Flipped Learning
Explore our comprehensive collection of classroom resources, including classroom posters, engaging activities, classroom management techniques, and more. Enhance your teaching and inspire your students with these valuable insights.
·educatorstechnology.com·
The Four Pillars of Flipped Learning