It All Comes Together: Laptop roundup

It All Comes Together: Laptop roundup – Secure your laptop with the LaptopLock“Don’t let the creep who stole your computer paw through your private files, passwords and personal information.” Turn a t-shirt into a keyboard cover“Great for saving your lappie’s screen from keyboard scratches with an old or free tee, this project requires only a bit of cutting, ironing and sewing.” Stuff We Like: Laptop CushTop“Man, there’s nothing worse than frying your thighs with a hot laptop in the middle of some very important web surfing.” DIY magnetic power connector“If you’re familiar with the MagSafe magnetic connectors on the new MacBooks, this is a DIY version for Thinkpads.” Use your laptop as a giant clock“To always end your presentation on time without glancing at your watch (a gesture that communicates to the audience that you can’t wait to finish and leave), place a laptop on the floor in front of where you’re speaking, and set it up to display a giant clock.” Make your own laptop stand“I’ve always liked the iLap laptop stands, but I’ve never been able to justify the price…” Laptop Troubleshooting Tip: Re-seat your RAM“…the moral of the story might save you a trip to the computer hospital..” Video demonstration: Fix your wine-soaked laptop“Save your laptop from the heartbreak of liquid spills.” MacGyver Tip: Silence your laptop with snipped headphones“Repurpose those old crappy earphones into a laptop silencer.” How to secure your laptop for air travelPack laptops with soft foam or bubble wrap and place laptop bags inside other luggage to protect them from rough handling and to keep them inconspicuous.” Use your cell phone as a modem“You’re stuck with the laptop in the land of no Internet, but you’ve got unlimited minutes or a great data plan on your cell phone.” [LifeHacker]
It All Comes Together: Laptop roundup

[LifeHacker]

0 Shares:
You May Also Like

Featured Mac Download: Monitor your Mac with iStat menus

Featured Mac Download: Monitor your Mac with iStat menus - istat-menus.png

Mac OS X only: Donationware application iStat menus integrates system statistics like CPU, RAM, HD, and Network usage into your Mac's menubar.

iStat menus is completely customizable, so you can include only those stats that you want (enabling all of the available stats would mean a lot of menubar clutter). In the past we discussed how to display your system activity in the dock, but iStat menus takes this idea to an entirely new level of system monitoring. iStat menus is donationware, Mac OS X only.

[LifeHacker]

New LinuxCOE helps admins customize distros

This is a really neat idea. You can roll all of your scripted installations for all of your distributions into one application, instead of configuring each distributions application. For example, if you wanted to install RedHat, you no longer need Kickstart. The same would go for Ubuntu, no more preseed. Just one application to handle all of the scripted installations.
New LinuxCOE helps admins customize distros - Hewlett-Packard released version 4 of its Linux Common Operating Environment (LinuxCOE) software this month. LinuxCOE is a front end to a set of Perl scripts that helps administrators by building customized install images for various Linux... [Linux.com]

New Zealand teenager arrested as Botnet Leader

A New Zealand teenager was arrested and then freed of charges today for allegedly being the Leader of a Bot/Spybot network. The New Zealand E-crime unit arrested the teenager on suspicion of stealing over 9.7 Million Pounds from bank accounts around the world and breaking into an estimated 1.3 Million computers. The full quote from the Guardian..

Network Solutions (NSI) is registering every domain name checked throug their WHOIS

I always thought there was something really strange about the WHOIS searches done at Registrars. Specifically the searches would have to be done on their website, a normal "whois" lookup through Linux wouldn't show up registered the next day.
A story is developing regarding domain name registrar Network Solutions front running domains. According to multiple sources on DomainState.com, it appears that domains searched via NSI are being purchased by the registrar thereby preventing a registrant from purchasing it at any other registrar other than NSI. As an example, a random domain which DNN searches such as HowDoesThisDomainTasteTaste.com can be seen in this whois search to now be unavailable to register at other registrars but at NSI it can be purchased
Full article at domainnamenews.com

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]