Daily Spotlight on Education 05/18/2009
Yeah, I can now fix the ethernet in the office I tried to do from memory watching the guy who wired the school! Lots of summer projects coming here. Want to wire the xbox so we can watch netflix on it this summer.
Lifehacker - Alpha Geek: How to digitize cassette tapes - Alpha Geek
I plan to convert my cassette tapes from growing up this summer - we made tons of interviews each Christmas.
Repair4Laptop: How to Make a Digital Picture Frame - DPF from an Old Laptop or Notebook
These are very do it yourself picture frames.
Rockbox - Open Source Jukebox Firmware
This program lets you kick up your mp3 player a bit. Not sure that I will put it on my ipod but planning to install on an old iriver.
5 Ways to Retrieve Data Off a Crashed Hard Drive - LaptopLogic.com
There are inexpensive programs that you can use to do this - it helped us with a personnel matter quite a few years back - I think every IT person should have such a program and every teacher should understand that it is possible for such a program to be used. I teach my students that everything ever saved on a hard drive can be retrieved - be careful.
How to hide files in JPEG pictures
So, learn to hide your financial files backup after you did your taxes in that old picture of you and Grandma.
OK, now this is very cool - you can hide files inside JPEG pictures. To me, it is not possible to have too many backups - of your tax records, your financial records, etc. Although this method isn't perfect, it would require maximum geekiness to sniff out and find.You can download Tor and put it on a USB drive to use it when traveling if required.
A leading proxy system for privately surfing - not saying you'd need this. Tor is a registered 501(c)(3) nonprofit with the purpose of protecting your INternet traffic from analysis.
64 Things Every Geek Should Know - LaptopLogic.com
Cool article that covers a lot of things that people should know - whether you mind being called a geek or not. Very interesting reading.
If you can stomach the fact that they said P2P was Person to Person instead of Peer to Peer in #1 and the fact that these link to other articles that you have to dig into, it is still worth reading.How to defeat most keyloggers on public computers
How to defeat keyloggers on public computers - this is a fascinating article. To me the best advice is still when on public computers not to log into anything that needs to stay secure, particularly accounts you've used a high security password. If you have to - change the password the next time you log on at home or work - IMMEDIATELY!
Posted from Diigo. The rest of my favorite links are here.