Implementing virtualization: Techniques and Tools for Microsoft Windows Conversion

Since a lot of you guys are IT professionals, I thought I would point you to an interesting whitepaper we have on our free magazine portal. Here’s a short summary. Most IT professionals know or suspect that virtualization of computer systems may have an important role in their organization’s evolving infrastructure – though where and […]



Mastering the Costanza: Eight Steps to Beating a Lie Detector

By JR Raphael Contributing Writer, [GAS] Ah, the mystery of the lie detector. Can it really be beaten? George Constanza said trying to learn would be like asking Pavarotti to teach you his tricks. Well, grab your microphone and get ready. It’s time for you to hit the stage. The basics To beat a polygraph, […]

FBI Warns Wi-Fi Users to be Wary of Public Hot Spots

With the increasing amount of WiFi hot spots everywhere, the FBI is warning people to be careful when connecting to unknown wireless networks. Without the proper protection, it is fairly easy for a villain to capture information broadcasted from your system while being connected to a rogue or compromised access point. Since most laptops are […]



Build a Whole New Identity to Protect Yourself Online

By Mark O’Neill No, the title of this article is not the way it sounds.   I’m not advocating anything illegal.   I’m not offering any fake passports or dodgy driving licenses.   But instead, when you’re filling in another one of those endless web forms asking for your contact information, instead of giving them your actual details, […]

Drift off to sleep with Ambient Skype

By Mark O’Neill When the cost of bandwidth is virtually next to nothing these days, couples who find themselves apart are using Skype to recreate that “at home” feeling. It even has a name – Ambient Skype. Basically you leave the app constantly running on your computer as background noise. Since Skype-to-Skype calls are free, […]