Search TekSocial
Stay Connected

Enter your email address:

(We respect your privacy!)

Or subscribe with your favorite RSS Reader

  

Entries in Infographic (21)

3:01PM

Five New Technologies to Manage a Zombie Apocalypse

If the zombie apocalpyse really does happen we all want to be prepared right? According to the infographic below, technology should be our best friend if the zombies take over.

Check out the infographic below presented by Emergency-Management-Degree.org  to learn about five new technologies that will help us manage a zombie apocalypse.

5 New Technologies to Manage a Zombie Apocalypse

4:14PM

The Anatomy of a Tweet Cheatsheet

Twiiter has been redesigned quite a few times, added and removed some features... It's easy to gte lost especially if you are beginner.. So what does one Tweet consist of? Here's a simple cheatsheet that will help you out:

Anatomy of a Tweet Cheatsheet

Futher reading:

I hope it will help you or your friends to understand how Twitter works!

8:45PM

Demand for Ethical Hackers is Growing in the U.S.

While hackers are often associated with malicious acts, such as denial-of-service attacks and posting private information on the web, there are some “white hat” hackers which help governments and companies locate potential security vulnerabilities in their systems and respond to any security breaches that could happen.

As the United States government is facing a growing threat from cybercriminals, it also needs people that know how to secure their systems. However, the government has a lot less security experts than it needs. In 2010, it needed 20,000 security experts, but only had around 1,000 of them. Due to this growing demand, the American government is working hard to put forward programs that will create a new generation of ethical hackers. But who are these white hat hackers?

Click to read more ...

11:36PM

Email Use and Security [Infographic]

Almost every day we use our email addresses. We use them to communicate with others, to send and receive files and to sign-up/login on other sites and services, like social networks. Because they are linked to so many different accounts. and it's normally needed to login, some would even say an email address is an access gateway to the internet.

Stephanie Garcia of simpleemails.org has pieced together this cool infographic about email use from around the world and uploaded in to the gallery on Visual.ly.

 

Click to read more ...

11:11AM

Only Time Will Tell if MEGA Has Staying Power

Megaupload was one of the most popular file-sharing services, until it was shut down. Its founder, Kim Dotcom, has been hailed as a pioneer and a lawbreaker around the world. Dotcom's new service, MEGA, seeks to do what Megaupload never did: Protect users and Dotcom from the legal ramifications of file sharing online.

Click to read more ...