Tagged With au

0

For as long as I can remember, PC makers have been looking for a single cable/connector combination that can be used for video, peripherals, power and other I/O functions. Thunderbolt 3 with USB-C connectors brings us close to realising that dream. And to help with that Intel is planning to do two things: integrate Thunderbolt 3 into CPUs and releasing the Thunderbolt Protocol Specification to industry.

0

Foreplay is something that you don’t even have to think about in the early stages of a relationship. Getting turned on just by holding hands and being together, leading onto kissing, stroking and then the removal of clothes for even more intimate touching - all that spine-tingling good stuff generally comes pretty naturally while you’re still getting to know each other. This guide is aimed at everybody else.

0

WordPress blogs are complex pieces of software with a threat surface that expands with each plug-in or theme you install. Whenever I set up a new WordPress site, one of the first things I install is Wordfence - a security plug-in that provides a number of services that help me monitor and manage those sites. Wordfence has launched a WordPress Security Audit service.

0

We all know eating vegetables is a good way to improve health. And for many years the focus has been on just eating more vegetables, be it fresh, frozen or tinned. But what if there was a quicker and easier way to get more benefit from our vegetables? Can the way we prepare vegetables boost their nutrition? Does tearing or chopping your lettuce makes any difference? And if we chop, does it matter what type of knife we use?

1

Most of us have a pretty good understanding of how the internet works - but it can be notoriously difficult to explain in plain English. This infographic from Internet.Frontier does a pretty good job of breaking it all down in easy to understand language.

9

Dear Lifehacker, I always take my thumb drive wherever I go. I'm also a bit absentminded. I want to guarantee my thumb drive gets returned to me if I ever lose it. My idea is to have malware hidden on the drive in a specific folder labelled 'porn101' or 'myprivatefiles'. If the person opens that file, it will automatically encrypt their computer and ask them to email me to get the unlock code. (I will give it to them once they return the thumb drive to me, of course.)

Which brings me to my question - is this legal? It's not like I'm demanding money or anything. I just want my property back!

1

One of the primary vehicles used by bad guys to access our systems is stealing log-in credentials in order to impersonate real users. All the security processes and tools in the world are circumvented when someone has your username and password. That's where two-factor authentication (2FA) comes into play. 2FA works by adding another authentication challenge to the equation. It's not just about what you know - your password, it's also about something you have. That's where the authenticator apps from Microsoft and Google come into play.

0

It's likely that you've got details of your whole life stored on your phone — the people you know, the banks you've used, the videos you've wasted hours watching — and you don't necessarily want that info getting out into the wider world. If you're keen to lock down your handset against unwelcome visitors, you need to take a few steps.

2

Samsung and Apple have enjoyed dominance of the smartphone market for some time. But that is changing according to data from Gartner. Both companies saw their quarterly shipments fall compared to the same period last year with their rivals Huawei, Oppo and Vivo all showing solid growth over the same period.

0

Personally, I need breakfast. Almost every morning, I wake up early feeling hungry, and it’s only once I banish my morning hunger that I’m ready to fire. By mid-morning, I take a break and enjoy a snack.

I’ve used a personal anecdote because it’s likely that eating breakfast – or skipping it – may simply reflect a personal preference for timing food intake. Not everyone enjoys eating first thing in the morning. But your first choice of foods may contribute to an overall healthy diet.

0

A new piece of research from Data 61, the digital research arm of CSIRO, has found the energy patterns we generate when we walk can be used to power mobile devices and to authenticate our identity. It turns out we have, in Star Trek parlance, unique energy signatures.

0

It seems barely a day goes by without some new "miracle" diet littering our social media feed. Some are very well known (hello, paleo) while others are slowly gaining traction (the 'blood type' diet.) One thing that most of them share in common is a lack of rigorous scientific research. This infographic pits seven popular diets against the expertise of a professional nutritionist.

0

It can be tricky to move into your dream industry once you've already built your adult life. Maybe you already have an established career. Perhaps you have kids. You might even be stuck in a job you hate, but need it to pay the bills.

But it's not impossible to make a change. You do have options. Course or education providers like Upskilled offer Australians online study options so you can upgrade your career, or perhaps find a new one. All from the comfort of your home. Here's what you need to know.

1

I was once told the best time to buy new tech is tomorrow and the best time to sell the tech you no longer need is yesterday. With most tech hardware products refreshed annually it seems almost impossible to perfectly match your buying patterns to the release cycles of hardware manufacturers. Today's announcement of the new Surface Pro had me thinking - how do you ensure you're getting the best bang for buck when buying new hardware?