Tagged With evil week 2014

0

Slacking on password security can have horrific consequences. Even so, it's easy to lose track of how many are vulnerable. With just a couple of files, you can steal passwords from nearly everywhere they're stored on a victim's Windows PC, including your own, just to see how secure they really are.

Predicting the future is near impossible -- but that doesn‘t stop us all from having a red hot go. Human beings have been predicting the future since the beginning of history and the results range from the hilarious to the downright uncanny.

One thing all future predictions have in common: they‘re rooted in our current understanding of how the world works. It‘s difficult to escape that mindset. We have no idea how technology will evolve, so our ideas are connected to the technology of today.

7

Earlier in the week, we looked at ten social media faux pas that were guaranteed to annoy your followers -- from "sexy" selfies to endless fitness updates. Sadly, we barely scraped the bottom of the barrel. Against our better judgement, we've decided to share ten more ways to be a horrible person on Facebook, Instsgram and Twitter. If you indulge in any of these practices, you've clearly taken "Evil Week" too far.

35

When we hear the words "domestic violence", we typically think of angry men with raised fists and women with bruised faces. The reality is that domestic violence manifests itself more often than not as verbal and psychological abuse, which means you could be abusing your partner or the victim of abuse without realising it. Here are some of the more subtle warning signs you should be aware of.

21

As movie studios are want to remind us, internet piracy is a crime. If you're going to commit this (vaguely) unlawful act, don't compound the infraction by stealing a really crap movie. Here are ten films that absolutely nobody should seek to obtain -- legally or otherwise.

8

Your home network is your fortress. Inside it lies tons of valuable information -- unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose. Let's talk about how you can, with the power of evil, sniff around your home network to make sure you don't have any uninvited guests.