Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
W

William Putman

@William Putman
About
Posts
3
Topics
0
Shares
0
Groups
0
Followers
0
Following
0

Posts

Recent Best Controversial

  • Looking for VPN recommendations
    W William Putman

    I have used PIA over a year and recommend it. But you also asked about TOR. PIA provides privacy so that your internet provider can't spy on you. It also provides encryption so you are safe on public Wifi. However, your browser also collects data on your browsing habits, so something like TOR is extremely valuable, in addition to a VPN. I don't use TOR, but I configured my browsers (both Chrome and Firefox) to clear my browsing history when I exit.

    The Lounge question csharp architecture help

  • Please fire the person in Microsoft that thought the charms thing is ok
    W William Putman

    Completely agree. Charms does not work very good on desktops without a touchscreen. Most Microsoft consumers used desktops, so why alienate those people. I have to say it, Charms is not charming.

    The Lounge com design sysadmin windows-admin data-structures

  • How to inform about a website that it can be hacked?
    W William Putman

    It's sad that people are prosecuted for trying to help. Here are some ideas. 1. Go to a cyber cafe. 2. Don't use your real name. 3. Change your computer name to something unrelated to your real identity. 4. Override your MAC address 5. Connect to the cyber cafe internet. 6. Use a temporary email account 7. Send the company an email and explain the problem. I would be honest about the steps you took to conceal your identity and the reason why you did it. 8. After the email, put everything on your computer back the way it was.

    The Lounge question database testing beta-testing tutorial
  • Login

  • Don't have an account? Register

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups