Monthly Archives: December 2015

Dragon speech recognition – Transcription software – Nuance

If you’re a mobile professional—or anyone on the go—who relies on a digital voice recorder or smartphone to capture notes and memos, use Dragon’s robust transcription features to turn your recordings into text quickly, easily and accurately. Dragon can even transcribe another single speaker’s voice from pre-recorded audio files or from podcasts to maximize flexibility […]

How to Transcribe Video Files to Text with YouTube

Learn how to use YouTube to automatically transcribe audio and video files. The transcriptions can be exported as text files. Source: How to Transcribe Video Files to Text with YouTube

SpeedOf.Me, HTML5 Speed Test | Non Flash/Java Broadband Speed Test

SpeedOf.Me is an HTML5 Internet speed test. No Flash or Java needed! It is the smartest and most accurate online bandwidth test. It works well on iPhone, iPad, Android, Windows 8 and other mobile devices, as well as desktop computers. Source: SpeedOf.Me, HTML5 Speed Test | Non Flash/Java Broadband Speed Test

istumbler.net

iStumbler is the leading wireless discovery tool for Mac OS X, providing plugins for finding AirPort networks, Bluetooth devices, Bonjour services and Location information with your Mac. Source: istumbler.net

Wifi Analyzer – Android Apps on Google Play

Turns your android phone into a Wi-Fi analyzer!! Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router. Source: Wifi Analyzer – Android Apps on Google Play

PSA: You Can Run Windows 10 Without a Microsoft Account « Windows Tips

Since the release of Windows 8, Microsoft has been heavily encouraging users to use Windows with a Microsoft account. According to Microsoft, the main benefit of using a Microsoft account is the ability to sign in and sync your information across various Microsoft devices and services. Furthermore, you have access to a singular cloud storage […]

GRC’s | Password Haystacks: How Well Hidden is Your Needle?  

Every password you use can be thought of as a needle hiding in a haystack. After all searches of common passwords and dictionaries have failed, an attacker must resort to a “brute force” search – ultimately trying every possible combination of letters, numbers and then symbols until the combination you chose, is discovered. Source: GRC’s | Password […]

Breach Level Index

The Breach Level Index not only tracks publicly disclosed data breaches, but also allows organizations to calculate their own breach risk assessments.

« Previous Page