If you’re a mobile professional—or anyone on the go—who relies on a digital voice recorder or smartphone to capture notes and memos, use Dragon’s robust transcription features to turn your recordings into text quickly, easily and accurately. Dragon can even transcribe another single speaker’s voice from pre-recorded audio files or from podcasts to maximize flexibility […]
Learn how to use YouTube to automatically transcribe audio and video files. The transcriptions can be exported as text files. Source: How to Transcribe Video Files to Text with YouTube
SpeedOf.Me is an HTML5 Internet speed test. No Flash or Java needed! It is the smartest and most accurate online bandwidth test. It works well on iPhone, iPad, Android, Windows 8 and other mobile devices, as well as desktop computers. Source: SpeedOf.Me, HTML5 Speed Test | Non Flash/Java Broadband Speed Test
iStumbler is the leading wireless discovery tool for Mac OS X, providing plugins for finding AirPort networks, Bluetooth devices, Bonjour services and Location information with your Mac. Source: istumbler.net
Turns your android phone into a Wi-Fi analyzer!! Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router. Source: Wifi Analyzer – Android Apps on Google Play
Since the release of Windows 8, Microsoft has been heavily encouraging users to use Windows with a Microsoft account. According to Microsoft, the main benefit of using a Microsoft account is the ability to sign in and sync your information across various Microsoft devices and services. Furthermore, you have access to a singular cloud storage […]
Every password you use can be thought of as a needle hiding in a haystack. After all searches of common passwords and dictionaries have failed, an attacker must resort to a “brute force” search – ultimately trying every possible combination of letters, numbers and then symbols until the combination you chose, is discovered. Source: GRC’s | Password […]
The Breach Level Index not only tracks publicly disclosed data breaches, but also allows organizations to calculate their own breach risk assessments.