Complete Obfuscation

Complete Obfuscation

Two techniques which appear not only to currently be 100% successful at protecting email addresses, but are likely to remain so for some time. The first technique uses Javascript to obscure the address, the second hides the email address in an image. Harvesters are...
Complete Obfuscation

Avoid Being Harvested by Spambots

One of the primary ways spammers get email addresses is by stealing them from websites. They do this by using “spambots,” computer programs which automatically troll web pages and harvest email addresses. “Munging” Your Address There are two...
Complete Obfuscation

Take Better Photos With a Phone

Look for the light: Good photography requires good light. You can’t always choose when to take photos, but avoiding midday glare is always a good idea due to the harsh shadows that appear at this time. Get steady shots: To avoid blur, shake the camera as little as...
Complete Obfuscation

BlueStacks App Player

Are you thinking about buying an Android…but want to try out the smart phone’s apps first? Or maybe you already have an Android phone and want to run your favorite apps on a larger PC monitor. BlueStacks App Player, now in alpha, lets you do both of these things...
Complete Obfuscation

Reading full email headers

Email headers determine where a message is sent, and records the specific path the message follows as it passes through each mail server. To follow the path of a message chronologically, read from the bottom of the header, and work your way up. Here’s an example...
Complete Obfuscation

Check Your Temperature

If you need a tool that can change your computer’s fan speeds, read the temperatures of your motherboard and your hard disk, read voltages and fan speeds and check the status of your hard disk using S.M.A.R.T. or SCSI attributes, then SpeedFan is the software to...