.NET, Security, Tech, Humor, Gaming


46dbwq1awtkux0c5wmqoabtb PriceJump Tells You Which Amazon Products are Cheaper Elsewhere

While there are some great deals to be found on Amazon, it’s not always the cheapest option. An online tool called PriceJump tells you what products on Amazon are cheaper elsewhere.

We’re big fans of Amazon. We’ve written about the perks of Amazon Prime and Amazon’s Subscribe and Save program. But as great as Amazon is, its prices aren’t unbeatable.


PriceJump is available as a Chrome extension, or you can use their web site directly. With Chrome, you simply browse a product on Amazon, and click the extension’s icon. A list of stores and prices will pop up, sorted from low to high. You can easily see how they compare with the Amazon price.

447au6dmftl2r0sqkexeoac2 PriceJump Tells You Which Amazon Products are Cheaper Elsewhere

To use their website directly, just enter the Amazon URL via their site, and it’ll will tell you where to find that product cheaper (if available). A list of other online retailers and prices will pop up, too.

1259t1qwa4kgcsmvwoekawcf PriceJump Tells You Which Amazon Products are Cheaper Elsewhere



The rest is here:
PriceJump Tells You Which Amazon Products are Cheaper Elsewhere

44d5q4d84dmajoqclrg9syub Share Reminders Lists with Other Users Over iCloud

Reminders are a handy feature in iCloud, especially when you tag locations. You may already know you can share these reminder lists with other iCloud users, but in case you don’t, here’s how.

After creating the list on the web, your iOS device, or your Mac, click the icon next to the list that looks like a Wi-Fi icon (strangely, it doesn’t use the traditional sharing icon nor does the icon show up in iOS 7). Type in the name of another iCloud user, and you’ll both have access to the reminders.

This comes in handy when you need to remember something at a specific location like the grocery store, but aren’t sure which of you will get there first. It’s a pretty basic tip, but one I just started using—and it’s a lot more handy than I’d realized.

See the article here:
Share Reminders Lists with Other Users Over iCloud

2f7dxbvxjxkkxeu7mgr3zo2j LEGO Figures Make Perfect Cable HoldersS

Who knew that LEGO designed their figures’ hands perfectly to hold Apple lightning and other types of cables? Stick a LEGO brick on your desk, attach LEGO figure(s), and, voilà, an ingenious cord-catching solution.

Original post:
LEGO Figures Make Perfect Cable Holders

For all the benefits that the internet has brought with it, it’s also opened the door for scammers in a way never imagined before. The anonymity that the internet allows means that people who might not otherwise have considered doing unscrupulous things to make money find it an easy temptation.

The best way to avoid falling victim to such scams is knowing what the biggest threats are and how you can avoid them. Below are some of the most common threats to your computer.

1. Viruses 

Viruses have been a problem since the early days of the internet and the amount of anti-virus software that’s on the market just shows what a significant threat they still are. Viruses are most commonly transmitted via the internet although they can also get into your computer through physical media such as CDs and USB sticks.

Any decent anti-virus software will detect most of the common viruses and remove them before they’re able to affect your computer. In cases where a virus is causing widespread damage such as deleting files and taking up memory, then the best solution is usually to reinstall the operating system.

Broadband from Virgin Media comes with 12 months free internet security for new customers to help prevent viruses infecting your PC.

2. Spam

Spam email is something that everyone who uses the internet has come across. Whilst most email services will block out the vast majority of spam email, there are still messages that get through. However the real danger with spam isn’t necessarily receiving the messages yourself but unknowingly becoming a distributor of it.

It’s very common for spammers to take control of other people’s email accounts to distribute spam. Once your email account has been compromised then it’s very possible that your personal information will be compromised too.

GreenNet have a very comprehensive guide on spam if you want further information.

3. Phishing

Phishing is an extremely common threat these days and people who are not internet savvy are at particular risk of falling victim to it. Phishing usually starts in the form of an email that appears to be from a legitimate source such as eBay, PayPal or your bank.

The email will usually say something along the lines of “your order has been approved, please log into your account if you did not make this order”. There’ll be a link in the email that takes you to a phony website that’s been set up to look like the website of the company that’s being imitated and hosted on the scammer’s server.

You’ll then be asked to provide sensitive information such as your name, address and credit card details. People who fall victim to phishing usually don’t know about it until they see money disappearing from their bank or are informed by someone else that it was a scam.

This YouTube video clearly demonstrates how phishing works

4. Spyware

Spyware is what most people commonly mistake as a virus. It usually gets onto a computer by being hidden in another download. Spyware can collect any personal information thats on your computer as well as causing it to act in unexpected ways such as redirecting you to websites selling software, changing computer settings and causing crashes.

Most good anti-virus software will also come with spyware protection that removes the threat before it’s able to infect your machine.


Chrome: The latest stable build of Google Chrome can lock your browser when you step away, to protect your data and privacy. All you have to do is change a setting to enable the new profile management system—no extensions needed.

You might want to lock your browser if you share gadgets in your house, or if someone else has to use your personal laptop for a bit. The new user manager comes with this feature built-in. I Love Free Software has a quick tutorial on how to enable it:


  1. Go to chrome://flags


  • Search for “Enable new profile management system”



  • Click the blue “Enable” link.



  • Click the “Relaunch Now” button at the bottom of your browser to apply changes.



You will see a drop-down button with your Google account name, next to your Minimize button. Click this and click the lock icon when you want to password-protect your Chrome browser. The password is the same one used for your Google account. The protection stays active even after restarting Chrome as well as after rebooting Windows.

Lock Google Chrome with Built-in Password Protection