We’ve started using the iPad to stream movies to the AppleTV so that we can watch them on the big screen.
It’s one thing to stream a show we’ve bought from the iTunes store or a clip off YouTube. Those are very straightforward.
But what about other (third party) video files?
Every WordPress theme comes pre-set with a default menu that is, usually, based on how you structure your pages. Some have drop-downs to show secondary pages (children) but some only show top-level pages.
With the advent of WordPress 3, you can now create a custom menu where you add or delete pages from the primary navigation at will. Or you can create a custom menu that you use somewhere else. Here’s how.
If you have ever used a Google form for collecting information (maybe RSVPs to a party), you may have wished there was something RSS-like that would automatically alert you to the fact that you had a new submission. Good news! You can configure the spreadsheet associated with the Google form to do just that. This requires no coding experience, because Amit Agarwal has already written the code bits. Continue reading
One way to make it harder for bad guys to access your online accounts is to require more than a username and password to access an account.
Google uses a two-step verification process tied to account credentials and your mobile phone. So does Facebook.
And as Alex Howard points out, security has always been important but events are conspiring to suggest just how important.
Learn how to set up two-step verification on your Facebook account. Important for anyone, the higher your public profile, the more important.
This means journalists, professors engaged in public scholarship (especially when controversial), celebrities (authors, musicians, actors, directors, models, athletes ….), politicians (of all stripes, elected or candidate), political appointees, judges and high profile lawyers … anyone who manages a Facebook page for someone else … the list goes on.
The complimentary one-year domain name that web hosts use to lure new customers too often has a downside (or two). They range from inconvenient to security risks. But the most frustrating: failure to provide specific information on the “temporary” location of the website.