User Name:

Password:

remember me

Forgot your password?

Not a member?

Join Now

Computer News

RSS feedDisplaying articles 31 - 40 of most recent articles

Walmart Sucks Fun Out of Walmart.horse Domain Walmart.horse was a pretty obvious (and silly) parody, but Walmart wasn't having it.
PC Magazine | May 22, 2015 12:25 AM [GMT] | comment? | recommend
ARM, Unicef Launch 'Wearables for Good' Challenge The new program aims to serve children in developing countries with cost-effective, useful tech solutions.
PC Magazine | May 22, 2015 12:25 AM [GMT] | comment? | recommend
YouTube Now Supports 60fps Live Streaming YouTube will also now show live streams using an HTML5 player on supported browsers.
PC Magazine | May 21, 2015 8:25 PM [GMT] | comment? | recommend
Your Secret Questions Are Just as Terrible As Your Passwords Not only do we use awful passwords, but we can't even remember the answers to our secret questions, Google finds.
PC Magazine | May 21, 2015 8:25 PM [GMT] | comment? | recommend
Leak Tips Lightweight Microsoft Email App, Flow Flow allows people to communicate in real-time, and have their conversations saved in Outlook.
PC Magazine | May 21, 2015 8:25 PM [GMT] | comment? | recommend
Nintendo Hires Bowser Doug Bowser, not King Koopa, will be leading Nintendo's North American sales.
PC Magazine | May 21, 2015 8:25 PM [GMT] | comment? | recommend
BBC Sued Over 'Grand Theft Auto' Movie The 90-minute TV movie, Game Changer, stars Daniel Radcliffe and Bill Paxton.
PC Magazine | May 21, 2015 4:29 PM [GMT] | comment? | recommend
Bin Laden Might Have Trained Terrorists With a Video Game It's more likely that bin Laden used Delta Force: Xtreme 2 for training than entertainment purposes.
PC Magazine | May 21, 2015 4:29 PM [GMT] | comment? | recommend
QuizUp Arrives on the Web With Facebook-Like Site QuizUp is now on the Web with a social network-type site that borrows a few things from Facebook.
PC Magazine | May 21, 2015 4:29 PM [GMT] | comment? | recommend
Logjam Bug Targets Encrypted Web Data The Logjam flaw allows hackers to target and edit keys—the random numbers used to code and decode encrypted data.
PC Magazine | May 21, 2015 4:29 PM [GMT] | comment? | recommend