File Transfer & Backup Services
Active reviews for service that allow you to send large files!

We're reviewing various file transfer services to allow our readers the best overall comparison.

When complete, we will have the most extensive research and review data anywere online to help you make the right decision when it comes to cloud storage, file transfer, FTP and more.

File Transfer & Online Backup Reviews: Read more!

virtual drive backup software

#1 Virtual Drive, Inc.

Virtual Drive is currently the top rated contender for Free FTP Server & Online Storage services that we have evaluated. They also are leading in online backup solutions to ensure your files security online. 

#2 YouSendIt, Inc.

YouSendIt has been a leader in File Transfer for quite some time, but fell to the #2 position after our extensive review and public reaction to their file transfer services.  

Binary browser plugins using the 1990s-era NPAPI (“Netscape Plugin API”, the very name betraying its age) will soon be almost completely squeezed off the Web. Microsoft dropped NPAPI support in Internet Explorer 5.5, and its Edge browser in Windows 10 also drops support for ActiveX plugins. Google’s Chrome started phasing out NPAPI support in April this year and dropped it entirely in September.

Now it’s Firefox’s turn. Netscape’s open source descendent will be removing NPAPI plugin support by the end of 2016. Some variants of the browser, such as 64-bit Firefox for Windows, already lack this plugin support.

Mozilla’s plans resemble Microsoft’s and Google’s in more than one way. There’s one plugin that traditionally used NPAPI that’s special: Flash. Chrome and Edge both embed and update their own versions of the Flash plugin, and even after 2016, Firefox will continue to support Flash. Though the scope and capabilities of HTML5 have continued to grow, Flash remains a significant part of the Web, especially for interactive content such as games. Many of these uses are declining, but support for Adobe’s technology will still be a practical necessity in a general purpose browser at the end of 2016.

Read 3 remaining paragraphs | Comments

VW’s cheating scandal is a reminder that manufacturers of appliances and electronics have gone down a similar path before, only to have standards tightened.

Researchers use an algorithm to detect a type of tax shelter dodge used by partnerships.

(credit: PhotoAtelier)

Apple has purged its iOS App Store of several titles that it said had the ability to compromise encrypted connections between end users and the servers they connect to. The company advised users to uninstall the apps from their iPhones and iPads to prevent potentially harmful monitoring, but it has yet to name any of the offending titles.

“Apple has removed a few apps from the App Store that install root certificates that could allow monitoring of data,” company officials wrote in an advisory posted Friday. “This monitoring could be used to compromise SSL/TLS security solutions. If you have one of these apps installed on your device, delete both the app and its associated configuration profile to make sure your data remains protected.”

Apple representatives didn’t respond to an e-mail seeking the names of the offending apps and an explanation of why they weren’t identified. This post will be updated if they reply later.

Read 4 remaining paragraphs | Comments

US Marine Corps Lance Cpl. Britain Morris, an infantryman with Fox Company, 2nd Battalion, 2nd Marine Regiment, “enrolls” an Afghan into the SEEK II system, part of the Navy and Marine Corps’ Identity Dominance System, during a patrol in Washer, Helmand Province, Afghanistan, July 29, 2013. The Marines are seeking an upgrade to their biometric toolkit. (credit: US Marine Corps)

The Navy and Marine Corps are looking to upgrade biometric tools used by forces in the field and at sea that would give them the power to identify individuals both up close and at a distance. In an announcement kicking off the Identity Dominance System (IDS) 2 program, the Marine Corps Systems Command put out a call for information on potential sources for portable systems to collect everything from voice and gait data to DNA samples—tools that would turn troops in the field into high-powered forensics investigators and create profiles to track every human they encounter.

Starting in 2007, the US military fielded a set of biometric tools in Afghanistan intended to achieve what the Defense Department calls “identity dominance”—the ability to identify and track every single human being in the country and, in the process, make it impossible for the Taliban and other insurgents to live undetected among civilian populations. The equipment fielded by the services soon became “programs of record”—established procurement programs with their own management offices; the Army called its system the Biometrics Automated Toolset-Army (BAT-A), and the Navy and Marine Corps called theirs the AN/PYX-1 IDS. These systems, assembled mostly from off-the-shelf technology, allow American forces to record the facial, iris, and fingerprint biometric data of anyone they encounter.

Identity dominance has scored some wins for the military: as Public Intelligence reported, in 2012, an Afghani man was arrested during a sweep of a village in Khost Province because his fingerprint data matched fingerprints found on a cache of explosives found in 2011. And it’s believed that the Navy’s IDS was used by Navy SEALs to positively identify Osama Bin Laden during the raid on his compound in Pakistan. The systems and data have also been adopted by the Afghan government, which has used it to essentially fingerprint the entire country to control travel and access to certain areas, as well as to create a national identity card system.

Read 5 remaining paragraphs | Comments

 Page 1 of 3,234  1  2  3  4  5 » ...  Last »