News

Friday IT Fun: Twitterific

Why should IT Fun be limited to only Fridays? Get daily doses of the funny through our new Twitter feed. If you've found something you think other IT pros will appreciate, send an e-mail to cpaoli@1105media.com so we can include it in next week's edition.

  • How To Trick an Online Scammer... (TheAtlantic.com) - While I think these scammers should be brought down a peg or two, going after them is almost like challenging your 80-year-old grandmother to a footrace…

  • Kitten Rescue (DontEverReply.com) – Time, prepared to be wasted. Whether this guy's e-mail pranks are real or not, they are all pure comedic gold.

  • Zuckerberg! The REAL Social Network Movie (Babelgum.com) – At least Zuckerberg didn't just "borrow" Fincher's version and slap his name on it.

  • Never Say No to Panda (YouTube.com) – I've gone on record many times about my intense, rage-filled hatred for pandas. This week's random link helps to prove my point that these waste-of-space animals are nothing but big jerks.

And because it's hard to get people to do anything without a little incentive, one lucky reader who signs up for our new Twitter feed will be randomly selected to receive the timely and highly practical MCSE Training Guide: Internet Explorer 4, plus a T-shirt. Add it now!


 

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

  • A Quicker Way To Create Hyper-V Inventory Reports

    If you need to generate Hyper-V inventory reports but don't want the hassle of writing your own custom PowerShell script, here is a shortcut.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.