Friday 29 August 2014

TrueNorth Computers come with Brain Synapses

Computers come with Brain Synapses
TrueNorth: The IBM recently unveiled what it calls the first nefrosynaptiko computer chip in the world, a processor that mimics the capabilities of the human brain and energy efficiency. 

The chip of IBM is known as TrueNorth, and could strengthen the forces of a supercomputer with a microprocessor th the size of a postage stamp. Instead of solving problems through brute-force mathematical calculations, as do today's processors, designed to understand the environment, to clarify the ambiguity, and take action in real-time animation in this context. 

A computer "dresses» TrueNorth is configured as the human brain. The chip TrueNorth incorporates 5.4 billion transistors, most of which has never been used in an IBM chip. It also features programmable one million neurons and 256 million programmable synapses. Of course the numbers are much lower than the 100 billion neurons and 100 trillion to 150 trillion synapses are beginning to be rather several. The chip is the core element of cognitive computer programs of IBM, known as Synapse. 

It is still under investigation, and the announcement says the second generation design. The IBM released the first generation a year ago. While still in prototype stage, could after two or three years to have our first commercial use. Experts believe that an innovation like the TrueNorth Synapse could help to overcome the performance limits of architecture von Neumann, the mathematical system kernel based almost every computer that was built from 1948 onwards. 

The new technique does not rely on the von Neumann architecture could one day give us devices that understand the world through sight, smell, hearing, just understand him and feel a man. 
The IBM plans to make the TrueNorth - along with a new custom programming language - first in universities and later to business customers. 

Imagine what risks can hide such a project. 
Future computers surpass humans in intelligence, has already been the subject of films Hollywood. Trying to create computers that think and feel the same way you think a human brain, we could expect autonomous vehicles working in warehouses, or robots to ensure security at home or in the city. 

The project is one of the most important of IBM, which spends $ 6 billion a year on research. In 2011, the supercomputer Watson beat the best players of «Jeopardy», an impressive display of computing power. 

But imagine that Watson is the most powerful engine made ​​the architecture of von Neumann. Requires more electricity than any home and technology ... considered outdated.

According to Bloomberg 12.9-inch iPad In the Pipeline

12.9-inch iPad
After the new iPhone magnitude 4.7 and 5.5 inches, according to the news agency Bloomberg, the company with the bitten apple logo is to announce a larger iRad which touches 12.9 inches. 

Existing models iRad available in sizes 7,9 (mini) and 9.7 inches. According to anonymous sources Bloomberg, Apple is planning to get the production tampletas- "giga" 12.9 inch, early 2015 The same sources said that the company is working feverishly with its suppliers to create a series touch devices with larger screen. 

According to analysts the specific announcement comes as the American giant monitors the downturn in sales of the tablet, because the fierce "war" received from powerful opponents such as The Samsung Electonics etc. shown to "seduce" the general public with oversized mobile.

What is Public Key Pinning (PKP) coming in Firefox 32

To Public Key Pinning (PKP) is an extension of the HTTP protocol that controls the state of the Internet Engineering Task Force (IETF).
Public Key Pinning (PKP)

It allows web services to reduce the number of authorities that can validate a website instructing customers (clients) to use only a specific subset of principles, rather than accept any certificate that is served from the browser. 

The technique is designed to reduce the likelihood of attacks man in the middle (MITM) under certain conditions and protect against false certificates. 

The safety feature works only the second visit to the site and not the first, as the information provided by the website for certificate authorities submitted to the client on the first visit. This is called trust on first use or trust on first use (TOFU). 

This means that the technique can not help if you have already visited a website and you have received a fake certificate from scammers or if an attack happens man in the middle at that time. 

With the new version of Firefox 32, Mozilla's browser will support the Public Key Pinning. The Firefox 32 is already available as a beta version and will be released in the final version of the September 2, 2014 (maybe sooner for readers iGuRu.gr). 

O new Firefox will display a lock icon to indicate when a website is secure and will reject websites it deems unsafe. The latter is the case, ie if a fail safe link will display the error to the browser. 
Public Key Pinning 

It should be mentioned that the new feature of Firefox is not so new for Google Chrome that already. 

Pinning (Public Key Pinning) is enabled by default in Firefox 32 and subsequent versions of the browser.

How to protect your PIN from the thermal cameras

You can protect your PIN from a new enemy is in the hands of crooks? The technology is evolving and with it and the methods used for each kind of theft. Let's talk about thermal cameras used to be expensive and bulky. So very few people were able to get their hands on. In the new part of the iPhone FLIR, your device turns into a thermal imaging camera. The device is very affordable and incredibly discreet. Somewhere it all begins here ... 

How to protect your PINFor this reason it has been in use since many course of several criminals are aiming to steal credit card PIN. 

The former engineer of NASA JPL Mark Rober with a video explains very simply, how can one criminal to steal your PIN you from the heat leave your fingers on the keys, a machine. 

Since I now know the trick of fraudsters is very easy to protect yourself, simply by touching more keys than you use to register your PIN. Alternatively, when you are done typing, you can put your whole palm on the keyboard in order to warm up all the buttons. You can also type using a pen or any other object that will not transfer heat. 

The good news is that they usually do not have to worry about the keyboards that are made ​​of metal. The metal keyboards reflect heat like a mirror. 

Attention So now you know, and of course there is no excuse.

The Microsoft cleans the Windows Store misleading applications

A "thorn" in app stores like Windows Store, is false applications, using icons and names of known applications, designed to confuse the user.
 Windows 8 Store

Due to the large number of fraudulent applications, Microsoft decided that the name of the application should be clear and define its operation. 

Also, the apps will go into various categories depending on their type, will be removed and you use images that resemble other popular apps. 

The Microsoft states that proceeded to delete 1,500 applications, and is intended to compensate users who have given money to buy them. 

In the coming weeks the company will contact with several of the authors of such applications in order to change the name and icon of programs, so as not to put any problem with copyright.

Wednesday 27 August 2014

Orlando Jones a Defiant Message to the ice bucket challenge

Orlando Jones
While politicians and celebrities bougainvillea the last two weeks for charity,actor Orlando Jones, thought something more challenging. 

Emptied over his head a bucket filled with bullets, following the viral trend. In this way the actor complains about the disturbing news coming from Ferguson, afterthe murder of unarmed teenager Michael Brown. 

The Jones does not degrade the ice bucket challenge and supports ALS (senthis check to charity), but decided to use the time to complain. The actor says in the video: 

My "bullet bucket challenge" is to show the finger and not because I'm angry.Each shell of this bucket represents the life you lost someone fighting for civil rights and human dignity. We will not stand idly by while others violate civil and human rights within the coverage of the authorities. 

Since its release, the video became viral with more than 1 million 100 thousandvisits.

Man Arrested after Video Ice Bucket Challenge

Te Ice Bucket Challenge, as you know is one campaign that aims to raise funds for research into disease amyotrophic lateral sclerosis (motor neuron disease), but also for people who are diagnosed with this disease, but seem to have other effects. 

In fact in this campaign used famous athletes, singers, etc. to simulate the feeling of sudden numbness spine felt by patients with the disease and similar if someone gets wet with ice water. The scene of bougelomatos with ice water eventually ended up fashion, without any connection with fundraising efforts for research of the disease. Thus, ordinary citizens bougelonontai pulling the scene on video and then upload to the internet. 

Can this whole process that resembles the Ice Bucket Challenge but it helps sufferers of the disease. But it can help the police to apprehend criminals. Provided that these criminals are not that smart. 

According to The Smoking Gun, late last week Friday that a man was arrested after taking part in this campaign and then present a video showing pouring ice water on his head online. This 20 year old Jesean Morris, the Ohama, USA, who was first arrested in April 2010 then was found guilty of assault and using a firearm while committing a crime. Was left but released on bail. However, this man did not comply with the rules of the provisional release. In simple words, he had pretty much disappeared without bothering to parousiazettai regularly astynomikoo part, as it should. 

While hiding, the man considered it appropriate to make Ice Bucket Challenge and to film the whole experience. Shortly after the video posted on Facebook. One of the electronic "friends" recognized the hiding place and alerted the authorities. 

Having identified the fugitive criminal, the police decided to make a visit to spiti.O 20 year old tried to escape by running, but police finally caught him. Rumor has it that before the arrest, the Jesean Morris tried to fool them by giving them a false name and date of birth. 

The 20 year old is now behind bars in Douglas County, in Nebraska, where it will remain for quite a long time. 

The interesting thing is that there seem to be some people that are not shared by the conditions under which the Jesean Morris arrested. They argue that electronic "friend" did not have to inform the police about who was the 20 year old who just wanted to help those suffering from ALS (Amyotrophic Lateral Sclerosis) by making Ice Bucket Challenge.

Mars and the moon will appear the same size on 27 August?


The "story" (hoax) is as follows: If you look at the night sky today August 27th will see Mars appear as large as the moon? Unfortunately, you will not see it. This stupid prank occurs almost every year, with the promise that no one has seen this phenomenon so far and that it will not happen again for hundreds of years. It is known by the name of the hoax two moons.

It is obvious that the exciting "news" is a lie of course does not answer the question because Mars will suddenly appear exactly the same as the moon?
But as we have seen several times, and the most obvious lie can spread very easily from social networks or websites offering garbage collect clicks. So before you begin to spread and become viral it would be good to know.
Just ignore it if you see it on your Facebook feeds today.

Tuesday 26 August 2014

The Largest Student Hacking Contest Started, Entries are Open

Student Hacking Contest
Registration for the annual student hacking contest hosted by the Faculty of Engineering of New York (NYU Polytechnic School of Engineering), is open to participants from across the globe. 

The final tournament Cyber ​​Security Awareness Week (CSAW) will be held on November 13-15. Pet contestants from high schools and doctoral programs, who will have to compete in six preliminary rounds for a place in the final. 

Prizes will be several scholarships and awards. Apart from six matches, and the contest is Capture the Flag, which aims to find ways to breach system security and theft of protected data. This is the most popular events of the competition by qualifying round which will be held between 19-21 September. 

There is also a category for forensic analysis, for high school students as well as a section for hackers hardware (hardware). The notice of registration to the event The organizers reported that added a new competition for public policy developed by students. 

This year, the Chief Information Security Officer of Yahoo, Mr. Alex Stamos (obviously Greek origin), will provide the keynote presentation, entitled "Shaping the Future: espionage, cyber crimes, and your career" on November 13, when reception of finalists. 

According to the announcement from the university, last year's event brought together more than 15,000 students, shows that there is growing interest among participants. 

This year's competition is supported by a total of 20 organizations, gold sponsor is the U.S. Department of Homeland Security (DHS). The Yahoo is the silver sponsor (2nd) competition, and the list of donors includes copper big names like Facebook, the National Security Agency (NSA), NCC Group North America.

Additional companies that offer support are FireEye, the Intel, the Microsoft, the MIT Lincoln Laboratory and Service United States Secret Service.

Kaspersky Lab Back to School Safely

Kaspersky Lab: The end of the summer holidays approaching, signaling the start of the new school year. Soon the kids will leave the beaches to come back in front of their computers and start using again tools like tablet and smartphone in order to prepare their work. In fact, apart from a wide variety of useful educational materials, children can easily meet and unwanted content on the Internet, such as pornography, violence, and websites that focus on drug use and even suicide.
Kaspersky Lab

For this reason, parents need to pay particular attention to the online activity of their children. The Kaspersky Lab specialists advise parents who want to protect their children in cyberspace:

Limit the Children Time on Internet
Children are good to spend some time on the internet, searching educational information, playing games or even talking to their friends on Facebook. However, everyone will agree that most children probably spend too many hours online. This requires parents to adopt strict rules on the time children spend in front of a computer. Before setting these new standards, parents should be careful to make a frank discussion with their child, explaining why these limits are important. Otherwise, it can be seen as an arbitrary punishment, creating problems in the relationship of parents with their children.

Check the contents 
It is important to explain to children what they can and can not do on the internet and set clear rules. As children grow older, these rules should be reviewed. To ensure that children respect the rules you set, we recommend that you use the Parental Control offers Kaspersky Internet Security - Multi-Device, allowing parents restrict the time that children use the Internet, to prevent access to inappropriate websites and games and to prevent the disclosure of personal data to third parties. The websites and games are divided into categories according to their content and the age of the children. Also, parents can easily see detailed reports record all online activities of their children.

Advise your children 
Talking with children about the new rules, it is good for parents to share some tips with them. In this way, they will help their children to be protected against online threats while showing them that trust.

  • Do not disclose publicly or to foreign intelligence, such as the address, location, your school, etc..
  • Do not accept invitations to meet anyone you do not know.
  • Do not give anyone your phone or email and you do not post this information on your pages to social media.
  • Do not open links from strangers.
  • Do not trust any kind of seductive messages - free offers, discounts, or increase the reputation of likes on a carrier etc. Just delete these messages and do not open any of the link it contains.

If anything happens that makes you feel uncomfortable or if you start receiving messages from third parties that worry you, tell your parents and ask for their help to troubleshoot the problem.

Try to locate a key problem
Parents should remember that children remain connected to the Internet even when you close the computer, using tablets, smartphones and other devices. If children immediately start looking for another gadget just find that the computer is not available, parents must ensure that these devices are protected against digital threats. See why your kids prefer the digital world rather than meet their friends in real life.

This lack of social opportunities or the need for more physical activity? In each case, the parents have to focus their attention on activities for the whole family not related to computers to ensure that their children enjoy a healthy and balanced life.

New Update for the Console PS3, Version 4.65

New Update for the Console PS3
The Sony today gave the movement the 4.65 Firmware Update for the PS3, which according to its website contains the latest security updates, settings, features and other details. 

In short it improves the performance and stability of the system during some operations console. However, it is consistently moving company to "kill" in each new version of the jailbreak that have been released so far. Until you go on the internet and the new company to move to a new firmware version and the game of cat and mouse continued. 

Proceed then to upgrade depending what you do on your console. 

To upgrade you will need to connect your console to the internet or if otherwise download here the new 4.65 fireware and then the installation whenever you want.

The Automattic Buys BruteProtect And Enjoy the Premium Service Free

 BruteProtectThe Automattic bought the plugin BruteProtect to protect against malicious attacks on websites with WordPress. The company plans to adapt the plugin to suite Jetpack, developed by the same. 

The VruteProtect will remain available for the time being, while the development team is working on the adaptation of the Jetpack. The Automattic also will convert VruteProtect premium service, which currently costs $ 5 a month, a free service for all users. Once the technology is fully implemented in the Jetpack, the team VruteProtect will inform users in advance, before disabling the plugin. 

Interestingly, the founder of VruteProtect Sam Hotchkiss revealed that developed the first version of the tool in 18 hours last year when he noticed a significant increase in botnets that used brute force attacks to enter the administrative panel of WordPress sites. Last month, the VruteProtect takes 35 million attacks.

Monday 25 August 2014

GIGA Sound of Samsung

The GIGA Sound of Samsung distinguished by extremely loud, without distortion, and the sound effects and 20 different lighting patterns that pulsate to the beat of the music will catch the attention of your guests. 
GIGA Sound of Samsung

Thanks to the AutoChange, the GIGASound offers continuous playback to not waste minutes of your entertainment, while an easy connection via Bluetooth with smartphone and wireless connection to Samsung TV via TVSound Connect easily and directly provide alternative sources of music content .

Tuesday 19 August 2014

Great Attention to the "Loans" via Email!

 "loans" via email!

As at citizens draws attention to the police, after the appearance of the electronic circuit of crooks who steal personal data by sending an e-mail, through which promise instant loans with low interest rate. 
As announced by the Hellenic Police, the perpetrators promising internet users direct and easy loans, even large sums of money, and fast funding procedures. 

Indeed in these messages, as contact details are given, there is only one email address, and no address is never given the presumed natural home their mobile or landline phones or any other contact. 

As emphasized in a statement Hellenic Police, these messages do not come in any case banks or credit companies and senders request: 
either their personal information and data (ID, passport, tax identification number (TIN), etc.), to reuse them for malicious purposes, 
personal or financial information (bank account numbers, passwords (PIN numbers), credit card numbers, ATM card information, etc. 
or request to advance an amount initially, supposed to start the process of disbursement of the loan. Indeed, in the latter case require the funds to be sent via courier and not money through bank accounts. 
For this reason, the Internet users should not respond and reply to emails through which solicit personal information or financial information. 
Also, never send personal information or details of transactions through a common email address (webmail). 

In addition, Internet users are advised not to open e-mails (e-mails), the origin or the consignor are not yet sure. Especially dangerous are the emails from unknown sources with attachments and more are ending .exe, .pif, or .vbs.

Monday 18 August 2014

10 Most Popular Torrent Sites for 2014

Most Popular Torrent Sites


For many people the Pirate Bay is synonymous with BitTorrent. The site was founded a decade ago and continues to expand, despite the various legal troubles, hops sector and roadblocks ISP. The Pirate Bay currently has over one billion page views per month.


KickassTorrents was founded in 2009 and quickly rose to the top, making it the second place this year. In response to an impending seizure field site was transferred from the field to Kickass.to kat.ph last August. Despite the space problems and roadblocks of Internet providers in the United Kingdom and Italy, the region continues to grow.


The Torrentz has been the largest BitTorrent metasearch engine for many years. Unlike other sites that appear in the list Torrentz does not host any files torrent, simply redirects visitors to other places on the web. The website uses various domain names .eu is the most popular.


The ExtraTorrent continues to gain more users and climbed back into the top 10, now positioned as the 4th most visited site great torrent. This success has not gone unnoticed by groups like the MPAA who recently cried ExtraTorrent as one of the top sites for pirates. The site was forced from the commercial sector in .com .cc year after being suspended by the registrar of the domain.


About three years ago nobody had ever heard any of the YIFY but today the group is one of film's most recognizable pirate site in the Internet. This reputation has resulted in court ordered ISP exclusion in the UK last year.


In contrast to the other site of the top 10 distribution group TV-torrent EZTV is a niche site specializing in TV content only. Because the focus of the movement EZTV varies with the seasons of the TV.


The site owners say they started 1337x to "fill an obvious gap, which showed that there is a lack of quality conscience ad free torrent sites with public trackers.1337x.org currently blocked by all major UK providers on the Internet.


Launched last October, less than two weeks after isoHunt.com closed. This website is not affiliated with the old isoHunt but copying the design of the site. This without success, as the area has now millions of pages a day.


The BitSnoop is one of the largest BitTorrent sites, torrent files supporting 21,437,061 at the time of writing. List of torrents site continues to grow steadily, as has the number of DMCA notices received.


RARBG, which started as a Bulgarian tracker several years ago, is the third newcomer to the top 10 along with isoHunt.to is the only site in the list that has not been excluded in the UK, which may partly explain its popularity .

September the first preview version of Windows 9

windows 9

Microsoft is expected to release an early preview version of Windows Threshold next month. Threshold for those who do not know is the codename of the new functions that probably will be called Windows 9.

The company develops software in the last several months, tweaking and adding features to a version of "preview" or «technology preview» and preparing for the disposal of the public. Microsoft has already developed and is distributed by the Threshold for the close of OEMs and partners. According to a ZDNet public preview will be released next month or in early October.

The preview of Windows 9 will be the first version of Microsoft to allow developers to try Windows, for features that are not fully completed or missing. The ZDNet argues that existing internal publications include Threshold of a new mini Start menu, «Metro-style» apps displayed in separate windows on the desktop, virtual desktops, removing the possibility Charms bar, and an early version of Cortana. Microsoft has also made several changes to the UI of Windows 9, along with several tweaks to improve.

How to Convert any YouTube video to GIF adding a URL to GIF


Want to convert a YouTube video to GIF, but do not want to bother with complex applications?

We present a user-friendly, and easy trick you can remember any time you desire above: just add «GIF» at the beginning of the URL. After the «www.» And before "youtube.com"



Thus, for example, the address will be:

https://www.youtube.com/watch?v=zlfKdbWwruY

in:

https://www.gifyoutube.com/watch?v=zlfKdbWwruY

and press enter.

Otherwise you can go at gifyoutube and Enter the address of the video you want to convert to gif.

You should know that the service is not an official tool of YouTube (although it should) - so "do not be surprised if it stops working, especially if the legal team of YouTube has trouble using the brand's website.

Sunday 17 August 2014

Beats Electronics Earphones


Designed for athletes, Powerbeats Wireless headphones offer the familiar sound of the company in a lightweight, durable and resistant to sweat package. Plus the freedom to move and exercise through the design and weight make them a unique partner.

Tuesday 12 August 2014

8.5% of Twitter Accounts are Bots


Bad news on Twitter. The popular social network has admitted today that many of its users are bots. What does this mean? The Twitter, essentially admitted that there are many accounts automated bot, which merely serve to make retweeting content relevant to a specific topic, or just parroting slogans customer service. 

TwitterIn a recent document filed with the Securities and Exchange Commission, Twitter stated that the total number of bot accounts using the service stands at 23 million, the number is quite high, as the company's database contains 271 million users. This equates to a 8.5%. 8.5% in Twitter is not just regurgitate people and scheduled messages. 

As the Quartz, the bot accounts are nothing more than spam and let's face it, the spam is not so desirable. 

The data reported by the Twitter force until the end of June 2014 As the Quartz also shows that 7 M (almost 2.5%) of total monthly active visitors the company have access to client service through a third party.

The Gmail Adds New Filters for the Control of Spam

Gmail Spam Control

In an ongoing effort to stop spammers, Google began to reject messages service Gmail, which include "very limited" character combinations. 

The Google began using a new tool that aims to prevent e-mails of spammers to arrive in the inbox of the users of Gmail. The company announced Tuesday that it is adding new filters spam in email platform in an attempt to stop receiving deceptive or phishing messages. 

The filters involved searching e-mail using Unicode Consortium which could let spammers to trick users. Most companies, applications and websites using Unicode, so characters to work on all platforms. However, some characters look almost identical, as the Latin and Cyrillic 
Confusable Characters

"Fraudsters can exploit the fact that the 0, and the look almost identical to the letter o, and by mixing the match, they can deceive regular peoples" publish by anti Spam Google. 

Remains to be seen whether the new filtering company will be operating and leading spam tab spam. 
It should be remembered, and to admit that the Gmail service currently has the best spam protection on the internet.

Dropbox: Update Brings Document Preview and Android L-Support

Dropbox for Android L

The Android app of the popular cloud storage service Dropbox gets a major update: The developers implement in the new version a useful preview function, which among other things Word and PDF documents can be viewed. In addition, further improvements to the search function and cache performance were established, along with the app is now compatible with the Android L-Preview. 

With more than 100 million users Dropbox is one of the world's most famous and popular cloud services. No wonder, then, that the developers constantly release new updates: Immediately version 2.4.3 has landed in the Play Store and  introducing new functionalities  The biggest change concerns the new preview feature that directly in the app a look at Word, PDF and PowerPoint files can be thrown. 

Moreover, it was also working on the search function: Typing the user now a term, proposals are immediately presented. Moreover, no longer searches the entire Dropbox now available on request - it can now also sift through individual folders, which tremendously improves the search speed. Moreover, the developers have also diligently fixed several bugs and improves cache performance. Even for companies (Dropbox For Business) there is a change: From now reading corrections are created for shared folders. 

Finally, we have good news for all users of the developer preview of Android L: The Dropbox app is now running stable, even in our test, there were no problems. So far, she rushed after opening from always reliable. 

What do you think of the new Dropbox update? Have you ever tested the new features?

Install the Split View the LG G2 to G3 with a Single Application

LG G2 Split Window

The LG G2 was and still is a great phone and with the advent of the G3's price will fall even more for prospective buyers. He is also a special smarpthone which easily can acquire basic characteristics of the offspring. One of these improvements is the camera to bring the same quality level as the G3 and the second is the Split View, the function opens two applications simultaneously for better multitasking. So today we found a couple of ways installation Split View in G2, but who needs serious knowledge of the Android system to apply them safely. Until a few days ago but where one XDA devotee from the packaging all in one apk file to enable us. 

The apk essentially contains the tools and adequate records of a mod which is formed specifically for our device. In this mod after installing the custom recovery of choice after a reboot, everything is in place. Its use is very simple and easy as after installing just press "Create MOD" to create the file. This process can take up to 15 minutes so do not be alarmed. Once finished press "Reboot to Recovery" to install it in the usual way. It goes without saying that we always do a backup via recovery in case something goes wrong. To use the Split View is sufficient to go to the "System Settings" and activate the option "Multitasking", while longer triggered every time you hold down the key "Back". You will find the apk in the thread at XDA, where you can inquire with more details on this mod

Corrects the Android Intent Filters with Short Url Resolver

Short Url Resolver

One of the good things that have the Android, is that we can define the "default" applications for any action we want to do. 

Many applications (especially social media) show links which have first been "shrink" through various service (google, youtube, fb.me etc.). 

So while you're in the G + application and you want to get a video from YouTube to post them has a boyfriend, first pressing the link will open the Browser for 1-2 seconds (to "translate" the shrinked link in "normal" ) and then you open the YouTube application to "play" the video. 

Generally always hated the shrinked / short links, mainly because "hide" what the site will open. The fact that "spoil" the Android Intent Filters to make them even more undesirable for my tastes. 

Those who have Xposed is the Module CrappaLinks, but there is another solution that does not require root. 

Applying Short Url Resolver works impeccably, making resolve the short urls in the background without opening the Browser. 

All that is required of us is to make that associate with the management of short urls the first time. 

It's free, no ads and only 200kb. You know what to do.

Download Short URL Resolver

Google Search: Discovered Evidence of Device Cross-Share Function with Push Bullet


After Google last week, version 3.6.13 of the search app for Android has released, the guys from Android Police have looked at in more detail the application and made an interesting discovery: Apparently Google is working on a competition for Push Bullet. With the new feature, for example, text should be easy to send as a notification from the computer onto the phone. 

Tastes are obviously differ, in terms of apps. Push Bullet however, is without doubt one of the small number of must-have apps. The application adds Android and Chrome so many useful features that many observers speculated on a takeover startup with Google for quite some time. That this has not yet happened, could possibly have a good reason: Google apparently working on its own solution à la Push Bullet. 

Google Crose Share with Pushbullet

The evidence can be found, as so often, buried deep in the assets of already available applications. In version 3.6.13 of Google Search, which was released last week, can find four interesting snippet: 

<string name = "phonelink_note_sent_from_computer"> Sent from PC. </ string> 
<string name = "phonelink_note_save"> Save </ string> 
<string name = "phonelink_note_copy"> Copy </ string> 
<string name = "phonelink_note_copied"> Text copied </ string> 

A brief statement on this: In the future, therefore it should be possible to send text directly from the computer to the smartphone. Achieved the notification the mobile companion, the user is informed about their origin and then has the opportunity to copy the text to the or to save. While saving the text user can chose which app he wants to use this, then. To visually represent the better, Android Police has taken the assets and created from it a sample app. 

A sent from computer text wanders in form of a normal notification on your smartphone and can be copied or saved to the clipboard: 

bullet push-compete-for-app 

If you want to save the text, you get a choice between several compatible applications: 

bullet push-compete-for-app-2 push bullet-competitor-related-memo app 

Much to Google's Push Bullet alternative is currently still in the dark: If you just about can send text or links, images and other files? It remains only for text, Bullet Push Google solution is still miles ahead. How will Google implement the function on the PC? Here, of course, Chrome would offer integrated either as an extension or directly in the browser.

Interestingly, the feature also fits the new "Warp" function, which has made headlines at the weekend and the one probably soon among other YouTube videos with other smart phones in the vicinity will be able to share - even without an Internet connection. New possibilities for sharing content and data currently appear to be on Google's own to-do list probably at the top. 

What do you say? Would you an integrated solution within Androids / Chrome prefer? Or do you prefer to stay at Push Bullet?

Monday 11 August 2014

Presented Netbook with Nvidia Tegra SoC K1 and 13 hours of battery life: Acer Chromebook 13

Acer Chromebook 13

In addition to the already available Chromebooks with Intel or Exynos processors, Acer has now unveiled its Chromebook 13 based on NVIDIA's new Tegra chip K1. Besides the fast ARM CPU to the Chrome OS netbook come up especially with long battery life. 

Acer Chromebook 13 will be available in two models: One has a full HD display with a resolution of 1,920 x 1,080 pixels, another, slightly cheaper model has a 13 inch screen with 1366 x 768 pixels. Both display-variants have Acers ComfyView so-called anti-glare features. 

The Full HD device has aside from the higher resolution generally a little better equipment: The methods employed according to the customer either 2 GB RAM and a 16 GB SSD and 4 GB RAM and a 32 GB SSD. The price for the former version is 299 U.S. dollars, the 4 GB RAM variant fails with 379 U.S. Dollar to book. The Chromebook 13 with 768p display there is only 16 GB SSD storage and 2GB of RAM. The price should be at 279 U.S. Dollar, the Euro price will move in similar regions. 

Impressive the manufacturer's battery life is: While the attenuated version of the Chromebook 13 comes to a whopping 13 hours of battery life, reaches the more potent version still 11 hours continuous run time. The built-K1 NVIDIA Tegra chip that is installed including in Mi Pad by Xiaomi and the Nvidia Shield Tablet, features four ARM Cortex-A15 cores clocked at up to 2.1GHz. This brings several advantages: Thanks to the special architecture of the SoC the Acer Chromebook is completely fanless, which has a positive effect on size and weight. With a weight of just 1.4 pounds and a thickness of 1.7 centimeters, the Chromebook 13 is one of the smallest units on the market. 

The rest of the equipment: Acer installed two USB 3.0 slots, an HDMI port, also is also a microSD card slot for optional memory expansion board. Whether the device will find its way to Germany, is currently not yet clear. In the USA, the Acer Chromebook will be delivered from September 13. It is quite possible that his new Acer Chromebook brings the IFA 2014 - we'll keep you in any case to date!

First Siemens Electric Highway in the USA


Siemens Electric Highway in the USA

For the first time ever, electric trucks will be powered by overhead contact lines, will be released in the USA, with the aim of reducing greenhouse gas carbon dioxide in the atmosphere. The Regional Authority Air Quality in the South Coast of the USA (SCAQMD), Siemens gave the "green light" to install an electric highway system for testing purposes, near the ports of Los Angeles and Long Beach, which is the US larger. 
The electric highway will electrifies the Siemens selected lanes through a system of overhead contact line. In this way, the truck will be powered by electricity like trams. In collaboration with the VolvoGroup and its subsidiary Mack, the Siemens is developing a demonstration vehicle for the purposes of the project. Also, Siemens works with company management from California trucks, vehicles which will be part of the test. 

Siemens Electric Highway
The infrastructure for tisenaeries contact lines will be installed in both directions, in Carson, near Los Angeles. The project is expected to begin in July 2015 and will last for one year. During the trial phase, up to four trucks will run daily the route in both directions. The electric trucks ("e-trucks") will be equipped with a hybrid system with intelligent collectors dc. As will be powered by electricity from overhead contact lines, the trucks will not produce any greenhouse gas emissions, when moving to the area. On roads with no overhead contact lines, vehicles will use an electrical system, which can be powered by diesel, compressed natural gas, battery or other power source. The collector dc allows vehicles to make overtaking, stop and restart, reaching speeds up to 90 kilometers per hour. 

The implementation of electric highways are particularly efficient in environmental and economic terms for relatively short distances, which are often used by trucks, such as routes between ports, industrial facilities, transportation centers and transhipment hubs. The ports of Los Angeles and Long Beach aimed at adopting a zero emissions solution for a portion of Highway I-710 ("ZeroEmissionI-710 Project"). On the highway, it carried about 35,000 trucks from nearby trails on a daily routine. Authorities now looking to develop a "zero emissions corridor" for the routes between the two ports and transhipment centers located inland, about 30 km. This way, you will reduce the environmental pressure in an area affected by smog. The aim is the complete elimination of local pollutants, reduce the use of fossil fuels, reduce operating costs and to provide a platform for the commercialization of the system in the future.

Sunday 10 August 2014

Klick / Pressy / Mikey review: An Additional Button that Does all the Work!

Klick / Pressy / Mikey review

In the name of progress and flexibility, our devices tend to eliminate all physical keys, but some moments in which we would like an extra for us to do a particular job. To this purpose created Pressy (and its variants), a key that can be added to all devices and can arrange to do the job we want. 

The Pressy started as an idea on Kickstarter, which quickly expanded and copied by the Chinese. It is actually a plug for the headphone port us, which at the top has a button. This button can be arrange through the respective application in order to do that we want, such as taking pictures, to open specific applications and notifications. 

You may find it convenient or excessive ... but it is a clever gadget that will certainly solve many problems and will further automate our lives. Current as mentioned in the related several versions, with Pressy to cost about 30 dollars and the Chinese versions of the start of one dollar, but usually sold in sets of five. 

More information can be found below: 

Klick: Home | Apply 
Pressy: Home | Apply 
MiKey: Page 

Friday 8 August 2014

Increasing Turnover for Forthnet

Increasing Turnover for Forthnet

The consolidated turnover of Forthnet the second quarter of 2014 amounted to € 97,5 m., An increase over the second quarter of 2013 for the first time in nine quarters, despite the reduction in termination rates in fixed networks. 
The reduction from 01/01/14 termination charges on fixed telecommunications networks affected revenues by € 1,1 million. 
The improving trend in revenue is also evident in the retail revenue due to the commercial success of Nova 3Play. The growing subscriber base begins to improve retail revenues, with the 2nd quarter to show an increase for the second consecutive quarter, stated in the company.

Main fueling data results 
  • Continued and 2o quarter increase in retail revenues 
  • Increase in turnover for the first time in nine quarters. 
  • Maintaining the momentum of Nova 3Play and the second quarter of 2014, posting record highs in total subscriptions in PayTV subscribers and Broadband. 
  • Recorded a marginal increase in adjusted EBITDA and 

According to the CEO, Mr. Panos Papadopoulos: "One year after the launch of Nova 3Play, the company continues to be in a strong position. Our choice to differentiate with respect to competition, creating a new market for entertainment and communication, shall be reflected in our financials. Retail revenues continue to show an increase, while in the second quarter showed improvement and turnover and EBITDA. The great appeal of Service Nova 3Play continued unabated, increasing the penetration of pay-TV and broadband in the country. As a result, the customer base of the company hit a new record high, improving its market share. "
Bundled Services / 3Play 
At the end of June 2014, subscribers Nova 3Play services of Forthnet, amounted to 344,400, marking an increase of 68.4% compared with the second quarter of 2013, boosting its presence in Forthnet Greek households. In the second quarter of 2014, new subscribers Nova 3Play totaled 20,100, an increase of + 9.5%, compared with 19,100 a year earlier. 

Similarly, there was an increase in the share of subscribers Nova 3Play, in relation to the total subscriber base of Forthnet, the tendency to act supportive, both in average revenue per subscriber, and to strengthen customer loyalty. 

Telecommunication Services 
At the end of the second quarter of 2014, subscribers of telecommunications services increased by 11.7% compared to last year, and amounted to 667 800. In the overall market LLU, Q2 2014 added 26,300 lines, of which 13.0 thousand new subscribers relate Forthnet. As a result, the market share of Forthnet new LLU subscribers reached 49.5%, verifying the impact of Nova 3Play. 

Pay TV Services 
In the second quarter of 2014, the subscriber base grew 29.4% compared to last year, reaching a record high of 482,600 subscribers, despite the seasonality adversely affects the pay-TV at the end of June. The impact of service Nova 3Play continued dynamically in Q2 2014 The service deployment 3play expected to continue to be the backbone of the development of pay-TV market.

Thursday 7 August 2014

The FBI attacks Drive-by Download Malware Distributes


Hacking the FBI; Security experts call it "drive-by download": a hacker accesses a high traffic website and then divert visitors to deliver their malware. It is one of the most powerful tools in the arsenal of the Black Hat, capable of bringing thousands of new victims to hackers in a few minutes. 

As shown, however, the technique has been adopted by a different kind hacker, a species with a signal. The last two years, the FBI quietly experimenting with drive-by hacks as a solution to tackle the serious problems of Internet: how to identify and prosecute users of banned websites behind powerful (?) Anonymity system Tor. 

This approach has borne fruit, with many users of child pornography sites that are hidden behind the Tor have led t

he courts. But there is a conflict, because the Ministry of Justice "forgets" to describe the technical hacking judges, and has its use by defendants. Critics are concerned that similar techniques weaken the security and human rights defenders and activists, said that it is possible to become infected and someone innocent with malware only because government visited the wrong website. "You should listen to the Congress on this," says technologist ACLU Chris Soghoian, an expert on the use of hacking tools by law enforcement authorities. "If Congress decides that the technique is well suited, it's okay. But first let's talk about it. "

FBI DJThe malware used by the FBI of malware is nothing new, reports Wired. The service calls the method NIT, the "network investigative technique," or "network investigative technique," and use it at least since 2002 in cases involving child pornography, extortion, or who knows what else. Depending on the development of a NIT may be a full-featured program backdoor that gives the government access to your files, location, browsing history on web cam, computer name and your address. 
Please remember, however, what is the Tor and see the relationship with the FBI.

To Tor is a free, open source allows you to surf the web anonymously. This can happen by accepting connections from the public Internet using encrypted traffic.  

The system also supports the so-called hidden services specific websites which have addresses ending .onion. The access is achieved only through the network Tor, and is usually hidden services used by people who want to avoid surveillance. Some users of these services are legitimate and worthy causes - including groups of human rights activists and journalists. Of course there are hidden services for illegal activities, see Dark Net: to buy drugs, child pornography, killers for hire, and more 

The law enforcement and intelligence agencies have a love-hate relationship with Tor. They can use it themselves, but when others do, the hunters. Last month, the Russian Government has offered $ 111,000 to anyone who managed to break the Tor

Today's Children Face the Prior Art -Koitoun one Typewriter and have no Idea What to do

children with typewriter

In recent decades, technology has evolved rapidly and many of today's childrenhave no idea of the devices we used previously, either to play or to enter text. 

In the new episode of «Kids React», the group «TheFineBros» wanted to see the reactions of the children and gave them a typewriter asking them to write a text.They explained how to load paper, how to change the line and what to do in case of error. Their reactions were really fun as the frustration is painted on their face ...