Thursday, 13 November 2014

The Google rents airbase of NASA

In order to extend the exploration of space and robotics, Google will pay to NASA 1,6 bn. Dollars to hire a historic airbase near the company's headquarters in Silicon Valley.

The Google rents airbase of NASAManagement of Federal Airport "Mofet ', an area of four million acres on the peninsula of San Francisco, passed on 60 years in Planetary Ventures, a mysterious company owned by Google.

Little is known about its activities, although according to some reports, the company is active in the real estate market.

Google has not revealed how it intends to use the facility, but according to NASA, the space will be used for "research, development, assembly and testing in the areas of space exploration, aviation, robotics and other emerging technologies.

The two founders of Google, Larry Paige and Sergey Brin, are known to be concerned about issues of aviation and Space Administration, and recently acquired companies were robotic and satellite technology.

Under the agreement, the Planetary Ventures will take to restore the "Hangar One" of the airport, a giant structure that dates back to 1933 and has been declared a historic and listed. A total of $ 200 million will go towards the restoration of Hangar One and two other similar structures.

The Federal Airport "Mofet" was used by the US Navy before going to the Ames Research Center of NASA.

Already used for landing private aircraft carrying top executives of Google.

The sex video of Emma Watson with spam came back to Facebook

Sex Video of Emma Watson
Remember the posts - warnings that had as its subject the Emma Watson;
Although it is an old malicious campaign, it seems that the name of Emma draws crowds. Especially if the title of Facebook Spam advertises a Sex Tape of the famous actor.

Clicking on the link that promises hot videos will be redirected to the page Google translation. Within a few seconds, you will be redirected to another page that is hosted on a free hosting "altervista.org".
As usual, the victims are asked to copy and paste the URL containing the access token in facebook to verify their age.

Just click on the buttons "Activate", you will see a pop-up stating "8 New comments". Clicking "Continue" will take you to a Facebook application that asks users to give permission to access their profile, friends list, email addresses and birth dates.
The spammers of course they do not ask the Date to send your card on your birthday. The information collected will be used in the future for new spam or any malicious purpose.

Wednesday, 12 November 2014

Rosetta: Historic Landing on The Comet Chasing for 10 Years

Rosetta: Historic Landing on The Comet Chasing for 10 YearsAround 18:00 GMT, and after 10 years journey connected with the spacecraft Rosetta, Phileas (Philae), a small spacecraft designed to land on the comet 67P, he carried out his mission successfully.

The weight 113 kg lander Philae succeeded smoothly in length 4 km comet, and then sent a signal back to Earth, which confirmed the success of the mission.

The Philae
The mission began 10 years ago with the launch of Rosetta Philae who brought a smaller spaceship. A few hours ago, Philae, which is the size of a washing machine, disconnected from Rosetta and began to fall to the comet. The fall lasted about 7 hours and the Philae lander managed to smoothly. Although part of the landing was selected to be as smooth as possible, it was not certain that the Philae would be able to land smoothly.

The Director General of ESA, the Jean-Jacques Dordain, said "We all learned that the Philae landed. This is a big step for mankind. This is the earthly intelligence that makes the difference. "

The special hooks that were designed to be thrown to the ground during the landing was not used for this reason we do not know if the Philae managed to remain in the party landed. Scientists working on how to shoot the hooks to make sure the position of Philae. According to the pressure received by the Philae landing wheels touched the surface and the landing was smooth.

No spacecraft has landed on the comet, although the Nasa with Deep Impact, 2005 sent a mini spaceship to collide with a comet to see what ingredients consisted of.

The Journey of 10 Years
After the launch of Rosetta in 2004, the spacecraft used 3 times Earth's gravity as a slingshot to accelerate the speed needed to reach the comet. The Rosetta spacecraft using solar panels to have energy for electronic systems, but when he arrived at the most distant point from the sun, where he arrived only 3% of the light that reaches the Earth, should be put in a form and performing Sleep only basic functions. In January 2014 the Rosetta «awakened" successfully in August reached the 67P.
Rosetta: Historic Landing on The Comet Chasing for 10 Years
Comets Are The Primary Elements Which Formed Our Solar System
Comets are very important goals as large frozen pieces are left over from the creation of the planets 4.6 billion years ago. Comets are thought to have maintained the primary elements which created our solar system, says Jean-Pierre Bibring, a scientist who works with the Philae.

The complex molecules are considered to be the original pieces which created life may still exist on the 67P / Churyumov-Gerasimenko. The Philae has about 60 hours to do all the experiments using 10 institutions before its batteries run out. If Philae is perhaps the shadow has the possibility to charge the batteries with solar panels has.

The Rosetta has already amassed valuable information, as no one ever had followed a comet for so long. Already know how to smelt the environment of the comet from the chemical elements which has acknowledged. The scent would smell if anyone was on the comet would be quite uncomfortable as like rotten eggs or horse urine. Also as the temperature rises as the comet approaches the sun seen firing more water from its surface.

The Rosetta costing 1.4 billion euros, and will continue to accompany the comet for some time. The mission will end in December 2015 when it passed to the closest point to the sun.

Friday, 24 October 2014

Sweetie: The avatars that "captures" pedophiles on the Internet

Sweetie: The avatars that "captures" pedophiles on the Internet"My name is Sweetie (cute). I am 10 years old and I live in the Philippines. Every day I sit in front of the camera on my computer and talking with men: 10, sometimes 100 per hour. Asking me to take my clothes off. And they undress. "

It is a confession that undoubtedly shock. Fortunately, however, Sweetie is a ten year old girl, allegedly advised when interlocutors.

This is an avatar (SS so called graphical representation of a human) or, more simply, a software that pretends to be a minor.

Its purpose is to "fish" pedophiles who try to satisfy their appetites, thinking that they are dealing with real children (as unfortunately happens often).

"What we do not know is that I'm not real. I'm a computer system that has been built specifically to identify people who do these acts, "said Sweetie.

The "Sweetness" was born in the laboratories of the Dutch NGO Terre des Hommes. So today is "converse" with thousands of men from around the world who seek to engage in sexual acts in front of the webcam, thinking they are real.

Until now, these people remain unpunished. On Tuesday, however, an Australian became the world's first pedophile sentenced for acts made ​​against not a real man, but a ... avatar.

His name is Robert Scott Hansen is 38 years. Brisbane's Court sentenced him to two years imprisonment, judging the guilty on charges related to child sexual abuse.

"Hey, are you really nine years?" Asked the Sweetie Hansen at the beginning of the dialogue. When he got hit, wasted no time: "I like Asian chicks. Are you "inside" for some action?  Have you ever seen a man naked. He said to a ten year old girl "I am naked.

According to the judge, no matter if it was a real child, or computer software. What matters is that the actor thought he had to do with a minor in the Philippines.

The Sweetie goes into chatrooms and "fishes" pedophiles who surf the Internet to reach out to young children.

In just 10 weeks approximately 200,000 men from 71 countries came into contact with her. According to its creators, most of these people are "above suspicion": a family and children, a good job and a high income and education levels.

In the case of Hansen's organization Terre des Hommes recorded all the "talks" with his Sweetie, as well as the movements of the front of the camera and delivered the material to the Australian police.

The action started Sweetie in a campaign to end the so-called "tourism of webcam» (men surf the internet and pay children from developing countries to perform sexual acts on camera).

appeals

Some, however, do not agree with this practice. The Terry Gorman, president of the Australian Council of Civil Liberties, said the use of such avatars of private organizations is "far-fetched" and equivalent to continuous policing.

Last year, British police warned that these "hunters" often destroy the lives of innocent people - some of whom are driven to suicide - and prevent the identification of the actual culprits.

Jailbreak for iOS 8.1

ios-8-1-jailbreak
The same team that released the jailbreak for iOS 7 and released the jailbreak for iOS 8.1. Currently, the tool only works on systems with Windows, it is in Chinese, and do not install the Cydia by default.

The jailbreak at present in several errors and we recommend you try the device. If you use a password system crashes, there are problems with Cydia, and several tweaks do not work.

To Cydia has been updated to the new iOS, but requires manual installation of SSH. If you are adventurous, you can download the tool from the jailbreak website Pangu.

We do not, however, wait until you correct the error.
Jailbreak for iOS 8.1 was last modified: 24/10/2014 00:59 by dim

Thursday, 23 October 2014

Apple, wants to replace the keys with iPhone and proximity sensors


iPhone and proximity sensors
The Apple just patented a patent which could be used in your iPhone and a car equipped with CarPlay, to unlock the doors, opening the trunk to open it or heating. The main thing is that all this is done without taking off your cell phone from his pocket. 

Rather than replace your key with an application that lets you unlock the doors to start the engine or download below the windows, which already offers the GM, the Apple the go a step further by using proximity sensors. 

More specifically, using the technology of Apple iBeacon to connect with the car or a location based vCard, when you approach the car a range of actions can be triggered. The patent describes that depending on the place where you are around the car, it will open for example the trunk or unlock the doors. But the idea does not stop here. 
iPhone and proximity sensors

With the car connected to the network (by 2020 it is estimated that 150 million cars will have a data connection), the sensors will recognize the iPhone user's movement in the street, at home and in the office and can predict that for example to heat the water when he goes home and opens the heating when you arrive at the office. 
iPhone and proximity sensors

Of course all this is a patent, as it currently only offers Ferrari cars equipped with CarPlay. But the question remains today what it is when you run out of battery.

Sony, further reduces the low sales forecasts for smartphones

Sony
Lately the news for Sony is not at all well. After sore losers announced 1.7 billion dollars and then change strategy with layoffs and a shift towards more high-end devices, now comes to reduce even further expectations for sales of smartphones for the financial year. 

According to information from the Wall Street Journal, and will announce further discount on estimates and not the first time you do it in 2014 for the first time went to 43 million sales of the 50 was the goal. The new estimates are lower because of the change strategy Sony wants to move away from the entry-level smartphones and therefore leaving key markets such as China. 

Although the news is not so encouraging, Sony seems to have focused on a plan that will help to boost the segment of mobile. 

For a long time trying to make attractive high-end devices like the Sony Xperia Z3 and renew the cycle of its flagship every six months instead of a year most people do.

Wednesday, 22 October 2014

BLOCK - First Articulated Smartwatch

BLOCK smartwatch
After the Project Ara, the first modular smartphone which you can make whatever you want out of the camera, the RAM, CPU and more, comes the first articulated smartwatch. The Project Ara passed into the hands of Google and Phoneblocks, now an independent organization, decided to take the step to buying wearable devices.

Create a modular, customizable smartwatch which called Blocks. The modules that are available to create your own smartwatch will include square and circular screens / facades, E Ink front, microphone, motion sensors, sensor gestures, GPS, heart rate sensor, sensor for oxygen in the blood, fingerprint scanner , headphone jack, camera, extra battery, NFC, lens and many more.

Each module will have a removable cover so you can configure and appearance with functionality. Now wonder if that can fit all of this, the answer is that the modules will be part of a bracelet.

The Blocks will enter a phase of crowdfunding in the second quarter of 2015, and the price has not been announced yet. If all goes well at the end of 2015 will be released on the market. Currently based Tizen OS and then supporting Android, iPhone and Windows Phone.

Thursday, 9 October 2014

Trexte Windows applications and games on Linux with the new version of PlayOnLinux

PlayOnLinux
The PlауOnLіnux, ѕоftwаrе thаt uѕеѕ the Wine аllоwіng Lіnux users tо іnѕtаll аnd run games аnd аррlісаtіоnѕ designed tо run оn Mісrоѕоft Windows, has been uрdаtеd tо vеrѕіоn 4.2.5, whісh рrеѕеntѕ ѕеvеrаl ѕіgnіfісаnt іmрrоvеmеntѕ. 

Thе PlауOnLіnux ѕеrvеѕ thе same рurроѕе as thе Wіnе, but hаѕ a frіеndlіеr іntеrfасе, аnd several times it іѕ able tо run gаmеѕ аnd аррlісаtіоnѕ do nоt work with Wіnе. The whоlе аррlісаtіоn іѕ bаѕеd оn Wine, however, іѕ much mоrе thаn a ѕіmрlе front-end. 
The PlayOnLinux іѕ quite рорulаr because іt hаѕ a ѕіmрlе аnd іntuіtіvе іntеrfасе. It іѕ сеrtаіnlу much еаѕіеr tо uѕе compared wіth Wine аnd іt іѕ particularly uѕеful for users whо have juѕt mіgrаtеd from Wіndоwѕ. 

"Thе PlауOnLіnux іѕ a piece оf software that allows you to еаѕіlу install аnd uѕе numеrоuѕ gаmеѕ аnd аррѕ designed tо run оn Mісrоѕоft Wіndоwѕ. Few gаmеѕ аrе соmраtіblе with GNU / Linux at thе moment аnd іt certainly іѕ a factor preventing thе mіgrаtіоn tо this OS. Thе free PlауOnLіnux brіngѕ аn ассеѕѕіblе аnd еffісіеnt ѕоlutіоn tо thіѕ рrоblеm, "wrіtе the developers. 
The PlауOnLіnux іѕ соmрlеtеlу frее and uѕеѕ Bаѕh аnd Pуthоn, mаkіng it еаѕіеr tо іmрrоvе ѕоftwаrе dеvеlореrѕ. 

Wednesday, 24 September 2014

Microsoft changes in domain addresses and Nokia websites

Microsoft changes in domain addresses and Nokia websites
The final movement of the domain adresses Microsoft have launched services Nokia, starting with the Nokia UK. «Nokia devices and services have moved to a new website» is the message you receive those who visit the page, which encourages them to follow a new link, which leads naturally to the website of Microsoft

It is natural to move to follow all company websites around the world, and a -like all deichnoun- Microsoft does not want the name «Nokia» in the smartphones. We are not talking about but "unexpected" evolution, since it was already known the intentions of Americans, from the commitment of the company brandnames (Lumia, Asha etc). Together, however, the 'mythical' name is lost as we saw a few days ago and the name «Windows Phone», which will take place the name Windows. 

Naturally expect more developments around the movements of Microsoft, but which leave the intense bitterness everywhere Nokia fans.

Monday, 22 September 2014

Check if your Android device is affected by the vulnerability SOP

 Android deviceA quarter of users with devices Android, uses the latest Android 4.4 version. All others use older versions.

The systems have not been upgraded since the manufacturers of the devices can not provide timely updates to devices. So often created security problems. A security flaw recently discovered in Android Browser reminds us why the difficulties manufacturers provide updates is an important problem. The Android Browser is the default web browser for Android devices. This changed after the release Android 4.2 when the default browser Google Chrome.
The Google Chromium changed in the Android 4.4 and this means that whoever does not use version 4.4 is exposed to the bug.

What causes the vulnerability 
When you visit a website, you can expect to provide you with fast content. A script (script) running on the site should, for example, may not be able to modify the contents of another site. This defect is found to occur in the Android Browser.

The Same Origin Policy (SOP) (or Greek Same Origin Policy) is a safety device designed to prevent the JavaScript to be executed from a web page to another. JavaScripts running in malicious sites will not be able to recover data from "good» sites.

This is the Android Browser when the browser is used by applications that could potentially steal sensitive data. Data such as cookies can be stolen by this vulnerability.

Check your device 
To check if your device is vulnerable visit the following website and click test to find out if you are affected.

http://ejj.io/SOP.php

If you get a popup message that your browser is vulnerable, be sure to immediately change browser.

The problem 
The Google is working on a patch to correct the problem. Placing the patch but the end user will be complicated. The main reason is that these kinds of updates responsibility lies with the manufacturer of the device.

Given that support devices usually ends after two years, it is unlikely that all vulnerable devices will receive the update.

To make things even worse, the switch to another browser like Firefox or Chrome the affected devices only solves part of the problem. Although the browser is safe, the applications running on the device can still use the default browser is of course the Android Browser.

Google ads with malware! million computers with malicious software

Google ads with malware!
Google ads with malware! Yes you read that right. Yesterday evening, researchers Malwarebytes noticed a strange behavior on sites like Last.fm, The Times of Israel and the newspaper Jerusalem Post. The ads served these websites were unusually aggressive, causing warnings from anti-virus systems and Malwarebytes. 

After much research, the security researcher Jerome Segura realized that the problem stems from the ad networks of Google, DoubleClick and popular Zedo. Both networks promoted malicious ads that are designed to distribute Zemot malware. A Google spokesman confirmed the problem, saying: "Our team is aware of the problem and has taken the necessary to eliminate it." 

The Malware served by ad networks (or «malvertising») is nothing new, but this incident is noteworthy because of the unusually wide range of attack. 

"He was active, but not visible for several weeks until we started to see popular sites to" fly »flags on our honeypots," says Segura. 
"Then we thought, that something is happening." Early indications came in late August, and today millions of computers likely to have been exposed to Zemot, and people with antivirus is not updated at risk. "

The Zemot focuses on computers with Windows XP, although it can also infect and modern operating systems that run on x86 and 64bit. The Zemot designed to bypass the security of a system before infecting with additional malware. 
"Even though there were only 5% of vulnerable systems," says Segura «expect a very large number of infections."

Sunday, 21 September 2014

The Google does not force any more new users to Google+ account

Google+ account
Google is changing little things these days will probably make new users, happy. Those who open a new account in Gmail will not longer have to also create Google + account. 

The option is there, but Google continues to invite new users to create a profile on Google +, which will "help make Google better for all, contributing to reviews on YouTube, and ratings for apps, books, movies Play Store ». But now the company will not cause those who only want the Gmail service to hurry and create an account at Google Plus, according to a publication of the Marketing Land. 

You can click "Create Profile" or select "No, thanks" to proceed without Google + account. 

Until now, those who wanted to use only Gmail completely "democratic" had to obtain a social network of Google. 

The move comes after an attempt by Google to separate users of Google + users of other products. For example, not long ago, the news that YouTube will only accept comments that are supported by a Google + account caused quite a stir and the reactions of users. 

It seems, however, that the dedication of Google for Google + network rather fade. The company came late in the game of social media and really does not offer a product that will make users leave Facebook or Twitter. 

Mr. Vic Gundotra, head of Google+ had created and lead the social networking site from the beginning, chose to leave the company last April. It will be interesting to see how Google will manage the product from here. Rather it is unlikely to close the service, since it has about 300 million monthly users, but is likely to start separated from the other products of Google, or at least will reduce the level of dependency between Google + and the rest of the portfolio.

Posts only specific friends to "Moments" of Facebook

Facebook
One of the problems that has come the complaints Facebook is its membership that they can share photos, files and posts specific atoma.Sta more members, it is difficult to create a post or a photo album with the ability to see specific individuals (through lists), while most also do not know that they can create a hidden group members epithymoun.Afto people trying to solve the Facebook, the application Moments, which has made its appearance even in some pilot users .

The purpose of this application is to create groups in Facebook, a combination of buddy lists and groups that posts, photos and videos that take members to be available to those who wish.

The user simply selects which group of users will be available in the post.

It is not clear whether it will be a separate application, but rather will be enaensomatomeno feature of the social network.

Thursday, 18 September 2014

Announcement of the Geforce GTX 960 expected in late October

Geforce GTX 960
On September 19 the expected announcement of the new Geforce GTX 970 and GTX 980 from Nvidia, and it will be late and anakkoinosi "small" GTX 960.

The smallest of the three graphics cards prepared by the Nvidia is also located close to the official announcement.

The Geforce GTX 960 is expected in late October, according to TechPowerUp, it belongs to the lower price of $ 300.

Regarding the cores, the memory supported and the other technical characteristics, there is no information so far.

The Higher-apacity SD card in the world 512 GB by SanDisk

SanDisk 512 GB SD Card
According to the company, the SanDisk Extreme PRO SDXC UHS-I memory card is the highest capacity SD card on the market, and is designed to meet the needs of professionals who require sophisticated equipment in order to meet the demands of recording 4K Ultra High Definition (3840x2160p ) video, Full HD video (1920x1080) and high speed burst mode photography. 

As said Dinesh mess, vice president product marketing SanDisk, the 4K Ultra HD is an example of a technology that "pushes us in the development of new storage solutions able to manage files of huge size. The card 512GB SanDisk Extreme PRO SDXC UHS-I is impressive progress, which allows professionals to reliably store more material in a single card than ever before. "

As stated in the announcement of the company since 2003, the SanDisk unveiled its first SD card of 512 MB, the capacity requirements have grown significantly and the card of 512 GB represents 1.000plasiasmo capacity in just over a decade, however, have the same size. The card provides write speeds up to 90 MB / s speed and recording UHS Speed ​​Class 3 (U3) for high-resolution, natural color and stutter-free 4K Ultra HD video. Transfer speeds of nearly 95 MB / s resulting in fast data transfer. 

To meet the requirements of professionals, the card is designed to withstand and respond to extreme environmental conditions (temperature, water, vibration, radiation), and accompanied by a special offer download software to recover photos that have been deleted by mistake. 
The cost is (suggested retail price by the manufacturer) to $ 799.99.

Printable solar stick everywhere - Two cells per second

Printable solar stick
Printable solar panels that will soon be marketed developed by a consortium set up by Australia's Agency for Scientific and Industrial Research of the Commonwealth (CSIRO) together with the University of Melbourne and Panepistimio Monash. 

The technology relies on the use of a special "solar ink" that can be printed on a plastic film (film) with conventional printers, similar to those used for banknotes. 

The research team behind the printable solar intended for use on any surface that would accept plastic: bags of metaforasforiton electrical computers to skyscrapers. 

The best part is that the printing speed is such that it takes more than two seconds to print a solar cell. 
The Organic Solar Cell Consortium of Victoria in Australia working in printable photovoltaics since 2007 Scientists involved in the project have developed several processes including spray coating, reverse gravure, coating by placing the paint in specific slots (slot -dye coating) and screen printing. 

Plus using semiconducting ink, researchers can print solar cells directly into flexible sheets (sheet thickness) of polyethylene terephthalate (PET), the same type of plastic used for bottled water and soft drinks. 
The cells can also be printed in steel or become semi-transparent for use on windows and facades. 
Initially built in coin-sized cells, but in a short time built into cell surface paper A3. Currently printing speed has reached ten meters per minute, which translates to a solar cell per second. 

The big downside of technology is as will be anamenotan- that achieved a 10% efficiency of this cell silicon. 
However, scientists aim to close the gap factor higher efficiency solar inks. The lifespan of the cells was only six months with a target of ten years. 

Comparing printable plastic solar panels with conventional silicon technology, Fiona Scholes by CSIRO notes that while declining price of silicon, plastic is even cheaper, while the cost of cartridges is negligible. 
"This is an important step forward because you can put those cells where you want. It is also more "consistent" than silicon, and operate in conditions of clouding. "

The huge range of applications of the technology has already attracted many companies prospecting the potential for commercial exploitation. Although, the printer used costs around 150,000 Euros, the economies of scale of commercial production is expected to make the cells very affordable.

Cycling in peace with MindRider

MindRider

The MindRider is a helmet for cyclists who has the ability to "read" the mind of the rider. It has a sensor which operates by way of EEG recording the reactions of the cyclist. It also has built and a LED. 
An application for iPhone receives and then processes the data sent by the MindRider. Then, in collaboration with the GPS data provided notes on the map of the route points that caused more stress and less rider that the next time to choose a specific route as well as to be more careful.

Tuesday, 16 September 2014

Android One Unveiled for the first 3 affordable devices

Android One
During the Google I / O, the company officially presented its new project which is called Android One and aims to bring much economic devices in emerging markets. Today presented the first 3 ultra cheap Android smartphones in India. This is the Karbon Sparkle V, Micromax Canvas A1 and Spice Dream UNO. 

The Dream UNO is the most economical of the three at $ 103 while the Sparkle V costs $ 105 and the Canvas A1 106 dollars. In India, Google has to compete with Mozilla on economic devices started selling mobile at $ 40 with Firefox OS. Of course we are talking about a market of 900 million population only 10% use smartphone, apomenos enough space for everyone. 

In terms of technical characteristics and the three models have the same specs: 4.5-inch screen with a resolution of 480 x 854, MediaTek MT6582 SoC with 1.3GHz quad-core Cortex-A7 CPU and Mali 400 MP2 GPU, 1GB RAM and 4GB built-in memory that can be expanded . The outdoor camera is 5MP and the front 2MP. It will also have Wi-Fi, 3G and Bluetooth connectivity, 2 card slot for SIM, FM radio and 1,700mAh removable battery. 

The best thing about the new devices that are running stock Android, specifically 4.4.4 KitKat. This means that for two years will get updates directly from Google and will be the first devices that will be upgraded to Android L with the Nexus.

Thursday, 11 September 2014

IFA 2014: New tablets and PC from Lenovo for high resolution gaming

New tablets and PC from Lenovo for high resolution gaming
The latest tablets offer options for mobile use? New gaming PC equipped for high resolution. 
ToTabS8 the first Androidtablet 8 inch powered Intel ® Atom ™ combines wonderfully clean infinity screen me strong productivity into a slim and lightweight frame. 
  • The Y70 Touch- The first inch touchscreen laptop17 Lenovo- provides players with the 4th generation of high-performance processor and Intel ® Core ™ NVIDIA GTX graphics card. 
  • The gaming notebook with quad Z50-75 AMDFX with FullHD screen dualgraphics performance and comes bundled with two free games from the collection of AAA titles at great prices. 
  • The ERAZER X310 expands the already strong gamingdesktopstis Lenovo series with discrete graphics, high-speed memory and futuristic design. 

The Lenovo announced the IFA Consumer Electronics show in Berlin 2014, expanding its product portfoliotis tabletskai PCs, offering consumers more options to suit tabletspou lifestyletous and options exclusively for gamingPCs restless. The new composition begins with the first TABS8 Androidtablettis Lenovopou powered by Intel ® Atom ™. The Lenovoanakoinose gamingPCs well as two new high performance: Y70 Touch, the first touch screen laptop17 inch Lenovo with the latest processor technology and graphics and ERAZERX310 HDgaming, the latest technology available LenovogamingPC. 

S8 Tab: Android combines experience with Intel performance 
The Lenovo TABS8 created for consumers seeking a stylish, slim and affordable Androidtablet. With infinite 1920x1200 screen of 8 inches, the TABS8 has sharper FullHD performance while OneGlassSolution technology within touch experience offers a clear display glass. The ultra slim tablet screen joins harmoniously with the dark facade, giving the TABS8 a clean and elegant. The front has a 1.6 megapixel HD Webcam for easy videochatting. Turning the TABS8 backwards to reveal the 8-megapixel rear camera. The F2.2 wide angle lens captures high definition, even in low light. The preinstalled applications like ShareIT, which allows quick and easy sharing of pictures and files. 

Designed to offer users maximum without sacrificing portability, LenovoTABS8, marks the first Android tablet 8 inches from Lenovo me Intel processor. Available IntelAtomZ3745 technology IntelBurstPerformance processor, fits TABS8 dynamic processing power for each task to maximize battery power without sacrificing speed and slim, lightweight design. ToTAV S8 weighs 295grkai is 78mm thin, almost as thin as a pencil. 

Additional features include optional high-speed 4G LTE (based Intel XMMTM 7160) and data connection WiFigia up to seven hours to give users the freedom wireless technology and 64-bit support. The TAB S8 KitKat runs Android 4.4, includes 2 GB of RAM, 16 GB of storage memory, Bluetooth 4.0 and dual Dolby ® reinforced front speakers. The colors vary by region and include black and blue black, yellow, white. 

Y70 Touch: Utmost performance HDgaming 
ToLenovoY70 Toucherchetai the 4th generation processor Intel ® Core ™ i7 processors and powerful graphics NVIDIAGTX, making it ideal for intensive use for fun and HDgaming. The 17-inch screen makes the Y70 Touchtis Lenovoto most laptop with a touchscreen, reaching new levels of interactivity to video editing, sharing, and games. 

The Y70 produces a stunning aural and visual experience, fullHDpou screen brings movies and games to life with enhanced color, clarity and resolution. The JBL ® stereo speakers and Dolby ® Sound subwoofersyndyasmena advanced AdvancedAudioparechoun experience totally exciting sound rarely  adding to the overall viewing experience. 
Weighing less than 7.5 pounds, the Y70 Touch, is thinner and lighter than most laptopsstin class, thanks to an external optical drive that supports Blu-ray and DVDkathos. ToY70 Touchdiathetei also up to five hours of life choices and adaptive memory and storage, with up to 1TB SSHD and 16GBDDR3L 512GBSSD or storage. 

Z50-75: Slim and lightweight optimized for games 
The elegant LenovoZ50-75 laptopparechei one gamingon-la-Gome great price integrated experience. Once AMDFX 2,5cmlepto has a quad, R7-M260DX 2GBgrafika and innovative APIgrafika that allows games and applications using the GPU effectively CPUkai, which improves performance by up to 60%. Equipped with a large 15.6-inch FHD 1920X1080 until 16GBDDR3Lmnimi, great storage options 1TBHDDi 1TBSSHD and stereo speakers Dolby ® HomeTheater ™, the Z50-75 offers users a fantastic gaming experience. 

The new package comes with two free Z50-75 games collection AAA titles, with titles such as "Thief" and "Darksiders", buyers can download through a special sitekanontas using a single password. The promotion will be available in EMEA and will be valid until 31 March. 

ERAZER X310: Unique Experience Flawless Gamingme 
The LenovoERAZERX310 is the latest addition to the affordable range of gamingdesktopypologistes Lenovostous. To keep users in action, has distinguished ERAZERX310 NVIDIA ® GeForce ® GTX, quad-core processor and up to 2 TB SSD 256 GB SSHD or high-speed memory. The combination of power and speed, which allows users to play more intense games without problems or delays. The ERAZERX310 improves immersive gaming experience with 7.1 channel sound and Dolby ® strengthening. 
The new chassis design features front and futuristic LEDfotismo profile that mimics the soft lines of the armor of a knight. The front panel has a port cover one-touch easy access and conceals a ventilation system keeps the device at the correct temperature when "lights" game. 

Other features include up 32GBDDR3 memory, four USB 3.0 ports and a port system always lit USBthira load for enhanced connectivity. 

Statements: 
"The PCs tabletskai final consumption give consumers even more options to choose the device best suited for quick lifestyletous" JeffMeredith, Vice President, Marketing, MobileBusinessGroup, Lenovo said "From super-portable Y70 tabletsto TABS8 and ERAZERX310 gamingPCs, we have optimized each to meet the diverse needs of consumers. "

"With LenovoTabS8 tabletpou driven by the Intel ® Atom ™ processor, consumers have the opportunity to enjoy high performance without major problems with battery life. You can enjoy the content they want on the tablet, based on Intelepexergasti as games and videos. "ErikReid, Deputy Director General of TabletBusiness IntelMobileandCommunicationsGroupkai said. 

Availability: 
The Lenovo TABS8, Y70 Touch, and ERAZER Z50-75 X310 will be available in the period 11 December 2014 through www.lenovo.com and wholesalers ....

Wednesday, 10 September 2014

Five Reasons Not to Buy Android Wear Smartwatch this Year

Android Wear
From the day I won my first Android smartphone, fell in love with everything in it. It was the first smart device I bought, but the configuration, freedom, affinity with Linux and the limitless possibilities offered was exactly what I was looking for. Since all communications in Google's Android to look forward and Wear rumors first Android SmartWatch made ​​my imagination run. 

Apparently, however, what I had in my mind is far from the one created by Google and thus refrain from buying an Android device wear at least for this year. Not that I'm worried about the quality of the raw devices, early adopter like myself who say the Americans, but what worries me is the use of a gadget and whether to serve in my daily life. The main reasons therefore improved by my thinking is: 

It's just a Google Now SmartWatch 
Android watches wear well be called "Google Now SmartWatch 'that's because its main function is to display our applications we have in our cards and mobile information Google Now. Of course more and more developers to create applications for Android clothing slowly, but they can get, and a time to be "improved" the logic of the platform, which means that next year we will have a new device. 

No Greek not proceed 
Since we got unfinished features, the biggest disadvantage of Android wear in my opinion are the languages​​. See all the videos where people use Internet with voice instructions in ... English. Correctly, then, is a device to be used without using both our hands, without the Greek language but how to exploit features and reduced? 

The addition of the Greek language, which by the way according to the rumors that we will be added in 2015, just change the way you see the wear on Android, but also the way we use our smartphone Android. Until then, though ... patience! 

Autonomy is laughable 
Thus we come to the problem that affects everyone gadget, which is none other than autonomy. Since I can remember the first mobile phones Battery technology lithium ion (and some more nickel - cadmium). This action was more than enough for the phones of the time, they do not have connectivity Bluetooth and infrared and color screens five inches. 

Today's manufacturers choose to grow the size of the device, increasing battery respectively, in trying to convince us that one day is enough for use before reloading. The same however can not be done with SmartWatch, first because it has to be necessarily small size and lightweight, and secondly because the wear and made to remove them from time to time by hand to the office. The problem is that if you have a day loaded and sufficient use our device, you may leave us in the middle, which is unacceptable for any gadget. 

I think the category is SmartWatch will force companies to look up the issue of the battery, but it is still too early to talk about it. 

Prices are high 
For each new product for SmartWatch is now up to them, and have higher prices. I remember my first Android (HTC Hero) I would buy € 550 with features that are now considered ridiculous. It's 100% reasonable to be high when you do not know a technology operating prices, but this is not true SmartWatch is so small smartphone with "petsokommeno" Android. The processor, RAM, display technology and other components that make up the first SmartWatch are the same as those observed for many years in our mobile. It is not something new for the company, and therefore the risk is not great to justify the high prices. 

Nor should we forget that we are talking about an accessory and not a stand-alone device and is very stupid to have a decent smartphone to 180 € (Moto G) and the accessories that come with an unfinished 300 € (LG Clock T R). Personally I think the most expensive SmartWatch what we have seen to date should be available at 150 €, while probably my market will do when I will be what I'm asking about 100 €. 

The wear is another concept Android 
The most important of all, however, I think the Android Wear something unfinished. The Google has just launched the idea of waiting for manufacturers and independent developers to complement it. So did the older Android, but the original image was wider than the wear, which will undoubtedly change in the future, but still do not know how. 

Today SmartWatch So as I've seen so far is identical in features and functions, with the exception gear with Tizen OS Samsung and I think still worth investing in them. I am not opposed to SmartWatch in general, and the proof is that I have already purchased one (which will soon be under review), but I can not find utility in Greek Wear for Android users, as our gifts to Google.

The Developers Playground of GDG Thessaloniki started and excited guests of the 79th Thessaloniki International Fair


Developers Playground of GDG

September 07 was the opening day of the season DevFest II, for the second time in Thessaloniki official and exclusively for participants in the playground. 

Developers Google Group this year, after "guideway" from Google, focused on four key pillars that will bring the future in our hands: 
  • wearable technology 
  • cloud platforms 
  • Google Maps API 
  • Chrome Extensions and planning 

During the first day of DevFest, guests and participants of the Playground, I had the opportunity to try the Google Glass and solve their queries by Wiebe Elsinga a Google browser Glass. For this reason, developers Google Group 3 workshops planned based on technology and utility of Google Glass. The positions of these workshops filled immediately, and had over 300 people attending, or have questions about the Glass Google! 

Notable was the presentation of a 12 year old, who traveled from Athens to Thessaloniki exclusively for games. The atmosphere was very warm, and as we all know, the GDG Thessaloniki is enthusiastic when it comes to bringing these young talents. 
Google DevelopersAfter Google sessions Glass, saw Wiebe Elsinga flushes on stage when he began to assemble a team talk UX prototyping and a related workshop, where participants had to form teams and start planning your implementation. The workshop lasted over two hours, but neither the participants nor he realized how quickly time passed Wiebe. 

Alongside the conference center Emil RIADIS (former Crown) held the Lady Geek Day event for the first time in Thessaloniki, inspired by the initiative of women Techmakers Google. The panel attended four main women: Olga Stavropoulou Marika Lambrou, Sandra Zafirakopoulou and Liana Gouta. They shared their experiences with the audience and focused on the need to break the stereotypes that prevent women from participating in science, technology and entrepreneurship. Solve the problem in accordance with the same comes through changes in basic social structures such as family, but also through the educational community in line with the labor market. A pleasant surprise was the presence of two young girls, who have announced their intention to create a group of women in the areas of information technology, in an effort to come closer to the fair sex of code generation and beyond. 

After the end of the break, the event moved to stand 14, the area features the Google Developers. There spokesman Mr. John Kotsifis Hackers Media, presented the group's activities. The main target of hackers Media is developing a flexible program of basic education for journalists in order to be better equipped to deal with new technologies. The joint venture was created specifically for the purpose of the project and includes eight experienced partners representing areas of journalism, journalism education, vocational education and training and advisory services in six Member States of the European Union.

Security measures in iCloud with delay

Security measures in iCloud
The trick that resulted in leaks photos of celebrities, led Apple to implement a stricter security policy delivery push notifications, users using iCloud. 

Apple CEO Tim Cook announced some new measures on Friday in an interview with the Wall Street Journal and said that will be implemented in two weeks. 

Earlier this month, if someone has the user name iCloud for a new device to ignore. 

However, new measures have been implemented, at least in part, by far, the account owner will receive a notification if someone has access to the service web browsers. 

Email notice Apple is very clear and says "Apple ID you use to log into iCloud via a web browser." 

The e-mail had at least ten minutes to take note that informed our Apple ID was used. That time is over-sufficient for an attacker to make changes to our account. 

You can try it for yourself to see the 'immediacy' warning Apple. Of course, if it happens to some really should immediately change your password to your account.

27 Year old arrested for sending a threatening message on Facebook

From the Department of Electronic Crime file a case formed post messages to the social networking site, where there was talk of threats against persons in the prefecture of Ilia. 
Facebook

Case formed file against domestic 27 years old, who was identified as a manager and owner of the "profile" of social networking, through which the issue had been hanging. 

It emerges from the above, through the website and Facebook in particular through "personal profile" which managed, sent a "page-group 'of the site, threatening message when firefighters and police officers who served or are serving in Services of Ilia. 

To clarify the matter, the Department of Electronic Crime contacted directly by the company and after a thorough investigation identified the digital internet connection used to send the message, which, as noted, came from Internet - cafe.

Step the police Cyber ​​Crime went yesterday (07/09/2014) morning in the area of Elis, which identified the 27-year old actor, who admitted that he sent the message in question, but claimed that he had no intention to carry out the threats.

The papers formed on the case will be submitted to the competent Prosecutor Athens.

Tuesday, 9 September 2014

How to check a suspicious link before clicking on it

Have you ever been in front of a link, do not inspire confidence? We all know the dangers that can result in a fatal one click. 
Secure HTTPS

There are warning signs that may indicate that the link can infect your computer or send it to a phishing website; 

Below we will describe how to identify malicious links and how you can check whether it is safe or not without their visit. 

Some warning signs of possible malicious links: 
Access services like bitly links (and many others) are popular choices for anyone trying to fit a link to the limits of a Twitter message. The iGuRu.gr use the service, for the same reason. Unfortunately, this method links and shortcut phishers and malware distributors is also used to hide the actual address. 

Obviously a shortened link, which helps identify a malicious link, but there are tools that let you see the real destination without clicking. 

Strange links in unsolicited email 
Very suspicious. If you received a spam email that is supposedly from your bank asking you to "verify your information" then it is likely to be a target of phishing attack. 

Even if the connection to your bank for email seems normal, you should not click as it could be a very well disguised to connect to the database phishing.Gia link, use a new browser window. All you need to enter yourself to face directly in your browser or using a bookmark that you created yourself. Be wary of links in emails, pop-ups, etc. Of course, if the bank check online is secure (https) green. 

Link contains unusual characters 
Malware distributors are constantly trying to hide the destination of links containing malware, or that lead to phishing sites. One of the ways they are using and URL encoding. For example, the letter "A" encoded in a URL will appear as "41%". 

The use of encryption can cover destinations, orders and other unpleasant things through a link, so no one can read it in advance. If you see this type of character in a bond, it would be nice to see. 

How to check a suspicious link without clicking it. 

Expand shortened links 
You develop a brief online using services like Untiny, or by installing a plug-in for your browser, which will show the destination of a shortened connection with a right-click. Some sites let you know if there is a link to a list of known malicious sites. 

Scan this link to connect the scanner 
There are several tools available that can test the security of the link before clicking on it. Visit the Norton SafeWeb, URLVoid, ScanURL and test the link. 

Select the antimalware software analysis in "real time" use. 
To have the best chance to detect malware before it infects your computer, it should benefit from the protection function has enough real-time antimalware. You may use more system resources, but protection is better. 

Keep your antivirus and antimalware used to date. 
If your security software does not have the latest virus definitions, which are not secure. Make sure your software is configured to automatically update periodically. 

Get a second opinion from a second scan of malware 
A second opinion from a different malware scanner offers extra protection. There are some malware that hassle and provide additional security.

Hacking as a Service: How much is hacking an account?

Hacking as a Service: There are many who may not be able to remember the days when HTML was written entirely by hand, as there are also many hackers, who can not remember when an exploit had to be built from scratch. The process of piracy has remained illegal, but seems to have become easier to use. Combining this fact with the increase in the number of online transactions, created fertile ground for the growth of the informal economy. 

With sophisticated exploit kits, free tools, botnets and hackers for hire, has become relatively easier than before could only be done by skilled hackers. We have created an illegal market that anyone can buy and sell malware, exploits, botnets, credit card information, zero-day vulnerabilities (for which no patch available) for all popular operating systems or applications and services such as the attack and destruction of a website or execution attacks DDoS site. How, then, operates through this market? 

As software as a service (SaaS) transforms the way we access applications, so the hacking as a Service (Haas) makes it easy for attackers. 

Piracy as a service 
Economically, the cost required to hire a hacker is similar to that required for hiring any other professional. The time spent by hackers and determines their remuneration, since it takes more time to complete the process of attacking the higher your rate. A simple DDoS attack or some malicious links SEO might cost only $ 100, while rats as Blackshades or renting a botnet could cost between $ 250 to $ 500 The complete control of a ZeuS botnet as the management and control of potential can vary from $ 20,000. 

Since the hackers apparently will not wait until you request its services to seek economic benefits, usually in search of income through the sale of exploit toolkits. Initially toolkits sales were not as profitable as before buy, download and be resold, can bring benefits to the developers stopped. Blackhole kit tools solved this problem by introducing a model of service updates, so that the user can be supported, new features and new zero-day attacks, provided you have subscribed to the original developer. Developers turn to invest some money to find and create new features and exploits the toolkit. Exploit kits as Metasploit open source you can download free. 

There are different specializations among hackers; 
As with the "legitimate" and ethical and IT / security professionals network, hackers hackers have specialties. There may be some who are experts in the planning and creation of viruses or Trojans, just as there are security professionals who specialize in creating signatures to detect this type of malware and participate in the creation of antivirus / antimalware products. There are probably others who have experience in identifying vulnerabilities in software or systems functioning. There may be others who have experience rape or networking websites. This industry is so diverse and the list of security certifications networks, IT managers are trying to acquire to become more expert. 

What is the solution? 
As observed costs may be relatively low, have caused significant damage, although they have significantly reduced barriers so anyone can act voluntarily. In the IT administrator one hand, this situation should not lead to resignation, but seeking new ways to protect smart. In general, to ensure that all software patches have been updated and complete information about new trends in the industry are an important principle. Speaking of trends, make sure you are in contact with the competent authorities if they are victims of a botnet attack. Symantec's work in this field has led to several strikes against botnets so far. 

It is important that users are trained to know how to protect your data. Network administrators must inform you that you have to avoid clicking on email links that do not know or avoid opening attachments you do not recognize. Also, managers should prohibit "pirated" software and conduct awareness classes to keep users informed. 

Editor's Note: This information is not available to help you compare the market or to encourage you to participate in illegal activities, but to better understand what facing IT managers and administrators. The pricing provided is not mentioned anywhere in particular, but the time spent on these activities.

Reddit Launched Support HTTPS for all Pages

The Reddit launched support HTTPS for all pages using CloudFlare, a popular CDN service and DNS. The move means that all the users can now use encrypted connections when browsing the site. 

For those not familiar, the Hypertext Transfer Protocol Secure (HTTPS) is a secure communication protocol. Despite the name, however, is not technically a protocol of its own, as it consists of the SSL / TLS protocol with a layer of HTTP. 

All your communications today, including authentication credentials, and your most cookies, will not be visible to attack man-in-the-middle. 

This is due to the fact that the policy used by Reddit is to redirect any non-HTTPS requests containing your credentials to HTTPS. The company, however, says that this will not work for everyone, because it "can not force them to use client API, such as mobile applications or bots, or some older browsers, use this setting.

Thursday, 4 September 2014

The nude photos of celebrities catapulted the share of Apple!

Can the loss of nude photos of beautiful women and famous as Jennifer Lawrence, Rianne, Ariana Grande, Kate Upton, Kim Kardashian and many others to be shocked on the other side of the Atlantic, but this does not apply to Apple itself. 
The stock of the company when it was announced that the issue has been resolved, jumped to a record 103, $ 74, an increase of 1%, despite the fact that the reported loss caused by the accounts of certain names in iCloud. 

According to the results of the internal investigation of the technology giant, which lasted 40 hours, this "targeted attack" exposed to risk accounts only some names but not detected signs of tampering on the storage system iCloud. 

A virus of 2009 has found the "backdoor" of the system 

The problem, according to experts presumably caused by the virus called "ibrute" who took a weakness in the "Find my iPhone". 

The iBrute created in 2009, when he lost 32 million usernames and passwords up to the creators to reach the 500 most common combinations that published in the particular websites. 

Probably, therefore, what they had achieved so far unknown hackers using virus was to find the appropriate codes constantly looking for new "solutions" possible to find a fair and gain access to personal photos of actors and other celebrities as well. 

E 'possible to use absolute immunity? 
As he wrote in Time magazine presents "the only effective way to protect yourself 100% on the internet is not to use it" But because we are in the 21st century and this is nearly impossible, experts conclude in five basic steps for protection. : 

  • Use unique passwords and different on all devices 
  • Use your choice of identification in two phases, if available. This option exists in iCloud from Apple, Google and Gmail, Dropbox, Facebook, Twitter, and Microsoft PayPayl. 
  • Turn off automatic "upload" photo. 
  • Especially for the iCloud the only safe procedure requires first of "close" a service for iPhone, namely the substance is not used. Then you need to delete the folder of photos from photos you do not want to be exposed. The next step is to "close" a pc in iCloud clearing these services does not want to "share" the internet. 
  • Turn the locking services on the mobile phone and the bills 

The operating system of the phone as well as companies such as Apple continually progresses "corrections" that protect against such problems.