Wednesday 31 July 2013

The Days Of Gigabyte Is Over

GÉANT has been upgraded to a maximum capacity of two terabits per second, with individual researchers and scientists able to enjoy connections of up to 100 gigabits per second.

        European scientists are pumping out an ever-increasing amount of data – just look at CERN’s Large Hadron Collider experiments for example – so here’s some welcome news for them: GÉANT, Europe’s research data backbone, has just completed a two terabits-per-second (2Tbps) upgrade.

         That’s a whopping amount of capacity for the network, which connects Europe’s national research and education networks (NRENs) with one another and also with overseas counterparts – in total, the network takes in 32,000 universities, schools, research institutes, hospitals and so on. And the result is just as impressive for individual researchers, who will now get connection speeds of up to 100Gbps each – that’s 1,000 times more than the pretty darned impressive cable connection I’m using as I type, and about 10 times the maximum they could hope for before the upgrade.

            The self-healing network offers capacity of up to 500Gbps today, with 2Tbps being the maximum that can be exploited in future. Entry into the terabit era will probably be necessary for handling the data spewing out of the Large Hadron Collider and other sources, including the upcoming Square Kilometre Array, the largest radio telescope ever, which is being constructed in South Africa and Australia.

            The upgrade meant renewing 50,000km (31,000 miles) of backbone, plus putting in new equipment – the backbone’s 500Gbps “super-channels” use Infinera’s DTN-X optical transmission platform, while the 100Gbps end-user speeds come courtesy of Juniper’s MX-series routers.

Meet Mynd: the iOS calendar app that keeps track of how you spend your time

Built by former Good Technology employees, Mynd helps users stay on top of their schedule and then lets them look back and see where they’ve been, who they met with and more.


           Yes, there’s another app about to launch that wants to help you stay productive and on top of your daily tasks and appointments. But this one, Mynd, also wants to help you decide if you’re spending your time wisely.

         Mynd goes live in the iOS App Store Wednesday morning, where it will be free to download. The app is a calendar that uses your contacts, maps, location, and Facebook, Evernote and LinkedIn accounts  to present a picture of what your day looks like. It will prompt you at the appropriate times to get ready for your next appointment; it’ll tell you when to leave for your doctor’s appointment in order to arrive on time, will dial you into your next conference call and show you the weather for where you’re going. It will also surface the Evernote notes that are related to particular meetings.

          When you open the app you aren’t presented with a traditional calendar view. You see a home screen of large panels that show you, all at once, your next upcoming appointment time, a picture of who you’re meeting with, the current weather report, the location you’re headed next, how many miles you’ve traveled today, and the number of appointments you have to go. It’s a lot of information elegantly presented. Instead of overwhelming the user with info, it actually makes the day seem manageable. Managing time is the app’s main feature. And its most important feature allows you to look back at the end of the day or page back through the week, get a quick summary and make a judgement about where you’ve been, who you met with, etc.

        “It’s at the core of what we’re about: time as the basis of presenting you with all sorts of relevant and interesting info about how you’re spending this valuable commodity of time,” Max Wheeler, founder and CEO told me.

Micromax A240 with Octa-Core Processor Rummoured to be launch soon

According to XXMNewscaster (Micromax serial leaker), Micromax’s next device will be called the Canvas A240 (aka canvas 5), will likely feature MediaTek’s MT6592 octo-core SoC and is expected to go official in Q4 of 2013 this Diwali or  Christmas priced around Rs 20,000.

According to rumors,in terms of hardware, the Micromax A240 could feature a 5-inch full-HD screen, Octa-Core MediaTek procesor with 2 GB RAM and a 13-megapixel rear camera, 5-megapixel front camera along with LTE (4g) connectivity, as it will be a fool decision for Micromax, if they launch the next Canvas flagship with Quad-Core processor or HD display, because they have already missed out the opportunity by launching the Canvas 4 with specs similar to Canvas HD.


The specifications provided above are just some expectations, However no words of pricing, specification and release date from Micromax.

How to hide folder in windows without actually hidding it

This is not a high-tech geeky trick, it's just a short and simple trick. When each time you create a new folder in Windows, Microsoft has made “New Folder” as the default name. Even you enter the spacebar so many times to create blank spaces, it still will generate the “New Folder” text like this.
So first we will delete the name of the file, after which it will looks like this.

To do this, you need a keyboard with numpad.
1) Create a new folder in your specified directory.
2) rename the folder or file by pressing F2 key or Right Click -> Rename.
3) Now hold ALT button and press 0160 ( or 255) using numpad keys.
4) Hit Enter then you are successfully creating a folder without name in Windows XP.

Here half of our work is done i.e. text is deleted now we will hide icon, to hide icon:
1) Right Click on folder -> properties
2) Click Customize tab -> Change Icon...
3) Choose invisible icon then press OK and close properties window
Tada!!!

Tuesday 30 July 2013

MediaTek Announces TRUE Octa-core Processor For Mobile Devices


            There has been talk of MediaTek coming up with a new octa-core chip, which should be seen in mobile devices by November. While the date for mass production stays unchanged, the company has officially introduced the new octa-core processor, codenamed MT6592.

            Samsung already has an Exynos 5 octa-core processor out in the market. But the reality of the chipset is another matter all together, as it makes use of ARM’s big.LITTLE architecture. This is basically a combination of two quad-core processors, the first being a Cortex A15 chip, which is bunched in with a power-efficient Cortex A7 CPU. This means that at any point in time, only one set of four cores will be active.

          The new MediaTek processor, however, stands out with the claim that it can make all eight cores work at the same time. This should give much better performance in terms of gaming, as well as other functions like Internet surfing, better video playback, as well as better battery performance. The company has also said that all eight cores can function well without the fear of overheating.

Enhanced multi-tasking capabilities




By allowing tasks to run concurrently with the use of multiple different cores, MediaTek True Octa-Core intelligently allocates processing power to where it is needed, both on a per-application and per-task basis. With MediaTek True Octa-Core, users can enjoy heavy web downloading, hardcore gaming, high-quality premium video viewing or other types of rigorous multitasking without experiencing lag times or excessive battery consumption.





Improved current-application experiences

Advanced web browsing:

With the unique ability to allocate individual browser tabs to CPU cores, MediaTek True Octa-Core allows for a faster, more stable web browsing experiences.

Smoother user interfaces:

With the ability to delegate user inputs to individual cores and render 3D effects more smoothly, the functionality and appearance of user interfaces in both applications and operating systems are significantly enhanced.

Superior gaming experiences:

The advanced multi-threaded programming deployed in the MediaTek True Octa-Core, enables different sequences to be allocated to different cores, delivering enhanced video frame-rate processing and exceptionally low-latency gaming experiences.

Efficient video playback:

When on decoding mode, the battery used for decoding HEVC (H.265) FHD video can be reduced by up to 18 percent compared to current quad-core solutions. While on display mode, MediaTek True Octa-Core provides users 20 percent more frames.





Monday 29 July 2013

11 Mobile Etiquette You Must Know

Cellphones are ubiquitous and research shows that although most users think they have good mobile manners, many people report being irritated or annoyed by the use of the phones in public places.

Clearly there's a lack of understanding of what is and isn't acceptable in terms of cellphone etiquette. Following is a list of do's and don'ts: 



1>Do respect those who are with you. When you're engaged face-to-face with others, either in a meeting or     a conversation, give them your complete and undivided attention. Avoid texting or taking calls. If a call is        important, apologize and ask permission before accepting it.

2>Don't yell. The average person talks three times louder on a cellphone than they do in a face-to-face             conversation. Always be mindful of your volume.

3>Do be a good dining companion. No one wants to be a captive audience to a third-party cellphone               conversation, or to sit in silence while their dining companion texts with someone. Always silence and             store your phone before being seated. Never put your cellphone on the table.

4>Don't ignore universal quiet zones such as the theater, church, the library, your daughter's dance recital           and funerals.

5>Do let voicemail do its job. When you're in the company of others, let voicemail handle non-urgent calls. 


6>Don't make wait staff wait. Whether it's your turn in line or time to order at the table, always make                  yourself available to the server. Making servers and other patrons wait for you to finish a personal phone      call is never acceptable. If the call is important, step away from the table or get out of line.

7>Don't text and drive. There is no message that is so important.

8>Do keep arguments under wraps. Nobody can hear the person on the other end. All they are aware of is        a one-sided screaming match a few feet away.

9>Don't forget to filter your language. A rule of thumb: If you wouldn't walk through a busy public place with      a particular word or comment printed on your T-shirt, don't use it in cellphone conversations.

10>Do respect the personal space of others. When you must use your phone in public, try to keep at least           10 feet (three meters) between you and others.

11>Do exercise good international calling behavior. The rules of cellphone etiquette vary from country to country.

Good cellphone etiquette is similar to common courtesy. Conversations and text exchanges have a tendency to distract people from what's happening in front of them. Cellphone users should be thoughtful, courteous and respect the people around them.

Get ready for a TV-like Twitter

        Social networking site Twitter, which has more than 500 million registered users, will become comparable to a non-evolving, static structure like TV in the future, a new study predicts.

        The study from scholars at Columbia Business School and the University of Pittsburgh questions the sustainability of Twitter.

"Get ready for a TV-like Twitter," said Professor Olivier Toubia, co-author of the study.


       The research examined the motivations behind why everyday people, with no financial incentive, contribute to Twitter.

      The study examined roughly 2,500 non-commercial Twitter users. In a field experiment, Toubia and Professor Andrew T Stephen randomly selected some of those users and, through the use of other synthetic accounts, increased the selected group's followers.



            At first, they noticed that as the selected group's followers increased, so did the posting rate. However, when that group reached a level of stature - a moderately large amount of followers - the posting rate declined significantly.

        "Users began to realise it was harder to continue to attract more followers with their current strategy, so they slowed down," Toubia added.

        "When posting activity no longer leads to additional followers, people will view Twitter as a non-evolving, static structure, like TV," Toubia said.

         Based on the analyses, Toubia and Stephen predict Twitter posts by everyday people will slow down, yet celebrities and commercial users will continue to post for financial gain.

        "Twitter will become less of a communications vehicle and more of a content-delivery vehicle, much like TV. Peer-to-peer contact is likely to evolve to the next great thing, but with 500 million followers, Twitter isn't just going to disappear. It's just going to become a new way to follow celebrities, corporations, and the like," said Toubia.

The study was published in the journal Marketing Science.



Sunday 28 July 2013

Create your own RAM cleaner using NOTEPAD

Many times our computer become slow, when we keep using our PCs for long time or working with many programs. It may be due to RAM, as our RAM eventually get's filled up with unnecessary programs. So, if you can clean or clear the RAM by deleting those unnecessary programs that you are not using any more, your computer will again run at normal speed, but many of us don’t know how to do it.

So, in this article I will show you how to clean RAM using notepad in 4 simple steps:

1) Open notepad.
2) Type "FreeMem=Space(51200000)".

Above code is only for those who have 512 MB RAM, if you have 1GB(1024*1 = 1024 MB) RAM than replace 512 from above code to 1024 and if you have 2GB(2048 MB) RAM in your Computer than replace 512 from above code to 2048.

3) Save file with name "RAMCleaner.vbs".
4)Close it and run the file.

It will free memory in RAM. As simple as that!!!

Now whenever you want to free up RAM, just run "RAMCleaner.vbs". When you run this file, nothing will appear on screen i.e. no message, no popups, but you will find that your PC has become fast and RAM got cleared.

Saturday 27 July 2013

Trick To Make Your Firefox Fast

This Firefox tricks will improve the speed & load time of firefox. And you will be able to surf considerably faster.

Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.

network.http.max-connections-per-server =32

network.http.max-persistent-connections-per-proxy =16

network.http.max-connections = 64

network.http.max-persistent-connections-per-server = 10

network.http.pipelining = true

network.http.pipelining.maxrequests = 200

network.http.request.max-start-delay = 0

network.http.proxy.pipelining = true

network.http.proxy.version = 1.0

Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it receives. 

Apple's iPhone activation servers experience Up, Up and Away




iPhone users reported being unable to activate their new iPhones due to issues with Apple's activation servers on Thursday.


      Apple's iPhone activation process experienced hiccups Thursday, with users reportedly unable to activate their new phones.

           The check-in process phones home to Apple before users are able to use the device, leaving new buyers out of luck. The security measure has been a source of frustration during previous product launches, when the servers were swamped with new owners.



Apple declined comment on the apparent downtime, which was reported earlier Thursday by MacRumors.

The issues came as Apple's developer site and most of its connected services near a full week of unavailability. Apple temporarily closed the site down last Thursday following what it says was an attack by an intruder. This Thursday's connectivity issues are believed to be unrelated.

Update has been rolled: The issue has now been fixed.

Friday 26 July 2013

All you need to know about Android Master Key vulnerability

                As you may have heard by now, the recent discovery of the Master Key vulnerability is by far the most threatening vulnerability in Android. If you are still uninformed about this development, sit back and see what it’s all about and why there’s good reason to be scared.

What is Master Key?
        To understand what Master Key is, we must first understand what happens when you install any application on your Droid. All Android apps and games are APK files (short for Android Package). These are essentially bit-compressing .zip files that have a different file extension and contain all the resources one needs to run the particular app. These resources are packaged within very specifically-named files, so as to be compatible with all Android devices. When you install the app, the device recognises each resource file and executes them.


            The Master Key vulnerability allows attackers to insert two files with the same name into the package. The Android verifier baked into the OS checks for file signatures for the first instance of any file with duplicate names; however, it will extract and install only the second (or latest) version of the file. This is the Master Key exploit, which was discovered by researchers from Bluebox, a security startup. The company will announce the full details of this vulnerability at Las Vegas at the Black Hat conference later this month, so it may be that the full extent of its powers are still unclear. But from what we know so far, it works by including in the APK, a legitimate file and a second file with the same name that's modified to do whatever the attacker wants. The real danger, of course, is that the app will look like the official version and function 100 percent regularly, but could be executing malicious code in the background.

             A similar loophole, which exploits another resource file in a package (classes.dex, to be specific), was found in the wild in China this week and is allegedly being used by two apps. This particular way to breach regular-looking apps is not as versatile as the original Master Key discovery as it needs the duplicate file to be of a particular size, so it has limitations. As you may know, China does not have access to paid apps from the Google Play Store, so third-party app storefronts and "warez" sites are the go-to option for Chinese Android users to experience the same apps. This is a highly insecure environment, which exposes users to exploits such as the Master Key and any variants.

What does it do?
          The potential of the Master Key exploit is only limited by the devious imagination of the attacker. It could be as simple as using your Android to spy on your location and all communication. A scarier scenario is that your device could be used to send premium-rate texts, make background calls (when your phone is sleeping) to the same high-rate numbers, use background data and thus bleed you out of your money. The situation turns worse if you are using your device for business email and storing confidential enterprise data. The exploit can be used to access all such files and thus damage more than just your personal life.

            Attackers can modify system-level software information and can inject their own information, as shown by Bluebox's screenshot of an exploited device below. In this case, the firm changed the Baseband Version name to include BlueBox, something that normally follows the system firmware and is decided by the OEM.

           The biggest threat is that your device can be used to create a scary botnet. Botnet is a portmanteau of robot and network, and is a collection of programs that are connected to the internet. It started off as a way to bring live interactive communication (you may know this as chat) and synchronous conferencing to the Internet, making it mimic real-life communication.This is a very mundane use of a botnet.

          But botnets could also be used to send spam emails from your system, thus giving the spammer an alibi. In its most evil form, however, a botnet can be used to conduct Distributed Denial of Service (DDoS) attacks. Since smartphones and tablets running Android have high user involvement, it becomes that much more dangerous when they are part of a botnet used to conduct DDoS attacks. It will essentially allow the attacker to use your device to bring down web servers, and if left uncontrolled, can even take down the Internet. If it must be pointed out, this will cause huge financial and infrastructural damage to governments and organisations invested in the net.

How to protect yourself?
           Raise your hands if you’ve ever used a pirated app instead of paying up for it on the Play Store. You could very well be in danger. Piracy of apps is rampant in India, as is evident from the number of Indian users on websites that provide downloadable, cracked APKs. A simple search for members based on their location yielded 1,267 pages of results for India on one such website (iPmart). So it’s essential that users DO NOT (we cannot stress this enough) install apps downloaded from such sources. You are just inviting a world of trouble.

Secondly, head to Settings now and to the Security page. Here, uncheck the box that lets you install apps from unknown sources (It says Unknown Sources). And it's also a good idea to check the box that asks you whether Android should verify apps before installation. Those who use only the Google Play Store to get their content should most likely be safe considering Google released a patch for the Master Key almost immediately after it surfaced and also seeded it to OEMs. However, just the fact that OEMs have the update doesn’t mean your device will too. After all, how many devices get official updates (even minor firmware bump-ups) from their companies?



            Perhaps this is too simplistic, but it’s always a good idea to verify who the developer is even when you are using the Play Store. Look for how many apps the developer has released (a lone app released recently should raise alarms), read the user reviews and do a search for how the app has been received in the media, if at all. As an alternative, one could install (from the Play Store, of course) any number of apps that scan APKs before they are installed. You can also check if your Android is vulnerable to Master Key thanks to Bluebox's app.

          Malware on Android is not new and neither will the Master Key exploit be the last one that will threaten these devices, but we are glad that it was discovered by security researchers and not first found infecting devices in the wild. With the Black Hat conference scheduled for July 27, we don’t have to wait too long for more details about this particular exploit to emerge.

Sony announces 4.3 Jelly Bean will come to Xperia Z devices

                Sony has confirmed that the latest version of Jelly Bean will be coming to the Xperia Z, Xperia ZL, Xperia ZR, Xperia SP and Xperia Z Ultra. For now, the only tablet that is confirmed to be getting Android version 4.3 Jelly Bean is Xperia Tablet Z.  

            
           Android version 4.3 Jelly Bean may have only been revealed by Google few day ago in Nexus Range, but Sony isn’t wasting any time at all. The company has released a software roadmap for Xperia devices that will be taken into the 4.3 Jelly Bean fold. 

           The smartphone manufacturer has admitted that the Jelly Bean 4.1 rollout for Xperia 2012 products had not been “as succinct or as timely” as the customers might have expected. Sony has written quite a lengthy, informative piece about how it tries to improve and refine its efforts to bring users new Android versions in a blog post.

           
          The rollout of Android version 4.3 for Sony phones will depend on the carrier and market you are in, but the Japanese company says that it is keen on bringing the latest iteration of Android to customers as quickly as possible.


             The company is currently working on making Android version Jelly Bean 4.2 available for Xperia Z and Xperia ZL. Starting early August, Sony will be rolling out the update for the Xperia ZR and Xperia Tablet Z. The company has some more good news – Sony will be looking at pushing some of its other devices running Android version 4.1 Jelly Bean to version 4.3 directly. 


Thursday 25 July 2013

Youtube in a new avatar, celebrating its up-comming geek week


YouTube has decided to celebrate its upcoming Geek Week event, and has started an Easter egg hunt on its Twitter feed.If you wanna see just what the video giant has planned, head to the site and type "/ geekweek" minus the quotation marks into the search field, you'll be presented a Unix terminal-style conversion and gawk away.
Fair warning: Your eyes might hate you for what you'll see. [Youtube Twitter]

Motorola unveils 3 phones under Droid range

                  Verizon Wireless, the biggest US mobile service provider, on Tuesday announced three new phones under its Droid smartphone brand from Google's Motorola and said that Motorola would be its exclusive Droid phone vendor going forward.

                The phones, the Droid Mini, Droid Ultra and Droid Maxx will go on sale for $99, $199 and $299 for customers who sign a two year contract and will be available in Verizon stores August 20, according to Verizon Wireless.

         The Droid brand helped to resuscitate a struggling Motorola at the time as Verizon Wireless supported the device with a massive marketing campaign.



The exclusivity agreement with Motorola could be a blow for phone makers including HTC, whose devices have also carried the Droid brand in the past as have devices from Korea's Samsung Electronics.

           Verizon Wireless vice president of marketing Jeff Dietel said that since Droid phones should only include its "elite" phones based on Google's Android software it wanted a manufacturer "that matched all the expectations" for unique hardware and services.

            Verizon said the full retail price would be $499 for the Mini, $599 for the Ultra and $699 for the Maxx.

        Verizon Wireless is a venture of Verizon Communications and Vodafone Group.

Beebone PC virus threatens Indian cyberspace

The deadly 'Beebone' computer virus attacking the Indian cyberspace can take as many as 20 aliases to compromise the security of a computer system.

                    According to the Computer Emergency Response Team-India (CERT-In), a new variant of the Trojan win32/Beebone virus is spreading in the Indian cyberspace. The national Internet and computer security sleuths organization has stated that the Beebone Virus is from the Trojan downloader family and can install other malware and programs without the users consent.

The latest virus detected on the country's internet network is so notorious and lethal that it acquires as many as 20 aliases or masks to infect and attack a vulnerable computer system which is low on security features.

          For the past few months cyber security firms have been trying to find out more about the Beebone and Vobfus viruses. According to a new report from cyber security firm Kaspersky Lab these two viruses are working together to keep each other alive. This indicates that the criminals behind the two viruses are also aiding each other.

CERT has put together a list of aliases acquired by the Beebone virus for computer technology geeks.

Some of them are-- Trojan.Win32.Jorik.Fareit.qru (Kaspersky), W32/Autorun.worm.aaeh!gen (McAfee), W32/VobFus-BX (Sophos), Trojan horse ( Symantec), Trojan-FBZZ! 41E0B7088DD9 (McAfee), Trojan.Win32.SelfDel.aqhh (Kaspersky), Trojan.Win32.Jorik.Fareit.qsl (Kaspersky), Beebone-FMQ! 039FA2520D97 (McAfee), W32.Changeup! gen40 (Symantec) and Worm.Win32.Vobfus.dxpf (Kaspersky).

Android 4.3 announced, for Nexus 7, Nexus 4, Nexus 10 And Galaxy Nexus



After weeks of leaks, other leaks, and false starts, Google finally took the wraps off its next version of Android at an event on Wednesday in San Francisco. The new version of Android is actually the third version to carry the "Jelly Bean" label, as opposed to the rumored next-generation leap, "Key Lime Pie." Android 4.3 isn’t an overly dramatic advancement over Android 4.2, but its highlights include:

Wednesday 24 July 2013

6 YouTube Tricks You Probably Don’t Know


              This post intends to deliver tricks that will add more dimension to your experience on the YouTube platform, and allow you to enjoy some of the little-known shortcuts, hacks and special features you can use on Youtube.

1. Specific Start Time

         If you want to share just a certain portion of a video with a user, you’ll notice that there is no official option to do this. Normally you have to inform others which minute they can pull to start from. Bet you didn’t know that there is a handy hack to send a link to a user or embed a certain portion of the YouTube video in your website. Skip the fluff and get to the good stuff.

Here is how it works. Consider the following Youtube Video URL:
                        https://www.youtube.com/watch?v=r00ikilDxW4

After the URL link add #t=01m08s to set the starting point of the video at 1 minute and 8 seconds.

2. Auto Video Replay

            There are certain times when you get obsessed with a Youtube video, whether it’s a really catchy song or a funny video. Isn’t it annoying to always have to hit replay everytime you near the end? Why not activate the looping feature?

The what now? Let’s use the same YouTube video. Just replace youtube with the text infinitelooper in the URL and hit enter.


        It will redirect you to another YouTube third-party platform where you are also provided with the option of looping selected portions of the video.


3. Auto High-Definition Video Play

        Sometimes when you play a YouTube video the video quality has been set on default for you, usually at a lower quality video resolution. To prevent this from happening you can force the system to permanently play videos in an HD format.

        Grab the extension called Magic Actions for Youtube available only for Google Chrome and Firefox. Enable the option Auto HD in the extension and select the video resolution you would like to be played automatically. You can also set the mouse wheel to scroll up (and down) the volume of the video.


4. Accurate Keyword Searching

        There are a billion videos on Youtube so trying to find that specific Youtube video you want to watch is an adventure by itself. You might find yourself crawling through dozens of pages hoping to land the video you actually want to watch.

The solution for this time-consuming exercise is to add allintitle: before the keywords you are search for. What it does is basically provide you with only videos that include the chosen keywords
.


5. Omit Keywords

          You can opt for specific keywords to be in the search, or out of it. Let’s say you are searching for a tutorial about ‘register domain.’ Using the most conventional search form you will find tons of videos about how to register domain using Godaddy.

If you want to find other options that are not GoDaddy, you can always exclude the keyword from your search results i.e. ‘keyword -excluded keyword.’

Here is how it should look like.


6. Watching Videos with a Slow Internet Speed

           Youtube has released a robust feature called the ‘Feather Beta’. This feature is dedicated to users who want to run videos on a very slow internet connection. The system basically cuts down some bytes that limit the speed of video streaming in your browser.

To opt-in the feature you simply go to http://www.youtube.com/feather_beta and join the beta feature.



Tuesday 23 July 2013

Record iPhone screen video using xRec[No jailbreak required]..

iPhone-xrec

Until now, the only way to record the display of our iDevices was to run the jailbreak and install a special tweak. Apple doesn’t allow apps in the App Store that can record video of anything on the screen… until now. A new app has slipped on the App Store, its called xRec, it can fully record the iPhone’s screen, including any audio.
xrec-redbar
The interface is actually quite nice.Users can record screen activity, although the application requires an active Internet connection to function.The recorded video can then be saved to your camera roll or exported to other applications installed on the device. When the application is registered, a red bar will be displayed in the iPhone’s status bar until the recording ends.This can not be turned off. The application will record audio through the mic with different quality levels.

xRec is compatible with the iPhone 3GS/4/4S/5 and third-gen iPod touch or later running iOS 5.0 and up. The 4.4MB download is on the App Store and will run you $1.99. The developer says its not compatible with iOS 7. It probably won’t be available for long, so grab ASAP from the App Store before it’s too late!!!

Canonical looks to raise $32 million via crowdfunding to develop Ubuntu Edge phones

Canonical, the firm behind Ubuntu has announced a crowdfunding campaign to build the first batch of Ubuntu Edge phones.

The company hopes to raise $32 million in 30 days to manufacture a limited batch of 40,000 devices that will run both Android and open source Ubuntu Touch operating systems. Canonical is using the Indiegogo crowdfunding service, which is similar to the more popular Kickstarter, for the campaign and the Paypal electronic payment facility to collect the contributions.

Mark Shuttleworth, founder of Ubuntu, said in a press note, "Ubuntu Edge is the ultimate convergence device - challenging established norms for PCs and smartphones. The crowdfunding approach is a new way to prove demand for cutting edge technologies and new classes of devices, supporting the Ubuntu Edge is the best way to catalyse the next generation of personal devices from the industry."

The innovative Ubuntu Edge phone is said to support dual-boot with Ubuntu phone OS and Android, and will transform into a PC when docked with a monitor with full Ubuntu desktop with shared access to all phone's files.

The Indiegogo project lists the specifications of the Ubuntu Edge phones. The phone will be powered by a 'multi-core' processor coupled with 4GB of RAM and would include 128GB of storage. It will feature a 4.5-inch HD display with a resolution of 720x1280 pixels and would sport a sapphire crystal display. There will be an 8-megapixel rear camera with low-light feature and a 2-megapixel front camera. Other features would include GPS, accelerometer, gyro, proximity sensor, compass, barometer and active noise cancellation. The Ubuntu Edge phone is said to feature stereo speakers with HD audio and dual-mic recording. Connectivity options include LTE, Wi-Fi, Bluetooth and NFC. However, the site clearly mentions that the specifications are subject to change.

As of filing this report, the campaign has already raised over 3 million dollars, less than 24 hours after launch.


New iPhone 5S photos leak appear

New iPhone 5S photos appear, specs hint at 12 MP camera, higher CPU clock, quad-core GPU

           
          Parts for the iPhone 5S have leaked quite a few times before, and now we have another batch of what seems to be chassis waiting to be stuffed with internal silicon.

          The more interesting part here are the claimed specs accompanying them, which say that we'll get a 4" 2272x1280 pixels IGZO display accounting to whooping 652 pixels per inch<ppi>, meaning high brightness at frugal battery consumption, the same A6 SoC like in the iPhone5, but clocked higher, and a quad-core PowerVR SGX544MP4 GPU, instead of the tri-core unit we have now.
         

          The source also confirms 2 GB of RAM, NFC at last and the elusive fingerprint scanner we've been hearing about for a while, linked to mobile payment system of sorts, though we have to see the two gigs of RAM listed officially to believe them. As for the camera, it gets downgraded a bit in terms of resolution from the last leaks, claimed to be 12 MP instead of 13 MP now, but a dual LED flash system is confirmed. 

Monday 22 July 2013

App to tell where you will exactly be in future

                 
            NEW YORK: Do you know precisely where you'll be 285 days from now at 2 pm? Researchers have developed a new tracking software that can tell you exactly where you will be on a precise time and date years into the future.
Adam Sadilek , formerly of Microsoft 
John Krumm
       
        They used information from a pool of 300 volunteers in the Seattle metro area, Sadilek and Krumm  gathered a mountain of location data.



           
             As the volunteers went about their daily lives — going to work, to the grocery store, out for a jog, even for transcontinental travel — each carried a GPS device much the same way they carried a cell phone, Fast Company Magazine reported. The researchers also installed GPS devices in commercial shuttles and transit vans that the volunteers used regularly, and the volunteers' own vehicles, to further ensure accuracy.

           After collecting over 150 million location points, the researchers then had Far Out, the first system of its kind to predict long term human mobility in a unified way, parse the data. Far Out does not need to be told exactly what to look for — it automatically discovered regularities in the data.

           "For example, it might notice that Tuesdays and Thursdays are usually about the same and fairly consistent from week to week. Then when we ask about a future Tuesday or Thursday, the algorithm automatically produces a typical Tuesday/Thursday as a prediction," they said.

Actual Mobile Paying Device Through Credit Card

For those who fear Virtual Money Transfer and The Under Developing Countries GOOD NEWS !!!

iZette

           Enter iZettle, a Stockholm, Sweden-based company which wants to solve this problem by introducing a credit card reader which does work with smart cards.

           Instead of swiping a card, this little device lets you insert them into iZettle to read the chip contents. In that sense iZettle is not plugged on the headphone jack but on the Dock connector, making the device bigger than Square but I guess something’s gotta give.
         
          Aside from the regular card processing, users will also be able to share their spending with friends on Facebook and Twitter a la Blippy. The short iZettle promo video follows.



Same Kind of Thinking from Ezetap an Indian Company




Bangalore-based Ezetap has launched a new mobile point-of-sale device that will cost a lot less than similar products in the market, while meeting global security standards and RBI guidelines.

Rapid growth in India's online retail and financial service sectors is leading to a demand for secure point-of-sale devices, as companies move towards non-cash based transactions. Overall, credit and debit card based transactions in India are expected to touch 862 million this year, a growth of 33% over last year, according to a report by Atos Worldline India.

"India is the toughest market, very competitive and cost sensitive," said Ezetap co-founder Abhijit Bose, who expects to sell one million devices in the next two years. The Ezetap device, will be priced at around Rs 2,900, consists of a lightweight card reader that can be plugged into any smart device or feature phone used by a retailer. Customers need to only swipe their cards on the mobile to complete the transaction.

"Most people prefer cash on delivery. And it became difficult, when they did not have exact cash at the time of delivery," said Abhinay Choudhari, co-founder of online grocery store BigBasket.com, which has about 1.5 lakh customers. Experts said with the government promoting digital payments, the mobile point of sale market is expected to soar. "Millions of mom-and-pop businesses, or kirana shops, cannot afford expensive integrated point-of-sale solutions," said Uttam Nayak, group country manager for India at Visa.

There are a number of companies that offer mobile payment solutions, including Mswipe, Prizm Payments and Synergistic Financial Networks. "It is a very competitive space," said Nayak who expects the insurance and ecommerce industry to be the biggest adopters of mobile point of sale solutions.

Ezetap has bagged banking customers, such as Citibank and Yes Bank, as well as those in the ecommerce, telecom, insurance and hospitality sectors. The company has launched operations in Kenya and expects to enter the South-East Asian markets in the next three months.

SIM Card flaw makes millions of mobile vulnerable to hacking

sim cards
An eighth of all SIM cards used around the world could be at risk of fraud, theft, or being bugged, a German security expert has claimed.

It has been revealed that the encryption that is used by some mobile SIM cards can be a direct source for hackers in remotely controlling their host handsets. According to The New York Times report, this flaw is directly linked to cards using DES (Data Encryption Standard).

Karsten Nohl, the founder of Germany’s Security Research Labs, who has supplied some hacking achievements previously, brought in details of the attack to both the New York Times and Forbes.

angry phone women
According to Nohl, two targeted SMS texts could allow a hacker to send premium text messages, re-direct and record calls and even undertake payment system fraud of NFC-equipped devices.
Nohl said: “We can remotely install software on a handset that operates completely independently from your phone. We can spy on you. We know your encryption keys for calls. We can read your SMS’s. More than just spying, we can steal data from the SIM card, your mobile identity, and charge to your account.” Nohl also said that he can complete such operation in about two minutes, using the personal computer.

Karsten Nohl
Karsten Nohl
Nohl is preparing to present his findings to the annual Black Hat security conference coming up on July 31 in Las Vegas.He estimated that the flaw might affect as many as 750 million mobile phones.

Verizon and AT&T said they knew of Nohl’s research, but said their SIM profiles were not vulnerable to the flaw. AT&T added that it had used SIMs with triple Data Encryption Standards (3DES) for almost a decade; Verizon did not specify why its SIMs were not vulnerable.


“Give me any phone number and there is some chance I will, a few minutes later, be able to remotely control this SIM card and even make a copy of it,” Nohl says.

Nohl has already advised GSM Association and other chip makers to tighten up technology to block the kind of messages he had sent in the process. He also asked operators to comply with the newer standards of encryption. Nohl also warned consumers using SIM cards more than three years old to get new cards from their carriers.