Saturday, 10 August 2013

Brief Introduction About Moto X

Inside lies the answer to a question we’ve been asking since Google announced its $12.5 billion purchase of Motorola: what happens when Google builds a smartphone?

The answer to that question is the Moto X. It has endlessly leaked out in various forms for the past few months — Google chairman Eric Schmidt even posed for an impromptu photo shoot with one several weeks ago. Eighteen phones, face-down in rectangles of gray foam.

Okay, Google. Now.



The same, only different

         There are actually 504 potential versions of Moto X — the 18 available backplate covers, from concrete gray to hot pink, are just the start. You can also choose a black or white front panel, and the side-mounted buttons and the ring around the rear camera lens come in seven different colors. You have to pick between 16 and 32GB of storage. And then you can engrave the back of your phone.

You pick the color palette you want online, using a tool called Moto Maker. Although the Moto X will come to every carrier, the customization is exclusive to AT&T customers at launch, which is odd — it’s easily the most compelling thing about the Moto X. (It won’t last, either: everyone I spoke to said the exclusive is "just for now.") And if you pick, buy, and change your mind? Just ship it back within two weeks and try another.

To allow for the custom design process, Motorola placed its entire assembly operation for the X in Fort Worth, Texas. Components come from 16 states and countries around the world, but 2,000 or so workers assemble the phones in Texas and ship them all over America. There's certainly a patriotic element to the decision — Osterloh says "it's just the right thing to do" — but the real upside is practical. Since there's no boat from China to wait for, Motorola can have you a new phone in four days. It's like the Warby Parker of cellphones; just try it and see how you feel.

But while Moto X is clothed in high fashion, underneath that wardrobe you’ll find decidedly department-store internals. And that may be Motorola’s most interesting bet of all.




The sweet spot

         Jim Wicks calls this size "the sweet spot." Clad in a pink dress shirt that may well have inspired a Moto X color option, he says that Motorola's goal was to build an X that worked for everyone, and the process started with screen size. "We had a lot of debates about the density of the display — 1080 versus 720 — and what the right size is," says Wicks. "It's easy to hold for people. Basically they feel like they have an ample screen to do everything they want to do, but also it's highly pocketable."

Wicks and his team ended up choosing a 4.7-inch 720p AMOLED display, with whites that look a little pink when examined closely and the same motion-blur problems that plague every similar panel. Compared to the the HTC One and Samsung Galaxy S4, both of which have 1080p screens, it’s a mid-range panel, but Wicks says it doesn’t matter. "We could go and make a higher-resolution screen," Wicks says, "but it would just suck battery and nobody would know the difference."



Borne of the Droid

           Even though Motorola was aiming for simplicity, there are some software flourishes that don’t quite pay off. The phone constantly monitors its sensors to be aware of where you are and what you're doing, and can automatically switch into Driving Mode when it detects that you're in a car. But it can't tell whether you're driving or the passenger — so, you'll have to manually disable it every time you get in the back of a cab.

But overall, the Moto X runs what is essentially stock Android (version 4.2.2), and Motorola hopes to provide updates quickly by giving itself very little work to do. Osterloh characterizes Motorola's plan as simply to "remove a lot of the customizations that have plagued Android phones for a long time, and just focus right on the core Android user experience, which has evolved to a great place." Motorola's changes, he says, focus on improving existing features — like allowing Google Now to always be listening — without changing for the sake of changing.

Osterloh insists there's no nepotism from the Android team, and that Motorola is treated like every other manufacturer. A Google Play edition of the Moto X is coming, but it’s not clear when, or how much it’ll cost, or whether it’ll come at the cost of some of Motorola’s great software features. The Moto X is just a Motorola phone, prone to the same carrier hangups and bloatware as every other.

"But we also of course have a lot of Google influence," says Osterloh. Seventy Google employees took advantage of a company program that allowed people to transfer to Motorola, and Dennis Woodside, Motorola’s CEO, spent nine years at Google before being tasked with revitalizing the company. It may not be codified, and it may not help the Moto X get Android updates any faster, but Google's influence on Motorola is everywhere.


Detailed Specs Sheet :




Wednesday, 7 August 2013

Yahoo! to get a new logo with the same old flavour next month



        There are plenty of changes afoot in the Yahoo! office at Sunnyvale. Under iron-fisted CEO Marissa Mayer, Yahoo! is not only seeing a small but noticeable change in fortunes with the service refreshes and acquisitions, the Internet giant is also set to get a brand new look with a logo redesign in the works.


             In a blog post early this morning, Kathy Savitt, Chief Marketing Officer at Yahoo! announced that the company is going to introduce a brand new logo next month. “Over the past year, there’s been a renewed sense of purpose and progress at Yahoo!, and we want everything we do to reflect this spirit of innovation. While the company is rapidly evolving, our logo — the essence of our brand — should too.”

           To kick off the countdown to the new logo, Savitt announced that Yahoo! will be putting up a new design each day and on day number 30, will unveil the new Yahoo! logo. For those of you who think Yahoo! will completely change its identity, think again, Yahoo! will still be retaining its exclamation mark – the service’s calling card. It will also be retaining the colour purple and the famous yodel, the double “O”s that increase in size. Essentially, we could be looking at just a change in the font for the logo.

             The new-logo-a-day exercise will be limited to Yahoo’s network throughout the US only, but you will be able to check out the daily new logo on Yahoo’s Tumblr blog, Twitter and Facebook page. The logo redesign was done in partnership with artists like Macklemore and Ryan Lewis, John Legend and Imagine Dragons. The “30 days of change” campaign will come to an end on September 4 with the unveiling of Yahoo’s new logo.

Facebook changes News Feed again

                 
               Facebook's quest to be a personalized newspaper for the internet age continued on Tuesday with tweaks aimed at making sure members spy hot stories from their friends.

Changes to the leading social network's formula for figuring out which posts will be of interest included "bumping" up potentially intriguing stories that went unnoticed during prior visits to Facebook.

"It is hard for users to get back to old things; you have to scroll through things you have already seen," Facebook News Feed team engineering Lars Backstrom said while discussing the latest changes.

"We wanted to make it so people weren't missing important stories that didn't make top slots but were just below the fold."

Signals weighed in the machine learning algorithm were modified to bump-up a story considered more interesting than fresher material that formerly got priority simply for being newer.

"We tweaked the model," Backstrom said, noting that about 30,000 signals are balanced in the algorithm.

"Instead of just taking the new stories, we would take all stories that were new to you, that you haven't seen, even if it isn't the freshest."

A test of the change showed that the number of stories people read in News Feeds rose to 70% from 57% with "bumping," according to Facebook.

"Story Bumping is going to be a really nice tool for people if they... are sitting with a Facebook account and have run out of things to look at," said Facebook vice president of product Chris Cox. "It will bump up new stuff."

News Feeds were also modified to take into account the "last actor" a member interacted with and then give that friend's posts temporary priority since they seem to be up to something interesting.

"We wanted to capture your current state of mind as you were using Facebook," Backstrom said.

"A lot of signals are long term, such as the relationship with each friend; we wanted a real time factor."

Facebook's ranking software assigns numerical scores to the roughly 1,500 stories typically eligible for delivery to a member's News Feed and displays the top 300.

Powerful factors for ranking are relationships, along with how often a member comments, shares, "likes," or otherwise acts on posts of friends. Hiding posts sinks content from that person in News Feed rankings.

"Our goal is to create the best personalized newspaper for each of our readers," Backstrom said.

Facebook engineers are experimenting with ways for News Feeds to better handle chronological posts, such as a friend firing off play-by-play updates from a sporting event.

Backstrom's team meets each Tuesday to brainstorm ways to improve the Facebook News Feed, with worthwhile ideas tested internally among workers or with a tiny fraction of the social network's more than one billion members.

"It starts with intuition and then that gets written into code as a feature," said Cox. "Then we look at interactions."

Ads displayed as promoted posts in News Feeds are handled separately from content generated by people's friends or family members at Facebook, according to the ranking team.

"We figure out the most relevant News Feed with the organic content, and then, as a newspaper or television programme might do, we create advertising slots," said Facebook product manager Will Cathcart.

Backstrom compared the job of ranking News Feed posts to the challenge faced by internet search engines Google or Bing when it comes to quickly determining optimal results for queries.

"Facebook is one of the only places where you have a problem on the same scale as what Google or Bing is doing but you have to use different techniques because of the personal aspects of it," Backstrom said.

Sunday, 4 August 2013

Usian Bolt Now Playable in Temple Run 2

 

The six-time Olympic gold medalist and so-called "fastest man on Earth", Jamaican runner Usian Bolt, is now a playable character in the mobile game Temple Run 2.

This is the first instance in which Imangi Studios, the game’s creator, has added a character based on someone in real life. Imangi Studios, called Bolt's addition to the game an "obvious and fitting partnership."

Bolt joins the game's cast of fictional characters as a 99-cent in-app purchase available from the game's "Upgrades" menu, wearing his signature yellow-and-green Olympic uniform. He also brings the unique power-up, "Bolt", when activated, the character auto-dashes at breakneck speed, immune from the game's traps, with the coin magnet.

"I am a big fan of Temple Run. I travel all over the world, and travel time gives me lots of opportunity to play Temple Run at airports or on car journeys," Bolt said. "It's exciting to see myself represented within a game I already play."

Temple Run 2 is free for iOS and Android


Saturday, 3 August 2013

Types Of Hackers

This is How Google Defines Hacker

Q. Ever Wondered If there are type of Mobiles,PC's,Animals,People Then Are There Type of Hackers

Ans. Yes ,3 Major Types Lets Me Give A Brief Intro About Them.

1. White hat hacker                                 2. Gray hat hacker                         3. Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?

What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.

So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.

1. What Is A White Hat Hacker?

A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.

In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.


When computers appeared, this people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.

Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.

On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, Linux, a PC and an internet connection is all you need.

2. Grey Hat Hackers

A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.

For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.

If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.


Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers are not the only ones who go to this event. There are also computer journalists, computer security professionals, lawyers, and employees of the federal government. The event is composed by tracks of different kind, all of them related, in some way, to the world of hackers (computer security, worms, viruses, new technologies, coding, etc). Besides the tracks, there are contests that involve hacking computers, l ock picking and even robot related events. Ethical hacking, white hat hacking or whatever names you wish to use, at the end, it has a purpose: to protect the systems of organizations, public or private, around the world. After all, hackers can now be located anywhere, and they can be counted by the millions. Soon, concepts like white hat, linux operating system or grey hat will become common knowledge. A real proof of how much has our society been influenced by technology.

3. Black Hat Hackers

Black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals.
Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let's learn about black hat techniques and how they make our lives a little more difficult.
Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.


What Is Black Hat Hacking?

A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transfernces to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.

Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10'000,000 to Citigrou.


Interesting Windows Tricks And Hacks You May Find Interesting

Always Thought of Hacking And Cracking But Always Confused Where To Start With Let Me Help You To Boost You Towards Start.

>>Open COMMAND PROMPT while Locked by User.

>open notepad
>type www.command.com
> then save as cmd.bat at desktop
>then enter now its open.....enjoy

>>CracK BIOS Password

>Open the CPU
>Observe the Motherbord
>Remove the Silver Battery(3v)
>Wait 2 minutes and place the Battery
>>Restoring a Lost Desktop-
>Start
>Run
Type a period " . "
Then press Enter

>>If ur PC is hanged then do this.

Press shift+ctrl+esc or ctrl+alt+del
n den click on 'END TASK'
ur PC is runing now

>>create folder without name

>select any folder
>rename it
>press alt & type 0160 or 255
>enter

>>Turning off the Help on Min, Max, Close Icons

When the mouse goes over the minimize, maximize and close icons on the upper
right hand side of a window.

To disable that display:
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control Panel \ Desktop
3. Create a String Value called MinMaxClose
4. Give it a value of 1
5. Reboot

>>AUTO DELETE TEMPORARY FOLDER.!!

what i prefer is %temp% " without quotes.. at Start -> Run.. this opens ur temp folder n den u cal erase it nearly
First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in
that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

>>HIDE DRIVES

 How to Hide the drives(c:,d:,e:,f:...etc)

To disable the display of local or networked drives when you click My Computer.
1.Go to start->run.Type regedit.Now go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies

\Explorer

2.In the right pane create a new DWORD item and name it NoDrives(it is case sensitive).

3.Modify it's value and set it to 3FFFFFF (Hexadecimal) .

4.Restart the computer.

5.Now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created. Restart your computer. All the drives are back again.

>>Locking Drives:

We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.
Start & Run and type Regedit to open Registry editor
Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Create a new DWORD value NoViewOnDrive and set its value as

2^ (Alpha Number of Drive Letter-1) where Alpha number are simple counting of alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
To lock more drives, calculate the value of each drive and then set sum of those numbers as value
To unlock your drive just delete the key from the registry.

>>Locking Folders:

Consider you want to lock a folder named XXXX in your E:\, whose path is E:\XXXX.
Now open the Notepad and type the following

[code]ren xxxx xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D}[/code]
Where xxxx is your folder name. Save the text file as loc.bat in the same drive.
Open another new notepad text file and type the following

[code]ren xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D} xxxx[/code]
Save the text file as key.bat in the same drive.

Steps to lock the folder:
To lock the xxxx folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.

HOPE THIS TRICKS HELP YOU FOR INITIAL BOOST OF WINDOWS PC HACKING..........

STAY CONNECTED FOR MORE HIGH CLASS HACKING.........



Wednesday, 31 July 2013

The Days Of Gigabyte Is Over

GÉANT has been upgraded to a maximum capacity of two terabits per second, with individual researchers and scientists able to enjoy connections of up to 100 gigabits per second.

        European scientists are pumping out an ever-increasing amount of data – just look at CERN’s Large Hadron Collider experiments for example – so here’s some welcome news for them: GÉANT, Europe’s research data backbone, has just completed a two terabits-per-second (2Tbps) upgrade.

         That’s a whopping amount of capacity for the network, which connects Europe’s national research and education networks (NRENs) with one another and also with overseas counterparts – in total, the network takes in 32,000 universities, schools, research institutes, hospitals and so on. And the result is just as impressive for individual researchers, who will now get connection speeds of up to 100Gbps each – that’s 1,000 times more than the pretty darned impressive cable connection I’m using as I type, and about 10 times the maximum they could hope for before the upgrade.

            The self-healing network offers capacity of up to 500Gbps today, with 2Tbps being the maximum that can be exploited in future. Entry into the terabit era will probably be necessary for handling the data spewing out of the Large Hadron Collider and other sources, including the upcoming Square Kilometre Array, the largest radio telescope ever, which is being constructed in South Africa and Australia.

            The upgrade meant renewing 50,000km (31,000 miles) of backbone, plus putting in new equipment – the backbone’s 500Gbps “super-channels” use Infinera’s DTN-X optical transmission platform, while the 100Gbps end-user speeds come courtesy of Juniper’s MX-series routers.

Meet Mynd: the iOS calendar app that keeps track of how you spend your time

Built by former Good Technology employees, Mynd helps users stay on top of their schedule and then lets them look back and see where they’ve been, who they met with and more.


           Yes, there’s another app about to launch that wants to help you stay productive and on top of your daily tasks and appointments. But this one, Mynd, also wants to help you decide if you’re spending your time wisely.

         Mynd goes live in the iOS App Store Wednesday morning, where it will be free to download. The app is a calendar that uses your contacts, maps, location, and Facebook, Evernote and LinkedIn accounts  to present a picture of what your day looks like. It will prompt you at the appropriate times to get ready for your next appointment; it’ll tell you when to leave for your doctor’s appointment in order to arrive on time, will dial you into your next conference call and show you the weather for where you’re going. It will also surface the Evernote notes that are related to particular meetings.

          When you open the app you aren’t presented with a traditional calendar view. You see a home screen of large panels that show you, all at once, your next upcoming appointment time, a picture of who you’re meeting with, the current weather report, the location you’re headed next, how many miles you’ve traveled today, and the number of appointments you have to go. It’s a lot of information elegantly presented. Instead of overwhelming the user with info, it actually makes the day seem manageable. Managing time is the app’s main feature. And its most important feature allows you to look back at the end of the day or page back through the week, get a quick summary and make a judgement about where you’ve been, who you met with, etc.

        “It’s at the core of what we’re about: time as the basis of presenting you with all sorts of relevant and interesting info about how you’re spending this valuable commodity of time,” Max Wheeler, founder and CEO told me.

Micromax A240 with Octa-Core Processor Rummoured to be launch soon

According to XXMNewscaster (Micromax serial leaker), Micromax’s next device will be called the Canvas A240 (aka canvas 5), will likely feature MediaTek’s MT6592 octo-core SoC and is expected to go official in Q4 of 2013 this Diwali or  Christmas priced around Rs 20,000.

According to rumors,in terms of hardware, the Micromax A240 could feature a 5-inch full-HD screen, Octa-Core MediaTek procesor with 2 GB RAM and a 13-megapixel rear camera, 5-megapixel front camera along with LTE (4g) connectivity, as it will be a fool decision for Micromax, if they launch the next Canvas flagship with Quad-Core processor or HD display, because they have already missed out the opportunity by launching the Canvas 4 with specs similar to Canvas HD.


The specifications provided above are just some expectations, However no words of pricing, specification and release date from Micromax.

How to hide folder in windows without actually hidding it

This is not a high-tech geeky trick, it's just a short and simple trick. When each time you create a new folder in Windows, Microsoft has made “New Folder” as the default name. Even you enter the spacebar so many times to create blank spaces, it still will generate the “New Folder” text like this.
So first we will delete the name of the file, after which it will looks like this.

To do this, you need a keyboard with numpad.
1) Create a new folder in your specified directory.
2) rename the folder or file by pressing F2 key or Right Click -> Rename.
3) Now hold ALT button and press 0160 ( or 255) using numpad keys.
4) Hit Enter then you are successfully creating a folder without name in Windows XP.

Here half of our work is done i.e. text is deleted now we will hide icon, to hide icon:
1) Right Click on folder -> properties
2) Click Customize tab -> Change Icon...
3) Choose invisible icon then press OK and close properties window
Tada!!!

Tuesday, 30 July 2013

MediaTek Announces TRUE Octa-core Processor For Mobile Devices


            There has been talk of MediaTek coming up with a new octa-core chip, which should be seen in mobile devices by November. While the date for mass production stays unchanged, the company has officially introduced the new octa-core processor, codenamed MT6592.

            Samsung already has an Exynos 5 octa-core processor out in the market. But the reality of the chipset is another matter all together, as it makes use of ARM’s big.LITTLE architecture. This is basically a combination of two quad-core processors, the first being a Cortex A15 chip, which is bunched in with a power-efficient Cortex A7 CPU. This means that at any point in time, only one set of four cores will be active.

          The new MediaTek processor, however, stands out with the claim that it can make all eight cores work at the same time. This should give much better performance in terms of gaming, as well as other functions like Internet surfing, better video playback, as well as better battery performance. The company has also said that all eight cores can function well without the fear of overheating.

Enhanced multi-tasking capabilities




By allowing tasks to run concurrently with the use of multiple different cores, MediaTek True Octa-Core intelligently allocates processing power to where it is needed, both on a per-application and per-task basis. With MediaTek True Octa-Core, users can enjoy heavy web downloading, hardcore gaming, high-quality premium video viewing or other types of rigorous multitasking without experiencing lag times or excessive battery consumption.





Improved current-application experiences

Advanced web browsing:

With the unique ability to allocate individual browser tabs to CPU cores, MediaTek True Octa-Core allows for a faster, more stable web browsing experiences.

Smoother user interfaces:

With the ability to delegate user inputs to individual cores and render 3D effects more smoothly, the functionality and appearance of user interfaces in both applications and operating systems are significantly enhanced.

Superior gaming experiences:

The advanced multi-threaded programming deployed in the MediaTek True Octa-Core, enables different sequences to be allocated to different cores, delivering enhanced video frame-rate processing and exceptionally low-latency gaming experiences.

Efficient video playback:

When on decoding mode, the battery used for decoding HEVC (H.265) FHD video can be reduced by up to 18 percent compared to current quad-core solutions. While on display mode, MediaTek True Octa-Core provides users 20 percent more frames.





Monday, 29 July 2013

11 Mobile Etiquette You Must Know

Cellphones are ubiquitous and research shows that although most users think they have good mobile manners, many people report being irritated or annoyed by the use of the phones in public places.

Clearly there's a lack of understanding of what is and isn't acceptable in terms of cellphone etiquette. Following is a list of do's and don'ts: 



1>Do respect those who are with you. When you're engaged face-to-face with others, either in a meeting or     a conversation, give them your complete and undivided attention. Avoid texting or taking calls. If a call is        important, apologize and ask permission before accepting it.

2>Don't yell. The average person talks three times louder on a cellphone than they do in a face-to-face             conversation. Always be mindful of your volume.

3>Do be a good dining companion. No one wants to be a captive audience to a third-party cellphone               conversation, or to sit in silence while their dining companion texts with someone. Always silence and             store your phone before being seated. Never put your cellphone on the table.

4>Don't ignore universal quiet zones such as the theater, church, the library, your daughter's dance recital           and funerals.

5>Do let voicemail do its job. When you're in the company of others, let voicemail handle non-urgent calls. 


6>Don't make wait staff wait. Whether it's your turn in line or time to order at the table, always make                  yourself available to the server. Making servers and other patrons wait for you to finish a personal phone      call is never acceptable. If the call is important, step away from the table or get out of line.

7>Don't text and drive. There is no message that is so important.

8>Do keep arguments under wraps. Nobody can hear the person on the other end. All they are aware of is        a one-sided screaming match a few feet away.

9>Don't forget to filter your language. A rule of thumb: If you wouldn't walk through a busy public place with      a particular word or comment printed on your T-shirt, don't use it in cellphone conversations.

10>Do respect the personal space of others. When you must use your phone in public, try to keep at least           10 feet (three meters) between you and others.

11>Do exercise good international calling behavior. The rules of cellphone etiquette vary from country to country.

Good cellphone etiquette is similar to common courtesy. Conversations and text exchanges have a tendency to distract people from what's happening in front of them. Cellphone users should be thoughtful, courteous and respect the people around them.

Get ready for a TV-like Twitter

        Social networking site Twitter, which has more than 500 million registered users, will become comparable to a non-evolving, static structure like TV in the future, a new study predicts.

        The study from scholars at Columbia Business School and the University of Pittsburgh questions the sustainability of Twitter.

"Get ready for a TV-like Twitter," said Professor Olivier Toubia, co-author of the study.


       The research examined the motivations behind why everyday people, with no financial incentive, contribute to Twitter.

      The study examined roughly 2,500 non-commercial Twitter users. In a field experiment, Toubia and Professor Andrew T Stephen randomly selected some of those users and, through the use of other synthetic accounts, increased the selected group's followers.



            At first, they noticed that as the selected group's followers increased, so did the posting rate. However, when that group reached a level of stature - a moderately large amount of followers - the posting rate declined significantly.

        "Users began to realise it was harder to continue to attract more followers with their current strategy, so they slowed down," Toubia added.

        "When posting activity no longer leads to additional followers, people will view Twitter as a non-evolving, static structure, like TV," Toubia said.

         Based on the analyses, Toubia and Stephen predict Twitter posts by everyday people will slow down, yet celebrities and commercial users will continue to post for financial gain.

        "Twitter will become less of a communications vehicle and more of a content-delivery vehicle, much like TV. Peer-to-peer contact is likely to evolve to the next great thing, but with 500 million followers, Twitter isn't just going to disappear. It's just going to become a new way to follow celebrities, corporations, and the like," said Toubia.

The study was published in the journal Marketing Science.



Sunday, 28 July 2013

Create your own RAM cleaner using NOTEPAD

Many times our computer become slow, when we keep using our PCs for long time or working with many programs. It may be due to RAM, as our RAM eventually get's filled up with unnecessary programs. So, if you can clean or clear the RAM by deleting those unnecessary programs that you are not using any more, your computer will again run at normal speed, but many of us don’t know how to do it.

So, in this article I will show you how to clean RAM using notepad in 4 simple steps:

1) Open notepad.
2) Type "FreeMem=Space(51200000)".

Above code is only for those who have 512 MB RAM, if you have 1GB(1024*1 = 1024 MB) RAM than replace 512 from above code to 1024 and if you have 2GB(2048 MB) RAM in your Computer than replace 512 from above code to 2048.

3) Save file with name "RAMCleaner.vbs".
4)Close it and run the file.

It will free memory in RAM. As simple as that!!!

Now whenever you want to free up RAM, just run "RAMCleaner.vbs". When you run this file, nothing will appear on screen i.e. no message, no popups, but you will find that your PC has become fast and RAM got cleared.

Saturday, 27 July 2013

Trick To Make Your Firefox Fast

This Firefox tricks will improve the speed & load time of firefox. And you will be able to surf considerably faster.

Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.

network.http.max-connections-per-server =32

network.http.max-persistent-connections-per-proxy =16

network.http.max-connections = 64

network.http.max-persistent-connections-per-server = 10

network.http.pipelining = true

network.http.pipelining.maxrequests = 200

network.http.request.max-start-delay = 0

network.http.proxy.pipelining = true

network.http.proxy.version = 1.0

Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it receives. 

Apple's iPhone activation servers experience Up, Up and Away




iPhone users reported being unable to activate their new iPhones due to issues with Apple's activation servers on Thursday.


      Apple's iPhone activation process experienced hiccups Thursday, with users reportedly unable to activate their new phones.

           The check-in process phones home to Apple before users are able to use the device, leaving new buyers out of luck. The security measure has been a source of frustration during previous product launches, when the servers were swamped with new owners.



Apple declined comment on the apparent downtime, which was reported earlier Thursday by MacRumors.

The issues came as Apple's developer site and most of its connected services near a full week of unavailability. Apple temporarily closed the site down last Thursday following what it says was an attack by an intruder. This Thursday's connectivity issues are believed to be unrelated.

Update has been rolled: The issue has now been fixed.

Friday, 26 July 2013

All you need to know about Android Master Key vulnerability

                As you may have heard by now, the recent discovery of the Master Key vulnerability is by far the most threatening vulnerability in Android. If you are still uninformed about this development, sit back and see what it’s all about and why there’s good reason to be scared.

What is Master Key?
        To understand what Master Key is, we must first understand what happens when you install any application on your Droid. All Android apps and games are APK files (short for Android Package). These are essentially bit-compressing .zip files that have a different file extension and contain all the resources one needs to run the particular app. These resources are packaged within very specifically-named files, so as to be compatible with all Android devices. When you install the app, the device recognises each resource file and executes them.


            The Master Key vulnerability allows attackers to insert two files with the same name into the package. The Android verifier baked into the OS checks for file signatures for the first instance of any file with duplicate names; however, it will extract and install only the second (or latest) version of the file. This is the Master Key exploit, which was discovered by researchers from Bluebox, a security startup. The company will announce the full details of this vulnerability at Las Vegas at the Black Hat conference later this month, so it may be that the full extent of its powers are still unclear. But from what we know so far, it works by including in the APK, a legitimate file and a second file with the same name that's modified to do whatever the attacker wants. The real danger, of course, is that the app will look like the official version and function 100 percent regularly, but could be executing malicious code in the background.

             A similar loophole, which exploits another resource file in a package (classes.dex, to be specific), was found in the wild in China this week and is allegedly being used by two apps. This particular way to breach regular-looking apps is not as versatile as the original Master Key discovery as it needs the duplicate file to be of a particular size, so it has limitations. As you may know, China does not have access to paid apps from the Google Play Store, so third-party app storefronts and "warez" sites are the go-to option for Chinese Android users to experience the same apps. This is a highly insecure environment, which exposes users to exploits such as the Master Key and any variants.

What does it do?
          The potential of the Master Key exploit is only limited by the devious imagination of the attacker. It could be as simple as using your Android to spy on your location and all communication. A scarier scenario is that your device could be used to send premium-rate texts, make background calls (when your phone is sleeping) to the same high-rate numbers, use background data and thus bleed you out of your money. The situation turns worse if you are using your device for business email and storing confidential enterprise data. The exploit can be used to access all such files and thus damage more than just your personal life.

            Attackers can modify system-level software information and can inject their own information, as shown by Bluebox's screenshot of an exploited device below. In this case, the firm changed the Baseband Version name to include BlueBox, something that normally follows the system firmware and is decided by the OEM.

           The biggest threat is that your device can be used to create a scary botnet. Botnet is a portmanteau of robot and network, and is a collection of programs that are connected to the internet. It started off as a way to bring live interactive communication (you may know this as chat) and synchronous conferencing to the Internet, making it mimic real-life communication.This is a very mundane use of a botnet.

          But botnets could also be used to send spam emails from your system, thus giving the spammer an alibi. In its most evil form, however, a botnet can be used to conduct Distributed Denial of Service (DDoS) attacks. Since smartphones and tablets running Android have high user involvement, it becomes that much more dangerous when they are part of a botnet used to conduct DDoS attacks. It will essentially allow the attacker to use your device to bring down web servers, and if left uncontrolled, can even take down the Internet. If it must be pointed out, this will cause huge financial and infrastructural damage to governments and organisations invested in the net.

How to protect yourself?
           Raise your hands if you’ve ever used a pirated app instead of paying up for it on the Play Store. You could very well be in danger. Piracy of apps is rampant in India, as is evident from the number of Indian users on websites that provide downloadable, cracked APKs. A simple search for members based on their location yielded 1,267 pages of results for India on one such website (iPmart). So it’s essential that users DO NOT (we cannot stress this enough) install apps downloaded from such sources. You are just inviting a world of trouble.

Secondly, head to Settings now and to the Security page. Here, uncheck the box that lets you install apps from unknown sources (It says Unknown Sources). And it's also a good idea to check the box that asks you whether Android should verify apps before installation. Those who use only the Google Play Store to get their content should most likely be safe considering Google released a patch for the Master Key almost immediately after it surfaced and also seeded it to OEMs. However, just the fact that OEMs have the update doesn’t mean your device will too. After all, how many devices get official updates (even minor firmware bump-ups) from their companies?



            Perhaps this is too simplistic, but it’s always a good idea to verify who the developer is even when you are using the Play Store. Look for how many apps the developer has released (a lone app released recently should raise alarms), read the user reviews and do a search for how the app has been received in the media, if at all. As an alternative, one could install (from the Play Store, of course) any number of apps that scan APKs before they are installed. You can also check if your Android is vulnerable to Master Key thanks to Bluebox's app.

          Malware on Android is not new and neither will the Master Key exploit be the last one that will threaten these devices, but we are glad that it was discovered by security researchers and not first found infecting devices in the wild. With the Black Hat conference scheduled for July 27, we don’t have to wait too long for more details about this particular exploit to emerge.

Sony announces 4.3 Jelly Bean will come to Xperia Z devices

                Sony has confirmed that the latest version of Jelly Bean will be coming to the Xperia Z, Xperia ZL, Xperia ZR, Xperia SP and Xperia Z Ultra. For now, the only tablet that is confirmed to be getting Android version 4.3 Jelly Bean is Xperia Tablet Z.  

            
           Android version 4.3 Jelly Bean may have only been revealed by Google few day ago in Nexus Range, but Sony isn’t wasting any time at all. The company has released a software roadmap for Xperia devices that will be taken into the 4.3 Jelly Bean fold. 

           The smartphone manufacturer has admitted that the Jelly Bean 4.1 rollout for Xperia 2012 products had not been “as succinct or as timely” as the customers might have expected. Sony has written quite a lengthy, informative piece about how it tries to improve and refine its efforts to bring users new Android versions in a blog post.

           
          The rollout of Android version 4.3 for Sony phones will depend on the carrier and market you are in, but the Japanese company says that it is keen on bringing the latest iteration of Android to customers as quickly as possible.


             The company is currently working on making Android version Jelly Bean 4.2 available for Xperia Z and Xperia ZL. Starting early August, Sony will be rolling out the update for the Xperia ZR and Xperia Tablet Z. The company has some more good news – Sony will be looking at pushing some of its other devices running Android version 4.1 Jelly Bean to version 4.3 directly. 


Thursday, 25 July 2013

Youtube in a new avatar, celebrating its up-comming geek week


YouTube has decided to celebrate its upcoming Geek Week event, and has started an Easter egg hunt on its Twitter feed.If you wanna see just what the video giant has planned, head to the site and type "/ geekweek" minus the quotation marks into the search field, you'll be presented a Unix terminal-style conversion and gawk away.
Fair warning: Your eyes might hate you for what you'll see. [Youtube Twitter]

Motorola unveils 3 phones under Droid range

                  Verizon Wireless, the biggest US mobile service provider, on Tuesday announced three new phones under its Droid smartphone brand from Google's Motorola and said that Motorola would be its exclusive Droid phone vendor going forward.

                The phones, the Droid Mini, Droid Ultra and Droid Maxx will go on sale for $99, $199 and $299 for customers who sign a two year contract and will be available in Verizon stores August 20, according to Verizon Wireless.

         The Droid brand helped to resuscitate a struggling Motorola at the time as Verizon Wireless supported the device with a massive marketing campaign.



The exclusivity agreement with Motorola could be a blow for phone makers including HTC, whose devices have also carried the Droid brand in the past as have devices from Korea's Samsung Electronics.

           Verizon Wireless vice president of marketing Jeff Dietel said that since Droid phones should only include its "elite" phones based on Google's Android software it wanted a manufacturer "that matched all the expectations" for unique hardware and services.

            Verizon said the full retail price would be $499 for the Mini, $599 for the Ultra and $699 for the Maxx.

        Verizon Wireless is a venture of Verizon Communications and Vodafone Group.

Beebone PC virus threatens Indian cyberspace

The deadly 'Beebone' computer virus attacking the Indian cyberspace can take as many as 20 aliases to compromise the security of a computer system.

                    According to the Computer Emergency Response Team-India (CERT-In), a new variant of the Trojan win32/Beebone virus is spreading in the Indian cyberspace. The national Internet and computer security sleuths organization has stated that the Beebone Virus is from the Trojan downloader family and can install other malware and programs without the users consent.

The latest virus detected on the country's internet network is so notorious and lethal that it acquires as many as 20 aliases or masks to infect and attack a vulnerable computer system which is low on security features.

          For the past few months cyber security firms have been trying to find out more about the Beebone and Vobfus viruses. According to a new report from cyber security firm Kaspersky Lab these two viruses are working together to keep each other alive. This indicates that the criminals behind the two viruses are also aiding each other.

CERT has put together a list of aliases acquired by the Beebone virus for computer technology geeks.

Some of them are-- Trojan.Win32.Jorik.Fareit.qru (Kaspersky), W32/Autorun.worm.aaeh!gen (McAfee), W32/VobFus-BX (Sophos), Trojan horse ( Symantec), Trojan-FBZZ! 41E0B7088DD9 (McAfee), Trojan.Win32.SelfDel.aqhh (Kaspersky), Trojan.Win32.Jorik.Fareit.qsl (Kaspersky), Beebone-FMQ! 039FA2520D97 (McAfee), W32.Changeup! gen40 (Symantec) and Worm.Win32.Vobfus.dxpf (Kaspersky).

Android 4.3 announced, for Nexus 7, Nexus 4, Nexus 10 And Galaxy Nexus



After weeks of leaks, other leaks, and false starts, Google finally took the wraps off its next version of Android at an event on Wednesday in San Francisco. The new version of Android is actually the third version to carry the "Jelly Bean" label, as opposed to the rumored next-generation leap, "Key Lime Pie." Android 4.3 isn’t an overly dramatic advancement over Android 4.2, but its highlights include:

Wednesday, 24 July 2013

6 YouTube Tricks You Probably Don’t Know


              This post intends to deliver tricks that will add more dimension to your experience on the YouTube platform, and allow you to enjoy some of the little-known shortcuts, hacks and special features you can use on Youtube.

1. Specific Start Time

         If you want to share just a certain portion of a video with a user, you’ll notice that there is no official option to do this. Normally you have to inform others which minute they can pull to start from. Bet you didn’t know that there is a handy hack to send a link to a user or embed a certain portion of the YouTube video in your website. Skip the fluff and get to the good stuff.

Here is how it works. Consider the following Youtube Video URL:
                        https://www.youtube.com/watch?v=r00ikilDxW4

After the URL link add #t=01m08s to set the starting point of the video at 1 minute and 8 seconds.

2. Auto Video Replay

            There are certain times when you get obsessed with a Youtube video, whether it’s a really catchy song or a funny video. Isn’t it annoying to always have to hit replay everytime you near the end? Why not activate the looping feature?

The what now? Let’s use the same YouTube video. Just replace youtube with the text infinitelooper in the URL and hit enter.


        It will redirect you to another YouTube third-party platform where you are also provided with the option of looping selected portions of the video.


3. Auto High-Definition Video Play

        Sometimes when you play a YouTube video the video quality has been set on default for you, usually at a lower quality video resolution. To prevent this from happening you can force the system to permanently play videos in an HD format.

        Grab the extension called Magic Actions for Youtube available only for Google Chrome and Firefox. Enable the option Auto HD in the extension and select the video resolution you would like to be played automatically. You can also set the mouse wheel to scroll up (and down) the volume of the video.


4. Accurate Keyword Searching

        There are a billion videos on Youtube so trying to find that specific Youtube video you want to watch is an adventure by itself. You might find yourself crawling through dozens of pages hoping to land the video you actually want to watch.

The solution for this time-consuming exercise is to add allintitle: before the keywords you are search for. What it does is basically provide you with only videos that include the chosen keywords
.


5. Omit Keywords

          You can opt for specific keywords to be in the search, or out of it. Let’s say you are searching for a tutorial about ‘register domain.’ Using the most conventional search form you will find tons of videos about how to register domain using Godaddy.

If you want to find other options that are not GoDaddy, you can always exclude the keyword from your search results i.e. ‘keyword -excluded keyword.’

Here is how it should look like.


6. Watching Videos with a Slow Internet Speed

           Youtube has released a robust feature called the ‘Feather Beta’. This feature is dedicated to users who want to run videos on a very slow internet connection. The system basically cuts down some bytes that limit the speed of video streaming in your browser.

To opt-in the feature you simply go to http://www.youtube.com/feather_beta and join the beta feature.