Monday, August 29, 2011

Twitter Login

Twitter is the most famous micro blogging website in the world and due to its popularity, Many bad guys try to target twitter or twitter users directly or indirectly using phishing attacks, click jacking and other hacking methods. below we mentioned some general tips and guidelines which you can follow to keep your account safe and secure.




  • To login to twitter, always visit official web page www.twitter.com never give your twitter credentials to sites other than official web page.
  • To login to twitter, always visit official web page www.twitter.com never give your twitter credentials to sites other than official web page.
  • Don’t forget to click on “Sign-out” button at the top right side of the page when you’re done using twitter. If you simply close the browser without signing out there might be chances that, other people who will open the same web browser will be able to access your account.
  • Never ever paste any java script or other codes in your web browser while signed into twitter account. No matter what they claims to do. there are many bad codes out there which can gain your account login session or can post tweets behalf of you if you paste that code into your web browser.
  • If you find ay tweets on your account which you never posted, immediately change your password anc check the list of applications you given permission to.

Saturday, August 27, 2011

IBM Combines 200,000 HDDs to Make Giant Data Repository


IBM may have sparked interest lately by making cognitive processors, but it has again looked to the storage segment ,where it hopes to set a massive new record in terms of sheer capacity.

IBM definitely stirred the sleeping curiosity of many feelings by announcing that it had made cognitive computers, systems that can learn through experience, an actual part of reality.

It turns out that the company is not done being shocking, however, as the newest project it embarked in will have this effect simply because of its sheer scope.

Basically, IBM is showing that it has ambition in abundance by starting work on a giant data drive of 120 petabytes.

This capacity is about ten times higher than that of any other data container ever made and will be attained by combining 200,000 hard disk drives.

The company will employ new hardware and software techniques in order to make the project possible, though the main challenge will be to have the merger possess a decent level of efficiency, both performance- and energy-wise.

The other matter they will need to address is the inevitable failure of these drives and how the data on them might be preserved.

Making sure the whole is not disrupted by the collapse of a small part is also necessary.

What remains is to see how much time it takes for this project to come to fruition and, once it does, if it really does give a strong enough kick to the data center industry that such massive arrays become standard.

Mozilla to Develop OS based on android!


Mozilla, who are renowned for their successful internet browser, are entering the mobile race, developing a new web-centric OS that will directly compete with Google, Apple and Microsoft.

Mozilla took the leviathan computing company on with its Firefox browser, and today it stands as the second most popular browser worldwide.

Announced on the Mozilla discussion forum, Mozilla have begun coding for phones and tablets. The BBC revealed the mobile operating system will draw on Android code, with Mozilla writing as much fresh code as possible. The hybrid-like operating system will be named Boot To Gecko.

It is an unusual name for an OS, until you remember Gecko is the rendering engine employed by the Firefox browser that interprets web page coding and displays it in a screen-friendly format, a homage to its origins.

Even though Android coding will form the operating system's foundations, Mozilla hope to add a much more open wrapper around it than Google currently do, making it more versatile as an operating system.

Its shared foundations will also make Boot To Gecko compatible with the same phones as Android, competing as a direct alternative to Google.

Often, when you select a link from an application native to the Android or iOS market, the operating system will have to open a new webpage in the browser. Boot To Gecko aims to limit this by making applications much more web-centric.

If the venture proves successful, Mozilla will be waging war against industry giants, with Google, Apple and Microsoft dominating many facets of the technological world.

Thursday, August 25, 2011

Microsoft Windows 8 first look

A first look at the "Windows 8" user interface !!!!!!




Google Buys Motorola For $12.5 Billion

Google announced it will buy Motorola Mobility for $12.5 billion, in a move that will give the Internet giant a presence in smartphone hardware and bring it thousands of new patents.


The Mountain View, Calif.-based company expects to complete the deal by late 2011 or early 2012 though the purchase may be subject to government approval. Motorola, one of the leading manufacturers of Android devices, will officially become an Google-only phone maker, despite CEO Sanjay Jha expressing interest in developing for Microsoft’s Windows Phone platform.

Google intends to run Motorola as a separate company that will continue to develop Android devices. Android will remain an open platform, allowing other companies to develop devices that run the platform.

But despite Android keeping its status as an open platform, Google’s new purchase makes the company a bit more like Apple.

Wednesday, August 24, 2011

Facebook Changes Aimed at Improved Privacy

Facebook Tuesday announced changes to its user interface that are designed to improve user privacy and make the social network's privacy options easier to find.

The changes make it easier for a user to control who sees what he or she posts to the social network and what is able to be seen on a user's Facebook page. The changes affect your profile page, your posts, and tagging and adds a new addition: A do-over feature if you change your mind about who sees your post.



Not Enough Privacy?


However, at least one security expert maintains the social network should have gone further to protect users' privacy.

As good as the new changes are, Facebook missed a real opportunity to advance privacy on its network, says Graham Cluley, a senior technology consultant with Sophos, a cyber security software maker. "A lot of these things are quite cosmetic," Cluley told PC World. "They could have done more about general privacy and safety on Facebook."

"Some of the things they've done here are great, and they're a step in the right direction," he added, "but I worry that there are more fundamental opportunities they could have taken which they ignored with this revamp."

One of those opportunities cited by Cluley was to put more "opt-in" choices in the Facebook system, instead of requiring users to "opt-out" of its offerings. "They've put a nice varnish over Facebook," he said. "But what we haven't got is anything which says, 'From now on, whenever we introduce a new feature, we're not going to share your information without your express agreement."

Changes: Google+ Inspired?




Although Facebook denies it, it appears that the changes are a response to Google's upstart social network, Google+. "Even some of the terminology which Facebook is now using is a direct copy of Google+," Cluley asserted. "For instance, you no longer share with everyone, you share with 'public.'"

"This is a reaction to Google+," he said. "That's not a bad thing. That's how competitiveness develops things. Facebook should be applauded from that point of view."

Intel launches low-cost quad-core mobile chip

Intel has launched a low-cost quad-core mobile processor and added more mobile Core 2 Duo processors to its chip lineup, according to an updated price list dated December 28.quadcore

Acer was one of the first PC makers to announce a system with the new quad-core processor. On Monday Acer released the Aspire 8930G-7665 laptop designed for extreme gaming using the new Intel Core 2 Quad Mobile Processor Q9000, which runs at 2.53GHz. The laptop comes with a 18.4-inch WUXGA screen and Nvidia GeForce 9700M GT graphics. It is priced at $1,799.


The Q9000 processor is listed at $348, significantly less expensive than the existing QX9300 mobile quad-core processor, which is listed at $1,038, and the Q9100, listed at $851. Both of these processors, however, have 12MB of cache memory, twice the amount of the cheaper Q9000, which integrates 6MB of cache. Generally, the more cache memory, the faster the processor.

Tuesday, August 23, 2011

The Downfall of Nokia- 11 reason why it is doing so badly....

1) Symbian is a sinking ship - the downfall of Nokia

Times have changed and Android and iOS have blown Symbian out of the water. It is still desperately clinging on in some parts of the world but for most it just doesn’t come close to today’s expected level of standard.

2) Windows 7 OS may be too little too late - the downfall of Nokia

Microsoft was even later in latching on to the smartphone advancements than Nokia, and that’s saying something. So far, few consumers have been keen to switch to a Windows Phone 7 device. In this case two wrongs will make one huge wrong.


3) MeeGo is a NoGo - the downfall of Nokia

Back in June it was announced that the Linux-based OS would run on the flagship N9, but it didn't take off. There is nothing majorly wrong with MeeGo, it is just seen as a stopgap between Symbian and Windows Phone 7.


4) Stephen Elop has done nothing to help

Nokia CEO Stepehen Elop made things worse. An internal memo, which Elop sent to staff, leaked in February. In the memo, Elop uses the metaphor of a burning oil station, referring to Nokia "pouring gasoline on our own burning platform". This confirmed just how much trouble Nokia is in.


5) The latest designs look like guess work.

From odd colour choices to varying screen sizes, Nokia seem to have gone for a hit and miss tactic. A more considered, researched and developed approach to hardware would improve Nokia’s chances of revival.


6) Failed to live up to its own hype (new models unpopular)

Nokia has deployed heavy marketing to try to boost sales and popularity of its handsets. From the sheep social network advert to posters plastered all over bus stops, Nokia is setting itself up for a fall, because its current crop just doesn’t improve the user's experience.

7) Revenue is substantially below estimates

'The Finnish firm used to be a hugely profitable company, once it was the only firm in the world whose turnover exceeded the taxation revenue of the country it was from, but now times have changed', should be changed to, 'The Finnish firm used to be a hugely profitable company, once being the only firm in the world that had a turnover which exceeded the taxation revenue of the country it was based in'.


8) Can’t shake the 3310

The 3310 is the handset that springs to mind whenever anyone mentions Nokia. It revolutionised mobile phones when it was first released and just rode the wave of success, doing little to progress designs especially when the iPhone was released. It is now left to regret resting on its laurels.


9) Ovi store never really took off

Say the word App and consumers, as well as developers, immediately think of iTunes or the Android Marketplace. In comparison, Ovi's selection is nowhere near as good and those apps that are similar to offerings from Android and Apple don’t run as well on Nokia devices, with crashing being a frequently reported problem.



10) Blackberry dominates the enterprise

Businesses that once used to hand out thousands of Nokias to their employees have now turned to Blackberrys or iPhones. The improved functionality and reliability dealt a killer blow to Nokia and it has a lot of work to do if it hopes to regain its place in the offices.

11) Could be slow to react to future changes

It’s taken Nokia two years to admit it has been slow in reacting to the changes in the sector and few people would be surprised if it is still playing catch up for the foreseeable future. Apple and Android certainly won’t be waiting for it to catch up, so the gap will only continue to widen.

Simple Security for Wireless !!!!!!

In early August, at the Def Con conference -- a major annual gathering of computer hackers -- someone apparently hacked into many of the attendees' cell phones, in what may have been the first successful breach of a 4G cellular network. If early reports are correct, the incident was a

man-in-the-middle

(MITM) attack,so called because the attacker

interposes

himself between two other wireless devices.

Coincidentally, a week later, at the 20th Usenix Security Symposium, MIT researchers presented the first security scheme that can automatically create connections between wireless devices and still defend against MITM attacks. Previously, thwarting the attacks required password protection or some additional communication mechanism, such as an infrared transmitter.

Showcasing novel ways to breach security is something of a tradition at Def Con. In previous years, MITM attacks had been launched against attendees' Wi-Fi devices; indeed, the MIT researchers demonstrated the effectiveness of their new scheme on a Wi-Fi network. But in principle, MITM attacks can target any type of wireless connection, not only between devices (phones or laptops) and base stations (cell towers or Wi-Fi routers), but also between a phone and a wireless headset, a medical implant and a wrist-mounted monitor, or a computer and a wireless speaker system.



Key change


Ordinarily, when two wireless devices establish a secure connection, they swap cryptographic keys -- the unique codes they use to encrypt their transmissions. In an MITM attack, the attacker tries to broadcast his own key at the exact moment that the key swap takes place. If he's successful, one or both of the devices will mistake him for the other, and he will be able to intercept their transmissions.

Password protection can thwart MITM attacks, assuming the attacker doesn't know the password. But that's not always a safe assumption. At a hotel or airport that offers Wi-Fi, for instance, all authorized users are generally given the same password, which means that any one of them could launch an MITM attack against the others. Moreover, many casual computer users find it so complicated to set up home Wi-Fi networks that they don't bother to protect them; when they do, they often select passwords that are too simple to provide much security. That's led to the marketing of Wi-Fi transmitters with push-button configuration: To establish a secure link, you simply push a button on top of the transmitter and a corresponding button (or virtual button) on your wireless device. But such systems remain vulnerable to MITM attacks.

"None of these solutions are quite satisfactory," says Nickolai Zeldovich, the Douglas Ross (1954) Career Development Assistant Professor of Software Technology, who developed the new security scheme together with Dina Katabi, the Class of 1947 Career Development Associate Professor of Computer Science and Engineering, as well as postdoc Nabeel Ahmed and graduate student Shyam Gollakota, all of MIT's Department of Electrical Engineering and Computer Science. "The cool thing about this work is that it takes some insight from somewhat of a different field, from wireless communication -- actually, fairly low-level details about what can happen in terms of wireless signals -- and observes that, hey, if you assume some of these properties about wireless networks, you can actually get stronger guarantees."

Strength in silence



In an MITM attack, the attacker needs to drown out the signal from the legitimate sender. But the researchers' new system ensures that any attempt to do so will be detected. The trick is that, after transmitting its encryption key, the legitimate sender transmits a second string of numbers related to the key by a known mathematical operation. But whereas the key is converted into a wireless signal in the ordinary way -- it's encoded as changes in the amplitude of a radio wave -- the second string of numbers is encoded as alternating bursts of radiation and silences.

If an attacker tries to substitute his key for the legitimate sender's, he'll have to send the corresponding sequence of bursts and silences. But that sequence will differ from the legitimate one. Through the silences of one, the receiver will hear the bursts of the other. The overlapping sequences will look to the receiver like a wholly new sequence, which won't match up with the transmitted key, indicating an MITM attack.

Of course, the attacker could try to drown out the entirety of the legitimate transmission and then send his own key. But that would require broadcasting a signal of such long duration that it, too, would alert the receiver to an attack.

The reports of an MITM attack on 4G phones are still being verified, and 4G itself is a vague term that encompasses many different technical approaches. But if the reports prove true, then cell phones, too, could benefit from the MIT researchers' security scheme.

Android Finally Taking Steps Towards WebKit And Chromium






Why isn’t Chrome a part of Android?

It’s a question as old as time itself. Or at least a few years old. But given that the same company, Google, makes both products, it never made much sense. Now they’re finally taking steps to resolve this. A bit. Maybe.

As a group of Googlers have announced on the WebKit-Dev group today (relayed by Google’s Peter Beverloo), the Android team is now committed to working more closely with the WebKit community. Yes, it’s a bit odd that a product so devoted to “open” wasn’t really working with the open source community before — but hey, better late than never.


The full story is a bit more complicated than it appears on the surface. While Android has its own separate browser which isn’t branded as “Chrome”, the two do share some code. But they’re not the same, and two separate teams work on each. For whatever reason, Google chose not to brand the Android browser as Chrome, and doing so now may cause some confusion since there’s Chrome OS — another operating system built by Google that’s unrelated to Android.

So here’s what happening now: Google’s Android team is going to start making available another, slightly modified build of the Android browser, which will be fully open source. Think of it as Chromium to Google’s Chrome. Android-specific code will be removed and presumably, anyone will be able to use this code to build a new mobile WebKit-based browser.