Wednesday, December 21, 2011

FACEBOOK AUTOMATIC WALL POST VIRUS


Don’t let your family be infected : SHARE!

To everyone that is facing problem with automatic (nude) video posts on your friend’s walls, the website is installing an extension which takes access to all your websites including Facebook, and is named as 

“YOUTUBE EXTENSION” 
“YOUTUBE PREMIUM”

In order to stop this auto posting remove this.

Monday, November 14, 2011

Face Recognition On Android 4.0 Can Be Tricked


     Android 4.0 (Ice Cream Sandwich) has a cool new feature, where the users can unlock the mobile device using face recognition technology. Well, it seems like the face unlock feature which Google showed off with much enthusiasm (though it failed a couple of times during the announcement) can be easily tricked. The timing of this new bug will strike Google and Samsung (because the video shows a couple of Samsung devices in use for the demo) hard since the launch is nearing. However, we believe that Google will come up with a solution soon.

      The video below shows how the guy uses an image of himself from the Galaxy Note to unlock the display on the Galaxy Nexus. If it's this easy to trick, we can't seem to figure out the point of this new feature. Users might as well use the typical lock pattern which is a bit harder to trick. Watch the video below to see how easily the demonstrator tricks the Galaxy Nexus. This, however, doesn't take anything away from the other neat features that come packed with ICS


Saturday, October 15, 2011

New Device: Electricity From Human Breathing



    One of the biggest hurdles facing the developers of biological implants is coming up with a power source to keep the implanted devices ticking. We've seen various technologies that could be used instead of traditional batteries (which require the patient to go under the knife so they can be replaced) such as wireless transmission of power from outside the body, biological fuel cells that generate electricity from a person's blood sugar, and piezoelectric devices that generate electricity from body movements or the beating of the heart. Now researchers have developed a device that could be used to generate electricity from a patient's breathing.

The device created by researchers at the University of Wisconsin-Madison relies on the piezoelectric effect - whereby an electrical charge accumulates in certain materials in response to mechanical stress. But instead of relying on body movements to create the mechanical stress, the UW-Madison team's device uses low speed airflow like that caused by normal human respiration to cause the vibration of a plastic micro belt engineered from a piezoelectric material called polyvinylidene fluoride (PVDF).

"Basically, we are harvesting mechanical energy from biological systems. The airflow of normal human respiration is typically below about two meters per second," says Materials Science and Engineering Assistant Professor Xudong Wang who created the device along with postdoctoral researcher Chengliang Sun and graduate student Jian Shi. "We calculated that if we could make this material thin enough, small vibrations could produce a microwatt of electrical energy that could be useful for sensors or other devices implanted in the face," said Wang.



To thin the PVDF material to micrometer scale while preserving its piezoelectric properties, Wang's team used an ion-etching process. Wang believes that, with improvements, the thickness of the material, which is biocompatible, can be controlled down to the submicron level and lead to the development of a practical micro-scale device that could harvest energy from the airflow in a person's nose.

Tests conducted by the team saw the device reach power levels in the millivolt range, but reached up to 6 volts with maximum airflow speeds. Wang and the UW-Madison team now plan to look for ways to improve the efficiency of the device. The team's research appears in the September issue of Energy and Environmental Science.

Monday, October 10, 2011

Portable Solar Chargers

 Designers of solar chargers need to deal with a certain issue: how to build a charger so that it had easy access to maximum sunlight, without much effort on the user's part.

Utilizing a USB port suitable for numerous portable gadgets, the Ray solar charger reportedly stores enough energy to fully power a cell phone. Its suction cup can be used on any glass surface, such as house windows, or windows in cars and planes. In-car use while driving (as suggested by the picture) is a dubious idea, however, given the prevalence of lighter-based car chargers.

The tilting kickstand allows users to place the charger on flat surfaces, and also serves as a place to store the USB cord.
  
Canada's Kiwi Choice has announced the release of a strangely familiar-looking portable solar charger for mobile devices. The three-panel photovoltaic fan design first used by Solio has found its way to Kiwi's U-Powered charger. Featuring a powerful battery, LED flashlight and magnetic feet, the product also comes with multiple device connector tips for maximum compatibility.

The U-Powered solar charger is the first of four green products to be announced by Kiwi Choice. As well as being a backup power source or outright charger for portable electronics such as smartphones, cameras and media players, the device also offers the versatility of not being wholly dependent on the sun for its power. When sunlight adamantly refuses to appear or when users just need a quick power boost, the unit can be hooked up to just about any power source via USB, car or wall charger.
 
The charge level of the U-Powered's powerful 2000 mAh Lithium Polymer battery is shown via a simple four LED charge level indicator, and the unit is said to be good for over a thousand recharge cycles. The product also has a built-in LED flashlight and sports magnetic feet for secure placement on metallic surfaces. Universal mobile device compatibility is helped along by the inclusion of 11 connector tips.

The U-Powered will be available from retail stores and online shortly, and has a manufacturer's suggested retail price of US$49.99.

Of course, fellow solar products company Solio also has a shocking pink hybrid charger which is compatible with a number of devices for about the same price as the U-Powered - although it does have a somewhat weaker 1600mAh Li-ion battery, lacks a torch, and has a suction cup instead of magnetic feet. 
 Of the other chargers available from Solio, the MAG offers the highest battery capacity at 1800mAh. Whereas Kiwi's product is said to need at least 17 hours of good sunlight to reach full charge, the MAG needs to sunbathe for only around ten.


Low-Cost,High-Density Energy-Storage Membrane


The low-cost, high-density energy-storage membrane, created at the National University of Singapore 
Researchers from the National University of Singapore's Nanoscience and Nanotechnology Initiative (NUSNNI) have created what they claim is the world's first energy-storage membrane. Not only is the material soft and foldable, but it doesn't incorporate liquid electrolytes that can spill out if it's damaged, it's more cost-effective than capacitors or traditional batteries, and it's reportedly capable of storing more energy.

The membrane is made from a polystyrene-based polymer, which is sandwiched between two metal plates. When charged by those plates, it can store the energy at a rate of 0.2 farads per square centimeter - standard capacitors, by contrast, can typically only manage an upper limit of 1 microfarad per square centimeter.

Due in part to the membrane's low fabrication costs, the cost of storing energy in it reportedly works out to 72 cents US per farad. According to the researchers, the cost for standard liquid electrolyte-based batteries is more like US$7 per farad. This in turn translates to an energy cost of 2.5 watt-hours per US dollar for lithium-ion batteries, whereas the membrane comes in at 10-20 watt-hours per dollar.

Details on how the material works, along with data on factors such as charging/discharging times and longevity have not yet been released. Principle investigator Dr. Xie Xian Ning, however, has stated "The performance of the membrane surpasses those of rechargeable batteries, such as lithium ion and lead-acid batteries, and supercapacitors."

Thursday, October 6, 2011

View Your Google Histroy

Did you know that Google has been keeping track of every single Google search you’ve ever performed? That is, at least every Google search you’ve performed while logged in to your Google account. Don’t believe me? 

Go here:https://www.google.com/history


Neat, huh? You can browse through your web history (includes searches and sites visited) by date using the calendar on the right, and beneath it is the total amount of searches you've performed to date. I’m nearing 50,000. I don’t know whether to be proud of or depressed by that.

In case you’re wondering if this is a breach of privacy, it’s not. You agreed to this when you signed up for a Google account. And you signed up for a Google account when you started using Gmail, YouTube, Picasa, Google Docs, Google Voice, Google Talk, Google Desktop, Google Sites, Blogger, Google Reader, Orkut, Google Code, iGoogle, Google Chrome—you get the point. There’s a lot of stuff that’s owned by Google and signing up for any of it signs you up for Google Web History as well.

Personally, I don’t mind it. I think it’s kind of interesting.


Google Trends
You should also check out the Trends section, which works just like Google Trends but only for you. The All Timesetting isn’t particularly insightful, since it could span back for years, but if you limit it to the last year, last 30 days or last 7 days, things get interesting. Apparently, I spend most of my time googling groovyPost, instead of spending the extra millisecond to just tack on the .com. (I think in the biz they call that a “navigational search.”) And unsurprisingly, the site that I visit the most is a Bandcamp page that just streams white noise (puts my baby to sleep, works like a charm).




The graphs along the bottom confirm other facts about your search habits that should be obvious. For instance, I do a lot more googling on the weekdays than the weekends. And I googled the least in July, when I was traveling most of the month.




Other Considerations

  • This is different and distinct from the history that’s saved in your browser. Browser history is saved locally on your machine. Google Web History is saved on Google’s servers and applies to all activity done while logged in on any device. So, for example, if you performed a search on your iPhone, it would show up here as well. If you want to remove all traces of your web history, you’ll have to delete your Google Web History and your local browser history.
  • When you are in Incognito Mode, you are not logged in to your Google Account, thus your search activity / web browsing activity won’t be recorded in Google Web History.
  • Google uses your web history to tailor your search results and ads. So, if you are testing your search engine rankings or just want to see the web like the rest of the world sees it, search in Incognito Mode.
  • If you have Javascript disabled or some other “no scripts” plugin installed, Google Web History may not work.
  • If you install the Google Toolbar, Google will begin tracking sites that you visit even if you don’t go there directly from Google.com.

Monday, October 3, 2011

Quickly Repair your Mobile Phone dropped in water



    Many of you get your mobile phone wet by one way or another. You worry as you mistakenly drop your mobile phone in water. It can also get wet if you are out in a heavy rain. However, there is no need to panic. It is possible to save your wet mobile phone by quickly repairing it. In order to save your mobile phone from water damage, you can consider these easy and simple solutions:


Act rapidly :

The first thing you have to do in order to save your wet mobile phone is to act rapidly. Quickly remove all the detachable parts as well as covers possible such as the back cover, battery, the SIM card, memory card etc. Next, take a piece of cloth or a tissue paper to wipe the excess water you are able to notice within the mobile phone. Make sure that you dry it completely. If you don' t do this, the water inside the mobile phone will begin to evaporate and gather in places which will be difficult to reach.

This will save your wet mobile phone and it will start working if it was under water for just a little while.

Using a hairdryer :

Take a hairdryer and begin drying the mobile phone while giving more consideration to the place where the battery is located. The battery housing usually consists of tiny holes to let in air (so giving more space for water) inside the mobile phone.

Make sure that you are not holding the hairdryer very near to the mobile phone. Keeping it too close to the mobile phone may harm the electrical mechanism of the mobile phone. Keep on drying the mobile phone from a safe distance for about twenty to thirty minutes.

If solution number 1 and solution number 2 don't work, try solution number 3. 

Drying for a long time:

Take off the covers as well as battery from the mobile phone. Put the phone in a dry as well as warm place to let the water inside the phone evaporate gradually from the little holes in the mobile phone.

Thursday, September 29, 2011

Cloud Computing vs Virtualization



Jargon in the computing industry is quite numerous, and many of them are difficult to understand. Virtualization and cloud computing are two terms that were relatively obscure but have since come to the forefront due to Google’s push for cloud computing. The two terms are closely related but are not in competition with each other. Virtualization is the creation of a virtual environment on another machine. A good example of this would be creating a Windows XP environment for an old program to run on inside a Windows 7 operating system. On the other hand, cloud computing is a computing architecture where the bulk of the resources are pooled together and can be accessed remotely usually through the Internet.

Virtualization provides several advantages. The first, as illustrated above, is allowing applications that were designed from one operating system to run on another one. It is a more cost-effective solution than having two or more machines just to be able to use all the software you need. For cloud computing, the main concept and goal is to create a virtual computing platform where resources can be allocated depending on the needs of each individual user. This provides flexibility as each user is allocated just what he needs, and it can be allocated to another user once that user logs out. It also means that the user’s computer need not be very powerful as most of the processing is done on the cloud. It is also convenient for users as their data would lie in the cloud, and they don’t need to worry about leaving data at home or on another computer. Their data would always be accessible regardless of which computer they are on.


The use of “a virtual computing platform” above may have already clued you in that cloud computing uses Virtualization in order to achieve its goals. This is true since it is necessary to virtualize each user’s desktop environment as well as resources like drives and folders in order to give the user the general feel of a personalized desktop.

Note This
  1. Virtualization is the virtual simulation of any computing element while cloud computing     is an architecture where resources are pooled together and remotely accessed.
  2. The goal of Virtualization is to provide multiple environments in a single machine while  the goal of cloud computing is to provide a scalable computing platform.
  3. Cloud computing utilizes Virtualization.


Wednesday, September 28, 2011

What is VoIP and SIP


In telecommunications, VoIP (Voice over Internet Protocol) is the new buzzword as many companies and individuals try to take advantage of the cost savings it offers. Another new term connected with VoIP is SIP (Session Initiation Protocol) due to the appearance of many SIP phones. The main difference between SIP and VoIP is their scope. VoIP is actually not a discrete technology but a family of technologies that are primarily concerned with setting up voice calls across packet networks like the Internet. SIP is just one of the technologies that are under the VoIP umbrella.

There are many technologies used in VoIP. There are technologies that are used to convert and compress the audio signal; there are technologies that are used to format the digital data and transmit it to the destination, and there are technologies that are used by devices to communicate with each other. SIP is in the latest of the three. It is a protocol that standardizes signals to initiate, terminate, accept, reject, hold, or redirect VoIP calls. It is basically a language used by the phones in order to communicate what it wants to do with each other. SIP is not concerned with how the voices are carried across the network once the call has been initiated as other protocols are used for that.

What confuses most users is the difference between VoIP handsets and SIP handsets. Keep in mind that a SIP handset is also a VoIP handset. The products that are commonly called VoIP phones require to be connected to a computer, and the computer has to be turned on in order to conduct calls. It is not very desirable to have a computer running just so you can make and receive calls. SIP phones are able to do the signaling without the need for a computer. It can, therefore, be plugged into an Ethernet outlet and connected to the Internet. In this scenario, only your modem needs to be constantly powered to give the SIP phone access to the Internet. In this manner, SIP phones behave more like traditional phones.

Tuesday, September 27, 2011

Reset Your BIOS



Did you recently upgrade your PC, change its components, or test a setting in the BIOS that now stops it from power up all the way? Here's how to reset your BIOS.


First of all, if you have, read the manual to the motherboard and look for BIOS or CMOS Reset.


Generally, the easiest and least fiddly method is to remove the power cord from the computer, open it and look for a button battery (usually bigger than the ones in a watch) remove it for for five or ten minutes. Theoretically this should work.

If no manual is handy and removing the battery did not work try the following methods:

METHOD 1

  1. Power down your PC.
  2. Open your CPU
  3. Find the 3-pin jumper near the power supply on the motherboard, typically labeled "clear cmos" or "reset bios".
  4. Remove the jumper from the default position (typically connecting the 1st and 2nd pins).
  5. Replace the jumper to connect the 2nd and 3rd pins.
  6. Push the power button on the front of your PC once.
  7. Wait a minute.and switch off again 
  8. Return the jumper to its default position, connecting the 1st and 2nd pins.
  9. Power on your PC with its front power button.

METHOD 2

  1. open Command Prompt , click Start Menu > Run > type CMD (enter).
  2. type debug (enter).
  3. then type this bellow code
o 70 10
o 71 20
type quit.
exit.

METHOD 3
  1. Open the CPU
  2. Remove the CMOS battery. This should be a regular 3V, round, flat watch battery.
  3. Wait at least 5 minutes.
  4. Reinsert the CMOS battery.
  5. Move the rocker-style switch at the back of your PC (if applicable), to the on (I) position.
  6. Power on your PC with its front power button.

METHOD 4
  1. Turn on your computer and press the key on your keyboard to enter the BIOS. This is typically the Del (delete) key. Pre-built systems from major manufacturers may use a function key such as F1, F2, or F10.
  2. Go to the last tab or page of your BIOS.
  3. Select an option similar to "restore factory settings".
  4. Save your changes and confirm your selection if necessary. This will often be combined with the process of exiting a BIOS. Some BIOS types may have this as a separate option such as "F10: Save Changes".

Sunday, September 25, 2011

Google Chrome OS


As if its decided lead in spiders, searches, and engines is not enough, Google launches its new Chrome OS, the company’s browser-based operating system. The new OS offers marked differences in data handling, such as cloud data storage, adding more user security and ease of use. It is also a very light operating system and does not eat up a lot of RAM. This is ideal for netbooks and systems that rely on cloud computing. Being a by-product of the Chrome browser, the Chrome OS also boasts of similar security features that the browser has been known for.

How it works


Security is one of the key components in the Chrome OS. The system fuses typical system-level security systems with exploit mitigation techniques. Thus, it successfully decreases the venues for attack and the system codes that can be attacked by malicious programs. And because all applications run through the browser, the operating system is more compact and easier to control and protect.

Sandboxing has been crucial in how Chrome functions. Through sandboxing, processes and applications have minimal interactions with each other and the operating system kernel. This partitioning of processes and applications makes it difficult for any malicious attacks to affect the whole system. Crashes become seldom, if these occur at all.

Security


Security is also one of the trademarks of the Chrome OS. Contrary to current trends in operating systems, Chrome limits the ability of applications to download and run any binary. This minimizes any application compromises that open up the whole system to attacks.


 
Likewise, the Chrome OS boasts of a verified boot process. This boot process allows the system to start up and boot without possible harm to the system’s memory, the Linux kernel, and the partition tables. This is done through cryptography.


Since the whole Chrome OS is secured by Google, it is close to impossible for any malicious program to penetrate and run. And even when some freak malicious programs do manage to get through the doubly secured kernel hardening and processing infrastructure, this will be immediately detected upon reboot. This sends a prompt to the user. It also initiates self-cleaning program within the system.

The cleaning process has less hassle too than the others. Since the system data is set apart from the user data, the system can fix itself without causing the user any setting changes and lost data. Cached data is also kept intact, within the “cloud” of Google servers. Adding to user specification security, the user data within the browser, OS , and plug-ins are encrypted. Devices cannot share user data.

For any bugs found upon installation, the Chrome OS has set up an auto system update and patch. All this is done in the background, even while the user keeps on working online.

Now, that makes for a lot of exciting new stuff from a technology company that’s been very reliable and attentive to its users.

Saturday, September 24, 2011

Apple iPad 3 Features and Release




The Apple iPad is one of the best-selling tablets in the world, and the iPad 3 is one of the most anticipated devices from Apple this year.

In a nutshell, the Apple iPad3 will feature a new, thinner and sleeker design, down nearly 20 percent in size compared to the iPad 2. It will also support full touchscreen HD display with a screen resolution of 2048 x 1536.

Apart from that, the iPad 3 will have a lighter battery life, reducing the weight of the tablet. However, the battery is reported to cost 20 to 30 percent more than the current iPad’s battery, which will also have a longer battery life.

It is also expected that the iPad 3 will have a wireless charging technology, which will be able to charge the battery and transfer data wirelessly.

iPad 3 Features :

A6 Processor: A6 is a Quad-core Processor (1.7GHz.), iPad 2 is A5 processor (900MHz dual-core) This would make the iPad 3 as powerful as any high-end desktop

iOS 5: It includes multitasking features, such as notifications, task-finishing, app-switching, location and background sound.

3D Feature and New Retina-Display: the screen resolution of the iPad3 will be 2048 x 1536 pixels

Cloud Computing:iCloud users can store photos, apps, calendars and access songs on iTunes without having them to store in the phone’s memory.

Camera:Unlike the iPad 2, the new tablet will come with LED flash to support the camera. It is expected to have a 5MP camera with 1080p or 720p video recording quality of 60 frames per second.

Finger-Print Proof:The touch screen will be coated with oleophobic materials, which will reduce the oil and fingerprints on the screen.

Release Date:There isn’t any official word from Apple on when the iPad 3 will be released; however, rumors indicate that it will be announced sometime early next year. Reports state the trial production is likely to start this October. One of the major reasons why the launch of the device has delayed is due to the Retina Display technology. 

Please make sure that you keep visiting this page to stay updated.

Thursday, September 22, 2011

PDF TO WORD : BEST CONVERTER EVER

Unlike other textual formats, PDFs aren’t that easy to edit. It is hard to edit them directly, so another available option – converting a PDF to a Word document – attracts more and more users. However, the task is not as easy as it may seem because of numerous in-depth differences between PDF format and Word or RTF files.

That’s what PDF to Word was developed for. The program delivers smooth and accurate conversion of virtually any PDF document to a corresponding Word or RTF file. The process runs so easily, that you would never think the conversion could be a problem!

You simply drag a desired PDF file to program’s window, then click the convert button and receive an accurately converted RTF or DOC file on the other side. It is that easy: no unnecessary configuration, no hundreds of options anymore. Drag in the file, click the Start, and you’re done! And PDF to Word Converter cares very much about accuracy of conversion, so every file you process looks exactly as it did before that.
Download Link

Tuesday, September 20, 2011

Windows Administrator Password Remover

Hello Readers.. If we lost an user log in password means no issues!! We can log in as administrator and Change the user’s password, But once if we lose administrator password, there arises the problem.
Windows Password Remover is the professional Windows password recovery software to restore lost Windows administrator and user passwords for you to instantly log into Windows without re installing the OS. It supports to restore passwords of all versions of Windows, as Windows 7, Windows Vista, XP, 2008, 2003 and 2000, etc.


Burn iso to a cd, that will work during the boot process and instantly reset / remove the administrator.

Installation Notes


Windows Administrator Password Remover:
1) Burn the iso on a cd.
2) Boot the CD.
3) Wait until it asks any thing from you (Some time).
4) Remove the password of the administrator.

The interface is simple and easy,
You will get it.


Monday, September 19, 2011

Four-Camera 3D shooting possible: for Glasses Free 3D TV

When it comes to producing 3D TV content, the more cameras that are used to simultaneously record one shot, the better. At least two cameras (or one camera with two lenses) are necessary to provide the depth information needed to produce the left- and right-eye images for conventional 3D, but according to researchers at Germany's Fraunhofer Institute for Telecommunications, at least four cameras will be needed if we ever want to achieve glasses-free 3D TV. Calibrating that many cameras to one another could ordinarily take days, however ... which is why Fraunhofer has developed a system that reportedly cuts that time down to 30 to 60 minutes.

The STAN assistance system ensures that the optical axes, focal lengths and focal points are the same for each camera. That way, as the viewer moves their head, the combined shots will all look like one three-dimensional shot.

Objects that are visible in all four shots are identified using a feature detector function. Using these objects as references, STAN then proceeds to calibrate the cameras so that they match one another. Due to slight imperfections in lenses, however, some discrepancies could still remain. In those cases, the system can do things such as electronically zooming in on one shot, to compensate for the flaws. This can be done in real time, so STAN could conceivably even be used for live broadcasts.

The Fraunhofer team is now in the process of developing a video encoding system, to compress all the data into a small enough form that it could be transmitted using the conventional broadcasting infrastructure. The four-camera setup is already in use by members of the MUSCADE project, which is a consortium dedicated to advancing glasses-free 3D TV technology.

Sunday, September 18, 2011

Creating the next Nokia Tune: Listen & Vote


Introducing the Nokia Tune Remake.
You may have heard about this little competition that Nokia are running at the moment. There’s something ever so slightly special about it – namely the prize


The Nokia Remake gives you the opportunity to create the next version of the Nokia ringtone. To put that into perspective, your work could be featured on over 100 million phones around the world! That isn’t all either, the winner will also take home a cool $10,000. Got your attention? Good 

The competition launched over a week ago and, needless to say, there have been some awesome entries! These will eventually be whittled down to 10 finalists. Five chosen by the number of public votes (“Likes”), and five by the specialist judging panel.

As we can see below The Five Most ‘Liked’ Entries are currently as follows – but that could all change.

1. The Great Marvelous – 35,976 likes

2. Progressive Nokia – 11,993 likes

3. Nokia tune China Classical Ver – 8,470 likes

4. Nokiorchestra – 4,829 likes

5. NOKIA CHINESE – 3,381 likes

Have a listen and vote for your favorites!

Remember, if you feel like being a music maestro, you have until the 2nd October to submit your entry on the competition page

Saturday, September 17, 2011

The Future of Skin

Of all our human organs, skin is arguably one of the most abused — yet it’s also arguably the most reliable. It protects everything inside us, helping us avoid harm by sensing obstacles in our way, making sure we stay hydrated, and ensuring we keep ourselves at the right temperature. It constantly replenishes itself, sloughing off former layers that we’ve either burned or dried out or scraped or ignored, while new ones grow in their places.

Many of skin’s properties would be useful in other applications — like helping people with artificial limbs regain some of what they’ve lost. And an electronic skin, or at least some tactile sensory ability, could help machines understand the delicate differences in force that are required to grip an apple, a hand or a piece of steel.

Researchers trying to duplicate its beneficial properties are building teeny stretchable electronics that can give artificial limbs a real sense of touch.

And scientists are making several changes to human skin itself, turning it into a 21st century interface capable of much more than feeling another person’s caress. From conductive tattoos that turn skin into a human-machine communications device, skin is getting plenty of upgrades.

Thursday, September 15, 2011

Download Now Windows 8 (DP)

    As promised earlier today at the Build Conference,The developer preview is up for grabs now on the newly launched Developer site.There are two kinds of builds available over the Developer site.First is with Developer tools and a 64 Bit version while the other version is Without the Developer tools in 32 bit as well as 64 bit version.





BUILD is a new event that shows modern hardware and software developers how to take advantage of the future of Windows. Learn how to work with the all new touch-centric user experience to create fast, fluid, and dynamic applications that leverage the power and flexibility of the core of Windows, used by more than a billion people around the world.

Hear how the UI was designed to work seamlessly with a diversity of devices and form factors. Go behind the scenes and learn all about the new app model that allows you to create powerful new apps. All while retaining the ability to use your existing apps. Web-connected and web-powered apps built using HTML5 and JavaScript have access to the power of the PC. Touch-optimized browsing, with the full power of hardware-accelerated Internet Explorer 10 transforms your experiences with the web. BUILD is the first place to dive deep into the future of Windows.



Here are the details of the Developer Builds and Windows 8 Videos that are up now on the site http://channel9.msdn.com/events/BUILD/BUILD2011

Windows Developer Preview with developer tools English, 64-bit (x64)
64-bit Windows Developer Preview
Windows SDK for Metro style apps
Microsoft Visual Studio 11 Express for Windows Developer Preview
Microsoft Expression Blend 5 Developer Preview
28 Metro style apps including the BUILD Conference app

Windows Developer Preview English, 64-bit (x64)

Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 64-bit PC.

Windows Developer Preview English, 32-bit (x86)

Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 32-bit PC.


Building "Windows 8" - Video #1





Windows 8 Hands-on at Microsoft Build 2011

Samsung Tablet



Monday, September 12, 2011

ANDROID – THE MOST ATTACKED MOBILE OS: MCAFEE


Malware attack on mobile devices, especially on Android platform, has surged in recent times, the computer security software maker McAfee said.

According to McAfee report, malware threat on Android device raised to 76 per cent since last quarter, making it the most vulnerable OS in the market. The report noted Android as the ‘most attacked mobile operating system.’

“This year we have seen record breaking numbers of malware, especially on mobile devices, where the uptick is in direct correlation to popularity,” Vincent Weafer, senior vice president of McAfee Labs, said in a statement.

Android over took Nokia’s Symbian OS as the most popular target for mobile malware developers. The rise of malware attack on Android may help cyber criminals to steal personal data from Android users.

The security firm added that these malwares may appear in “everything from calendar apps, to comedy apps to SMS messages to a fake Angry Birds updates”.

Interestingly, the report revealed that the hacker groups LulzSec and Anonymous were some of the prominent cyber news generators in 2011 Q2.