-->
Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu
Showing posts with label IT Application. Show all posts
Showing posts with label IT Application. Show all posts

Wednesday, October 31, 2012

Windows 8 Revolution

Windows 8 officially launched simultaneously around the world on Friday, October 26, 2012. Microsoft's latest operating system is touted as the second major revolution in the family of Windows after Windows 95, which maximally exploit free interface.

There are three operating systems are launched, namely Windows 8, Windows 8 Pro, and Windows RT. Windows 8 is the most basic version intended for general users, Windows 8 Pro is intended for professionals, and Windows RT is Windows 8 specifically for ARM-based mobile devices.

Computers with Windows 8 operating system can run on any older versions Windows Office application. While Windows-based devices RT can only run applications designed specifically from the Windows Store.

Windows 8 Installation takes about 10 minutes. If the upgrade is performed on a Windows 7-based devices, personal files and settings to an earlier application can still be used.
Windows 8 screenshot. (Picture from: http://www.howtogeek.com/)
Windows 8 interface using the new pattern. Icons that had changed little boxy rectangular box that continues to date. This is similar to the view outside the widget function continues to change with it.

On the right side of the screen there is a Charm feature. Contents of a setting, search, move the display screen, and share content. Its function is to facilitate navigation from one view to another view.

Although designed specifically for a touch screen, Windows 8 can still be operated on a computer with a mouse and keyboard shortcuts. The goal is transition to the new system is not too surprising.

Here's music video of Windows 8 commercial song, Everything At Once by Lenka.
If you want to install Windows 8. First, you’ll want to make sure that your PC can run Windows 8, and thankfully the Windows 8 system requirements are basically the same as Windows 7. You can probably get away with installing this on a PC with lousy specs, but obviously you’ll have a better experience on a faster machine. Here’s the specs:
  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver
  • Taking advantage of touch input requires a screen that supports multi-touch
Just head to dev.windows.com and download the ISO images from the page. Then head to the Microsoft Store page and download the USB/DVD Download Tool, which can put the ISO image onto a bootable flash drive for installation—all you have to do is choose the ISO, choose the drive, and wait for it to finish copying.

The setup process is nearly identical to Windows 7, so we’re not going to go into detail about it here. We’ll assume if you’re installing Windows 8 that you’re not a newb, and as such you shouldn’t need any help clicking through a couple of installer screens. *** [BUDI RIZA | FROM VARIOUS SOURCES | KORAN TEMPO 4040]
Note: This blog can be accessed via your smart phone.
Enhanced by Zemanta

Wednesday, September 26, 2012

Dangerous Loopholes of Samsung Galaxy

A dangerous bug was found in the Samsung Galaxy line of mobile phones. Cracks can deleted all data on the phone with just one click.

Cracks were discovered by researchers from the Technical University Berlin, Ravi Borgaonkar. He showed the results of his research at an Internet security conference in Argentina.
Ravi Borgaonkar demonstrating Galaxy handset flaws. (Picture from: http://betabeat.com/)
Borgaonkar explained that the TouchWiz interface used on the Samsung Galaxy variant has holes that can be exploited by hackers HTML code.
Samsung Galaxy Android. (Picture from: http://www.engadget.com/)
The way it works is very simple. Hackers only need to insert the HTML code into a web page, and while Samsung Galaxy users accessing the site, as it is also a code for the full wipe or reset is active.

When examined the code does contain a code to reset the Samsung Galaxy, and the hackers simply enter the code in a web page to activate the code reset automatically.
Samsung Galaxy S III, Galaxy S II and Galaxy S. (Picture from: http://www.engadget.com/)
As quoted from Slashgear, Wednesday (09/23/2012), the code can erase all data on the Galaxy S II, Galaxy S Advance, Galaxy Beam, Galaxy Ace. However, when the authors tried, the code can also be used on the Galaxy S III.

Mr. Borgaonkar, who reportedly wondered aloud what Samsung’s engineers were smoking when they created the vulnerable system, demonstrates how it works in the video below.
Viewers may need headphones to hear Mr. Borgaonkar clearly, but the shocked audience reaction at 2:10, when he uses a link from a tweet to demonstrate how quickly a malicious web page can reset the phone, is unmistakable.

Well, for those users who are curious about the Galaxy series, do not try typing that shortcut. Because it will reset your phone without any confirmation (option 'yes' or 'no') before! Beware...!!!! *** [SLASHGEAR | BETABEAT | DIGITAL SPY]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Thursday, September 20, 2012

1AVStreamer, Stream Your Video onto the Internet

Who knows if you are full of talent human being, whether it's singing talent, sharp wit, insight or commentary on current events. However, no one outside of your house are aware of this, and the rest of the world is missing out. There must be a way to convey your greatness to others, and you suspect that somehow the Internet should be part of the solution. Suddenly it hits you! Your webcam! You can broadcast yourself across the world wide web! So it's the idea of ​​writing on a napkin, now how do you pull it off?

PCWinSoft is a reputable software publishing company from Brazil has launched one of their leading products, namely 1AVStreamer. With 1AVStreamer the perceived obstacles to show your talent can overcome. Now the whole world can know and enjoy the talent that you have. Absolutely superb..!

Of course by using 1AVStreamer was very helpful! 1AVStreamer lets you broadcast yourself on the internet in one click, appeared in high-resolution video and excellent audio quality via a special web pages that are part of your own website. You can choose to stream your webcam, your desktop computer, even a DV camcorder connected to your system. 1AVStreamer even lets you save a copy of your broadcast recording for later playback and review!

1AVStreamer comes with other important features like the capability to totally hide itself even from Windows task manager so that even advanced users will not be able to know the software is running. This important feature will allow you to spy on your room, office, or on your desktop, over the web and without ever being noticed. How great is that?
Screenshots of 1AVStreamer. (PIcture from: http://www.pc-windows-software.com/)
People can access the video/audio streaming using the internet browser without the need to install any special software. You can save your stream as open as you want, or locking it with a password to restrict access. Plus, with 1AVStreamer, you will always have a log of all network connections and requests in real-time! As an administrator, you will have total control over the maximum number of connections, the quality of transmission, even broadcast schedule!
Screenshots of 1AVStreamer. (PIcture from: http://www.pc-windows-software.com/)
1AVStreamer is also perfect for trainning sessions and seminars because the content can be broadcasted to all PCs in the room and at the same time recorded for posterior web publishing. The software is also fit for your home entertainment system because you can broadcast video from one point to the entire house. 1AVStreamer is also perfect If you what you need is to publish live video from your stablishment directly to your website.

The minimum requirements to run 1AVStreamer software:
  • 1.3GHz processor.
  • 120MB HD.
  • 256MB RAM.
  • Windows 2000/XP/2003/Media Center/Vista/Windows 7/Windows 8.
  • 800x600 of screen resolution.
When it comes to streaming video right from your PC over the Internet reliably and in high resolution, 1AVStreamer is definitely the product you are looking for. Grab your free copy of 1AVStreamer by clicking this giveaway page:
give-away
Do not waste any more time and get your copy of 1AVStreamer right now with only U.S. $59.99. *** [ALESSANDRO FERRI | PCWINSOFT]
Note: This blog can be accessed via your smart phone.

Thursday, September 13, 2012

Secure Your Mobile Media

It is the human nature that likes to use something new and sophisticated but perhaps this is not true for gadget users in a remote telecommunications, disaster areas and war areas.

Not long ago, a nonprofit group MobileActive released a program called SaferMobile intended for activists and journalists who were in the area with a repressive regime. Through the program, the agency provides a guide on how to use encryption techniques and the use of handheld mobile devices that are not tracked.

The agency warned of the risks of using a communication device for activists and journalists working in conflict-prone areas. Many now prefer the international media news sources of the local population in conflict-prone areas, to reduce the risk of security for journalists working in the region.

But it was also create new problems. Rami al-Sayed, for example, video bloggers who are sending video material from the conflict in Syria, was killed after the download of video clips on the internet, used by Al Jazeera, the BBC and Sky News.

Through the agency SafferMobile program provides guidance on how the use of a number of communication tools can be dangerous device users. Through safermobile.org site, the agency released a Twitter user, YouTube service, e-mail, and downloading of pictures taken from a camera mobile phone. The Institute also provides satellite phone user is often so turned improve security risks in its operation.

The site invites users device communication tools to realize the risks of using communication tools to protect themselves.

Who does not know the sophistication of satellite phone, which is able to provide communication access in almost all locations in this hemisphere. Satellite phone, despite high operating costs, often a choice available when it comes to device communication tools in one location are minimal telecommunications infrastructure, from natural disasters to war conflict situations.

The agency expose a number of security-related risks users. Among other things, relatively easily intercepted satellite telephone, data sent via satellite could hardly be encrypted, and the device is also often sends the user's location in the form of data the GPS satellite coordinates.

In areas of conflict, particularly the war zone, the use of satellite phone can be dangerous. Frequently humanitarian activists and journalists became targets of the regime who feel aggrieved by their activity. The agency provides a number of tips that can be used to reduce risk. *** [AHMAD F | MOBILEACTIVE | PIKIRAN RAKYAT 13092012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta

Friday, August 31, 2012

The Unique Application on iPhone

Has not this blog does not display info about the gadget. On this occasion I try to display info derived from uniknya.com site.

Now iPhone is more familiar to the world community, especially the young people and businessesman. Young people who love the world of multimedia, iPhone will feature a complete delight. Businessman optimize the features of his office. But, besides all that, there are several iPhone apps that are unique and strange, here's an example:

1. Fart Mobile (Farting Sound Application)
This unique application for you who like to joke with friends. This application turn your iPhone into a virtual fart machine. Thus, it can be adjusted in the menu by simply moving the iPhone alone, it would be a real fart sound.

Also included is a variety of "types" farting noise. Can be used as a tool to joke around with comrades.

2. Baby Shaker (Lull Baby Application)
Baby Shaker application is a strange and controversial because it makes the baby as a toy object. How, you have a duty to lull baby with shaking the iPhone. If fine, the baby will fall asleep. If rough, the baby will cry and appear cross sign in his eyes.

Now, Baby Shaker apps was removed just a few days after its release.

3. iResus (Virtual Medical Applications)
iResus actually not so strange, but many people are worried because of the medical process is hung entirely on the iPhone. Dr Daniel Low at Hospital Seattle, simulating the operation with a view all the instructions step by step on iResus.

Although not a doctor, you can act as a medical expert.

4. Dog Whistler (Dogs Training Application)
Dog Whistler next unique applications. It's quite popular among iPhone users who have a dog in their home.

The application is easy to operate, you simply press a whistle symbol on the phone screen so that later appeared low frequency whistle that only dogs can hear at once will train them.

5. Hold On (Challenging How Long Grasping iPhone Application)
The latter is called Hold On. The application is to test how long you can press the button right in the middle of the screen. However, on second thought, this application eliminates boredom or create boredom?

It's good you play against other people to be more exciting. *** [MUHAMMAD SUFYAN | PIKIRAN RAKYAT 30082012]
This blog can be accessed via your smart phone.Enhanced by Zemanta

Thursday, July 12, 2012

Taking Lessons From Internet Doomsday

Earlier this week, July 9, 2012, internet citizen aka netizen to be wary of Internet doomsday. Although not fully proven, we can always take lessons from any incident that occurs.

It all began with the act of six Estonians and one Russian citizen last year. The group is led by Vladimir Tsastsin (31), a computer specialist malware (malicious software) maker.

Vladimir is the owner of several internet companies that have been attachment to the malware community. Other suspects are Timur Gerassimenko (31), Dmitri Jegorov (33), Valeri Aleksejev (31), Konstantin Poltev (28), and Anton Ivanvov (26).

The majority of them have captured the United States federal agents (FBI), yet one person still at large. They've been making since 2007. Because of the knowledge-based, virus threats that are made are still threatened even though their bodies are locked up in jail.

Malicious actions of DNS Changer virus allegedly infecting four million computers in the world, 50 thousand in Indonesia. DNS (Domain Name Server), is a means to address the human translator in the form of internet protocol number.

As an illustration, we are certainly easier to remember www.facebook.com than an actual computer system identifies the address of a computer with internet protocol numbers and addresses.

Through a number of engineering programming, Tsastsin group can control the victim computer's DNS server and redirect to a fraudulent DNS server that has been prepared in advance. More crazy, antivirus programs can disable them.

With all these threats, the Minister of Communications and Informatics of Indonesia Mr. Tifatul Sembiring said in various interviews, internet doomsday discourse quite exaggerated, but all parties should be aware of internet security.

Similar delivered Rolly Awangga, founder of Saung IT (information technology dissemination organizations from Bandung). According to him, the internet doomsday are increasingly confirming the Indonesian Community to improving computer security.

"We can take the lesson is always update your anti virus. Or if you want to be more fundamental, use a proven antivirus operating system such as Linux-based. Or UNIX base operating system," said the man from Bojongsari, Indramayu.

On the other hand, institutions that serve the public such as banks should always be aware and the public interest. He exemplifies the core banking services in the United States is willing to turn itself off when the internet doomsday. "That is not turned off because the malware has infected. However, rather than one client visit a site that has transferred control of his, they would prefer safe to turn off the first service. This should be followed," he said.

As a result, we can learn a lot from the July 9 Internet Doomsday. Even if we look at pattern threats of internet attacks on the public before, we can study the patterns of threat:

1. Melissa Virus (March 26, 1999)
Created by David L Smith, Melissa virus was first known on March 26, 1999. The virus is crippling client e-mail that can not be used, because the full electronic mail sent and received double the infected computer. Although it is marred not too big, but the giant companies like Microsoft when it shut down its e-mail while.

2. Y2K (Desember 31, 1999)
The second is the Y2K disaster, this is a calculation error caused by a computer storage system on which only provides two digits for the year, assuming that the first two digits are "19".

This is done in the 60's when the first computer designed to save on storage media. But when the new year 2000 arrives, the computer may indicate that the date change from December 31, 1999 to January 1, 1900.

This error will cause a major disaster is feared because the computer is also used to manage critical facilities such as nuclear power plants and aircraft. As a result, many companies around the world held a renewal in the field of computers, both software and hardware.

3. 'I Love U' Virus (May 4, 2000)
With the name of 'I Love U', this attack made netizens headache in 2000. Why not. This 'Romantic' virus has infected 55 million computers and causing losses of billions of dollars.

According to security software firm Symantec, the incident made the CIA and the British Parliament was forced to shut down their e-mail system in order to anticipate the threat. Its name is derived from the subject of e-mails that users receive.

Peak of the damage occurred on May 4, 2000. E-mail containing this virus consists of an attachment that says "LOVE-LETTER-FOR-YOU.TXT.vbs". When activated, the computer worm overwrites all files on the host as well as attacking a copy of itself to every file.

4. April Fool's Day (April 1, 2009)
There's also April Fool's Day conficket virus that spreads from April 1, 2009. This attack could infect up to 9 to 15 million computers at that time.

April Fool Conficker Virus is exploiting vulnerability the RPC DCOM MS 08-067, thus significantly succeeded in creating fear in the world of computer users.

5. 'Here You Have' Virus (September 9, 2010)
It became one of the darkest day for Internet users, especially in shipment proximity to the memorial of Black September. Because the users get e-mail subject 'Here You Have', which apparently contains a virus in it.

E-mail spread around the world at the time and managed to 'beat' network of major organizations such as Disney, NASA, Comcast, AIG, and Proctor & Gamble.

The virus is relatively harmless, is actually just a form of spam in the inbox, which in turn makes the user can not send e-mail anymore. But look at anyone who is a victim, obviously this is not a virus at random. *** [MUHAMMAD SUFYAN | ILHAM SANTOSO | TIM CERKAS | PIKIRAN RAKYAT 12072012]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta