GooGle Is SPyIng US ?
That words across my mine during web-surfing, while my gmail and iGoogle account still logged in. Moreover I like Chrome to get any information through internet. Does Google really spy on me? If you open History in Chrome, you will be amazed by how well-organize Chrome doing it.
How Does Google+ Stack Up Against Facebook?
With Google+, the behemoth of Web search may have finally figured out social networking. Demand for Google+ invites is reportedly through the roof, and critics are generally pleased with how the service works..
Angry Birds Now in Windows Phone Marketplace
At last. Angry Birds is now available in the Windows Phone Marketplace—a few hours ahead of schedule and so fresh it hasn’t even been rated yet! Be the first—or just hunker down with your phone and get dem pigs. .
WindOwS 8 is Cool Enough ?
On Tuesday, Microsoft showed off the first tablets running Windows 8, and provided a bunch of new details about the operating system.
Secure Browseing Is The Way To scuess
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.
justbeamit Offers Easy File Sharing Over P2P Without Signing Up
Reactions: |
Edit & Add Effects To Your Videos Online Via FileLab Video Editor
Reactions: |
One Week After Launch, Blogger Fixes Biggest Issues with the New Dynamic Views
click on picture to enlarge |
So Blogger has now updated several of the templates with fixes and tweaks designed to squash what bugs made it through the testing phase but also add some of the most requested features.
"Last week, we launched Dynamic Views in an effort to make it easier for readers to enjoy and discover your posts. You responded," Bruce Polderman, product manager at Google, wrote.
"As of today, hundreds of thousands of blogs have changed their blog template to Dynamic Views. The clear favorite appears to be Magazine, with Classic running a close second," he said.
With so many people now using the templates, the big issues with them were quick to surface.
Following feedback, Blogger has added more emphasis to search results, when using either the Magazine or the Timeslide templates.
The way images are positioned in posts has been improved to make them more accurately follow the poster's intentions.
The new Dynamic Views now support JavaScript within posts, a welcomed update for those that use custom code on their blogs.
Also new is support for Archive pages, something that probably should have been there from the get go. Still, it's nice that Blogger is moving this fast and fixing what's missing.
These fixes and changes are great, but what most people have been missing and requesting the most is support for Blogger gadgets and the ability to customize the templates.
Both of these things are coming, but they're a bit harder to implement. Gadgets have to be rewritten to run on the new HTML5 and CSS3 base. Likewise, customization options are going to require bigger updates to the templates, but Blogger is working on it.
Reactions: |
Sony in final talks to buy movie rights to Steve Jobs bio
According to a report by Hollywood blog Deadline, the deal could be worth several million dollars. Sony had a big hit last year with another biopic, the Oscar-winning The Social Network, based on Facebook co-founder Mark Zuckerberg.
The Steve Jobs biography, written by former CNN chairman and Time Magazine managing editor Walter Isaacson, was previously set for publication on November 21. However, following the Apple co-founder’s death on Wednesday, publisher Simon & Schuster announced that it was bringing the date forward to October 24.
Isaacson’s book is the result of more than 40 interviews with Steve Jobs conducted over a period of two years. Family, friends, co-workers and business competitors also contributed. Substantial pre-orders of the publication have pushed it to the top of Amazon.com’s best seller list. The digital version also tops the book chart in Apple’s iTunes store.
As pointed out by Deadline, up to now only one other movie has profiled the life of the tech giant. Pirates of Silicon Valley, a made-for-TV production broadcast in 1999, saw Falling Skies actor Noah Wyle take on the role of Jobs.
The Apple co-founder enjoyed Wyle’s performance so much that he invited the actor to make an appearance at the 1999 Macworld event in New York. As you can see from the video below, his impersonation of Jobs at the event went down a storm.
It’s a safe bet any movie chronicling the life of Steve Jobs will also be a big hit.
Reactions: |
Microsoft Now Owns Skype
Reactions: |
An Introduction To RATS - Remote Administration Tools
Whats A Trojan Horse
Trojan is a malicious program/code which is used for remote access to target computer and then attack using unauthorized access to target or victim's computer and causes damage to the system. Trojan is a small hidden code inside another program that's why it easily enters system without knowledge of computer user.The term is derived from the Trojan Horse story in Greek mythology.
In the 12th century B.C., Greece declared war on the city of Troy. The dispute erupted when the prince of Troy abducted the queen of Sparta and declared that he wanted to make her his wife, which made the Greeks and especially the queen of Sparta quite furious.
The Greeks gave chase and engaged Troy in a 10-year war, but unfortunately for them, all of their efforts went down the drain. Troy was simply too well fortified.
In a last effort, the Greek army pretended to be retreating, leaving behind a huge wooden horse. The people of Troy saw the horse, and, thinking it was some kind of a present from the Greeks, pulled the horse into their city, without knowing that the finest soldiers of Greece were sitting inside it, since the horse was hollow.
Under the cover of night, the soldiers snuck out and opened the gates of the city, and later, together with the rest of the army, killed the entire army of Troy.
This is why such a program is called a Trojan horse - it pretends to do something while it does something completely different, or does what it is supposed to be and hides it's malicious actions from the user's prying eyes.
There are many types of Trojan Horse ,Some of the common ones are as fallows
- RATS (Remote administration Tools )
- Priviledges-Elevating Trojans
- Denial Of Service (DOS)
- File Sending Trojans(FTP Trojan)
- Destructive Trojans
RATS - Remote Administration Tools
Remote Administration Tool also known as RAT is used to remotely connect and manage single or multiple computers. RAT is one of the most dangerous Trojan because it compromises features of all types of Trojans. It provides an attacker with nearly unlimited access to host computer ,The following are some of the common features found in a RAT (Remote Administration Tool)
- Screen/camera capture or control
- File management (download/upload/execute/etc.)
- Shell control (usually piped from command prompt)
- Computer control (power off/on/log off)
- Registry management (query/add/delete/modify)
- Other product-specific function
How RATS Work
Remote administration trojans open a port on your computer and bind themselves to it (make the server file listen to incoming connections and data going through these ports). Then, once someone runs his client program and enters the victim's IP, the trojan starts receiving commands from the attacker and runs them on the victim's computer.
Some Trojans let you change this port into any other port and also put a password so only the person that infect this specific computer will be able to use the trojan. However, some of these password protections can be cracked due to bugs in the trojan (people who program RATs usually don't have much knowledge in the field of programming), and in some cases the creator of the trojan would also put a backdoor (which can be sometimes detected, under certain conditions) within the server file itself so he'll be able to access any computer running his Trojan without the need to enter a password. This is called "a backdoor within a backdoor".
Are RATS Illegal ?
Well, It is actually both. There are RATS that are Legal and that are actually Illegal. The difference between them both are the fact that, Legal RATS inform the connected remote that you are on the computer, And Illegal RATS do not inform the remote that you are on the computer.
Legal :-
legal means the person has full control as well, They can kill the connection any time they please, No backdoor is left on their PC, And it is in your network.
Illegal:-
Illegal means the person does not know you are connected and they have no knowledge you are till you take action, They have no control to kill the connection (unless they unplug the Internet), But even then, A backdoor is left on the computer meaning anytime the computer is on and the Internet is up, You can connect anytime you want. You can destroy files,Download files, Steal information, Basically make their life miserable.
Reactions: |
A man pirated $5 million of content in the name of art!
A man pirated $5 million of content in the name of art!
Reactions: |
40 Million Users on Google+, But How Many Use It?
Google has announced its earnings for the most recent quarter, and surprise!! they made lots and lots and lots of money, mostly off of search revenue. Which is the same story that's been written about Google earnings for the last ten years.
But! While the company didn't break out any specific numbers on Android usage, they did confirm that Google+ has over 40 million users. "Users," here, being loosely defined, since Google+ is a relative ghost town of privately shared links about how Google+ is a ghost town. And given how heavily Google+ was promoted in the early days—across however many millions and millions of Gmail accounts is it wrong to be a little surprised that there aren't even more people who signed up?
Google will be hosting a call to discuss earnings (a not at all shabby $9.72 billion revenue, $2.73 billion net income) at 4:30EST, which will hopefully include some goodies on Android activations, Ice Cream Sandwich, and the Motorola acquisition.
Read more: http://www.newtechie.com/2011/10/40-million-users-on-google-but-how-many.html#ixzz1avk2vfQu
Reactions: |
Download iOS 5 Firmware Direct Links
Direct Download iOS 5 IPSW Files: Below are the direct download links for iOS 5 firmware.
- Download iOS 5 for iPhone 3GS
- Download iOS 5 for iPhone 4 (GSM)
- Download iOS 5 for iPhone 4 (CDMA)
- Download iOS 5 for iPad 1
- Download iOS 5 for iPad 2 (WiFi)
- Download iOS 5 for iPad 2 (GSM)
- Download iOS 5 for iPad 2 (CDMA)
- Download iOS 5 for iPod Touch 3G
- Download iOS 5 for iPod Touch 4G
Reactions: |