Transparent White Star

GooGle Is SPyIng US ?

That words across my mine during web-surfing, while my gmail and iGoogle account still logged in. Moreover I like Chrome to get any information through internet. Does Google really spy on me? If you open History in Chrome, you will be amazed by how well-organize Chrome doing it.

How Does Google+ Stack Up Against Facebook?

With Google+, the behemoth of Web search may have finally figured out social networking. Demand for Google+ invites is reportedly through the roof, and critics are generally pleased with how the service works..

Angry Birds Now in Windows Phone Marketplace

At last. Angry Birds is now available in the Windows Phone Marketplace—a few hours ahead of schedule and so fresh it hasn’t even been rated yet! Be the first—or just hunker down with your phone and get dem pigs. .

WindOwS 8 is Cool Enough ?

On Tuesday, Microsoft showed off the first tablets running Windows 8, and provided a bunch of new details about the operating system.

Secure Browseing Is The Way To scuess

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

justbeamit Offers Easy File Sharing Over P2P Without Signing Up


When you have an oversized file or cluster of enormous files that you simply need to send to somebody, however you don’t need to clog up your Dropbox account and you don’t have time to merely drive over to your friend’s house with a USB drive, Justbeamit could be a new internet service that permits you to upload a file, get a non-public link and send it to an addict. once they open it, a non-public peer-to-peer download session can begin and they’ll grab the file from you over the net. There are, undoubtedly, dozens of file sharing services that enable you to share files with friends or coworkers, however the method is commonly a protracted one where you've got to upload a file, set security and visibility settings and generally even have the recipient sign on with the file sharing service so as to receive it. IM shoppers are a method of transferring files, but again, if you’re transferring files to somebody at work, you would possibly not have access to a messenger, otherwise you might not use constant messenger service as your friend. Justbeamit is a web application that permits file transfer with no sign on whatsoever. It offers easy Peer to see (P2P) file transfer that provides you a download link to share with anyone. The service creates a affiliation between you and whoever you share the link with thus your file isn't uploaded anywhere; rather, the link serves solely as a gateway for transferring the file from your pc to the recipient(s)’.
Justbeamit makes the method simple on purpose: all you've got to try to to is drag and drop the file you wish to share into your browser window, and also the internet app can offer you the URL you'll be able to send to your friend. You’ll be capable to catch the progression whereas your file is uploaded and when it’s finished, you’ll see a “waiting” indicator, which means the service is awaiting the recipient to download the file. once they visit the link, Justbeamit opens the affiliation between you and also the receiver and permits them download the file.
justbeamit Offers Easy File Sharing Over P2P Without Signing Up (3)
As previously mentioned, it’s a web based service and doesn’t need any log in or whatever, so it’s real easy to deal with simply go to the site and drag n drop your files (whose you want to share) or you can just click on “Select A File To Beam” in order to browse and select for your files.
justbeamit Offers Easy File Sharing Over P2P Without Signing Up (4)
The files will be added in no time. Then you will get a link which you need to share to whom you want to send the file. Once you shared the link and it’s been accessed, your files will be uploading and sending to them. Note that the transfer rate depends on both you and that person's internet speed.
justbeamit Offers Easy File Sharing Over P2P Without Signing Up (2)
You cannot close your browser (or the tab) as long as the file transfer is being progressed (if you close it, the P2P connection will end immediately and the receiver will loose the connection.
justbeamit Offers Easy File Sharing Over P2P Without Signing Up (1)
Nevertheless, you can close the tab when the download starts in receiver’s download manager.
Visit justbeamit


Read More

Edit & Add Effects To Your Videos Online Via FileLab Video Editor


Just look over search engines and you will find a lot of video editor tool available for all operating system. But most of them are paid and required a large file to be downloaded and huge system and hardware resource to run. If you are a professional video editor then you will need those big software, but if you are just an amateur who used to edit videos just for having fun, then those software in inappropriate for you because they are both hard to use and expensive to buy. For you, Filelab Video Editor is a simple web based service that you can use for free directly from your browser.
Edit & Add Effects To Your Videos Online Via FileLab Video Editors (2)
Visit FileLab Video Editor


Read More

One Week After Launch, Blogger Fixes Biggest Issues with the New Dynamic Views



click on picture to enlarge
Blogger debuted the new Dynamic Views last week, a great-looking new set of templates for Blogger blogs that are built on top of modern web technologies, HTML5, CSS3 and JavaScript. But, as with any big launch, especially for something as technical as this, some issues have only now surfaced.

So Blogger has now updated several of the templates with fixes and tweaks designed to squash what bugs made it through the testing phase but also add some of the most requested features.

"Last week, we launched Dynamic Views in an effort to make it easier for readers to enjoy and discover your posts. You responded," Bruce Polderman, product manager at Google, wrote.

"As of today, hundreds of thousands of blogs have changed their blog template to Dynamic Views. The clear favorite appears to be Magazine, with Classic running a close second," he said.

With so many people now using the templates, the big issues with them were quick to surface.

Following feedback, Blogger has added more emphasis to search results, when using either the Magazine or the Timeslide templates.

The way images are positioned in posts has been improved to make them more accurately follow the poster's intentions.

The new Dynamic Views now support JavaScript within posts, a welcomed update for those that use custom code on their blogs.

Also new is support for Archive pages, something that probably should have been there from the get go. Still, it's nice that Blogger is moving this fast and fixing what's missing.

These fixes and changes are great, but what most people have been missing and requesting the most is support for Blogger gadgets and the ability to customize the templates.

Both of these things are coming, but they're a bit harder to implement. Gadgets have to be rewritten to run on the new HTML5 and CSS3 base. Likewise, customization options are going to require bigger updates to the templates, but Blogger is working on it.
Read More

Sony in final talks to buy movie rights to Steve Jobs bio


Sony Pictures is believed to be in final talks to acquire the movie rights to the forthcoming and eagerly awaited Steve Jobs biography.
According to a report by Hollywood blog Deadline, the deal could be worth several million dollars. Sony had a big hit last year with another biopic, the Oscar-winning The Social Network, based on Facebook co-founder Mark Zuckerberg.
The Steve Jobs biography, written by former CNN chairman and Time Magazine managing editor Walter Isaacson, was previously set for publication on November 21. However, following the Apple co-founder’s death on Wednesday, publisher Simon & Schuster announced that it was bringing the date forward to October 24.
Isaacson’s book is the result of more than 40 interviews with Steve Jobs conducted over a period of two years. Family, friends, co-workers and business competitors also contributed. Substantial pre-orders of the publication have pushed it to the top of Amazon.com’s best seller list. The digital version also tops the book chart in Apple’s iTunes store.
As pointed out by Deadline, up to now only one other movie has profiled the life of the tech giant. Pirates of Silicon Valley, a made-for-TV production broadcast in 1999, saw Falling Skies actor Noah Wyle take on the role of Jobs.
The Apple co-founder enjoyed Wyle’s performance so much that he invited the actor to make an appearance at the 1999 Macworld event in New York. As you can see from the video below, his impersonation of Jobs at the event went down a storm.
It’s a safe bet any movie chronicling the life of Steve Jobs will also be a big hit.
Read More

Microsoft Now Owns Skype


Microsoft announced a while back that it had intended to purchase Skype for a total of $8.5 billion, and we heard recently that Microsoft had received the final approval they needed from the EU for the deal to go ahead.
Microsoft has now official announced that the company has purchased Skype and the deal has been completed, you can see part of the official statement from Microsoft below.
Microsoft Skype
Microsoft and Skype will remain focused on their shared goal of connecting all people across all devices and accelerating both companies’ efforts to transform real-time communications for consumers and enterprise customers. The completion of the acquisition also marks the official introduction of Skype as a new business division within Microsoft.
It will be interesting to see how Microsoft develops Skype further, and we suspect Windows 8 may come with some sort of Skype integration.
Source BGR
Read More

An Introduction To RATS - Remote Administration Tools

As promised earlier, I'll be writing some articles on RATS (Remote Administration Tools) and i will explain how you can hack remote computers using RATS, But before we go into the details let me first explain some of the basic concepts and working that one should know about RATS


Whats A Trojan  Horse
Trojan is a malicious program/code which is used for remote access to target computer and then attack using unauthorized access to target or victim's computer and causes damage to the system. Trojan is a small hidden code inside another program that's why it easily enters system without knowledge of computer user.The term is derived from the Trojan Horse story in Greek mythology.


In the 12th century B.C., Greece declared war on the city of Troy. The dispute erupted when the prince of Troy abducted the queen of Sparta and declared that he wanted to make her his wife, which made the Greeks and especially the queen of Sparta quite furious.

The Greeks gave chase and engaged Troy in a 10-year war, but unfortunately for them, all of their efforts went down the drain. Troy was simply too well fortified.

In a last effort, the Greek army pretended to be retreating, leaving behind a huge wooden horse. The people of Troy saw the horse, and, thinking it was some kind of a present from the Greeks, pulled the horse into their city, without knowing that the finest soldiers of Greece were sitting inside it, since the horse was hollow.
Under the cover of night, the soldiers snuck out and opened the gates of the city, and later, together with the rest of the army, killed the entire army of Troy.

This is why such a program is called a Trojan horse - it pretends to do something while it does something completely different, or does what it is supposed to be and hides it's malicious actions from the user's prying eyes.

There are many types of  Trojan Horse ,Some of the common ones are as fallows

  • RATS (Remote administration Tools )
  • Priviledges-Elevating Trojans
  • Denial Of Service (DOS)
  • File Sending Trojans(FTP Trojan)
  • Destructive Trojans
 and many more..

RATS - Remote Administration Tools
Remote Administration Tool also known as RAT is used to remotely connect and manage single or multiple computers. RAT is one of the most dangerous Trojan because it compromises features of all types of Trojans. It provides an attacker with nearly unlimited access to host computer ,The following are some of the common features found in a RAT (Remote Administration Tool)
  • Screen/camera capture or control
  • File management (download/upload/execute/etc.)
  • Shell control (usually piped from command prompt)
  • Computer control (power off/on/log off)
  • Registry management (query/add/delete/modify)
  • Other product-specific function

How RATS Work
Remote administration trojans open a port on your computer and bind themselves to it (make the server file listen to incoming connections and data going through these ports). Then, once someone runs his client program and enters the victim's IP, the trojan starts receiving commands from the attacker and runs them on the victim's computer.

Some Trojans let you change this port into any other port and also put a password so only the person that infect this specific computer will be able to use the trojan. However, some of these password protections can be cracked due to bugs in the trojan (people who program RATs usually don't have much knowledge in the field of programming), and in some cases the creator of the trojan would also put a backdoor (which can be sometimes detected, under certain conditions) within the server file itself so he'll be able to access any computer running his Trojan without the need to enter a password. This is called "a backdoor within a backdoor".

Are RATS  Illegal ?
Well, It is actually both. There are RATS that are Legal and that are actually Illegal. The difference between them both are the fact that, Legal RATS inform the connected remote that you are on the computer, And Illegal RATS do not inform the remote that you are on the computer.

Legal :- 
legal means the person has full control as well, They can kill the connection any time they please, No backdoor is left on their PC, And it is in your network.

Illegal:-
Illegal means the person does not know you are connected and they have no knowledge you are till you take action, They have no control to kill the connection (unless they unplug the Internet), But even then, A backdoor is left on the computer meaning anytime the computer is on and the Internet is up, You can connect anytime you want. You can destroy files,Download files, Steal information, Basically make their life miserable.

Hope this Info helps you, In my next Article i will explain how one can hack Remote computers using RATS, If you have any doubts regarding the article please feel free to post a comment  


Read More

A man pirated $5 million of content in the name of art!


A man pirated $5 million of content in the name of art!

Artist Manuel Palou recently unveiled his new piece titled "5 Million Dollars 1 Terabyte," which is exactly what it sounds like. The display is simply a 1TB external hard drive that contains $5,000,000 worth of illegally downloaded files. Of course, since they're all digital files, there's no difference between the hard drive he displays than the many other ones with pirated content with the same value or more that many people have next to their computer desks. You can see the listing of files he downloaded here. The most impressive thing is he managed to do all this without downloading any porn on the drive.
Read More

Iphone4 Vs Iphone4s



Read More

40 Million Users on Google+, But How Many Use It?




Google has announced its earnings for the most recent quarter, and surprise!! they made lots and lots and lots of money, mostly off of search revenue. Which is the same story that's been written about Google earnings for the last ten years.

But! While the company didn't break out any specific numbers on Android usage, they did confirm that Google+ has over 40 million users. "Users," here, being loosely defined, since Google+ is a relative ghost town of privately shared links about how Google+ is a ghost town. And given how heavily Google+ was promoted in the early days—across however many millions and millions of Gmail accounts is it wrong to be a little surprised that there aren't even more people who signed up?

Google will be hosting a call to discuss earnings (a not at all shabby $9.72 billion revenue, $2.73 billion net income) at 4:30EST, which will hopefully include some goodies on Android activations, Ice Cream Sandwich, and the Motorola acquisition.

Read more: http://www.newtechie.com/2011/10/40-million-users-on-google-but-how-many.html#ixzz1avk2vfQu
Read More

Download iOS 5 Firmware Direct Links



Apple has released iOS 5 firmware update just as they promised last week at the iPhone 5 event. Along with iOS 5, users will be able to access iCloud as well. You can download iOS 5 for your iPhone, iPad and iPod touch by plugging it into your computer and checking for updates in iTunes. If you have a slow/unreliableconnection, you can even use the direct download links (provided below).

Direct Download iOS 5 IPSW Files: Below are the direct download links for iOS 5 firmware.
  • Download iOS 5 for iPhone 3GS
  • Download iOS 5 for iPhone 4 (GSM)
  • Download iOS 5 for iPhone 4 (CDMA)
  • Download iOS 5 for iPad 1
  • Download iOS 5 for iPad 2 (WiFi)
  • Download iOS 5 for iPad 2 (GSM)
  • Download iOS 5 for iPad 2 (CDMA)
  • Download iOS 5 for iPod Touch 3G
  • Download iOS 5 for iPod Touch 4G
General tips: Unlockers must stay away. Others must go to iTunes 10.5 and click on Shift+Restore (Windows) or Option+restore (Mac) and then choose the Ipsw file you just downloaded.

Read More

Newer Posts Older Posts Home

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More