Friday, September 27, 2013

Dell Leaves Microsoft as the Only Company to Offer Windows RT Tabs



Dell XPS10 Teaser new 01 Dell Leaves Microsoft as the Only Company to Offer Windows RT Tabs
Dell has become another Microsoft OEM to drop the Windows RT platform as it pulls its XPS 10 tablet from the shelves.
This leaves Microsoft as the only company which is still making tablets running on Windows RT now.
Dell’s official website now lists XPS 10 Tablet, which is a 10 inch tablet running on Qualcomm’s Snapdragon S4 processor, as “unavailable”. It instead recommends users to buy the Latitude 10, another 10-inch tablet but running on Windows 8, thanks to an Intel Atom processor.
The news comes merely days after Microsoft announced the second-generation Surface tablets running on Windows RT and 8.
Still, while another Windows RT tablet is not off the cards completely, hardly anyone is expecting a product running on a failed operating system from a company which has seen a rebirth recently.
Until now, companies like Samsung, ASUS and Lenovo have already said no to the Windows RT long ago and one can’t expect a tablet from them either, probably they’ll return if the Surface 2 becomes an unexpected success.

Pakistan, Among Top 5 NSA Targets, Takes Steps to Secure its Cyber Space



Heatmap1 thumb Pakistan, Among Top 5 NSA Targets, Takes Steps to Secure its Cyber Space

NSA’s color-coded global heat maps, — a pictographic portrayal of the extent of its surveillance around the world, ranging from green, depicting the least amount of monitoring, to red, indicating the highest level of surveillance — showed Pakistan (as only contry other than Iran) in shades of red, indicating heighest level of surveillance.

 


Pakistan, among the top 5 targets of US National Security Agency, has taken steps to secure its cyber front, said a recently published report by “The News”.
Considering the revelations made by Edward Snowden, it was established that NSA may penetrate into Pakistani cyber space again to steal sensitive data relating to Pakistan, its domestic politics, strategic and economic interests and its nuclear programs, by tapping into computer networks of Internet service providers such as email, video-sharing, voice-over-IPs, chats and social networking websites.
National Telecom & Information Technology Security Board (NTISB) has resultantly framed guidelines/techniques for protecting government business from possible hacking attempts from domestic and foreign threats.
On recommendation of NTISB, Cabinet Division has communicated the guidelines to all ministries, government divisions and departments.
“Recent wave of stealing the sensitive official data by US NSA has raised serious concerns warranting the implementation of all policies and guidelines in true letter and spirit,” the Cabinet Division noted in a letter to all ministries, departments and divisions.
“USA being the leading country in the field of communication and IT is using multiple tools mainly through electronic surveillance, ground and air intelligence platforms like satellites, recording telephonic calls, gathering public pulse through e-mails filtering, radio monitoring, communication leaks, vulnerabilities in IT based networks carrying sensitive data and other sophisticated means, covertly or overtly,” the Cabinet Division noted.
It merits mentioning here that in one of the maps revealed by Edward Snowden, based on the amount of telephone and email communication data collected by NSA, Iran was shown as the primary target, warranting 14 billion reports, followed by Pakistan (13.5 billion), Jordan (12.7 billion), Egypt (7.6 billion) and India (6.3 billion).
Keeping in view the intents of NSA, NTISB framed following guidelines:
  • All government officials and officers must not use private emails (such as Gmail) for exchange of official correspondence
  • Official data should not be stored/ copied on personal computers and laptops and personal USB at any cost
  • Official data should not be stored/ copied on computers with internet connection
  • No official/ classified information should be placed on internet by any means
  • Uploading of sensitive information on social media should be avoided
  • Uploading of videos and photos of official meetings should be avoided
  • Downloading of software from internet should be avoided
  • All government offices are supposed to get internet connections from National Telecommunication Corporation (NTC) as per policy
  • Official personal computers (PCs) having sensitive data must not be provided with internet connection
  • Contents placed on official websites must be properly scrutinised and approved for uploading
  • Internet usage in government departments be regulated and access be provided with limited user privileges
  • Internet computers be isolated and the network security must be ensured and internet provision be controlled by the highest administrative authority in the ministry, division or department.
The Security Board noted that presence of sensitive/ official data on the web had made the government official entities hostage and vulnerable to hostile ingress and sudden access by unknown intelligent IT mafias, suspected hackers as well as individual secret agents.

Misuse of this information fairly acquired from such an advanced information resource through multiple hacking techniques may invariably cause serious threats to national security.
Keeping in view the NSA’s level of deep penetration into computer and communication networks, it is assumed that above mentioned guidelines aren’t enough to safeguard our national interests.
Further hardening of our ISPs, cellular networks, telecom companies and other liaison channels is needed to cent percent protect our national secrets.

Not to mention, Android, iOS, Windows, Mac and devices of various other makes and kinds are all under NSA’s control that can communicate user data to agency’s control room without any hassle.

Definitely, there is a lot more required than just these guidelines.

Sunday, August 5, 2012

7 Most Trusted Websites to Earn Money Online

Online earning is one of the latest trend to earn lot of money right from your home. Technology has brought it to people. This made  most of the unemployed people to get employed. Youngsters who have completed their schooling will have certain period gap between schooling and university studies for enjoying the vacation. They may use their vacation with a good and profitable manner. I have listed below the profitable and more trusted sites which could be used to earn lot of money from them by working. The delivery of your money may change according to the site you work with. Most of the sites uses Paypal or check for payment.
Students having skills may shine in online earning. Most of the trusted sites give rewards only for talents. But still, any person can earn more money if he is curious in his work. I would like to rank Google Adsense as the first one in this top site for earning online as it is more trusted than any other site.

Google Adsense:

The best way to earn money is by running a website and putting Google Ads in it. A big company which can be trusted more. If the child have best writing skills, then he may run a blog, publishing the things what he know or the stuff he learns. Buying a website has become more affordable to everyone. Websites are available at cheaper rates and it can be used to earn lot of money from Google. A better knowledge in SEO and web development is required but a best blogger is certified only through his writing skills. The earned money will be delivered to you via check directly to your house address.
When you run a site, your site will not only be eligible to Google Ads, but also if your blog or website becomes popular in future, you may receive more advertisers and sponsors to your site through contact. You may also earn from them. Blogs can also be bought for free. Blogger from Google offers a free service to start a blog.

Amazon Mechanical Turk:

Amazon.com provides users an opportunity to earn money by doing people’s work. People who want to finish their work will submit here by fixing a rate for that work. When you complete it, you will be rewarded with certain amount. A few part of the work rate will be taken by Amazon as a commission. Most of the works will be like completing stuffs in online mode. Example, typing given paragraph within some time. When you have reached a certain amount, you may withdraw your money. The mode of payment will be check and it is delivered to your house address.
Not only Mechanical Turn, Amazon.com provides lot of services to earn money online. You may get lot of details here:
http://www.amazon.com/gp/seller-account/mm-landing.html

ClickBank:

ClickBank is moreover like Amazon’s Mechanical Turk but it pays lot of money than Mechanical Turk. ClickBank is a fully Affiliate marketing service where you must promote their products. Each work pays different amount. If the work need more knowledge or the difficulty level of the work is more, then affiliates will pay you more. However, a certain amount of commission will get deducted from your earnings. The product can be promoted in many ways. Using social websites, Email marketing or by website reference. ClickBank will generate a short URL of the affiliate which you can use them for promoting. When people refer using your link, you will earn money. The mode of payment will be through check. ClickBank pays people since 1998.


Fiverr:

The cheap and easiest way to earn money is using the  site Fiverr.com.  Here, your work is often referred to a gig. You may do whatever the work you like. For example, if you are interested in painting, then you may just create a gig like “I will paint your picture for $5” and when people order from you, get the details from them. Here, you will be requiring a picture from the buyer. So, get the picture and complete the work within the delivery time you’ve specified. When you’ve completed painting, you may just submit it as a scanned image to the buyer. Remember, buyer may write a review after they purchase from you. When you deliver a best one, your gig will be reviewed as a good one and it may welcome more buyers to buy your gig. The payment will be delivered to you via Paypal account. For each gig you complete, you’ll be earning $5 where you’ll be getting $4 in your hand and remaining $1 will be taken by Fiverr as a commission.

ScriptLance:

A safer way of earning money through online is by ScriptLance. If the child is more interested in programming or have a good knowledge in programming then he/she can earn money thorugh ScriptLance. It apys more for well talented. A good and well programmer can earn thousands of dollars. You may find a project which fits according to your needs and solve them with your knowledge. Each project will be fixed at a rate to be earned. The payment will be made via Paypal. The prople who submitted the project will pay you.

NeoBux:

The simple and easiest way to earn online is via NeoBux. The only work for you is to browse their advertiser’s website. NeoBux will pay you for the sites you visit. The earnings you make will be paid to you through Paypal, Payza or Netteller. NeoBux, a Paid-to-Click service also welcomes advertisers.

Readbud:

Readbud is a service where you’ll get paid for reading the articles. You may choose your own interest to read and make money by reading them. You’ll not only gain knowledge but also money with it. Readbud pays you through PayPal.
The more harder you work, the more money you’ll gain. When any site pay you less, don’t give up. Try harder to make more output of your work. If you like any other websites to earn money online, you may just comment below.

Tuesday, July 24, 2012

Russian man accused of launching distributed-denial-of-service (DDOS) attacks on Amazon.com

Dmitry Olegovich Zubakha, a Russian man accused of launching distributed-denial-of-service (DDOS) attacks on Amazon.com, has been arrested this week by authorities in Cyprus based on an international warrant, the Department of Justice revealed.

Zubakha, a native of Moscow, was indicted for two denial of service attacks in 2008 on the Amazon.com website. The indictment, unsealed Thursday, also details denial of service attacks on Priceline.com and eBay.

"Orders from Amazon.com customers dropped significantly, as legitimate customers were unable to access the website and complete their e-commerce transactions during the pendency of the attack," read an indictment unsealed in district court in western Washington on Thursday. The botnet involved requested "large and resource-intensive web pages" on a magnitude of between 600 and 1,000 percent of normal traffic levels, according to the indictment.

The hacker is charged with conspiracy to intentionally cause damage to a protected computer, possession of more than 15 unauthorized access devices, aggravated identity theft, and intentionally causing damage to a computer resulting in a loss of over $5,000 (4,000 EUR).

Zubakha and his friend claimed credit for the attacks on online hacker forums, and law enforcement traced 28,000 stolen credit card numbers to the pair in 2009. For that reason, Zubakha and his partner are also charged with aggravated identity theft for illegally using the credit card of at least one person.

The charges faced by Zubakha carry potential penalties of up to 10 years in prison and a $250,000 (£160,000) fine.

CVE-2012-0217 - Intel SYSRET FreeBSD Privilege Escalation Exploit Released

The Vulnerability reported on 06/12/2012, dubbed as "CVE-2012-0217" - according to that Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.
FreeBSD/amd64 runs on CPUs from different vendors. Due to varying behaviour of CPUs in 64 bit mode a sanity check of the kernel may be insufficient when returning from a system call. Successful exploitation of the problem can lead to local kernel privilege escalation, kernel data corruption and/or crash.

Inj3ct0r team today released related private exploit on their website, which allow normal FreeBSD users to Privilege Escalation. All systems running 64 bit Xen hypervisor running 64 bit PV guests onIntel CPUs are vulnerable to this issue.

However FreeBSD/amd64 running on AMD CPUs is not vulnerable to thisparticular problem.Systems with 64 bit capable CPUs, but running the 32 bit FreeBSD/i386kernel are not vulnerable, nor are systems running on differentprocessor architectures.

Download the relevant patch from the location below:
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret.patch
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret.patch.asc
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81.patch
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81.patch.asc

[8.1 if original sysret.patch has been applied]
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81-correction.patch
# fetch http://security.FreeBSD.org/patches/SA-12:04/sysret-81-correction.patch.asc

How to Apply the patch ?
# cd /usr/src
# patch < /path/to/patch

After Recompile your kernel as described and reboot the system and update system
# freebsd-update fetch
# freebsd-update install

DOWNLOAD "FreeBSD Privilege Escalation Exploit"

Tuesday, July 19, 2011

Google plus Project A New Social Networking World Starts

As I wrote before on Google + Here Now at some more feature of the Google +

What is Google+? It’s the super top-secret social project that Google has been working on for the past year. You know, the one being led by General Patton (Vic Gundotra) and General MacArthur (Bradley Horowitz). Yes, the one Google has tried to downplay as much as humanly possible — even as we got leak after leak after leak of what they were working on. Yes, the one they weren’t going to make a big deal about with pomp and circumstance. It’s real. And it’s here.
Sort of.
You see, the truth is that Google really is trying not to make a huge deal out of Google+. That’s not because they don’t have high hopes for it. Or because they don’t think it’s any good. Instead, it’s because what they’re comfortable showing off right now is just step one of a much bigger picture. When I sat down with Gundotra and Horowitz last week, they made this point very clear. In their minds, Google+ is more than a social product, or even a social strategy, it’s an extension of Google itself. Hence, Google+.
How’s that for downplaying it?
“We believe online sharing is broken. And even awkward,” Gundotra says. “We think connecting with other people is a basic human need. We do it all the time in real life, but our online tools are rigid. They force us into buckets — or into being completely public,” he continues. “Real life sharing is nuanced and rich. It has been hard to get that into software,” is the last thing he says before diving into a demo of Google+.
What he proceeds to show me is a product that in many ways is so well designed that it doesn’t really even look like a Google product. When I tell Gundotra and Horowitz this, they laugh. “Thank you,” Gundotra says very enthusiastically. Clearly, they’ve put a lot of work into both the UI and UX of Google+.








Speaking of this black toolbar, which was codenamed the “Sandbar” as Google was working on it, Horowitz explains that it arose from the fact that sharing models on different sites are all different. The toolbar is an attempt to unify them. This toolbar will exist across all Google properties (though it may take some time to fully roll out). And down the road, you can imagine browser extensions, mobile versions, etc. But again, we’re on step one here.

Next, Gundotra showed off a feature called “Sparks”. He was quick to note that even though it’s a search box, this is not some sort of new search engine. Instead, he calls is a “sharing engine”. “Great content leads to great conversations,” he says. With Sparks, you enter an interest you have and Google goes out and finds elements on the web that they think you’ll care about. These can be links to blog posts, videos, books — anything that Google searches for. If you find something you like, you can click on an item to add it to your interest list (where it will stay for you to quickly refer to anytime you want). Or you can see what others are liking and talking about globally in the “Featured interests” area.

With that in mind, Google+ Hangout attempts to solve the social problem of video chat by making it easy for you to let others know that you’re interested in chatting. And if you’re already chatting with a Circle, everyone else in that Circle will get an alert to come hang out. This works for up to 10 people. And seeing it in action is a bit magical. Gundotra starts a Hangout with some co-workers and as they join, conversations start between multiple people. But the Google+ system is smart enough to focus on who is controlling the conversation in any given minute. This makes the conversation easy to watch. It was almost as if an editor is working behind the scenes, cutting between people.

Even cooler is that you can share a piece of content, like a YouTube clip, and everyone in the Hangout can watch it together while talking about it. It sounds a bit cheesy, but it’s really pretty great.
After the rundown of all of these features, Google+ may sound a bit convoluted. But the key to the project is the attempt to unify everything. This is done via the toolbar (which features a drop-down showing you all of your relevant Google+ activity), but also on the mobile apps (again, Android and iPhone), and, of course, on the web. The Google+ site is the main stream on which you’ll find everything. From here, you can easily switch between all of your Circles, share content with any of them, start a Hangout, look up Sparks, etc.


Speaking of Buzz, one thing that strikes me about Google+ is that it seems a bit like Google Buzz done right. When I asked if Google+ would be the official death of Buzz, Horowitz declined to say, but did note that it was still being decided how those pieces will play together.

What is Google Plus One?


Google+ is a social networking service operated by Google Inc. The service launched on June 28, 2011, in an invite-only testing phase. The following day, existing users were allowed to invite friends, who are above 18 years of age, to the service to create their own accounts. However, this was quickly suspended in a day after there was "insane demand" for accounts. Google+ will be built as a layer that not only integrates different Google social services, such as Google Profiles and Google Buzz, but also introduces many new features including Circles, Hangouts, Sparks and Huddles. Google+ will also be available as a desktop application and as an application on Android and iOS operating systems. Sources such as The New York Times have declared it Google's biggest attempt to rival the social network Facebook, which had over 750 million users in 2011.
The introduction of Google+ has had an impact on the design of Google's web search service, due to the graphical redesign (mistakenly...

The following video will give you more information about Google Plus one


Unleash the Power of AI: AMD Ryzen 8000 Pro Processors Take Productivity to the Next Level

Get ready to supercharge your professional workflow with the arrival of the all-new AMD Ryzen 8000 Pro processors! Building upon the foun...