Kamis, 27 Oktober 2011

Germany Makes Malware 'Soldier' Scouts

Not only hackers that take advantage of malware, government agencies also use it. As the German government is using it for the needs of surveillance (surveillance). Allegations of the use of malware as a 'soldier' ​​in the world of cyberspace surveillance by the German government came in a report released last October 8 by the European hacker group, Chaos Computer Club (CCC). Bundestrojaner malware known as Trojan becomes the tool or the Federal German Police work in carrying out their duties primarily related to reconnaissance duties. Bundestrojan somewhat different from the trojan is also used by other countries, namely Egypt, which uses trojans FinFisher, and France are using spyware. Different from the case in France and Egypt, Malware Bundestrojaner (DLL and its driver system) actually published by the CCC, and demanded the German Government to discontinue the use of malware spying on people because of the constitutional court has imposed the ban since February 27, 2008. Researchers at cyber security firm ESET, identify the malware as Win32/R2D2.A. The Trojan displays a tapper and able to take screenshots and record sounds, this capability could potentially widen further than Wiretapping functions allowed by the court. Some applications that will be affected and subject to spying, among others, Skype, MSN Messenger, Yahoo Messenger, and X-Lite - a VoIP application. Furthermore, the malware also creates a backdoor on the infected computer, so the trojan can send all information available to the controller computer. Another is the ability to download other malware that can be run in the system. This is not much different from the usual backdoor trojan that we encounter everyday. Yudhi Strong, Technical Consultant of ESET Prosperita Indonesia argues, from where the malware originated in the context of detection, not too important to be known. Because, if the malicious code contained in it, then there is no reason for antimalware to not detect it. "The main strength of behavior analysis methods and heuristics are used ESET principle is anyone sending software, and for whatever its consumer, if found any malicious code in it, it will be detected," he explained through information received detikINET, Thursday (27/10/2011) . Responding to this, David Harley, researcher of malware intelligence at ESET mentions in some cases, action to plant spy software on the computer a person who is suspected should be done with the consent of the government. "But in many countries this still is not allowed, except in special situations, eg for the investigation of crime or the need for national security," he said. In conclusion, this problem still save a lot of questions and could be a double-edged sword. For the government, how it can support the performance of law enforcement and security. But on the other side will catch all the antivirus software with a charge of malicious code.
READ MORE - Germany Makes Malware 'Soldier' Scouts

Selasa, 25 Oktober 2011

8 Shocking Facts on Steve Jobs Biography

Biography of Steve Jobs, who began to be marketed in several countries reveal surprising facts. This book is based on interviews Walter Isaacson, the author, with Jobs and the people nearby. Steve Jobs biography preliminary review indicates this book is very interesting. Jobs biography said to be a rich portrait of one person with the best minds of his day. Here are some startling facts about Steve Jobs in the biography, as quoted detikINET from the Huffington Post, Tuesday (10/25/2011): 

1. Where did the name Apple originate? Executek, Matrix, to Personal Computers Inc. is the names that had considered Steve Jobs and Steve Wozniak for technology companies that will they founded. Jobs express the name Apple after returning from an apple farm and eventually the name was used. "This name sounds fun, vibrant and not intimidating," said Jobs. 

2. Bill Clinton asked for advice Jobs Monica Lewinski scandal Bill Clinton's scandalous affair with Monica Lewinski had horrendous United States in the decade of the 1990s. Clinton's confusion turns Jobs had asked for advice. "I do not know you had an affair, but if it is true, you must tell the (citizens) of this country," advises Jobs in Clinton that the U.S. president at that time. 

3. Why Jobs is almost always wearing a black sweater? Jobs identical appearance with a black sweater. It started when Jobs visited the Sony factory in Japan and meet employees there in uniform. He loved it and had thought that Apple employees were in uniform. Although it was not so accomplished, Jobs decided to create a unique outfit for yourself. Be he always wore a black sweater, designed by Japanese designer Issey Miyake named. 

4. Jobs disillusioned with Barack Obama Jobs is a supporter of President Barack Obama. But he was disappointed with some of Obama's policies and at the time the two met, Jobs are expecting Obama will only be served during the first period alone. Jobs argued the government should be more friendly to business circles and reforming education. 

5. Jobs initially refusing cancer surgery Jobs at first refused a cancer operation that could potentially save his life. Jobs apparently did not like her diutak tweaking. "He was not prepared to 'open' body," said Jobs's wife, Laurene Powell. 

6. Jobs had rejected the idea of ​​an application for Apple devices Application services including Apple's key success factors. But who would have thought at first Jobs does not like the idea of ​​a third party may make application for Apple devices due to various reasons such as the possibility of virus attacks. But finally, Jobs was convinced to allow the application on the Apple device. 

7. Jobs felt depressed during the launch of the first generation iPad Critics had lunged at the launch of the Apple iPad though ultimately successful gadget is hard. These devices lack features considered. "'I seem to get depressed today," Jobs said in Isaacson, night after Jobs introduced the iPad. 

8. Jobs wrath on Google "I'll spend my last breath if necessary and I would spend all the money Apple of USD 40 billion in the bank, to correct this error. I will destroy the Android because it is a stolen product," said Jobs on Android. He did not accept Google's stealing ideas iPhone on Android....
READ MORE - 8 Shocking Facts on Steve Jobs Biography

Senin, 24 Oktober 2011

Tips Avoid Buying Fake iPhone 4S

The launch of the iPhone 4S trigger counterfeit sales at stores online. Not much different physical inversely with the price is priced much cheaper. Of course with sloping price there are many things sacrificed including specifications, quality and durability of the goods. Well to avoid being stuck buying counterfeit goods, the following tips you can do as quoted detikINET from Cnet, Friday (07/10/2011). 

  1.  Know your price. If the price is priced too low, the articles are questionable. So, when resellers offer high discounts. 
  2. Observe the specifications. Although the physical of counterfeit resemble the original, but often it has different specifications. Either that it adds new features or even reducing features that should exist in the original goods. 
  3. Returns policy. Resellers who have trusted returns policy for consumer satisfaction. Beware if the number of resellers do not offer it. 
  4. Warranty. All the company's smartphones offer a warranty that covers products, accessories and software. Counterfeit resellers do not offer the same thing. 
  5. Facebook and Twitter accounts. Many resellers who use social media to promote the account. There is no harm in checking their accounts and comments provided consumers in the account. Find out about how long they have that account to measure reputation.
READ MORE - Tips Avoid Buying Fake iPhone 4S

Sabtu, 09 Juli 2011

Flying Cars Ready Action

Future traffic will probably be met with a car that can run alone or flying cars passing in the sky. After Google berkemudi automatic car is considered to be road worthy, now turn the car flying a turn.

As quoted from FoxNews, Thursday (07/07/2011), U.S. institutions Department of Transportation grant, named Terrafuga Transition flying car for a test drive on public roads.

Transition is described more biased toward small plane with two seats. He can transform into a car and can be driven on the streets.

This car has a wing that can be folded automatically by pressing a button. This process takes place within a short time, about 30 seconds.

Various features are also intended to reassure drivers stay safe on the streets. For example, by the presence of airbags to reduce collisions when the accident occurred.

With a variety of strengths in the technology sector, predictable price is quite high. Ie USD 200 thousand, or in the range of billions of dollars.

Transition has been successfully tested several times. Dirapkan, sophisticated cars can already be mass produced in 2012.
READ MORE - Flying Cars Ready Action

Kamis, 07 Juli 2011

Games, Most Popular Smartphone Applications

Became the most popular gaming applications on mobile devices, especially smartphones. Applications topped the category of mobile games apps applications followed by weather info and social networking in the next sequence.

Based on latest data released by research firm Nielsen, users who download smartphone applications in the last 30 days, 93 percent are buying gaming applications.

"In contrast, only 76 percent of the downloaders who are willing to buy news applications," Nielsen wrote in a report quoted detikiNET by the Los Angeles Times and quoted on Thursday (07/07/2011).

Known, most gamers in the iPhone, Windows mobile phone 7 or the Android download the game that often they play. While BlackBerry users are usually only play games that are already on their devices.

"The average mobile gamers play games 7.8 hours per month. Those who use the iPhone tend to play for 14.7 hours per month while the users of Android 9.3 hours per month," Nielsen wrote.

In the data downloader application for 30 days, Nielsen recorded 64 per cent to download games, 60 percent download the application information to download weather and 56 percent of social networking applications.
READ MORE - Games, Most Popular Smartphone Applications

Selasa, 05 Juli 2011

Google will 'Remove' Picasa and Blogger

Two popular service owned by Google, Picasa and Blogger will soon disappear. Not that Google remove them, but because the Internet giant wants to 'throw' the name of the product to be renamed.

Picasa and Blogger that have been renamed, will remain a key component of Google's family of products. Such information is quoted detikiNET from PC World, on Wednesday (07/06/2011).

Rebranding Picasa and Blogger is reportedly part of Google's new strategy in introducing Google +, where several products that do not use Google's name was retired and replaced with names that include Google's behalf.

According to Mashable reports, six weeks away, the image editing service and the popular blogging platform will be renamed Google Photos and Google Blogs. But Google itself would not comment when questioned about this rebranding plan.

Google's decision is quite reasonable, considering the users of both services is generally less ngeh that the services they use are Google products. Well, the integration of Picasa and Blogger to Google + is expected to be the answer.
READ MORE - Google will 'Remove' Picasa and Blogger

Rabu, 29 Juni 2011

Opera Says Chrome As Most Serious Threat

Internet Explorer and Firefox when it is okay to have the greatest portion of the desktop browser market. But for Opera, the most serious threat came not from the two rulers, but from Google's Chrome.

Jan Standal, Vice President of Products stated Desktop Opera, Chrome is starting to grow quickly and have a big advantage of Google's biggest names in cyberspace. Google's influence can then be optimized to run a guerrilla marketing strategy on the internet.

"I have to admit, Google Chrome marketing action is so strong, especially on the internet," he said, when talking with detikINET via telephone directly from Opera's headquarters in Oslo, Norway.

Even so, Opera does not mean letting Chrome strolled away. According to Jan, Chrome could be inhibited in terms of products and technologies by Opera.

"We can beat them (Chrome-red.) in terms of innovation, technology, products and services continue to churn out the best. We strive for it," he continued.

While Firefox and Internet Explorer are also said not to say do not count. Two browsers already have a large user base it also can not go unpunished.

"But essentially the competition will yield its own benefits for users. They have so many options and pampered better technology," he concluded.

Based on data from StatCounter, Chrome in May was 19.36% market share, up about 6% compared to April. In the same month (May), Mozilla little lethargic with decreased 0.38 points to 29.29% market share.

IE is still a ruler with a proportion of 43.87%. In order of four and five there is the name of Apple's Safari and Opera with 5:01% in the range of 2%.
READ MORE - Opera Says Chrome As Most Serious Threat