This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, August 30, 2014

On January 13, 2015, Microsoft will stop mainstream support for Windows 7

Microsoft ended its support for  Windows XP on April 2014, but now comes their own wake up call. Microsoft has formally announced that mainstream support for Windows 7 which is still an extremely popular operating system will end on 13 January 2015 – just 5 months away. . But you'll still be able to use it safely for another five years.

Of course January 2015 will be much sooner than many people will have expected, especially the high profile attention given to the end of Windows XP support 13 years after release. By comparison Windows 7 is less than five years old.

That means no new Service Packs or features will be released. This is wholly different from the end of ‘Extended Support’ which is what happened to Windows XP on 8 April 2014.



Windows XP ended its support but you can try REGISTRY HACK to continue to deliver security updates till April 9th, 2019 let you extend for another 5 years http://blogmytuts.blogspot.com/2014/05/get-windows-xp-security-update-until.html

“Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it’s no longer supported,” the company explained. “Knowing key dates in this lifecycle helps you make informed decisions about when to upgrade or make other changes to your software.”

End of support

End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. This is the time to make sure you have the latest available update or service pack installed. Without Microsoft support, you will no longer receive security updates that can help protect your PC from harmful viruses, spyware, and other malicious software that can steal your personal information. For more information go to Microsoft Support Lifecycle .

Extended Support is the big one: no more security patches when hackers find holes, no performance improvements, nothing – the OS is effectively dead. Windows 7 Extended Support will not end until 14 January 2020. For comparison Windows XP Mainstream Support ended back on 8 April 2009.

Vista mainstream support  ended on April 10, 2012. Extended support will end on April 11, 2017, so you can continue to use Vista for another two and a half years plus.

Consequently most can breathe a sigh of relief, especially with Windows 7 currently running on over 50% of PCs around the world. If Windows XP was hard to kill remains World's Second most popular OS, Windows 7 is likely to be even harder.

http://blogmytuts.blogspot.com/2014/08/xp-remains-worlds-second-most-popular.html


Now Pressure Builds On Windows 9, If that doesn't put you at ease, consider this: XP's mainstream support ended in April, 2009. It caused no problems whatsoever. Millions continued to use XP for another five years without people like me warning them of dire consequences. Windows 7 won't be any different.
















Source:  http://windows.microsoft.com/en-us/windows/lifecycle

Sales End Soon


For the record those who still want to buy Windows 7 instead of Windows 8 will also need to be snappy. Sales of Windows 7 Home Basic, Home Premium and Ultimate will formally end on 31 October 2014, though a date to end sales of Windows 7 Professional has yet to be established.

Interestingly Microsoft has also revealed end of Mainstream Support for a number of its other platforms including Windows Server 2008, Windows Storage Server 2008, Exchange Server 2010, Windows CE 5.0 and Windows Phone 7.8. The last of these is most interesting with Mainstream Support ending on 9 September 2014. Extended Support will then continue for another 18 months.








Microsoft’s MSN Messenger,is shutting down after 15 years

Microsoft’s MSN Messenger, or Windows Live Messenger as it’s now known, will be fully retired on October 31st. The software maker originally announced its plans to shift users over to Skype last year, but Microsoft kept the service running in China. After October 31st Chinese Messenger users will need to use Skype, bringing an end to 15 years of the service.

MSN Messenger started off life in 1999 as a rival to AOL’s AIM service. Both companies battled over chat dominance, and Microsoft engineers reverse-engineered AOL's chat protocol to allow MSN Messenger to sign into AIM, a process that AOL wasn't happy with when Microsoft first released its instant messaging client. Over the years Microsoft added various features, including custom emoticons, the ability to play Minesweeper with friends, a nudge feature that would shake a friends chat window, and the super annoying winks option to send friends giant animated emoticons.

MSN Messenger





Microsoft has typically celebrated its MSN Messenger milestones with big green mascot outfits, but the 15-year mark and the end of the Messenger era is departing quietly. Here’s a look back at how MSN Messenger used to look, during a time when everyone put emoticons in their name or status message, and your mom picking up the phone and killing your modem connection to MSN Messenger was just as annoying as someone using the same font and color as you during a conversation. Farewell, MSN Messenger.










To many memories in time of dial up connection for me  .................






Friday, August 29, 2014

Redmi 1S Available on September 4, 2014 on its retail partner, Lazada

If the Xiaomi Mi 3 was the first taste of what the Chinese mega-brand can do when it sets its mind on a market, the Redmi 1S is all about consolidation and building a solid user base for Xiaomi. User base sounds weird when talking about hardware, but buying into the Xiaomi way of life is a lot about embracing the ecosystem around its cloud services, messaging app and the multitude of customisation options, more so than just any other Android device.

The Redmi 1S is all about giving this Xiaomi experience to anyone who can afford a basic smartphone. It’s priced at an incredible ₱ 5,599 but boasts specs of phones priced around ₱ 5,599 15,000-25,000 by the big-name brands.  In terms of the specs, it’s not entry-level, but its price puts it in this segment. But what’s the whole experience like?


The devices' availability has not been disclosed either, but the information will probably be listed on its retail partner, Lazada Philippines, real soon.

Processor 1.6 GHz quad-core Qualcomm Snapdragon 400 with Cortex-A7 cores, making the battery performance to be outstanding.
processor with Adreno 305 images, you can explore the real 3D games or you can also enjoy your favorite shows in incredible HD display.


The beauty of dazzling
Display 4.7

1S Redmi 1280x720 display with 312 ppi presents clear text
and clear photos
Technology In-plane switching (IPS) presents a stunning color
from any viewing angle.

 

 

 

 

 

8GB flash memory

More capacity for apps, music, videos and photos 


Photo remarkable
8MP Camera

f / 2.2 aperture, 28mm wide angle lens,
and 1080p video recording
With an extra large 1.4 um sensor and plastic lens 5, you can take photos with accurate, clear images in low light.
With an aperture of f / 2.2 and 28mm wide angle lens enables you to capture objects focus in front with obscure objects behind your images with soft.
With 16 megapixel camera, it is perfect for HD video chat with 720 pixels

Clear sound

Mi Hi-Fi Sound System with voice technology Dirac
Redmi 1S uses the same features as voice technology used by BMW, Bentley, and Rolls Royce.
Audio output according to the various types of headphones do you use to ensure that you always get the best performance.














Xiaomi Redmi 1S detailed specifications

General
Release date July 2014
Form factor Touchscreen
Dimensions (mm) 137.00 x 69.00 x 9.90
Weight (g) 158.00
Battery capacity (mAh) 2000
Removable battery Yes
SAR value NA
Display
Screen size (inches) 4.70
Touchscreen Yes
Touchscreen type Capacitive
Resolution 720x1280 pixels
Pixels per inch (PPI) 312
Colours 16M
Hardware
Processor 1.6GHz  quad-core
Processor make Qualcomm Snapdragon 400 MSM8228
RAM 1GB
Internal storage 8GB
Expandable storage Yes
Expandable storage type microSD
Expandable storage up to (GB) 64
Camera
Rear camera 8-megapixel
Flash Yes
Front camera 1.6-megapixel
Software
Operating System Android 4.3
Skin MIUI version 5
Java support Yes
Browser supports Flash No
Connectivity
Wi-Fi Yes
Wi-Fi standards supported 802.11 b/ g/ n
GPS Yes
Bluetooth Yes, v 4.00
NFC No
Infrared No
DLNA No
Wi-Fi Direct Yes
MHL Out No
HDMI No
Headphones 3.5mm
FM Yes
USB Micro-USB
Charging via Micro-USB Yes
Proprietary charging connector No
Proprietary data connector No
Number of SIMs 2
SIM 1  
SIM Type Regular
GSM/ CDMA GSM
3G Yes
SIM 2  
SIM Type Regular
GSM/ CDMA GSM
3G No
Sensors
Compass/ Magnetometer Yes
Proximity sensor Yes
Accelerometer Yes
Ambient light sensor Yes
Gyroscope Yes
Barometer No
Temperature sensor No



Thursday, August 28, 2014

WG-500P | Hotspot in a Printer by AGN Solutions

WG-500P | Hotspot in a Printer
Wireless Subscriber Gateway with built-in thermal printer to generate user's account for Internet access and is perfect for small venue owners.

Most people need Wi-Fi access for their works, researches and communications. Therefore, the WG-500P offers you a robust and secure hotspot solution which is just perfect for the mini size venues such as café/ airport lounge/ store or shop. The WG-500P provide customizable billing profiles and internet access with time limit control which is based on our billing management.

DESCRIPTION

The WG-500P can help to promote your products, services and satisfy your customers. With its user friendly design, venues owners can easily train their staffs to operate the gateway and print out the account ticket to access Internet for their customers.

The WG-500P can be used as a standalone authentication gateway to monitor and control Internet access while guests/visitors are visiting. The features of WG-500P support web-based authentication and management tool and marketing cooperation such as walled gardens, an internal portal page, and external portal page redirection. It also offers bandwidth and billing management.


In traditionally, the venues who provide a public internet access with the same username and password to guests which are insecure and easy to get identity hijacked. Or they have to take lots of efforts to provide the secure Internet access for guests such as pre-built user's accounts with passwords and print them out. Now with advantage of the WG-500P patented Account Generator, the venues can easily generate and print out a private Internet access ticket just in seconds with one press.
Also design a login page for venues to key-in guests/visitors identity to fit the laws. According to the law, it requires venue owners to provide the guest's Internet usage records for tracking. Thus the WG-500P provides a Real-time session information and the remote site administrator could monitor the real time usage status via Session information page.

The WG-500P is one of unique innovation from Handlink, it's more than a simple Wi-Fi hotspot device; it's also equipped with IP Plug and Play technology so there's no need for end-users to change any settings in the their devices. It's fast, easy and trouble free to access Internet.


 APPLICATION



 Mikrotik Compatible AP Printer




FEATURES:
  • All-In-One Instant Hotspot Gateway with built-in Thermal Printer
  • Compatible with IEE802.11n/b/g, Wireless 2T2R 2.4GHz with 300Mbps high speed network
  • Support up to 50 simultaneous devices and up to 256 local accounts
  • Support QR Code print out.
    Make more convenient for portable devices to login
  • Support WPA/WPA2 Encryption
  • AAA Control and Billing Support
    Support network access control service including Authentication, Authorization and Accounting (AAA) for internet subscribers and 10 billing profiles
  • Support Rich Functions
    Transparent HTTP proxy, Layer 2 Isolation, Administration access Control, SSL login page and various WAN connections
  • VPN PASS Through
    Run your VPN or Secure tunnelling client software to connect to your company's VPN server
  • Support WDS function with repeater mode
  • Allow multiple devices to login one subscriber account
  • USB to Ethernet connector design to support multiple LAN Device usage
  • Multiple languages support
    For ticket printout format and login-page only, language support available in English / German / French / Spanish / Portuguese / Italian languages
  • IP Plug and Play Internet Access
    Zero configuration Internet access!
    Connect your office PC, laptop and handheld devices to the network without human intervention. It will automatically configure itself for the network
Website : http://www.agnsolutions.net/products/wg-500p.php

 
You may aslo want to read:




Wi-Fi Vendo Machine by AGN Solutions

Kahit saan na yata meron Vending Machine halos lahat ng bagay binibili na. Madami  uri ng Vending Machine , Kape , Loading Station, Charge Station. Water Vending Machine this time around, Wi-Fi vending machine I saw on TV on GMA Unang Hirit  early this morning.

This Wi-Fi enabled machine can give you instant Wi-Fi hotspot for as low as Php 1 ( Piso WiFi ). It uses an IEE802.11 b/g/n compatible router at 2.4Ghz band. 

 Pwede pa customize  kung o-order kayo instant Negosyo..

Minimum 3mbps  dapat yun  Internet nyo..

Parang Piso net pero mas Hitech  kada hulog mag  gegenerate  siya resibo  at unique  username at password .


The process is simple. You insert a coin to the machine and it will issue a receipt containing your username and password for the login portal.
Wi-Fi rates are as follows:
Php 1 = 5 minutes
Php 5 = 25 minutes
Php 10 = 50 minutes

The business costs Php24,999  pwede pa customize “Isang hulog, log-in agad sa Internet. Kada hulog, ang kita mo – kabog!”. The said Wi-Fi vending machine is distributed by AGN Solutions.

Watch this Video from GMA Saksi



ABOUT AGN ENTERPRISE:

AGN offers a unique combination of systems, services, and overall solutions. Our products and services cover needs from one end to the next allowing us to be the sole communications provider for our customers.
Perhaps what makes our comprehensive selection of services so valuable is our ability to customize complete solutions for our customers. The bottom-line: we are an information technology company offering customers a single resource for their needs.
Our systems have proven expertise behind them, our services are innovative and effective, and our solutions are personalized for each and every customer. The combination makes us a powerful resource for a range of communications solutions.
Whatever your data, voice and video requirements and wherever in the world you need to go, AGN has the means to get you there. With its globsl IP network, AGN can help you cut costs, relieve WAN congestion and overcome last-mile barriers quickly and cost effectively by delivering corporate content via its innovative high-speed satellite links.

AGN Provides:
  • Top quality consulting services covering corporate network planning, design and implementation.
  • Complete end-to-end network communications services for voice, data and video in private networks.
  • Turnkey internet, Intranet and VPN solutions and implementation.
  • Secure Network Infrastructure design.
  • IP Surveillance Solutions, Network Cameras.
  • Antivirus Firewalls for Real Time Network Protection.
  • End-of-Life support of Network Equipment such as Cisco, Juniper and Foundry.
  • Business Continuity and Disaster Recovery Solutions.




You may also like to read:



Wednesday, August 27, 2014

CHES 16th Workshop on Cryptographic Hardware and Embedded Systems 2014

CHES 16th Workshop on Cryptographic Hardware and Embedded Systems 2014. CHES 2014 will take place Busan, Korea, from Tuesday, September 23th - Friday, September 26rd, 2014. The annual CHES workshop highlights new results in the design and analysis of cryptographic hardware and software implementations. CHES provides a valuable connection between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.



Organizing Committee

Lejla BatinaMatt Robshaw
(Program co-Chair)(Program co-Chair)
Radboud University Nijmegen (The Netherlands)Impinj (USA)
Email: ches2014programchairs@iacr.orgEmail: ches2014programchairs@iacr.org

Kwangjo Kim
(General Chair)
KAIST (Korea)
Email: kkj@kaist.ac.kr

http://www.chesworkshop.org/ches2014/

 The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communication systems which are secure in the presence of adversaries.

IACR

The IACR is a non-profit organization devoted to supporting the promotion of the science of cryptology. Cryptology is the science of the making and breaking of encryption algorithms, but in the modern world it encompasses so much more. You use cryptology all the time, when banking, when using a mobile phone, when opening your car door. You are even using it now when you are reading this web page



Meetings

Conferences — The IACR organizes three main international conferences in cryptology each year. Workshops — The IACR organizes four annual specialist workshops in various areas of cryptology. Schools — The IACR sponsors a small number of intensive cryptology schools.
  • Currently no upcoming schools










TOUCH AND VICTIMIZE ANY COMPUTER

A team of computer security experts at Tel Aviv University (Israel) has come up with a new potentially much simpler method that lets you steal data from computers — Just Touch it — literally.

TOUCH AND VICTIMIZE ANY COMPUTER

According to Eran Tromer, Daniel Genkin, and Itamar Pipman, computer security experts at Tel Aviv University, using a simple electrical trick is enough for sophisticated hackers to gain access to thousands of encrypted keys through solely touching the chassis of the computer.

Access to encrypted keys could be used to make hundreds of digital signatures used all the time by people when creating passwords, signing contracts, or perhaps most importantly, using credit and debit cards online.
 
 
In order to victimize any computer, all you need to do is wear a special digitizer wristband and touch the exposed part of the system. The wristband will measure all the tiny changes in the ground electrical potential that can reveal even stronger encryption keys, such as a 4,096-bit RSA key.

In fact, in some cases, you don't even have to touch the system directly with your bare hands. You can intercept encryption keys from attached network and video cables as well. Researchers called it a side-channel attack.

"Our attacks use novel side channels and are based on the observation that the 'ground' electric potential in many computers fluctuates in a computation-dependent way," the researchers wrote their finding on a paper [PDF]. "An attacker can measure this signal by touching exposed metal on the computer's chassis with a plain wire, or even with a bare hand. The signal can also be measured at the remote end of Ethernet, VGA or USB cables."

The researchers also note that this attack works better in hot weather, due to the lower resistance of sweaty fingers. The team will present their research in a talk titled Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks On PCs, at Workshop on Cryptographic Hardware and Embedded Systems 2014 (CHES 2014) in Korea, on September 23th.

The actual attack can be performed quickly. According to the research, "despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using medium frequency signals (around 2 MHz), or one hour using low frequency signals (up to 40 kHz)."

The team could retrieve keys from multiple test machines running a popular open source encryption software called GnuPG, which implements the OpenPGP standard. The end results are mind-blowing, as the researchers write:

Using GnuPG as our study case, we can, on some machines:
  • distinguish between the spectral signatures of different RSA secret keys (signing or decryption), and
  • fully extract decryption keys, by measuring the laptop's chassis potential during decryption of a chosen ciphertext.
Although, the information retrieval was better when used with high-end lab equipment. The researchers also have successfully executed this attack by using a smartphone connected to Ethernet shielding via its headphone port, which they found sufficient in some scenarios.

The good news is that there is nothing to worry about overly grabby strangers stealing your data just yet, because the technique primarily focuses on GnuPG's encryption software, which already got a patch ready to fix the problem to limit the effects. Attackers also have to monitor the electricity changes during the decryption process, so they get hold of your data, which isn't quite easy.
 
 About CHES 16th Workshop on Cryptographic Hardware and Embedded Systems 2014. CHES 2014 will take place Busan, Korea, from Tuesday, September 23th - Friday, September 26rd, 2014. The annual CHES workshop highlights new results in the design and analysis of cryptographic hardware and software implementations. CHES provides a valuable connection between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.