This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, October 03, 2014

THE HARD DRIVE YOU CAN MAKE SELF-DESTRUCT WITH A TEXT

Reminiscent of something from Mission: Impossible, the Autothysis128t is a hard drive you can make self-destruct with a text message should you lose it or if it happens to fall into the wrong hands.

You can encrypt it with a password, but for added protection it includes a built in cellular radio that can receive texts. You determine the kill command and, when necessary, text it to the drive to make it commit suicide.

The Autothysis128t is a 128GB drive, and can also be taught to self-destruct in the event that it is disconnected from your computer or if too many wrong passwords are attempted.
The device doesn’t exactly explode or anything like that, but it does scramble its insides to block all known methods of data recovery.
All of this extra security will set you back about $1600.

The Autothysis128t is the ultimate in data storage protection. The Drive offers a broad configuration set of options to safeguard your data from unauthorised access.

The Autothysis128t is a 128GB SSD Self-Encrypting Drive (SED) with 256-bit AES CBC hardware level encryption and computer independent 2 factor authentication via a separate Token. The encryption engine is FIPS 140-2 level 3 certified.

The 2.5” Drive can be used inside a computer via the SATAII interface or externally via the micro USB3.0 port with a micro USB3.0 or micro USB2.0 cable.

The Drive has built in GSM with the capability of physical data destruction on demand. It is the first SSD Drive in the world to offer remote fragmentation of the NAND Flash storage within the Drive.

This patented technology is designed to fragment the NAND Flash along with the security controller to impede any data recovery technique that might be applied in an attempt to gain access to the encrypted data. No amount of computer processing power will help if a NAND Flash can't be mounted onto a PCB. The whole design approach of this Drive was based on reverse engineering data recovery techniques.

Physical data destruction – on demand. The data destruction process can be triggered by any of the following:
  • Via SMS 'kill message' (user defined)
  • Starvation of the GSM signal
  • Anti-tamper Case
  • Tap-to-destroy function in the Token
  • Low battery level
  • Removing the Drive from a PC
  • PIN code retries being exceeded

Token - The Token is the command centre for the Drive and allows easy access to all configuration options. It enables the user to quickly change the level of security depending on the users own security risk landscape. Up to three Tokens can be assigned to one Drive and up to three Drives can be assigned to one Token.












Thursday, October 02, 2014

Windows 10 Technical Preview is Now Available for Download

The Windows 10 Technical Preview is now available , for laptops and desktops. Servers will follow after that. It’s part of a new thing called the Windows Insider Program. 


Microsoft is releasing Windows 10 Technical Preview as an ISO download, meaning you can install it in a virtual machine, clean install the OS on a spare machine, or even attempt to upgrade your existing Windows 8.1 installation. It's a very early build of Windows 10 so there will be bugs, but if you're interested in testing the very latest version of Windows then Microsoft's preview site has all the details for downloading and installing Windows 10.


Download Windows Technical Preview

System requirements

Basically, if your PC can run Windows 8.1, you’re good to go. If you're not sure, don't worry—Windows will check your system to make sure it can install the preview.
  • Processor: 1 gigahertz (GHz) or faster
  • RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
  • Free hard disk space: 16 GB
  • Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
  • A Microsoft account and Internet access

Follow these steps to download Technical Preview:
Get the upgrade

About your privacy

Microsoft will collect data about your installation and use of Windows Technical Preview to help us improve our products and services. See our privacy statement to learn more.

This is prerelease software

Windows Technical Preview may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. Some product features and functionality may require additional hardware or software.

Important

    • Remember, trying out an early build like this can be risky. That's why we recommend that you don't install the preview on your primary home or business PC. Unexpected PC crashes could damage or even delete your files, so you should back up everything.
    • After you install Windows Technical Preview, you won’t be able to use the recovery partition on your PC to go back to your previous version of Windows.
Windows 10 Technical Preview ISO Direct Links :



UPDATE: Windows 10 Insider Preview - Build 10130
 
http://windows.microsoft.com/en-ph/windows/preview-iso

Product key: 6P99N-YF42M-TPGBG-9VMJP-YKHCF 

If you want to create Bootable USB Flash Drive

Goto this link : http://www.blogmytuts.net/2015/06/how-to-create-windows-10-technical.html




Watch Windows VP Joe Belfiore talk about some of the features in Windows 10, like the new Start menu, multiple desktops, and improved multi-tasking. Learn how you can be part of creating the best Windows yet with the Tech Preview and the Windows Insider Program.

Windows 10 isn’t finished yet—it will launch in mid-2015









Wednesday, October 01, 2014

Pakistani Man Arrested by FBI for Selling 'StealthGenie' Spyware App "the spousal cheat"

The Federal Bureau of Investigation (FBI)  Monday, September 29, 2014  has arrested the CEO of a UK-based company for allegedly advertising and selling a spyware app to individuals who suspect their romantic partners of cheating on them.

The dodgy cell phone spyware application, dubbed as StealthGenie, monitors victims’ phone calls, text messages, videos, emails and other communications "without detection" when it is installed on a target's phone, according to the Department of Justice.

The chief executive officer of a mobile spyware maker is a Pakistani man collared 31-year-old Hammad Akbar, of Lahore, who was arrested over the weekend in Los Angeles for flogging StealthGenie spyware application and now faces a number of federal charges.
 

According to the US Department of Justice, Akbar operates a company called InvoCode, which sold the StealthGenie spyware app online that can intercept communications to and from mobile phones including Apple, Google, and BlackBerry devices.
 
The company's business plan for the product focused on "the spousal cheat" market, which was expected to constitute 65 percent of the StealthGenie app purchasers, as the plan even spelled that out, stating that the target audience was cheating spouses and romantic partners.
 



STEALTHGENIE MOBILE DEVICE SPYWARE APPLICATION

The Internet Crime Complaint Center (IC3) has received reports related to the fraudulent advertisement and selling of StealthGenie, a mobile device spyware application (“app”) that is alleged to illegally intercept wire and electronic communications made using mobile phones. The indictment and arrest of StealthGenie's CEO for selling the spyware coincides with disabling the website hosting StealthGenie and its associated online portal.

What are mobile device spyware apps?

Mobile device spyware apps are developed for smart mobile phones and may allow a purchaser of the app to, amongst other things, surreptitiously monitor a phone user’s communications and whereabouts.
The purchaser must generally have physical access to a target mobile phone to install a mobile device spyware app, which is usually downloaded to the phone. Each phone software platform, such as Apple Inc.’s (“Apple”) iOs (for iPhones) and Google Inc.’s (“Google”) Android, require specific steps to complete the installation process.

How does StealthGenie work?

The StealthGenie app works in so-called “stealth” mode and is undetectable by most individuals. It is advertised as being untraceable. According to the indictment, StealthGenie’s capabilities include the following:
  • Call Recording: Records all incoming/outgoing voice calls or those specified by the purchaser of the app
  • Call Interception: Allows the purchaser to intercept calls on the phone to be monitored while they take place, without the knowledge of the monitored smartphone user
  • Recorded Surroundings: Allows the purchaser to call the phone and activate it at any time to monitor all surrounding conversations within a fifteen (15)-foot radius without the knowledge of the user
  • Electronic Mail: Allows the purchaser to monitor the incoming and outgoing e-mail messages of user, read their saved drafts, and view attachments
  • SMS: Allows the purchaser to monitor the user’s incoming and outgoing SMS messages
  • Voicemail: Allows the purchaser to monitor the incoming voicemail messages
  • Contacts: Allows the purchaser to monitor the entries in the user’s address book
  • Photos: Allows the purchaser to monitor the photos on the user’s phone
  • Videos: Allows the purchaser to monitor the videos on the user’s phone
  • Appointments: Allows the purchaser to monitor the user’s calendar entries
The purchaser can review information transferred from the target mobile phone via an online portal. These intercepted communications are stored on the StealthGenie website. For example, a purchaser can log-in to the online portal to access information pulled from the user’s phone such as messages, e-mail, photos, and phone calls.

Can a person tell if a mobile device spyware app is on his or her phone?

Mobile device spyware apps are developed and advertised as being invisible to targets and act in an undetectable manner. For example, an app can be installed to look like another type of app or file, such as a digital photo application. Therefore, it will be difficult for the non-expert user to determine whether or not spyware is on his or her phone.
Certain companies market apps and other products that will scan a phone for malicious software. Private computer forensic companies can physically perform similar scans. Federal law enforcement is not in position to determine the effectiveness of products and services from individual private vendors or entities. If a user is concerned about the potential presence of a mobile device spyware app on their phone, the only way to ensure that any app is permanently removed from the phone is to perform a “factory reset,” as described immediately below.

How can a mobile device spyware app be removed?

 

If you believe your phone may contain a mobile device spyware app, the best option is to conduct a “factory reset” of the phone. When a reset takes place, the phone is restored to its original condition (i.e., the condition at the time of purchase).
Please be advised that this means any and all data and apps installed after purchase will be removed from the phone, including all stored information. Please make sure to back-up any data you want to save from your phone before conducting a factory reset. Please note that performing a factory reset of a phone will not delete any information that has already been already collected from the phone by the mobile device spyware app from a vendor’s website.
Apple has provided information concerning how to perform a factory reset of an iPhone running the latest version of their mobile device operating system athttp://support.apple.com/kb/HT1414 . Because Google’s Android operating system is customizable by a phone manufacturer, please contact your phone’s manufacturer for instructions on how to factory reset your phone, or take it to the store from which you purchased the phone. Similar action should be taken to determine how to factory reset a non-iPhone or non-Android phone.





Opening Keynote & Project Ara running on modified version of Android L

Paul Eremenko recently announced interesting news on Project Ara. The most significant concerns its market launch in early 2015. The first fully functional prototype will be shown at the second Ara developer conference, in December. The project’s development continues apace through the collaboration with many partners such as Quanta, Toshiba, Rockchip, Foxconn and others.
Many companies, large and small, as Laird Technologies and Array labs are developing modules with innovative features never seen before. 
Project Ara will use a modified version of Android L, developed in collaboration with Linaro. Thanks to this version, the modules, except the CPU and the display, will be hot swappable. This means you can change them without turning the phone off. The modules will be available on a new online store, like Play store.

The next few months will be crucial for Google and its partners, we expect a lot of news about Project Ara, new modules and new partnerships.
live  Set 15, 2014
LCU14 : Opening Keynote & Project Ara

----------------------------------------­-----------

Speaker: George Grey
Track:
Location: Grand Peninsula D, Hyatt Regency San Francisco Airport, Burlingame, CA, United States




Galaxy Note 4 Gapgate

Galaxy Note 4 was released last September 26

Apple just experienced Bendgate with reports of its iPhone 6 Plus facing bending issues. Samsung is now facing Gapgate as customers report Galaxy Note 4 has a gap defect around its display. 

The gap in their device is thick enough to fit 2 sheets of A4 bond papers or a slightly thicker business card. It may seem like a harmless design issue, but it might affect the internals of the Note 4 in the long run since dust, lint, and even water could easily penetrate the device

It’s not clear how widespread the issue is, considering that Samsung’s South Korean Galaxy Note 4 launch day sales amounted to around 30,000 units, or all available stock Samsung had on hand, but apparently the company is aware of the issue.



 Considering that Samsung has rushed Galaxy Note 4 launch, at least in its home country, to better counter the iPhone 6 record sales, it’s likely this screen separation issue is a limited manufacturing problem that will be corrected before it becomes Samsung’s “Gapgate,” or something similar, once the handset launches in more markets next month.















Microsoft Introduce the new Windows 10

San Francisco – 1pm Eastern, 10am Pacific, 6pm UK — Microsoft will unveil Windows 10 NOT Windows 9. The event is expected to focus on the changes to Windows 10 that will affect Desktop and enterprise users, though Microsoft might also show off some of the changes to the Metro/mobile side of things.

 But sadly, it seems Microsoft won’t be providing a live video stream.
I stay tune on live blog  theverge.com
 
"After the Build conference, mid next year" for Windows 10 release.

The Windows 10 Technical Preview will be made available tomorrow, for laptops and desktops. Servers will follow after that. It’s part of a new thing called the Windows Insider Program.


The Technical Preview will be available here: http://preview.windows.com/. 

 
Why Microsoft Skip to to Windows 10 ?
Belfiore: This product, when you see the product in your fullness I think you'll agree with us that it's a more appropriate name.

Belfiore is demonstrating windowed apps , for Windows 7 users to get the benefit of the new apps.
"In Windows 8 when users launched a modern app, it sort of had a different environment.
As users start using these apps they should just feel familiar and work in a way you'd expect with a mouse and keyboard.The tiles and icons that are shown are a blend of classic apps and new universal apps"



DEMO Windows 10 Preview  built Running on 9841

 

 This is for two-in-ones to change modes.
 
We're about to see a design study. "We call this continuum."
"With Windows 10, we think we have a better approach."
The task view is larger with buttons that are more touch friendly.
"In Windows 10, when you swipe in from the left, you get a task view."
So Microsoft is trying to keep some parts of Windows 8 alive here for touch users.
"The way we're going to evolve this touch UI, I expect that Charms bar to change."



 Windows 10 So even the command prompt has been improved.

Although it looks the same.
"This is... a geeky feature. I understand."
You used to have to trigger a context menu and hit the paste option. A lot easier now.
You can now paste in directories into command prompt with Ctrl+V. FINALLY.

"That gives you a look at the core experience. Not talking about cool new consumer features, that comes later."
"We want to deal with these different input methods in a way that works for everyone."
-Belfiore: 


Multiple Desktops Feature


Belfiore is showing off the multiple desktops feature. You can switch between different desktops with multiple apps running in their own separate areas.
There's a new "Snap Assist" UI at the side where you can grab apps from multiple desktops.
Power users will love this stuff.



Universal search from the Start Menu, and web results.

The search experience has been improved here.


Windows 10 the next mobile/phone operating system

It’ll be the next step up from Windows 8.1 (which scaled down to 8-inch devices). I think there’s still some more work to be done here, though. about designing a platform for all devices. Microsoft: “We’re building a platform that scales, from small devices up to Azure.”

We're trying to blend the experience across PCs, tablets. The best way to think of it, it will be a natural step forward from the Windows 8.1 model.
 -Belfiore 


 
  If you look at Windows 8 users on touch devices, they have higher satisfaction than those on Windows 7 devices. Windows 7 users have higher satisfaction on mouse and keyboard devices than Windows 8.

Watch Windows VP Joe Belfiore talk about some of the features in Windows 10, like the new Start menu, multiple desktops, and improved multi-tasking. Learn how you can be part of creating the best Windows yet with the Tech Preview and the Windows Insider Program.

Windows 10 isn’t finished yet—it will launch in mid-2015







Sunday, September 28, 2014

Most Mac OS X Users are not are Not Vulnerable to 'Shellshock' Bash because they are NOT Smart enough to configure advanced UNIX services

Apple said Friday that its Macintosh PCs are unlikely to be affected by the recently discovered "Bash" bug that could hit millions of computers and other devices connected to the Internet.
Even though the flaw was found in Unix-based Mac OS and Linux operating systems, most users of Apple computers should be protected, the US company said.

"The vast majority of (Macintosh) OS X users are not at risk to recently reported 'Bash' vulnerabilities," an Apple spokesman said in an email to AFP.

"With OS X, systems are safe by default and not exposed to remote exploits of Bash unless users configure advanced Unix services. We are working to quickly provide a software update for our advanced Unix users."



It comes a day after the US government and technology experts warned of a vulnerability in some computer operating systems that could allow widespread and serious attacks by hackers.


Security specialists say that if hackers develop malware to exploit the weakness, millions of Internet-connected devices could be at risk -- from web servers to PCs to routers, as well as any "smart" or wearable electronic devices using the software.


Some said the security hole would be more damaging than the "Heartbleed" bug which affected millions of computers worldwide earlier this year.
Patches were being made available for the flaw, which is also called "Shellshock."

On one hand where more than half of the Internet is considering the Bash vulnerability to be severe, Apple says the vast majority of Mac computer users are not at risk from the recently discovered vulnerability in the Bash command-line interpreter – aka the "Shellshock" bug that could allow hackers to take over an operating system completely.


Apple has issued a public statement in response to this issue, assuring its OS X users that most of them are safe from any potential attacks through the ShellShock Vulnerability, which security experts have warned affect operating systems, including Mac's OS X.

Till then, you may patch yourself using an unofficial patch that fixes the problem and claimed to completely addresses both vulnerabilities. In an email to the Open Source Software Security (oss-sec) mailing list, the maintainer of Bash, Chet Ramey addressed the vulnerability and issued the patch, but there is as of yet no official fix for the issue.