This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monday, December 26, 2016

Cyanogen No More Android ROM Updates

Cyanogen that tried and failed to kill Google's Android operating system is now shutting down the custom services that it provides to phones that run its Cyanogen OS as we know it and the "nightly builds" of said OS on December 31st.



Cyanogen came with an ambition to build better versions of the Android operating system than those created by Google itself, but following some technical and potential legal issues, the startup has decided to quit.


From January 2017, there will be no further updates to the Cyanogen OS, no more nightly builds, and no more security updates.

Eventually, smartphones running on the Cyanogen OS, like the original OnePlus One and Lenovo ZUK Z1, will have to switch to the open-source version of the CyanogenMod operating system.

The team announced just after the closure announcement by Cyanogen.
CyanogenMod team pays respects to the community as it served for more than eight long years and announced the next open-source Android project.

Friday, December 23, 2016

Microsoft released the last Windows 10 build of 2016

Microsoft released the new Windows 10 Insider Preview Build to the Fast Ring. This was followed by the arrival of build to the Slow Ring. Now, Build 14986 ISO images are available for download.
The interested users can directly find the new build in the Downloads section of Windows Insider website. It’s also the last Windows 10 build of 2016.




New features in Windows 10 Build 14986:


Smarter Cortana:

This update brings numerous improvements to Cortana. Now one can turn off the PC and change volume using voice commands. You can use it to control the music playback of apps. Music recognition support to Chinese has been added. Also, when your PC is idle, it’ll answer the questions in a full-screen view.

Enterprise Cloud Printing:

The corporate users can find the new Enterprise Cloud Printers discovery UI under Settings > Devices > Printers & scanners.

Windows Game Bar improvement:

In the Windows 10 Build 14986, Microsoft has added support for 19 additional games in full-screen mode. Simply hit Win+G to invoke Game Bar and start capturing.

Windows Ink:


In Windows Ink, the ability to resume previous screen sketches has been added. The Ink Flyout Visuals have been updated and the control over ruler rotation has been made finer.

New extensions for Edge:


Ebates, Intel TrueKey, and Read & Write are the new extensions added to Microsoft Edge.

Updated Rendering technology:

For many UWP apps, the rendering technology has been changed.

New Windows Defender dashboard:

To let you control Windows 10 security more easily, changes have been made to Windows Defender. Microsoft has called it a work in progress and not fully functional yet.

Registry Editor Improvements:

Using keyboard shortcuts go up (Alt+ Up arrow), backwards (Alt + Left arrow) or forwards (Alt + Right arrow), you can navigate in the registry easily.

Download it here.

Did you find the new features of Windows 10 Build 14986 interesting? Share your views in the comments section below.


Monday, December 19, 2016

Student Make This Documentary Lets Thief Steal His Phone, Spies On Him For Weeks

Film student Anthony van der Meer had his iPhone stolen and the thought that a stranger had access to all of his personal data really concerned him. What kind of person would steal a phone? Where do these phones end up? These were his biggest questions. To get answers, Anthony had another phone stolen from him on purpose, but this time he followed the thief using a hidden app and made a captivating documentary film about the whole process.



“Find my Phone” was possible because of a spyware app called Cerberus. Using it, van der Meer was able to remotely track and control his phone whenever it was turned on and connected to the internet. Anthony listened to the thief’s calls, read his messages, took photos, and even recorded both audio and video. The filmmaker then compressed everything into a thrilling 21 minute documentary movie which highlights how easy it is to spy on someone in the digital age. The video has already been viewed by more than 1.7 million people.


Latest update shows that his phone resurfaced in Romania.
More info: anthonyvdmeer.nl

This post original posted at  boredpanda


Thursday, December 15, 2016

Power Mac Center surprises customers with ‘Heaven Sent’ gifts

Who doesn’t like surprises? Especially when all you have to do is be at the right place at the right time. Now that sounds exciting! This holiday season, Power Mac Center is giving wonderful surprises to everyone who happens to be in their store when the clock strikes 7PM.

As a form of thanksgiving to shoppers, the activity dubbed as “Heaven Sent” will happen every day in select Power Mac Center Metro Manila stores until January 1, 2017. The venue of the surprise is, of course, undisclosed.
 
A cup of hot coco to warm the chilly December nights,
only at Power Mac Center! #HeavenSent

Last week, unsuspecting customers of Power Mac Center Greenbelt 3 were treated to a cup of premium hot chocolate to chase the holiday stress away and warm the rather chilly December night. Prior to that, Christmas cookies were given away to spread holiday cheer.
 
 
“It was a small gesture but it felt extremely good to see their smiles when they received the surprise. This season is all about giving, so while they are in our store to find gifts to give their loved ones, we, in turn, will make them feel extra special and give them a little token of appreciation for supporting Power Mac Center for the past 22 years,” said Joey Alvarez, Marketing Director of Power Mac Center.

As an insider tip, here are the Power Mac Center retail stores and Apple Authorized Service Provider branches included in the surprise: Greenbelt 3, Glorietta 5, The Annex at SM City North EDSA, SM City Fairview, TriNoma, Robinsons Magnolia, SM Megamall, The Podium, SM Mall of Asia, SM Aura Premier, Festival Supermall, Cash and Carry Mall, SM City Marikina, Power Plant Mall, SM City BF Parañaque, and Northeast Square Greenhills. 

So what are you waiting for? Complete your holiday shopping list at a Power Mac Center store and experience a heaven sent surprise from the country’s premier Apple reseller!


​​
=======================================
Important note / Proper Terminology:
​*Please use Power Mac Center or PMC (not Power Mac, not PowerMac) About Power Mac CenterPower Mac Center is a recognized Apple Premium Reseller, Authorized Education Reseller, Apple Authorized Training Center, and Apple Authorized Service Provider in the Philippines. Power Mac Center has become a reliable retail shop and service provider of Apple products to the Filipino consumer. The company has grown to 27 branches, with stores located in Greenbelt 3, Glorietta 5, The Annex at SM City North EDSA, SM City Fairview, TriNoma, Robinsons Magnolia,  SM Megamall, The Podium, SM Mall of Asia, SM Aura Premier, Festival Supermall, Cash and Carry Mall, Abreeza Mall, SM Lanang Premier, SM City Marikina, Power Plant Mall, SM City BF Parañaque, Harbor Point, SM City Southmall, SM City Pampanga, SM City Bacoor, SM City Lipa, SM City Santa Rosa, SM City Batangas, SM City Dasmariñas, Circuit Makati, and Vista Mall Sta. Rosa. ​Visit a Power Mac Center store or find more online: PowerMacCenter.com  Facebook Twitter Instagram Youtube.
​​
=======================================
PS: 
​​
​For social media posts, please don't forget to tag @PowerMacCenter on Facebook, Twitter & Instagram) and use the hashtag: 
#HeavenSent for this story.​
=============================
=
​​
​​
For 
​media inquiries,
 please refer to:
​​
Daisy Sabangan / Erwin dela Cruz
​ | CID
​ Communication​
T: (02) 804-2336 | M: 0999-8811694 / 0908-8176049

Simple Bug Facebook Messenger allows Hackers to Read all your Chats

A security researcher has discovered a critical vulnerability in Facebook Messenger that could allow an attacker to read all your private conversation, affecting the privacy of around 1 Billion Messenger users.
Ysrael Gurt, the security researcher at BugSec and Cynet, reported a cross-origin bypass-attack against Facebook Messenger which allows an attacker to access your private messages, photos as well as attachments sent on the Facebook chat.

To exploit this vulnerability, all an attacker need is to trick a victim into visiting a malicious website; that’s all.
Once clicked, all private conversations by the victim, whether from a Facebook's mobile app or a web browser, would be accessible to the attacker, because the flaw affected both the web chat as well as the mobile application.

Dubbed "Originull," the vulnerability actually lies in the fact that Facebook chats are managed from a server located at {number}-edge-chat.facebook.com, which is separate from Facebook's actual domain (www.facebook.com).

The root of this issue was misconfigured cross-origin header implementation on Facebook's chat server domain, which allowed an attacker to bypass origin checks and access Facebook messages from an external website.

However, Secret Conversations, Facebook Messenger's end-to-end encrypted chat feature was not affected by this bug, as it can be initiated or launched only using its mobile app.

"This security flaw meant that the messages of 1-billion active monthly Messenger users were vulnerable to attackers," said Stas Volfus, Chief Technology Officer of BugSec.
"This was an extremely serious issue, not only due to the high number of affected users, but also because even if the victim sent their messages using another computer or mobile, they were still completely vulnerable."

The researcher disclosed the severe vulnerability to Facebook through its Bug Bounty program. The Facebook security team acknowledged the issue and patched the vulnerable component.


source: cynet





Tuesday, December 13, 2016

Russian Photographer Uses Facial Recognition To Find People He Snaps On Subway

Social Media Had Taken Your Privacy!


A smart but also slightly scary project by Russian photographer Egor Tsvetkov. In order to show how easy it is for complete strangers to gather information about you, Egor spent six weeks taking around 100 pictures of subway commuters in St Petersburg before using a facial recognition app called FindFace to track down their internet profiles.

In 70 percent of cases, he was quite easily able to identify the people he had photographed. Often, there was a striking difference between a person’s real look and the image they projected on their social network profile: a shy and grim young man might appear to be the life and soul of the party and a lover of extreme sports on his VKontakte page.




He used open source software to scan the 55 million plus users of VKontakte, Russia's biggest social network, and despite some of his photographs bearing little resemblance to their online pictures, Egor was (rather alarmingly) able to find around 70% of the people he snapped. “My project is a clear illustration of the future that awaits us if we continue to disclose as much about ourselves on the internet as we do now,” he said. 

In an age where people are using social media more than ever, perhaps it's time we started to think about how much information we really want to share with the world.

The Your Face Is Big Data project is aimed to show to people that our right to privacy is endangered by the development of digital technologies, according to Tsvetkov.





















Monday, December 12, 2016

How to have the right blog post description on Facebook

How to have the right blog post description on Facebook?
I'm having trouble  to get the right post description on my Facebook page so  I try to find where to disabled the general blog description.


Here is where to disabled that..

1. Go to blogger "Settings".
2. Click "Search preferences"
3. Disable Meta tags Description  click "NO", then save it.


4. Now scrap your post to Facebook Developer.
Link : https://developers.facebook.com/tools/debug/


Now re-post your blog content on you Facebook Page. :)


Orbital ATK Rocket to launch eight NASA satellites into orbit


Tomorrow, NASA will attempt to launch eight small satellites to space on board a Pegasus XL rocket, manufactured by private spaceflight company Orbital ATK. Called the CYGNSS mission, the probes are meant to study various aspects of tropical storms and hurricanes from orbit, in order to help scientists better understand how these cyclones form. But launching these satellites into orbit won’t look like your typical trip to space, where a rocket takes off vertically from a launch pad on the ground. Instead, this launch will take place in the air.

That’s because the Pegasus XL rocket launches after being dropped from the belly of an airplane. First, Orbital’s Stargazer L-1011 aircraft will take off from Kennedy Space Center in Cape Canaveral, Florida and carry the rocket to a target drop zone over the Atlantic Ocean, an area that sits at an altitude of 39,000 feet. There, the Pegasus is released and ignites its main rocket motor about five seconds later. The vehicle will then ignite two additional motors over the course of the flight to get to the right altitude and orientation for the eight spacecraft to deploy properly into lower Earth orbit.

ASA will then make contact with the satellites about three hours after they’ve deployed, and that’s when the science work begins. From orbit, the CYGNSS satellites will be studying the ocean surface winds within the inner cores of hurricanes — important indicators of how intense a storm can get. To do this, the probes will receive reflected signals from GPS satellites, which will allow the CYGNSS team to “see” through the parts of hurricanes where it’s raining and measure the surface winds in those areas. It’s something that most Earth science missions aren’t able to do, according to NASA. These measurements will help scientists better predict how strong a hurricane or storm is going to be when it makes landfall.

Tomorrow’s mission gets underway at 7:11AM ET, when Orbital’s Stargazer airplane taxis onto the runway before taking off at 7:26AM ET. The launch window for the Pegasus rocket then opens about an hour later at 8:19AM ET, with release of the vehicle slated for 8:24AM ET. Up until now, weather hasn’t looked too great for the mission. There was a 40 percent chance of favorable conditions, thanks to a cold front that just moved through southern Florida. As the front moves out of the area, there’s a chance that the region could see some rain, and Orbital ATK doesn’t want to launch the Pegasus through any precipitation or heavy clouds. It seems that the weather forecast has improved somewhat though, as there’s now a 60 percent chance of good conditions. But if the launch doesn’t happen tomorrow, there is always backup option on Tuesday.

Sunday, December 11, 2016

How to make Google Chrome browser on incognito mode by Default

Instant private browsing Incognito


Private browsing mode doesn’t offer complete privacy, but it does prevent your browser from saving your history, searches, cookies, and other private data between browsing sessions. You can have your browser always start in private-browsing mode if you prefer it.

I personally prefer this for computer shop (Piso Net) because most of the customer failed to log out their account  at the end of time.



To activate Google Chrome’s incognito mode by default, you will need to add a command-line option to its shortcut.

First, locate the shortcut you use to launch Google Chrome – either on your desktop, Start menu, or taskbar – and right-click it. Select Properties in the menu that appears.



If you are using a taskbar shortcut on Windows 7 or 8, you will have to right-click the Google Chrome icon on your taskbar, right-click Google Chrome in the list, and select Properties.Add -incognito (that’s a space character, a dash, and then the word incognito) to the end of the Target box. Click OK after adding this option.



CONS: private-browsing mode permanently. You will have to log into the websites you use each time you open your browser, as your browser won’t save the cookies that keep your login state.


Google Pixel Bubbled Screen

There’s nothing worse than getting your expensive new phone and then having something go wrong with it. Justin Duino from 9to5Google is experiencing a Google Pixel defect and Google’s customer service wasn’t very helpful.

Justin’s Google Pixel defect happens to be a bubbled screen near the headphone jack which, according to his story, Google blamed him for.

One user on Google+ believes he may have the answer to the Google Pixel defect. “Under the glass is a film used for coloring/darkening. That film has disintegrated in that section which is why it’s so oddly shaped and also why it happened so quickly.”

There’s no question that every smartphone is going to experience a defect on occasion and that doesn’t necessarily affect the entire line. Google Pixel owners probably don’t need to worry about their phones forming bubbles under the screen but should be aware it has happened. Stories like this are good information for other owners who may be experiencing this Google Pixel defect but haven’t talked about it. Bringing people into the conversation who’ve experienced the issue could help in pushing Google to investigate more thoroughly.

Source Twitter



Thursday, December 08, 2016

New Zealand Passport Robot Insists That This Man's Eyes Are Closed


A New Zealand man of Asian descent had his passport photograph rejected when facial recognition software mistakenly registered his eyes as being closed.

DJ Richard Lee's trying to renew his passport was blocked after he submitted the picture to an online passport photo checker run by New Zealand's department of internal affairs.

Instead of calling it racist, he laughs it off. It was posted also on 9gag.

The automated system told the 22-year-old engineering student the photo was invalid because his eyes were closed, even though they were clearly open, according to a copy of the notification posted on social media site Facebook.



"No hard feelings on my part, I've always had very small eyes and facial recognition technology is relatively new and unsophisticated," Lee told Reuters.

"It was a robot, no hard feelings. I got my passport renewed in the end."
Up to 20 percent of passport photos submitted online are rejected for various reasons, an Internal Affairs spokesman said.
"The most common error is a subject's eyes being closed and that was the generic error message sent in this case," he said.

The lighting in Lee's first photo was uneven, but a later one was accepted, he added.

24-year-old Bahamian Who Hacked Celebrities’ Email Accounts Sex Tapes, Movie Scripts Gets 5 Years in Prison


Alonzo Knowles, a 24-year-old Bahamian man, was convicted by U.S. District Judge Paul A. Engelmayer in Manhattan on Tuesday.

Knowles, who maintained a list of emails and phone numbers of 130 celebrities, pleaded guilty in May to charges of identity theft and criminal copyright infringement.

The sentence is twice longer than the amount of years the federal sentencing guidelines suggested, as the judge felt that Knowles "would be a clear and present danger to commit the very same crime again," the New York Times reports.



The authorities arrested Knowles late December and seized his laptop that was later destroyed by investigators. The authorities found folders containing stolen data that includes:
  • Social Security numbers for actors and professional athletes
  • Private, explicit images
  • Scripts for unreleased TV shows and movies and even contract documents
  • Emails and phone numbers of at least 130 celebrities
  • Sex tapes of celebrities

The hacker expressed remorse in court and had already handed over unreleased scripts, songs, and $1,900 in cash.

The hacker was arrested after flying to New York from the Bahamas to sell 15 movie and TV shows scripts and the Social Security Numbers (SSNs) of a movie actress and two athletes to an undercover U.S. Department of Homeland Security agent for $80,000.

According to prosecutors, Knowles appeared anxious to continue exploiting celebrities once released even after pleading guilty.

The judge cited the book the hacker claimed he would someday write to "shake up Hollywood," with plans to sell them at $35 per copy, in which Knowles said: "When I get out, I'm going to shake up Hollywood."
The book, Knowles claimed, will contain information that can "jeopardize their careers, their security, and their personal relationships."

The affected celebrities were not identified, though the judge acknowledged that the court received a statement from 20th Century Fox. 







Wednesday, December 07, 2016

Things to Remember When Applying for Credit Online



We all need a little extra money sometimes, and today there are more options than ever before. One popular way is to take out short term loans. Getting quick cash once meant begging from a bank or pawning something you own, but these days we have better alternatives such as online payday loans where anyone with a job and a bank account can get the cash they need 24/7.
Here are some things to consider before you fill out that application. 

Be Security and Safety Conscious
The first thing to keep in mind is the safety of your personal and financial information. There are more scammers and hackers out there than most people realize, and the first line of defense in cyber security is the end user’s common sense. Avoid applying for loans, or doing any form of internet banking over public wi-fi. Always assume that anything you show or type, while on a public connection, is being viewed by a hacker. They would love to get their hands on all that personal information. Also, make sure your internet connection is safe and secure, and that all your virus and malware protection is running and up to date.
Another thing to do is check to see if the site you are applying on is legit and safe. Hackers will often hijack web traffic and send unwitting customers to phishing websites that look nearly 100% official. Make sure you look for the signs of a fake site. Check the https of any site you go to where you are required to log in. Legitimate sites will have a padlock in the far left of the address bar. Make sure everything is spelled correctly in the web address. Phishing sites are often use subtle misspellings for their sites that are easy for most people to overlook. Their phishing sites will use words like paypol instead of paypal or wallmart instead of walmart.

Be Honest
It might be tempting to fudge some numbers to try and get more money or a lower interest rate, but DON’T DO IT! It is illegal to give false information on credit applications and is considered fraud. The penalties are steep with jail sentences up to 30 years and fines of around one million dollars – for each offense.

Shop Around
Don’t go for the first online credit offer you find, no matter how slick the sales pitch. There are more lenders out there than you can shake a stick at. Each one will have their pros and cons, and different terms and policies can have some serious implications for your bank account and your credit score.
What are the interest rates? Find the lenders who offer the lowest interest rates. This can save you hundreds to thousands of dollars, depending on the size of your loan. Read over their repayment policies. Some places charge penalties and fees for early repayment.
Also, find out what their policy is for late payments. It's always a good idea to pay on time, but bad things happen, and a person can come up short or else simply forget. Some online lenders have rather draconian penalties when it comes to late payments that amount to interest rates in the triple or even quadruple digits! Make sure the one you borrow money from isn’t one of them.

Borrow Only What You Can Pay Back
You know your personal finances and obligations better than anyone else, so be honest with yourself. We all want that bigger TV, the nicer car, or that dream Caribbean vacation, but none of it is worth it if we ruin ourselves financially or have to declare bankruptcy. The best way to keep this from happening is only to take what you need, and no more.

Conclusion
There are several different reasons to apply for credit online. It could be a sudden unexpected demand or emergency, like an auto repair or sick pet, or maybe it’s just time to splurge a little and get that one particular thing you’ve had an eye on for a while. Whatever the reason, don’t go in blindly. There will always be strings attached, so make sure you don’t forego sound judgment for the lure of easy money.


Tuesday, December 06, 2016

How to turn Half Life shortcut to Counter Strike 1.3 console

This is a common issue when copying  Counter Strike 1.3 and you only get is Half Life. So when you open the shortcut you only get Half Life by default and when you wnt to cs strike 1.3 you need to go the setting and activate cs 1.3.


So how to make it cs strike by default?
1. Create a HL shorcut on Desktop
2. Right click hl shortcut and click Properties
3. click Shortcut Tab  on the "TARGET" you will see the directory.
add this at the end " -game cstrike -console" ( space and the add this without quote)
Sample : "D:\Online Games\Sierra (Counter Strike)\Half-Life\hl.exe" -game cstrike -console

Then click apply...

4. Change Icon browser your CStrike  folder then select the cstrike icon click apply



Now try to open the shortcut :)
You can also rename the shortcut XD
If you need a cstrike key type

KEY : 2186-42289-8687




Thursday, December 01, 2016

HP Elite X3 Available Now in the Philippines

HP Elite X3: Tailored for Today’s Lifestyle
The new HP Elite X3 makes its debut in the Philippines.

HP Elite X3 is the one device you need for all your other devices. It’s the first built 3-in-1 device for business that ingeniously combines the power and function of a PC with a smartphone’s capabilities – it’s the sleek and secure device you need for a work that is too big. 


 

Built for Business
The Elite X3 is designed to respond to the dynamic lifestyle of today’s professionals. It allows you to start a project at your desk and finish it while you’re on the go. Effortlessly switch from a handheld device to a desktop with external display, keyboard and mouse. With the help of your company’s virtualization solution, the HP Elite X3 lets you access any critical applications of your business.

Powerful Mobile Productivity
Without the need to switch from devices, you can move from one place to another while working and transfer from a call to a presentation with ease. It’s the seamless experience you need for your office or personal work.

Style and Functionality
Equipped with innovative technological advances, the HP Elite X3 offers new experiences. The scanner and fingerprint reader lets you unlock your device more quickly and naturally. Clearer conference video calls are expected because of its 16-megapixel camera and the front-facing camera that renders an optimal image according to the light conditions, premium Audio by B&O PLAY, and active noise cancellation microphones.

It’s the technology made to travel as the dual nano SIM card slots can be used for two distinct SIM cards that can be used to keep your work and personal calls and texts separate.

Power to Perform
Built with a powerful processor, the Qualcomm® Snapdragon™ 820 processor chipset, the Elite X3 is the device that powers applications reserved for PC matched with the premium features of a smartphone.  


The HP Elite X3 offers seamless productivity for all professionals looking for an all-in-one device to get the job done wherever it might be.



MSI-ECS exclusively distributes the HP Elite X3. For more product details and pricing, call (02)688-3512 or email inquiry@msi-ecs.com.ph.   

Android Malware 'Gooligan' Hacked Over 1 Million Google Accounts



If you own an Android smartphone, Beware! A new Android malware that has already breached more than 1 Million Google accounts is infecting around 13,000 devices every day.

Researchers found traces of Gooligan code in dozens of legitimate-looking Android apps on 3rd-party app stores, which if downloaded and installed by an Android user, malware starts sending your device’s information and stolen data to its Command and Control (C&C) server.

According to CheckPoint security researchers, who uncovered the malware, anyone running an older version of the Android operating system, including Android 4.x (Jelly Bean, KitKat) and 5.x, (Lollipop) is most at risk, which represents nearly 74% of Android devices in use today.


Once hack into any Android device, Gooligan also generates revenues for the cyber criminals by fraudulently buying and installing apps from Google Play Store and rating them and writing reviews on behalf of the phone's owner. The malware also installs adware to generate revenue.

Check Point has published an online tool to check if your Android device has been infected with the Gooligan malware. Just open ‘Gooligan Checker’ and enter your Google email address to find out if you've been hacked.


If you found yourself infected, Adrian Ludwig, Google's director of Android security, has recommended you to run a clean installation of the operating system on your Android device.
This process is called 'Flashing,' which is quite a complicated process. So, the company recommends you to power off your device and approach a certified technician or your mobile service provider in order to re-flash your device.



Monday, November 28, 2016

RSVP Philippines Cyber Security Threat Landscape and Compliance - Dec 3 2016


Technology and innovation have made things more convenient for the society. It streamlined different process on businesses and organizations, improved quality service for financial institutions and health facilities and helped the government in implementations of its goals. But as technology progresses, cyber-attacks have become more sophisticated and globalized. And, these cyber-attacks know no boundaries and all that is required is an internet connection and a computer or mobile phone. The masterminds of the cyber-attacks are often more skilled than your best security practitioner and/or administrator. They control the world with their fingertips since the dawn of the internet for it has become part of our daily lives. These cyber threats come in different forms – cyber-bullying, an inside threat, a cyber-criminal getting your accounts, a hacktivist making a statement, national security espionage or domestic terrorism. 

We encourage you to join this event and get to see the latest on cyber security and the changes in the global standards and compliances with respect to the growing sophistication of such attacks.

Event name:    Philippines Cyber Security Threat Landscape and Compliance
Date & Time:    December 3, 2016 at 10:00am to 5:00pm
Venue:    8th Floor, Visayas and Mindanao room, Microsoft Philippines, 6750 Ayala Avenue, Makati City, Metro Manila Philippines





How to Setup Microsoft Outlook for Gmail Account

You can read your messages from Gmail in other mail clients, like Microsoft Outlook and Apple Mail, using IMAP. When you use IMAP, you can read your Gmail messages on multiple devices, and messages are synced in real time.

NOTE:  2 Step verification Account don't support this Outlook or Less Secure Apps





Set up IMAP

Step 1: Check that IMAP is turned on

  1. On your computer, open Gmail.
  2. In the top right, click Settings Settings.
  3. Click Settings.
  4. Click the Forwarding and POP/IMAP tab.
  5. In the "IMAP Access" section, select Enable IMAP.
  6. Click Save Changes.



Create New Account on Microsoft Outlook

1. Click on Tools , and then click Account Settings.


2. On the E-mail click New

Or You can Edit or Remove the Existing Email here:





3. Input your gmail account info.

4.Click on Manual Setup, and then click Next.

5. Choose E-mail Service -> Internet E-mail POP, IMAP,  and then click Next.

 6. On the Server Information Input

Incoming Mail (IMAP) Server   
imap.gmail.com
Outgoing Mail (SMTP) Server   
smtp.gmail.com


Then check the box  Require logon using secured password. Click More settings


7. Click the outgoing Server and then  select Use same settings

 8. On the Advance Tab menu  input:

Incoming Mail (IMAP) Server  
Encrypted Connection : SSL
Port: 993


Outgoing Mail (SMTP) Server
Encrypted Connection TLS  
Port for TLS/STARTTLS: 587






9. Once Your Done,  click Test your Account settings  then Create  a Test Email by sending email to your own email account.




Troubleshooting:


If you can't sign in to your email client, you might see one of these errors:

"Username and password not accepted"
"Invalid credentials"
You're asked to enter your username and password over and over


Step 1: Check your password
If you have these problems or can’t sign in, first check to make sure you’re using the right password.

Step 2: Try these troubleshooting steps
Update your email client to the latest version.
Use an App Password: If you use 2-Step Verification, try signing in with an App Password.
Allow less secure apps: If you don't use 2-Step Verification, you might need to allow less secure apps to access your account.
If you recently changed your Gmail password, you might need to re-enter your Gmail account information or completely repeat your Gmail account setup on your other email client.




Solution: Change account access for less secure apps

Allowing less secure apps to access your account

Google may block sign-in attempts from some apps or devices that do not use modern security standards. Since these apps and devices are easier to break into, blocking them helps keep your account safe.

Some examples of apps that do not support the latest security standards include:
  • The Mail app on your iPhone or iPad with iOS 6 or below
  • The Mail app on your Windows phone preceding the 8.1 release
  • Some Desktop mail clients like Microsoft Outlook and Mozilla Thunderbird

To help keep Google Apps users' accounts secure, we may block less secure apps from accessing Google Apps accounts. As a Google Apps user, you will see a "Password incorrect" error when trying to sign in. If this is the case, you have two options:
  • Option 1: Upgrade to a more secure app that uses the most up to date security measures. All Google products, like Gmail, use the latest security measures.
  • Option 2: Change your settings to allow less secure apps to access your account. We don't recommend this option because it might make it easier for someone to break into your account. If you want to allow access anyway, follow these steps:
    1. Go to the "Less secure apps" section in My Account.
    2. Next to "Access for less secure apps," select Turn on. (Note to Google Apps users: This setting is hidden if your administrator has locked less secure app account access.)
If you still can't sign in to your account, the "password incorrect" error might be caused by a different reason.


NOTE:  2 Step verification Account don't support this Outlook or Less Secure Apps