This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, September 24, 2016

How to changed Globe LTE Modem WiFi Password and WiFi SSID/Name

How to changed Globe LTE Modem WiFi Password and WiFi SSID/Name

These are the steps how to change the wifi name/SSID and WiFi password:

1. Open a browser go to this url: 192.168.254.254.

2. Log in your account.



user: user
pass: @l03e1t3      (copypaste this or  type @,small letter L, zero,3,e,1,t,3---parang jejemon globelte)


3. On the left side bar, Go to General Settings > Click WLAN Basic settings.

4. On the interface profile below. On the SSID, type in your desired WIFI name.

5. Next is Security type, Select WPA2-PSK

6. Then on WPA-PSK (pwede din kahit WPA2), Type in your desired password. It must be not less than 8 characters and not greater than      63 characters. A-Z, 0 -9,  a-z combinations.
 

Ex. 
SSID WiFi name: BiliKaWiFiMo 
WiFi Password/Preshared Key:  2444666668888888 
( pag tinanong ka ano WiFi sagutin mo ng 12345678 joke)

7. On the WPA /WPA2 encryption type, select AES or pwede both

8. Then click on the submit button.

9. Restart the device then check if the Wifi name and password are changed.








Ex-KSU student accused of hacking school's computer system, changing grades

KENNESAW, Ga. - A former Kennesaw State University student is facing felony charges for allegedly hacking into the school’s computer system to change grades.

Police say Chase Hughes, 19, hacked into the system in May and altered his own grades and the grades for some of his friends.

Kennesaw State police began an investigation after receiving reports of the hacking. It started when a professor received an email from the university's computer system that there had been a grade change that he did not make. The professor alerted school officials, who then told police. 





While the system worked as it should and alerted the professors of the grade changes, additional measures have been put into place to help further detect unauthorized access,” said KSU interim Chief Information Officer Lectra Lawhorne.

Hughes was arrested on Monday. He is charged with three felony counts of computer trespassing among other charges.

Word of the arrest spread quickly across campus.

“I mean, I thought it was pointless. Why would you go in and changed your grade? I think I saw one of them he changed from a B to an A. It doesn't seem to be worth the trouble,” student Drew Weldon said.

“I think it’s crazy people can actually do that. I don't think it's good he was able to,” student Andrea Baker said.

A business major with a concentration in finance, Hughes was enrolled at the university from fall 2015 to summer 2016.

Hughes is out on bond.

source: WSBTV






The FBI recommends you cover your Laptop's Webcam

FBI director James Comey recently recommended that we all cover our webcams with tape for security reasons. Comey believes that doing so is a simple step for people to "take responsibility for their own safety and security."

Apparently Comey doesn't want to be spied on. In questions during a conference at the Center for Strategic and International Studies, Comey revealed that cam-covering is commonplace at the FBI and other government offices. "It's not crazy that the FBI director cares about personal security as well," he added. "If you go into any government office, we all have our little camera things that sit on top of the screen, they all have a little lid that closes down on them. You do that so people who do not have authority don't look at you. I think that's a good thing."



That the FBI's director covers his cams may be a surprise to some, just as it was when people spotted Mark Zuckerberg's webcam tape-over in a photo of his Facebook desk this spring.

But many of us who've been paying attention to cybercrime and punishment have been covering our webcams for years, and telling all our friends and family to do it, too. What's more surprising is that it's taken this long for officials and the press to raise the alarm. I mean, they're just a few years behind, but hey, it's nice to know they care.



In 2010, a Pennsylvania school narrowly escaped criminal charges when it was caught secretly taking photos of students through the webcams on school-issued laptops. Harriton High School student Blake Robbins filed a civil suit, and the FBI launched an investigation when he found out school employees had photographed him 400 times over a two-week period -- sometimes when he was partially undressed or sleeping. School officials said they had a tracking system for finding lost or stolen laptops but admitted that the software program took images every 15 minutes without telling the user. It turns out they'd snapped around 56,000 privacy-violating pictures of students.

Aside from institutional malfeasance, there's been a thriving black market for compromised webcams and the video or photos they can produce -- for many years. A clearly startled 2013 BBC reporter claimed the going price for access to a woman's webcam was priced at $1 per girl, whereas computer webcams belonging to men cost $1 -- for one hundred. And even then, three years ago, it was old news. The programs that capture images, take videos and record audio are not expensive, and they do their jobs surreptitiously by overriding the "record" light so victims don't know they're being spied on.

BBC's story was sparked by a case involving a Miss Teen USA contestant. A year before Cassidy Wolf won the 2013 crown, a guy in her high school used a program to hack into the webcam on her computer and take photos of her. She found out when he got into her social media accounts and tried to extort money from her. It turns out that she was one of 12 girls he had taken photos of and threatened for cash. He was sentenced to 18 months behind bars.




The software is typically put on a computer when the victim clicks a link, often through an email, and the computer becomes infected with a program that hides while letting the computer's camera be controlled remotely. Known as phishing, it's the most common form of online hack attack.


The following year, the FBI ran its largest cyber operation to date, in 2014, arresting scores of webcam hackers in over a dozen countries, who had all been using a program called Blackshades. The program has the ability to give its user access to "photographs and other files on the victim's computer, record all of the keystrokes entered on the victim's keyboard, steal the passwords to the victim's online accounts, and even activate the victim's web camera to spy on the victim -- all of which could be done without the victim's knowledge." The malicious tool was shown to have been purchased by several thousand hackers in over 100 countries, infecting more than half a million computers around the world.


After her harrowing experience, Ms. Wolf now tapes over all of her webcams, and so should we all. Everything has a camera. Your phone, your laptop, your tablet. If you have a modern device that can get online, it probably has a camera. And if it has a camera, someone looking for cash or scummy thrills has probably figured out how to hack it and turn it on without your knowing. Protecting yourself is as easy as taping it up, just like Zuck and Comey. Sticky notes work well because they have a gentle adhesive, and you can also find privacy stickers for purchase online that are made specifically for putting on (and taking off) web and phone cameras.

Perhaps what's such a facepalm isn't the irony of the FBI telling us how not to get spied on, or why cam-covering is such a wacky idea to Comey's friends. It's that the FBI is acknowledging to the public that, really, it's "everyone for themselves" when it comes to technology and personal security.




Tesla to unveil solar roof with integrated battery and charger at October 28th event

Tesla is planning to unveil a solar roof product for buildings at an event on October 28th in San Francisco, according to a tweet from Tesla CEO Elon Musk. The solar roof would be the first new product to come out of the SolarCity/Tesla merger, though that transaction has yet to close.

Musk says the solar roof will include a Powerwall battery and a Tesla charger. The solar roof was the first item in Musk’s "Master Plan, Part Deux" for Tesla, released back in July. The goal is to combine batteries built at the Tesla Gigafactory with SolarCity’s panels to create an all-in-one solar product.



SOURCE: Elon Musk (Twitter)


Friday, September 23, 2016

Yahoo confirms more than 500 million accounts hacked by "state sponsored" hacking group

In a statement released on businesswire, Yahoo said a hack of its network in late 2014 breached information related to at least 500 million user accounts. The company says it believes "a state-sponsored actor" is responsible for the hack.

"The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers," Yahoo said in the statement. The company added, however, that the hack "did not include unprotected passwords, payment card data, or bank account information."




A hacker was recently found to be selling information related to 200 million accounts, although today's announcement suggests the scope of the breach was wider than believed. Yahoo said it is working with law enforcement on an investigation, although it did not provide any details on why it believed the hack was state-sponsored.


The hacker, who goes by the pseudonym "Peace" or "peace_of_mind," has uploaded 200 Million Yahoo! credentials up for sale on an underground marketplace called The Real Deal for 3 Bitcoins (US$1,824).



Over past few months, a large number of data breaches have been reported to plague companies like LinkedIn, MySpace, Tumblr, and VK.com as hackers put up for sale massive data dumps of user credentials stolen earlier in the decade.

Yahoo said in its statement that anyone with an account who has not changed their password since 2014 change it immediately.

Update: Yahoo! started sending email to all Yahoo user including me.. I receive mail this morning.

 

Meanwhile Yahoo's announcement was forthcoming. Verizon is currently moving to acquire Yahoo, a deal that Recode reports may be frustrated by today's news.

Source : Yahoo Statement



IDM Version 6.26 Build 3 Final + Patch (Sept/21/2016)

Internet Download Manager aka IDM developers release a new build of  their well-known Download Accelerator. IDM supports the following web browsers: Internet Explorer, Opera, Netscape Navigator, Apple Safari, Flock, Google Chrome, Mozilla Firefox, and many others.


Version 6.26 Build 3 Final is available (Sept/21/2016)

Features:
IDM downloading a file


  •     Divides downloads into multiple streams for faster downloading
  •     Batch downloads
  •     Import/Export download jobs
  •     Auto/manual updating of download address
  •     Multiple queues
  •     Recent downloads list for easy access to directories
  •     Video downloading from streaming video sites.[2]
  •     Dynamic segmentation throughout the downloading process.[3]
  •     Protocols: HTTP, FTP, HTTPS, MMS[4] and Microsoft ISA
  •     Authentication protocols: Basic, Negotiate, NTLM, and Kerberos allowing for storage and auto-authentication of user names and passwords.



What's new in version 6.26 Build 3

(Released: Sep 21, 2016)

    Added support for Firefox 50
    Improved IPV6 support
    Fixed bugs

What's new in version 6.26 Build 2

(Released: Sep 09, 2016)

    Fixed problem with video recognition for several video types

What's new in version 6.26 Build 1

(Released: Sep 07, 2016)

    Added support for IPV6 Internet addresses
    Improved "Start Download Info" dialog
    Fixed a freezing problem when "save to" path is on a network drive
    Fixed bugs with IE and Firefox integration


How to Use ?
---------------------------------------
1. Close IDM on Taskbar, Install idman626build3.exe

2. After Finish it will pop out "Fake Serial" close and ignore everything
in short Close!!

3. Copy IDMan.exe and IDMGrHlp.exe from Crack Files Folder  to IDM installation path ( ex : C:\Program Files\Internet Download Manager or  C:\Program Files (x86)\Internet Download Manager\ )

4. Run Activate.reg file (kung naka gamit kana dati ng patch ko huwag muna i run eto )

5. Launch IDM

6. Done !

NOTE: This manual method activation is not generic, means these files can be used to activate IDM 6.26 build 3 only.


 (One Drive  download link might contain ads please disabled your adblock skip ads in 5 second to redirect to the link )

 https://www.facebook.com/download/934580599923436/Internet%20Download%20Manager%20%28IDM%29%206.25%20Full%20Version.rar





In Just 24 Hours iPhone 7 Has Already Jailbreak

It has only been a few days since the launch of Apple's brand new iPhone 7 and iPhone 7 Plus, but it appears didn't take long the new iPhone has already been jailbroken.

Security researcher and well-known hacker Luca Tedesco shared an image of his jailbroken smartphone on his Twitter account to show off the world that the new iPhone 7 has been jailbroken.

The image posted by Tedesco on Wednesday clearly shows an iPhone 7 running both iOS 10.0.1 as well as the Cydia app store, which allows jailbreakers to install apps and other software that Apple does not officially support.




Eventually, there is no tool available yet that you can use to jailbreak your device, but the good news is that a jailbreak has already been developed, which suggests that it's indeed possible to jailbreak iPhone 7.

Early iPhone 7 or iPhone 7 Plus user to install unauthorized Cydia tweaks have to wait until firms like Pangu or someone else come up with the same exploit.


Bad news to Apple, the company would likely block the vulnerability used to develop iPhone 7 jailbreak in its next iOS update, of course.




Hackers Can Remote Attack Tesla Autopilot Software From 12 Miles Away

The most recent car hacking has been performed on Tesla Model S by a team of security researchers from Keen Security Lab, demonstrating how they were able to hijack the Tesla car by exploiting multiple flaws in the latest models running the most recent software.

The team said the hacks worked on multiple models of Tesla and believed they would work across all marques.

"We have discovered multiple security vulnerabilities and successfully implemented remote, aka none physical contact, control on Tesla Model S in both Parking and Driving Mode," Keen writes in a blog post. "We used an unmodified car with the latest firmware to demonstrate the attack."
"As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars."



In a YouTube video, the team of Chinese researchers Sen Nie, Ling Liu, and Wen Lu, along with director Samuel Lv, demonstrated how it could remotely take control of a Tesla’s brakes and apply the brakes from 12 miles away by compromising the CAN bus that controls many vehicle systems in the car.

The researchers were also able to remotely unlock the door of the car, take over control of the dashboard computer screen, open the boot, move the seats and activate the indicators and windscreen wipers, as well as fold in the wing mirrors while the vehicle was in motion.

The hack requires the car to be connected to a malicious WiFi hotspot and is only triggered when the car's web browser is used.




The team demonstrated the hacks against a Tesla Model S P85 and Model 75D and said its attacks would work on multiple Tesla models. It was able to compromise the Tesla cars in both parking and driving modes at slow speed in a car park.

Thankfully, the vulnerabilities were privately disclosed to Tesla and the company addressed the issues worldwide with an over-the-air software update. 

"Within just 10 days of receiving this report, Tesla has already deployed an over-the-air software update (v7.1, 2.36.31) that addresses the potential security issues. The issue demonstrated is only triggered when the web browser is used, and also required the car to be physically near to and connected to a malicious Wi-Fi hotspot. Our realistic estimate is that the risk to our customers was very low, but this did not stop us from responding quickly."
"We engaged with the security research community to test the security of our products so that we can fix potential vulnerabilities before they result in issues for our customers. We commend the research team behind today’s demonstration and plan to reward them under our bug bounty program, which was set up to encourage this type of research."

The Keen team said it is Tesla’s "proactive attitude" towards its vulnerability report that made the fix available to its customers within ten days when other automakers required much time and more complex procedures to update vehicles following the major bug exposures.

source: http://keenlab.tencent.com/





Thursday, September 22, 2016

Edward Snowden Tweeted ‘Don’t use Google Allo'

Edward Snowden has warned people not to use Google’s new chat app, because it lets the company read everything that they say.

Google has finally released its new chat app after showing it off over the summer. It comes with a robot that watches everything people say and then stores it for later analysis, using that data to improve the app itself.

But that also means that chats are stored on Google’s servers indefinitely, and are able to be read by it. The company had initially indicated that the messages would only be stored temporarily, limiting the possible impact of any data breach and retaining some privacy for users.



But it now appears that Google won’t be doing that after all. Instead it will keep hold of all conversations.

Google will use that data to improve parts of the app, such as its smart replies feature. That will allow the app to read through conversations and try and work out how people talk – it can then use that data to suggest what they might want to say to their friends.



Google does allow people to switch into a different mode, called Incognito, where conversations will be end-to-end encrypted so that they can’t be read by Google. But that isn’t turned on by default and leads most of the app’s features to break, turning it into just a conventional chat app.

Making the change does probably keep Google on the right side of the law. By keeping track of all messages, Allo conversations will be accessible by law enforcement with warrants – something that can’t happen on apps like iMessage or WhatsApp, both of which have run into trouble over not being able to give up information to authorities.

All of those problems led Mr Snowden to send out a flurry of tweets telling people not to use Allo.

“Free for download today: Google Mail, Google Maps, and Google Surveillance,” he wrote. “That's #Allo. Don't use Allo.”


Snow then also reply a tweeted question of what message service should used.. he answered "Use Tor. Use Signal."





Samsung's new SSDs are super fast and more reliable 960 PRO and EVO

Samsung is back with a new version of its PCIe-based 950 Pro SSDs with the announcement of new 960 Pro and 960 Evo models. Both drives feature 3D NAND (which Samsung refers to as V-NAND) to offer more storage capacity than a traditional 2D NAND methodology would allow.


“For more than 30 years, Samsung has continued to push the boundaries of what is possible to deliver innovative consumer memory experiences.” said Un-Soo Kim, Senior Vice President of Branded Product Marketing, Memory Business at Samsung Electronics. “Our V-NAND technology for NVMe-based storage products is our most recent advancement in the NVMe era.”

Last year’s model, the 950 Pro, used 32-layer V-NAND technology from the 850 series of SATA SSDs, but replaced the older 2.5-inch SATA interface for the newer and smaller PCIe form factor. In 3D NAND, the number of layers is key to offering increased storage, and Samsung has managed to upgrade both this year's 960 Pro and 960 Evo to using 48-layer V-NAND technology. Both 960 series drives are also the first consumer SSDs from Samsung to use the newer NVMe interface specification to achieve faster speeds.



The 960 Pro is the top-of-the-line consumer model, which uses faster and more reliable – but less memory dense and therefore more expensive – MLC (Multi Level Cell) memory, where each memory cell can contain 2 bits of charge. The 960 Evo, on the other hand, uses cheaper TLC (Triple Level Cell) technology, which divides each cell into three possible bits of data, at the expense of reliability and speed. But Samsung is touting even the budget 960 Evo models as faster than last year's 950 Pro, with speeds of up to 3200 MB/s read and 1900 MB/s write, while the flagship 960 Pro can reach up to 3500 MB/s read and 2100 MB/s write.

Both the 960 Pro and 960 Evo are scheduled for release in October. The 960 Pro starts at $329.99 for 512GB up to $1,299 for 2TB, while the 960 Evo begins at $129.88 for 250GB up to $479 for 1TB of storage.


source: Samsung


Alstom's Coradia iLint is Hydrogen fuel cell train offers pollution-free rail trips

Hydrogen fuel cells aren't gaining a huge amount of traction in cars, where there's a steady move toward electric. But what about regional railways, where long ranges and a lack of powered rails makes electric trains impractical? Alstom thinks that makes plenty of sense -- the French firm has introduced one of the first hydrogen fuel cell trains, the Coradia iLint. The 300-passenger locomotive can travel up to 497 miles at a reasonably brisk 87 miles per hour, all the while spewing nothing more than water. Hydrogen gives it the freedom to run on non-electrified rails, and it's considerably quieter than diesels -- helped in part by batteries that store unused energy.


There are plans to put it into service relatively quickly. The first Coradia iLint should reach a rail line in northern Germany in December 2017, and it won't be surprising if other customers follow suit. The biggest challenge is infrastructure. Train service operators will have to upgrade all their relevant garages and stations with hydrogen filling systems, which could be more than a little expensive when spread across an entire rail network.


Source: Alstom




China has finally confirmed their first space station is heading for Earth and is potentially out of control

After months of suspicion, China has finally confirmed their first space station is heading for Earth and is potentially out of control.

A senior official of the Chinese space program revealed at a press conference last week that the Tiangong-1 space station is likely to fall to Earth by 2017, Xinhua News Agency reports. They added it's currently intact and orbiting at a height of around 370 kilometers (230 miles).

"Based on our calculation and analysis, most parts of the space lab will burn up during falling," said Wu Ping, deputy director of China's manned space engineering office, during the press conference.


The officials said that the space agency will continue to follow the movement of Tiangong-1 and will release an update on its expected time of arrival if required.



The 10.3-meter-long (34-foot-long) Tiangong-1, which means “Heavenly Palace," was launched in 2011 as China’s first manned space station. It ended its mission in March this year. However, since then, numerous astronomers noted the space station appeared to be aimlessly drifting out of control and heading for Earth. The silence by the Chinese government only heightened uncertainties.

The officials did not comment on how much of the space station they still maintain. However, given the vague estimated landing time, it suggests very little.

China launched a new experimental space station, Tiangong-2, last week, and are planning to launch a fully fledged space station next decade.


History :
Skylab was the United States' first space station, orbiting Earth from 1973 to 1979, when it fell back to Earth amid huge worldwide media attention.


Mir was a space station that operated in low Earth orbit from 1986 to 2001, run by the Soviet Union and later by Russia. Mir was the first modular space station and was assembled in orbit from 1986 to 1996.



Progress M-34 was a Russian unmanned cargo spacecraft which was launched in 1997 to resupply the Mir space station, and which subsequently collided with Mir during a docking attempt, resulting in significant damage to the space station.






Wednesday, September 21, 2016

Nike's self-lacing HyperAdapt 1.0 sneakers finally go on sale November 28th

Nike has finally announced when it will begin selling its self-lacing sneakers inspired by the shoes worn by Michael J. Fox in Back to The Future II. According to a tweet from the company's Heidi Burgett, the HyperAdapt 1.0 will be available for "experience & purchase" from the 28th of November, but only in select Nike locations in the US. Pricing is still unknown, but expect a "high price tag," according to a Wired feature on the shoe's development.

You can check out the full story from Wired for a more detailed look at how the sneakers were made, but here are the key points. Each shoe has an internal cable system made from fishing line and a pressure sensor in the sole. When you put your foot in, the cables tighten based on "an algorithmic pressure equation," and this fit can be adjusted throughout the day with a pair of buttons near the tongue.



LEDs in the heel light up when the shoes are tightening and when it's on low battery, and all the internal electronics mean that yes, you do have to charge these shoes. It takes three hours for a full charge and each charge last about two weeks, with Nike providing a magnetic clip-on charger similar to that used by Apple for the Apple Watch. It's also worth noting that the thick nylon laces you see on the top of the sneaker are just "visual aids" — they tighten, but they're not what's keeping the shoe hugged to your foot. You can watch the video below from Wired for a closer look:


Meet the HyperAdapt, Nike's Awesome New Power-Lacing Sneaker


Nike's Tinker Hatfield and Tiffany Beers explain the new power-lacing HyperAdapt 1.0 and demonstrate how to charge the sneakers, and tighten and loosen the laces with the touch of a button.


North Korea accidentally lets world access its internet and revealed that it only has 28 registered domains

On Monday at around 10 p.m. Pacific time, North Korea's nameserver – that contains information about all of the ".kp" websites – was misconfigured, allowing it to be accessed. This meant Matthew Bryant, a researcher, was able to access the domain names and some of the file data about the site.

Someone in North Korea is in a lot of trouble. The secretive state somehow accidentally opened access to all the websites hosted on its servers, revealing that it only has 28 registered domains.


Bryant dumped all of this on Github – a site that hosts computer code. It's the first real look into the secret online world of the hermit state North Korea.




Some of the websites take long time to load and some are inaccessible. Among the 28 sites listed is one called Air Koryo, a flight booking site, and one named Friend, presumably some sort of social network.

One website that has always been accessible outside of North Korea is the Korean Central News Agency – the state-run propaganda site.

A Reddit page lists all of the websites discovered and below are some examples of the sites.



Wiki: Internet access is available in the Democratic People's Republic of Korea (North Korea), but only permitted with special authorization and primarily used for government purposes and by foreigners. The country has some broadband infrastructure, including fiber optic links between major institutions.



IBM and MIT team up to help Autonomous robots and other AI systems see and hear like humans

IBM and MIT think Autonomous robots and other AI systems can do better. They've begun a "multi-year" partnership that aims to improve AI's ability to interpret sight and sound as well as humans. IBM will supply the expertise and technology from its Watson cognitive computing platform, while MIT will conduct research. It's still very early, but the two already have a sense of what they can accomplish.

The new IBM-MIT Laboratory for Brain-inspired Multimedia Machine Comprehension’s (BM3C) goal will be to develop cognitive computing systems that emulate the human ability to understand and integrate inputs from multiple sources of audio and visual information into a detailed computer representation of the world that can be used in a variety of computer applications in industries such as healthcare, education, and entertainment.

One of the biggest challenges will be to advance pattern recognition and prediction. A human can easily describe what they saw happen in an event and predict what happens next, IBM says, but that's virtually "impossible" for current AI. 

Guru Banavar, Chief Science Officer, Cognitive Computing and VP, IBM Research & Professor James DiCarlo, head of the Department of Brain & Cognitive Sciences (BCS) at the Massachusetts Institute Technology (MIT) (Credit: IBM Research)

There's no guarantee that IBM and MIT will crack a problem that has daunted Google, Facebook and countless academics. However, it's rare that scientists get access to this kind of technology. You might just see breakthroughs that aren't practical for teams that have only limited use of AI-friendly hardware and code.
That ability to quickly summarize and foresee events could be useful for everything from health care workers taking care of the elderly to repairing complicated machines, among other examples


source: IBM




AT&T's Project AirGig could be the next high-speed wireless internet alternative to fiber

AT&T Labs today announced Project AirGig, a new wireless internet delivery system that carriers high speed internet service over power-lines without actually tapping into the physical wired infrastructure. More specifically, AT&T plans to mount hundreds of tiny radio stations atop telephone poles to bring high-speed internet to customers without laying down new cable.



The project is still in its experimental phase, but AT&T says it's bursting with potential. AirGig's relay stations may sit on top of telephone poles, but it doesn't actually need to tap into the pole's power source -- it doesn't send signals over the lines either, opting instead to regenerate millimeter wave signals from station to station. 


Because the stations are designed with to use affordable plastic antennas and make use of existing infrastructure, it offers a potential way to bring high-speed connections to new areas without laying down new cable. Not only does that save a ton of money, it also means the new system could be deployed faster.

AT&T is careful to note that AirGig is purely experimental right now, and its first field trials won't even start until next year.


source: AT&T



Samsung has just announced that it has shipped 500,000 replacement Galaxy Note 7 devices to US retailers and carriers

Samsung has just announced that it has shipped 500,000 replacement Galaxy Note 7 devices to US retailers and carriers. They’ll be available beginning tomorrow to owners of the original, fire-hazard Note 7 for in-store exchanges. This first batch of replenishment stock is intended exclusively for exchanges and just 25 percent of Note 7s in US have been exchanged; Samsung hasn’t yet said when Note 7 retail sales will officially resume.

But it also makes clear that there are still a lot of potentially dangerous Note 7s out there. Safe replacement devices will display a green-colored battery in the phone’s taskbar — a clear indicator for concerned airline and mass transit employees to look for when examining the phone.




Hopefully that exchange rate will shoot up much quicker now that consumers can make a direct swap for Samsung’s latest batch of Note 7 shipments — assuming they still want one.



Samsung will also soon deliver updated firmware to all existing Note 7s with a new safety notice prompt urging owners to power down the device immediately. The prompt is a very polite way of saying “turn this thing off, you idiot” and will show up any time an at-risk Note 7 is powered on or plugged into a charger. Without any kind of kill switch to render the phones inoperable, this might be the best Samsung can do for now.



Polaroid's digital camera with inkless printing physical photos on the spot ships in October

Cologne, Germany, September 20, 2016 – At Photokina 2016, Polaroid announced the global release of the much anticipated Polaroid Snap Touch instant digital camera. The Polaroid Snap Touch is now available for pre-order at www.polaroidsnapcamera.com

Instant photography has been at the heart of the Polaroid brand for nearly 80 years, and today it is reimagined with the Polaroid Snap Touch instant digital camera. The Polaroid Snap Touch follows in the footsteps of the highly successful first generation Polaroid Snap. The new model is now available for pre-order with several new features that makes sharing even easier and more fun than before.

Despite recent experiments with photography apps and, uh, smart TVs, Polaroid is still making new cameras that print physical photos on the spot. To build on the success of its inkless instamatic Snap released last year, the company premiered the Touch at CES 2016, an upgraded version that adds a touchscreen and Bluetooth sensor. If that hybrid machine sounds right up your alley, Polaroid is now accepting preorders on its website to ship out sometime in October.




While it's a bit more expensive at $180 than the original Snap's $100 pricetag, the Touch has a few tricks besides the obvious virtue of seeing your photos on its touchscreen before printing. Load up its dedicated app on a smartphone or device and you can send images over Bluetooth to the camera, which can then pump out physical copies. 


Of course, you can only use Polaroid's proprietary ZINK inkless paper, which starts at $10 a pack, but such is the price of hybrid cameras-cum-printers.


Tuesday, September 20, 2016

YouTube commenters fell for it and tried the crazy stunt themselves DIY iPhone 7 Headphone Jack

YouTuber TechRax decided enough was enough and was longing to go back to the good ol’ days where you could just listen through your bog standard headphones- by literally drilling a headphone jack into his new iPhone 7.

Well it looks like a load of people on YouTube didn’t quite get that this DIY experiment was clearly a bunch of bull.

In just seconds, he had successfully drilled a 3.5-mm ‘headphone jack’ into the phone and could play music through it, though of course you couldn’t tell if it was coming from the built-in phone speakers or the wired Apple headphones.


A bunch of gullible YouTube commenters fell for it and tried the crazy stunt themselves, failing miserably in the process. They must be hating humanity so much right now.





Watch the YouTube DIY headphone jack here:







SanDisk's 1TB SDXC card

PHOTOKINA, COLOGNE, GERMANY, Sept. 20, 2016 – Western Digital Corporation (NASDAQ: WDC), a global storage technology and solutions leader, today unveiled its SanDisk® 1TB terabyte (TB) SDXC™ card prototype at the world's leading trade fair for photo and video professionals. The SDXC card is only a prototype at this point, with no details available on price or release date, but it's still an impressive milestone. As SanDisk owners Western Digital points out, it was only sixteen years ago that the company introduced its first 64 megabyte SD card, while two years ago they debuted the 512GB card, which was then the world's biggest. Things have moved fast, though, and compared to the 64MB card, today's 1TB version offers 16,384 times more storage.




The company says the 1TB card is necessary to match the increasing demand for memory-heavy formats, including 4K and 8K footage, 360-degree video and VR. However, there will be some downsides. 


“Just a few short years ago the idea of a 1TB capacity point in an SD card seemed so futuristic – it’s amazing that we’re now at the point where it’s becoming a reality. With the growing demand for applications like VR, we can certainly use 1TB when we’re out shooting continuous high-quality video. High-capacity cards allow us to capture more without interruption, streamlining our workflow, and eliminating the worry that we may miss a moment because we have to stop to swap out cards,” said Sam Nicholson, CEO of Stargate Studios and member of the American Society of Cinematographers.

The 1TB card is certain to be prohibitively expensive, and at such a large capacity, read and write speeds are going to be comparatively slow. Plus, if you're working with a 1TB card there's always the danger you'll have too much space and forget to ever switch cards.

source: SanDisk



Opera 40 built-in ad blocker and VPN-equipped browser is now available


The company has released the finished version of Opera 40 for desktops, which revolves around a free virtual private network (provided by SurfEasy) that offers both a more secure connection as well as access to foreign content that would otherwise be blocked. Hi, Hulu and Pandora! It can automatically choose whichever VPN server will provide the fastest connection, but you can specify one of five countries (Canada, Germany, the Netherlands, Singapore and the US) if you're more concerned about visiting region-specific sites.

Opera is the first major browser that can block ads for you without add-ons. According to tests, the built-in ad blocker makes content-rich webpages load in Opera up to 90% faster.


The update also brings a reworked battery saver and RSS feeds in personal news, so there's something to check out after the novelty of the browser's central feature wears off. One thing's for sure: it's worth a shot if you hate paying for VPNs, but want to stick to a mainstream browser that includes plenty of familiar elements.


Source: Opera