Just another WordPress.com weblog

tech

Image

Zmachine

zmachine


Image

Lamborghini Aventador

2012-Lamborghini-Aventador-J-Front-Side


Image

ferrari 458

Anderson-Germany-Ferrari-458-Italia-Carbon-5


Image

history of Coca Cola

13


Image

airport scooter bag


social networks


my password is 123456


jeremy clarkson fake gear


warning from malwarebytes

Please be wary and do not talk to any tech support agents who cold call you with a proposition to fix your PC. We have received many complaints from upset customers who have had their credit cards charged for hundreds of dollars.  These fake PC technicians will call users via telephone or Skype and ask to do a remote access to your PC to diagnose any problems by looking for malware. These tricksters will use Malwarebytes Free edition to clean your PC and then will try to upsell you a yearly tech support plan.  Do not let anyone who cold calls you remotely access your PC or give them your credit card number! We are saddened to hear these stories from our users and it goes without saying that we do not knowingly affiliate with any fraudulent companies.  If you have been victim to one of these, or have any information about a scam you saw on the web, please report it to us so our team can investigate.


beware of trojan horses

Anti virus

Viruses are the biggest scourge of computer user and even experienced users can be caught by them. There are a lot of programs on the market and most of them are effective as long as you keep them up to date. The free edition of AVG is a bit more basic than the full featured commercial products, but does a good job of basic protection.

Spyware remover

You don’t have to be surfing to dubious sites or file swapping to have your computer clogged with spyware. Even respectable websites can add tracking cookies and data miners. We recommend using at least two spyware removers, which you should run every few weeks to keep your system clean.

Our current favourite is Malware Bytes, but there are plenty of others that are both paid and free.

Spybot looks for software that snoops on your web surfing while advertising software is the target of Adaware. Using the two together catches most of the unwanted rubbish that can clog up your browser. We recommend running them once a month. Like virus checkers, they need to be kept up to date

phuket-1-12369DxbelOyOrgyOFPofAGwcPJNTji


Laptop shortage looms after Thailand flood

Flooding in Thailand, the No. 2 exporter of hard drives, has killed at least 377 people since July and devastated industrial areas in the center of the country.

NetGear Inc, which buys hard drives to use in commercial storage devices, in some cases has seen prices charged by distributors more than double from levels before disaster, said Shane Buckley. general manager of NetGear’s commercial business.

001---image012-verge-800_gallery_post_large_verge_medium_landscape


Online gamers crack AIDS enzyme puzzle

art_competition-420x0

Figuring out the structure of proteins is vital for understanding the causes of many diseases and developing drugs to block them.

But a microscope gives only a flat image of what to the outsider looks like a plate of one-dimensional scrunched-up spaghetti. Pharmacologists, though, need a 3D picture that “unfolds” the molecule and rotates it in order to reveal potential targets for drugs.

This is where Foldit comes in.

Developed in 2008 by the University of Washington, it is a fun-for-purpose video game in which gamers, divided into competing groups, compete to unfold chains of amino acids – the building blocks of proteins – using a set of online tools.

To the astonishment of the scientists, the gamers produced an accurate model of the enzyme in just three weeks

A “folded up puzzle” from fold.it.

Online gamers have achieved a feat beyond the realm of Second Life or Dungeons and Dragons: they have deciphered the structure of an enzyme of an AIDS-like virus that had thwarted scientists for a decade.

The exploit is published on Sunday in the journal Nature Structural & Molecular Biology, where – exceptionally in scientific publishing – both gamers and researchers are honoured as co-authors.

Their target was a monomeric protease enzyme, a cutting agent in the complex molecular tailoring of retroviruses, a family that includes HIV.


Amazon Kindle Australia

shopping on Amazon Australia. , how can we do this legitimately? It’s simple as long as you have an American shipping address, buying a Kindle in Australia either through Amazon or from a Dick Smith  online shop . Dick Smith price 3g $219  Wi-Fi $159 Aus  .Amazon price 3g-$189A Wi-Fi $139.

Technorati Tags:

rotate a video 90 degrees with VLC media player

sshot123

Open your video file by going to Media  > Open File… and browsing for your file. Or, by just dragging and dropping your video onto the VLC player.

sshot155

Choose Tools from the Menu bar and select Effects and Filters.

sshot115

On the Video Effects tab, tick the Transform checkbox and choose your degrees of rotation. The video is rotated counter-clockwise, so to rotate clockwise 90 degrees you’ll want to choose Rotate by 270 degrees.

sshot210

Technorati Tags:

What’s the difference between a computer and a cellphone?

19:09 15 February 2011

Law

Technology

Niall Firth, technology editor
PhoneComputer-thumb-600x392-115471What’s the difference? (Image: Rex Features)
Just where is the boundary line between a computer and a cell phone? Does one even exist?
The question is particularly pertinent following a recent ruling in January in the US that allowed police to search a suspect’s cellphone without a warrant. The thinking behind the decision was to stop suspects destroying potentially incriminating evidence on their phones, in the form of text messages.
But the ruling angered many in the US: in crimes in which the accused is carrying their cellphone in their pocket, was it really fair that all the data that is accessible via the cloud – texts, documents and emails – now be seized without warning? Cellphones are now so advanced that official access to one provides the authorities with almost the same level of insight into one’s life as the seizure of a home computer. Whatever happened to the Fourth Amendment?
But now the issue has been clouded even further. This week in the District Court of Springfield in New Orleans, Louisiana, a judge ruled that a cellphone should be classified as a computer for the first time.
The ruling came, as reported in the New Orleans Business News, after a man named Neil Kramer pleaded guilty to bringing a 15-year-old girl across state lines in 2008 to have sex.
When the prosecution tried to land him with a lengthier sentence they argued that his use of a cellphone during the crime was the same as using a computer – his Motorola Motorazr could access the internet – and was an aggravating factor.
Remarkably, US District Judge Richard Dorr agreed, and handed Kramer an extra two years on his tariff for the use of a computer in enticing a minor to engage in sexual conduct. Current US law says a computer is “an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions.”
Cellphones we use today are far more powerful than the hulking desktop PCs we used little more than 10 years ago, that much is certain. And it’s hard to argue that even the lowliest of internet-enabled phones fulfills these basic criteria.
The police in the US need a warrant to search a suspect’s personal home computer, protected, as it is, by the Fourth Amendment. If your cellphone, and all it contains, is now officially a computer can this now be used as a defence to prevent the authorities seizing it when they carry out a search? No one really knows until it is tested in court but it is an interesting development and shows how advances in technology can muddle even the clearest of legal matters.
Despite the serious nature of the case, however, the New Orleans court’s judgement was not without its moment of levity.
To show how bad humans are at predicting future developments in technology, the court included a footnote to a 1949 article in Popular Mechanics magazine which said that “computers in the future may have only 1000 vacuum tubes and perhaps weigh only 1.5 tons.”


Web filters not 100% foolproof against risky sites

A European Internet study has an instant message for parents who want to control their children’s online habits: web filters are not 100 percent foolproof against harmful sites.

A solid 84 percent of programmes restrict access to websites such as porn pages, according to a study released by the European Commission on Thursday.

But they still leave a 20 percent chance for sites with content unsuitable for children — webpages promoting anorexia, suicide and self-mutilation — to escape the filters.

The study also found that few Internet filters can block “Web 2.0″ content including blogs, forums and social networking sites such as Facebook or Twitter, or filter out instant messaging services.

For parents whose web-savvy kids use smart phones or video game consoles to access the Internet, not all products on the market provide parental controls for such platforms.

Computers are no longer the only way to go online: 31 percent of children access the Internet with their phones and a quarter through platforms such as the Nintendo Wii or Sony’s PlayStation, the study found.

A survey released in parallel to the study found that only a quarter of parents in the European Union use parental control software to monitor, track or filter online content.

The use of such software varies widely among parents in the 27-nation EU, from 54 percent in Britain to nine percent in Romania.

The EUKidsOnline survey was conducted in 25 countries with more than 25,000 children and one of their parents between April and August 2010.

The study on filtering software analysed 26 parental control tools for PCs, three for game consoles and two for mobile phones.

The goal is to give parents an “objective view” of which softwares is the most effective, said Jonathan Todd, spokesman for European digital agenda commissioner Neelie Kroes.

“Protecting children from unsuitable content on the internet is of course an important issue,” said Jonathan Todd, spokesman for European digital agenda commissioner Neelie Kroes.

“We want people in general, parents and children, to feel confident when they use the Internet,” he said.

The study was funded by the EU’s Safer Internet Programme, an initiative aimed at informing parents and children about the Web’s potential risks.

The 2009-2013 programme has a budget of 55 million euros and will fund a review of parental control software every six months until the end of 2012.

The programme’s website provides two lists ranking the effectiveness of the 26 software programmes for children 10 years old and younger and those over 11 years old.

Apple’s Mac OS X topped both lists while rival Microsoft’s Windows Vista was second for children under 10 and in ninth place for those over years old.


Reclaim Your Privacy On Facebook

Check out this link to insure your privacy on facebookhttp://www.reclaimprivacy.org/


Australia defends mandatory Internet filter

Australia Sunday defended its plan to block some Internet content, such as that featuring child sex abuse or advocating terrorism, after a media rights watchdog warned it may hurt free speech.

Australia Sunday defended its plan to block some Internet content, such as that featuring child sex abuse or advocating terrorism, after a media rights watchdog warned it may hurt free speech.

The Paris-based Reporters Without Borders (RSF) on Friday listed Australia, along with South Korea, Turkey and Russia, as countries “under surveillance” in its “Internet Enemies” report.

While Australia does not rank alongside Iran or North Korea in terms of censorship, its proposal to place a mandatory filter on the web to remove illegal and extreme material has raised concerns, RSF said.

Communications Minister Stephen Conroy wants Internet service providers (ISPs) to filter the web to bring the online world in line with censorship standards applied in Australia to material such as films, books and DVDs.

“The government does not support Refused Classification (RC) content being available on the Internet,” a spokeswoman for the minister told AFP.

“This content includes child sexual abuse imagery, bestiality, sexual violence, detailed instruction in crime, violence or drug use and/or material that advocates the doing of a terrorist act.”

Under Australia’s existing classification rules, this material is not available in news publications or libraries, and cannot be viewed at the cinema or on television and is not available on Australian-hosted websites.

“The government’s proposal will bring the treatment of overseas-hosted content into line by requiring ISPs to block overseas content that has been identified as being RC-rated,” she said.

“There are no plans to block any other material that is not RC,” she added.

But Geordie Guy, spokesman for the online rights group Electronic Frontiers Australia, said the filter was still a bad idea.

“In the construction of a censorship system like this, Australia will be building the framework for a broader censorship system if this government, or any future government, sees that that is what they wish to do,” he told AFP.


Malwarebytes anti-malware

malwarebytes I have used Malwarebytes for over a year now and it catches many Viruses, Spyware and Malware that my other programs don’t catch.
One good thing is they have a Free Version and a Paid Version.
The Free Version is very good, but only runs when you start the program yourself and you run a scan. There is no difference between the Free or Paid Version on which Viruses, Spyware and Malware will be found and removed. You will get the same protection with both.
No matter which version you get, either one is a must in your toolkit against Malware.

If you can afford it, I recommend that you get the paid version.  It’s a one time cost and with buying the paid version you will get these three benefits.
• Real-time Protection
• Scheduled Scanning
• Scheduled Updating
The best benefit of buying the Full Version is you can “Set It & Forget It”.


best Firefox add-on. MacAfee site advisor

Downloadable files like screensavers, toolbars and file sharing programs can be-or may be bundled with — adware, spyware, viruses and other malicious computer code. Sometimes, the malware is added without your knowledge. Sometimes, you click “yes” or “I agree” without reading the fine print. The end result is often the same – a PC that slows to a crawl, a hidden password sniffer that is used to steal your identity, or valuable personal files destroyed or scrambled.

We download and install each file we find – we even open zip files. We then scan our test computer to see what changes have been made. If a program is determined to be a virus, Trojan, or certain other types of malware, that program will earn a red rating.

image

How Site Ratings Are Determined

Each day, thousands of times a day, McAfee visits Websites and tests them for a comprehensive set of security threats. From annoying pop-ups to back door Trojans that can steal your identity, we find the danger zones before you stumble on them. Here’s what our test computers look for.


microsoft to patch 17 year computer bug

 

17-year-old bug in Windows will be patched by Microsoft in its latest security update.The February update for Windows will close the loophole that dates from the time of the DOS operating system.

First appearing in Windows NT 3.1, the vulnerability has been carried over into almost every version of Windows that has appeared since.

The monthly security update will also tackle a further 25 holes in Windows, five of which are rated as “critical”.

Home hijack

The ancient bug was discovered by Google security researcher Tavis Ormandy in January 2010 and involves a utility that allows newer versions of Windows to run very old programs.

Mr Ormandy has found a way to exploit this utility in Windows XP, Windows Server 2003 and 2008 as well as Windows Vista and Windows 7.

The patch for this vulnerability will appear in the February security update. Five of the vulnerabilities being patched at the same time allow attackers to effectively hijack a Windows PC and run their own programs on it.

STAYING SAFE ONLINE
Use security software that can tackle viruses and spyware
Use a firewall
Apply operating system updates as soon as they become available
Be suspicious of unsolicited e-mails bearing attachments
Keep your browser up to date

As well as fixing holes in many versions of Windows, the update also tackles bugs in Office XP, Office 2003 and Office 2004 for Apple Macintosh machines.

The bumper update is not the largest that Microsoft has ever released. The security update for October 2009 tackled a total of 34 vulnerabilities. Eight of those updates were rated as critical – the highest level.

In January 2010, Microsoft released an “out of band” patch for a serious vulnerability in Internet Explorer that was being exploited online. The vulnerability was also thought to be the one used to attack Google in China.

Following the attack on Google, many other cyber criminals started seeking ways to exploit the loophole.

Also this week, a security researcher has reported the discovery of a vulnerability in Internet Explorer that allows attackers to view the files held on a victim’s machine.

Microsoft has issued a security bulletin about the problem and aims to tackle it at a future date. At the moment there is no evidence that this latest find is being actively exploited online.


what do i really need to protect my computer

QWhat do I really need to protect my PC?

 

Let me start with what you don’t need. You don’t need or want any of the bloated, expensiveIntrusive packages on the market.

Not so long ago, software to companies were content

Produce and peddle programs that solved specific problems

Antivirus, firewalls or antispyware programs, for example. But in the past few years we’ve seen an explosion of “anti” programs. Almost every old firewall program is now bundled with

Antivirus; the old antivirus stalwarts now include antispyware antirootkit, firewall protection andHalitosis prevention

. While the manufacturers claim they’re expanding their reach to help protect

More people from more bad stuff, a somewhat less benign interpretation would lead some folks

To believe that they’re bloating their products so they can charge more

What they want, you don’t need. The Norton’s, MacAfee’s and TrendMicros of the world have

Created monsters. These packages’ Incessant demands for you to pay in order to stay up to date

Are more annoying than a cloying Hawker. Get rid of them.

A good case in point: Zone- Alarm used to make a very good Firewall. Back in the early days

Of Windows XP, I even recommended Zone Alarm, . But I don’t any more. Zone Alarm has turned into a behemoth that causes all sorts of Problems

– firewall, yes, but also Antivirus and antispyware and Identity theft protection (whatever that is). I use AVG, a free antivirus Program; Microsoft’s free Windows Defender; and the Windows Firewall. I run a rootkit Scan on my Windows XP machines From time to time. Vista Users are much, much less likely to be zombified by a rootkit. Antivirus, Windows Defender, the Windows Firewall and hardware Firewall – the kind you find in any ADSL router here you will have all the protection you need and it won’t cost a buck

My favorite antivirus program for many years has been AVG. You can download a copy

That’s free for personal use at http://www.free.avg.com. Make sure you click through to get the free

Version. In my experience, there’s No need to spend any money at All for decent antivirus protection. AVG has come under a lot of fire for sticking revenue-generating Junk in its free product, although they’ve backed off a bit in recent weeks, adding an option to the installer that lets you Bypass their webpage scanner. If you don’t want to deal With AVG’s junky ways, try

NOD-32 (www.nod32.com) or (www.avast.com), both of which are fully capable, nod-32 the best out cost about a buck a week.

Every Windows XP user At least, everybody with a genuine Copy of Windows – should Download, install and use Microsoft’s Free spyware/junkware program Called Windows Defender. Vista users needn’t bother as Windows Defender comes installed.

To download Windows Defender, go to tinyurl.com/5q36co and follow the instructions.

Windows Defender actively Blocks spyware and other kinds of junk. It also has a little-known

Ability to let you control which Programs run whenever Windows Starts. To clamp down on

Obnoxious auto-running programs, Click Start, All Programs, Windows Defender. Then at the

Top click Tools, Software Explorer. In the Software Explorer Window (see the screen shot

On this page) you can selectively disable programs that run at startup. For detecting and removing Rootkits – a task that every Windows XP undertake At least once a week

– You need an industrial-strength antirootkit Program. F-secure backlight did the best job


Are You Considering Buying A Computer

Are you considering buying a computer? If so, it’s worth giving the purchase a good Deal of thought beforehand as this Can save you a lot of money – as Well as much regret later. Most People overbuy, choosing a computer system with more features Than they require, while at the same time not getting what they Need for a good computing experience. Define your needs What will you use the system for Will it be for home or office use Where a desktop system is most useful? Or will it be for travel Requiring a portable? Be aware that while a powerful laptop may Seem the best “one size fits all solution, there may be options that Better satisfy your individual needs. Most home computer jobs require very little computing Power. Common tasks such as writing a note or word processing – Document, working with spreadsheets, sending email and Accessing the internet (including Skype-based telephone calls) require Only a fraction of the power of just about any modern computer. Watching a DVD will use more, but still not very much On the other hand, video editing and authoring will use all the processing Power available and 3D gaming requires serious computer Power and a very capable graphics processor (GPU), features not Provided by mainstream systems on display at local vendors. So, think about what you plan to use your system for and What software you will need. With this list in hand, you’re ready


Slingbox

Jay Tannenbaum, Sling Media

Jay is with Sling Media, makers of the SlingBox, a box which connects to your TV at home so you can watch it anywhere in the world. All local TV stations, all DVR programs. You can watch them online, with your smart phone (via WiFi only), and soon with your PSP. Leo’s been using it all week to stream coverage from CES.

New for 2010 is flash support and H.264 support. So as long as you have flash, you can watch your TV. You can even watch HD in full 1080p! Amazing.


Follow

Get every new post delivered to your Inbox.

Join 460 other followers