Tuesday, 5 August 2014

Facebook Official App now updated with awesome features for Windows Phone



Facebook just received an update to version 8.3.1.0, now gets the same features as the Beta, So we are now talking about to find important improvements, You will notice at first glance. Its interface is completely redesigned and Microsoft added new languages ​​and more other awesome features.

Back in the days what changes they made in Official Facebook App ​​were great. But now they made Improvements in notifications to make them faster and more reliable, chat notifications, a new design for the main screen, side windows, events, groups, pages and photo albums, messaging and much more. In short, many changes in recent versions.

The change log for the app bumps the version number up to 8.3.1.0 and adds the following new features:
  • Interface design renovation
  • Improved performance
  • Improved Video Upload function
  • New languages ​​available
    This update will make you see your friends online, share updates, photos and videos. Also receive notifications when your friends leave you a comment on your posts and give "Like". So, Don't miss the power chat and have group conversations . All this you can do it from your smartphone comfortably.


    Windows Phone Store : Facebook (Free)

Monday, 4 August 2014

End Your Shame It's Time To Convert Your Macbook into a Microsoft Surface


Awesome Surface Pro

Well we guys have spent approximately a grand on the new "Macbook Pro". How do you fancy spending a lot more than that time, all over once again, to mod your laptop to resembles a Microsoft Surface?

From the the cult-like Apple worship practiced through covens of fanbois and girls, we could reckon in which few people would undertake the offer associated with turning their Macbook into an Microsoft Surface.

But the optimistic bods behind a new project called Mod-book beg to differ. They reckon men and women will spend approximately $2, 999 to show their "Macbook Pro" into a Surface knock-off, recognizing Apple authority to wrench over screen and put it to use as a tablet.

Obviously, there is a finance drive now running on Kickstarter. It may even more successful. So how do the ModBook bods over in Chicago propose to desecrate your awesome shiny new "Apple" product?

So, The Modbook Pro X, like it is predecessors, strives to become respectful citizen from the Mac OS ecosystem, " it is creators wrote. "Our hardware modifications are designed to preserve native functionality as a way not to  the base operation normal system.

MacBook X
"As Our most experienced Mac developers create the software application and hardware to the Modbook Pro, in tight adherence to all or any applicable Apple Mac Developer guidelines in addition to Apple design rules for accessories to products."
What this means is that you send ModBook a Macbook and they send it back as a two-piece device, with the high-resolution screen detachable from the keyboard.


It also have a "digitizer pen" to permit guide on-screen scribbing. This gadget offers 2,048 Pressure levels, pen tilt and rotate functionality and a digital eraser.

Various keyboard have got shortcuts buttons on the back, permitting you to rapidly navigate away from sensible pages when a wife/manager/guardian/delicate member of family walks past.

On Kickstarter you can purchase the mod at an expense of $2,299, which is lessened from the original cost of $2,999. Then again, on the off chance that you can't face purchasing a Macbook, you can please up to $5,689 to get a high controlled Apple smart phone which comes preruined, an aggregate which is $800 lower than the possible expense of $6,588, which will get you a Modbook with 2.8ghz Quade-Core Intel i7 processor, Intel Iris Pro 5200 and NVIDIA Geforce GT 750m resolutions, 16gb RAM and 512gb Pcie streak storage drive.

Awesome Surface Pro, Surface Pro Details

You can just about imagine them considering purchasers with more cash than sense.

"I've to say, truly, what does Jony Ive or his group know in any case?" they may ask. "Why would anybody with serious cash trust one of the most respected design squads in the world, when they could just spend $6,000 and get a mashed-up Macbook from us?"

For register your interest in destroying that lovely Macbook of yours, pledge some cash at Kickstarter.

With 34 days to go and $51,773 promised out of an aggregate objective of $150,000 (at the time this story was delivered), there are possibly people rich enought to do this.

To them we say: go forward and use. Be that as it may give us a tenner to start with, if you don't mind as we can tell you've got a couple of sway thumping about. ®

Friday, 1 August 2014

Yes, Of course Now Hackers Could Easily Build an iPhone Bot-net, Thanks to Windows


The reminder to the Apple and smug iPhone Publishers: Simply because iOS is not certainly the victim of an widespread "Malware" outbreak doesn’t mean iPhone hacking isn’t still possible. Now one selection of security researchers plans to show how to enslave a full bot-net of Apple gadgets by way of a perennial weak point their connection to vulnerable Windows Computers.

In a study they will reveal in the future soon, Georgia Tech manufacturer assembled : The pieces should need to build a "Fully Controlled" collection of hacked iOS devices despite Apple’s sealed limitations on software lodged in iPads and iPhones. Georgia Tech Manufacturer haven’t just created the full, working exploit to the mobile operating system yet.

They've also identified a huge slice of "Malware infected" Windows machine around (23%) percent of the people they tested that regularly get connected to iOS devices and may easily be used to deliver the Rush-Attack!!

They also say that blueprint with an iPhone bot-net should serve totally a warning to Apple Publishers that despite the devices. Flaunt Security-Protection, it could do a lot more to screw, iOS hackable vulnerabilities more quicker.

(Many of you guys believe wide-ranging infections of iOS gadgets ain't possible. We would like to show that is not a fact, "Tielei Wang" Says: Certainly one of three researchers who will present the research at the Black Hat security conference in a few days and at the Usenix security seminar later this week.iOS itself is extremely secure. But when you consider the full ecosystem, you are able to see that PCs play a significant role, and they’re very probably be compromised. That leaves the iPhone in the mousy state too.

Apple is gonna blame Microsoft as much as it deserves. The researchers created their attack mainly from bugs Apple is actually aware of but neglected to fix. Most of the vulnerabilities they used originated from a jailbreak exploit called “evasi0n” that published by hacker obviously in December to let iOS people put off Apple’s software package restrictions.

As Apple released iOS 7. 1 Version, several months later, this Georgia Tech researchers say, the company repaired just three out of eight vulnerabilities this jailbreak had joined together.

The rest of the bugs that Apple did not patch, along having two new vulnerabilities the researchers discovered themselves, allowed the "Georgia Tech team" to reassemble the full iOS exploit that will definitely give a hacker complete control of the phone.

The Georgia Tech team researchers say their attack shows Apple could do more to fix known vulnerabilities.

For some outwardly superficial bugs, Apple does not often care very much. But from the attackers standpoint, these superficial bugs can equal to very important attacks says Wang. We actually wanted to show that vendors required to be very careful concerning to their vulnerabilities and fix all of them.

This Georgia Tech Founders say they aware Apple about their exploit a lot more than three months ago, but the firm still doesn't patch the particular bugs they utilized. Even after, they don’t decide to release the code for their "iOS exploit" on Black Hat because doing this would violate university or college policies. But they will describe the attack in little detail, both at "Black Hat" and in their Usenix paper.

There will be no code, ” claims Georgia Techs Yeongjin Jang. But if a number of the other developers recognize our talk, they may reproduce the complete work.

An Apple spokeswoman told TELEMEEN this company works "indefatigably” to guarantee the security of the hardware, applications and software, and promised the other remaining security will be fixed soon. “We appreciate the knowledge Georgia Tech presented to us and still have fixes in a future software update that address the difficulties they shared, ” she wrote in the review statement.

The master limitation to this researchers. Work, which possibly convinced Apple never to rush out some sort of fix, is that the exploit is “tied up. ” Like the evasi0n jailbreak it’s largely depends on, an iPad or

iPhone initially will need to be plugged into a computer for the hack to operate. That’s a minimal inconvenience for users wanting to jailbreak their i-phones, but it presents a more serious barrier to be able to hackers hoping to use it for harmful ends.

And Now For Android dominating smart phone market share in addition to presenting a more supple target to "Hackers", the large-scale transmission Georgia Tech’s researchers describe is probably not worth a profit-motivated cyber-criminals. But the identical techniques and vulnerabilities they can double for more discerning hacking. And if Apple wishes to prevent those more finely-targeted attacks, it may do more–and take action faster–to fix your bugs that help them.

As Anonymous (Cyber-Hackers) Be Like:

Wednesday, 30 July 2014

An Infrared iPhone 5 Case Enables you to See Behind the Walls



A smartphone case industry is starting to move away via bling-encrusted cheap tat and in the realms of (useful accessory).

FLIR systems is doing just that and invented a superb case for Apple's i phone with thermal-imaging abilities, which it disclosed at CES earlier this year but is finally about to take sale. The FLIR Is actually an iPhone 5s case with both a great infrared camera along with a VGA one that’s purported to add depth and detail infrared images as well.

The product works by combining heat signature information it gets from your infrared camera with all the live camera image from your iPhone. This then delivers a amalgamated thermal heat graphic images. The result you'll receive a negative-type image with the various heat levels in numerous different colors – shiny red and whitened being hottest.


 The facts in the used for it, FLIR Systems explains that will probably be useful for pinpointing the position of pipes inside the walls, finding weak spots with your home’s insulation, finding hidden animals throughout bushes and discovering leaks before that they cause serious destruction.

You guys are able to take time lapse and also panoramic thermal photographs, whilst being in a position to edit and share what they’ve grabbed. The case has its very own battery pack, which usually holds a 2 hour charge, and weighs on the same as your any smartphone. It retails for around 350 Bucks and will be available in August.
 Rise of the smart-case

Smart cases are usually in vogue. Sure, there’s still this odd 24-carat gold case boating, but there’s also a new trend in high-tech case accessories.

The group at Vysk Communications allow us a phone case that, according to its inventor Victor Cocchia, helps make your iPhone “unhackable”. Known as the QS1, the 230 Bucks case has a unique circuitry, its own battery power, microphone and  shutters that physically block the leading and rear dealing with cameras.


So, guys that approach is that your current calls and text messages can’t be monitored considering that the encryption happens inside the phone, and not about the (compromised) software installed in the phone. Cocchia explained to us:

"The encryption is going on on the electronics chip. The communication then experiences the phone, and this way there is none other way for someone who is gonna take control of the phone to listen to what you’re actually talking to" He says.

"After it we plain in case any of those were compromised, we'd put a mechanical device in the phone that actually jams the microphones."

 Security experts is not able to point out a flaw inside the QS1, yet. But doubts are actually raised about the lack of open source rule. Egemen Tas, vice us president of engineering on security specialist Comodo, explained:

"In order to gain the self confidence of private, anonymous or sensitive users and have a wide spread adoption they need to make their key technologies open source and available to an independent examine."
Related Posts Plugin for WordPress, Blogger...