Saturday, July 27, 2013

NEXT GENERATION SMART PHONE - UBUNTU EDGE

 In the car industry, Formula 1 provides a commercial testbed for cutting-edge technologies. The Ubuntu Edge project aims to do the same for the mobile phone industry -- to provide a low-volume, high-technology platform, crowdfunded by enthusiasts and mobile computing professionals. A pioneering project that accelerates the adoption of new technologies and drives them down into the mainstream.


What is Ubuntu Edge?

This beautifully crafted smartphone is a proving ground for the most advanced mobile technologies on the horizon, a showpiece for true mobile innovation. And at the heart of it all is convergence: connect to any monitor and this Ubuntu phone transforms into an Ubuntu PC, with a fully integrated desktop OS and shared access to all files. Linux developers are fascinated by converged computing, the idea that the smartphone in your pocket can also be the brain of the PC on your desk. They had shaped Ubuntu so you can transition seamlessly between the two environments. Now all that’s needed is a phone that’s designed from the ground up to be a PC as well. The Ubuntu Edge is our very own superphone, a catalyst to drive the next generation of personal computing.

Hardware
Crafted from cool, textured amorphous metal, the Edge has a distinctive, precise look but its rakishly chamfered edges are shaped to fit naturally in the palm -- the design prototype already has a wonderfully solid feel. It’s the right size, too. Edge gestures are the next big thing in mobile, and testing has found that a 4.5in screen is ideal for comfortable control of all four edges with one hand.


Beyond 300ppi you’re adding overhead rather than improving display clarity. They figured colour, brightness and dynamic range are now the edge of invention so choose a display for its balance of resolution, dynamic range and colour accuracy. Protecting that gorgeous display with something vastly tougher than glass: pure sapphire crystal, a material so hard only diamond could scratch it. For a phone to run a full desktop OS, it must have the raw power of a PC. They’ll choose the fastest available multi-core processor, at least 4GB of RAM and a massive 128GB of storage. The battery will use silicon-anode technology, so it can squeeze more energy into the same dimensions.


With that kind of muscle, this phone can be your main PC anywhere -- and we really do mean anywhere. You can use the desktop wherever you can find a standard HDMI screen, and the dual-LTE chip will get you online with 4G even when you’re travelling abroad. It’s desktop computing gone truly mobile.

Software

Next-generation hardware deserves innovative software. The Ubuntu Edge will dual-boot both the Ubuntu phone OS and Android, and convert into a fully integrated Ubuntu desktop PC.
First, Ubuntu mobile. We designed the interface to create a beautiful home screen that’s free from the usual clutter. You navigate by swiping over an edge of the screen: open your favourite apps on the left edge, switch instantly between open apps from the right, and use the system and app toolbars at the top and bottom respectively. It’s so simple, Ubuntu doesn’t need a home button at all.
Specialist data artists have designed Ubuntu’s welcome screen, with graphics that evolve over time to reflect your use of the phone. We’ve reinvented the inbox so you can read and respond to texts, emails and social media posts in an instant.

Overall Technical Specifications:

  • Dual boot Ubuntu mobile OS and Android
  • Fully integrated Ubuntu desktop PC when docked
  • Fastest multi-core CPU, 4GB RAM, 128GB storage
  • Micro-SIM
  • 4.5in 1,280 x 720 HD sapphire crystal display
  • 8mp low-light rear camera, 2mp front camera
  • Dual-LTE, dual-band 802.11n Wi-Fi, Bluetooth 4, NFC
  • GPS, accelerometer, gyro, proximity sensor, compass, barometer
  • Stereo speakers with HD audio, dual-mic recording, Active Noise Cancellation
  • 11-pin connector providing simultaneous MHL and USB OTG
  • 3.5mm jack
  • Silicon-anode Li-Ion battery
  • 64 x 9 x 124mm
Unfortunately. the project is currently under development. But you can order it now in Indiegogo, the project need a total of $32millions. The campaign will only receive all fundings if they have the amount of money before 21/8/2013. So order it now! Make your dream comes true!

Friday, July 26, 2013

GOOGLE'S NEW NEXUS 7

 During a press event in San Francisco on Wednesday morning, Google unveiled the next generation of its popular Nexus 7 tablet. The first device to ship running Android 4.3, the tablet is both thinner and lighter than its predecessor, and sports a number of other improvements, including a forward-facing camera, a high-resolution rear-facing camera and a brilliant 1920 x 1200 display.

Brilliant Display & Screen Resolution


The Nexus 7 features a 1080p high resolution display, high-end hardware specs, and runs Google’s latest Android OS, Jelly Bean 4.3. Two key features this new OS offers are support for multiple users with restricted profiles — useful if you share a tablet — as well as Bluetooth LE for pairing with wireless accessories.
But the first thing you’ll notice about the Nexus 7 is its screen. It’s now the world’s highest resolution 7-inch Android tablet, with a 1280 x 1920 pixel display — that’s 323 pixels per inch. Google says the Nexus 7 display can show a 30 percent wider range of colors than the original. It can render true 1080p video, and the Netflix app was just updated to take advantage of that capability on Monday. 

Audio


To complete your 1080p movie watching experience, the Nexus 7 features stereo speakers, one located at either end of the device when you’re holding it in landscape mode.

Specs


Inside it’s got a 1.5Ghz Snapdragon S4 pro processor, which offers 1.8 times the CPU power and 4X the GPU capabilities of its predecessor. The tablet includes NFC, so you can share data with other nearby NFC-enabled devices. It also includes wireless charging. Both of these technologies are available in a growing number of Android and Windows Phone devices these days, but due to clunky real-life use cases, have proven a more gimmicky than useful.
And the Nexus 7 isn’t rough on the eyes, either. It’s dominated by “black on black” styling, with the same soft-touch texture as the original that provides a nice amount of grip in your hand. Google also slimmed down the new Nexus. It’s 2mm thinner and 50 grams lighter than before, with a thinner bezel around its edge. The lighter weight in particular should make holding the tablet for long periods (like when you’re watching a video on your commute) more enjoyable.


The Nexus 7 will be available starting July 30th from a number of retailers, including Best Buy, Amazon, Walmart and Radioshack. The tablet will initially come in two varieties: 16GB and 32GB Wi-Fi only for $229 and $269, respectively. A 32GB 4G LTE version of the tablet will be available in the future, unlocked for AT&T, T-Mobile and Verizon customers for $349.

See also: How to secure your Android Device


Thursday, July 25, 2013

HOW TO SEND FRIEND REQUEST EVEN IF YOU'RE BLOCKED ON FACEBOOK

Facebook is a great social networking website through which we can stay connected with friends, relatives and other people. But Facebook does not allow to add strangers as your friends. You might have gone through a stage at least once in your Facebook account when a message appears i.e. your friend request is blocked for 1 day, 3 days, or even 30 days. You can not send friend request on Facebook to anyone whether you know him or not when you are blocked. This is because Facebook doesn’t let to send friend request to unknown people and considers it as spam and therefore temporarily disable sending friend requests when you violate its rules. This is generally done to secure privacy of people and some people by adding strangers as their friend make misuse of that thing. However, sometimes you may even get blocked when you send friend request to known people but there are a lot of friend requesting awaiting approval pending already. I have also gone from this same stage, and feel helpless that we can’t send friend request to dear friends. So today i will tell you an easy trick with which you can send friend request even if you are blocked.
1. Get the person's email address first . 
If you are going to add some unknown person then you need the email address of that person to whom you are going to add. After you get the email address of the personal whom you want to send friend request either from his profile or any other way,
2. Visit Add Personal Contacts as Friends.
3. Here you can send friend request even if your are blocked by using their email address. 
4. If you want to send friend request to lot's of friends here is an quick and easy way to do this.

5. Open up a new notepad file,paste all your friends email separated by comma (,)
6. Save the notepad file with the extension .vcf  
7. This is your list of your contact files containing your friends email address.

8. Go to Add Personal Contacts as Friends click on the last option other tools there you can find upload contact file. 

9. Browse your .vcf file and upload to the facebook.
10. It will send friend request to your friend's by email and facebook.
VoilĂ ! Now you can be friend with your beloved Girl Next Door or a 6 feet 3 Goldilocks!

See also: HOW TO SECURE YOUR ANDROID DEVICE

Wednesday, July 24, 2013

10 TIPS TO SECURE YOUR ANDROID DEVICES

The rapid adoption of mobile devices such as smart phones and tablets has created a significant security challenge for companies and IT professionals. This article help you meet this challenge with HP Fortify Mobile Application Security solutions. They give you the most comprehensive, automated and advanced mobile device security protection available for your enterprise. Whether your applications are developed in house, procured from third-parties or running in production. With the latest Android is coming up, I think I should cover the subject briefly.

1) Do Not Save All Of Your Passwords

Many users tend to save their passwords to online services and sites on their device, never once thinking about what it would mean to a person who got their hands on the phone. Avoid having all important passwords saved in your device particularly when it comes to banking or payment apps.


2) Use Android In-Built Security

If you are running on Jelly Bean, you can have a screen lock and encryption enabled to further enhance your security. There are many types of screen locks available for you to choose from such as passwordpinpattern and face unlock, available in your Android settings. Even when setting pins or pattern locks, try not to make it easy for hackers to guess your password.


3) Lock Your Apps

It is necessary to lock your apps, especially the ones holding private information that you wish nobody but you could see. This is a second layer of security to prevent anyone from using your lost device particularly if they have managed to bypass your locked Android.
You can use a free app like App Lock for this exact purpose. The idea here is not to lock every single app in your device, just really data-laden ones like your email apps or file managers.While you at it, avoid using a combination of a pin or pattern lock that can be traceable from the smudges of your screen (Yes, it is traceable).

4) The Importance Of App Permissions

Before you begin installing an app from Google Play, a list of requested permissions will pop up to show you what permission the app requires. Apps require permissions to do things but not all of them are necessary.
Always read through the permissions to make sure they make sense and correspond to what the app actually does eg. an alarm app does not require a permission to access your text messages. This is a real important step because not all apps in the Play Store are safe.
While you’re at it, make it a habit to read the comments as well as the rating of the app that you are going to download. This helps you understand more about what the app really does without trying it out firsthand.

5) Securing Your Network

One of the most important thing in protecting your Android is to secure your network. Try to avoid using public WiFi whenever you want to do something important like doing your banking online. As long you are sharing the same network with the public, they can easily sniff out your packets and translate it into actual data of your private information i.e. your passwords.
You can protect your information by using apps like Hideninja VPN so that your outgoing connection is always encrypted, making it harder for anyone to sabotage your data. If you suspect that your device is being attacked, WiFi Protector can help fend off these attackers. To further enhance your network security you can apply settings from SecDroid but note that this app is only for rooted phones.

6. Use Mobile Security App

It will make your job easier to have an app that handles most of your security issue. Find a mobile security app that you are comfortable using, for example: Lookout Security & Antivirus and avast! Mobile Security. Even with a security app, you shouldn’t let your guard down as Android malware is getting stronger and more rampant, which brings us to the next tip.

7) Create Multiple User Account To Protect Privacy

If you own an Android tablet and have to share it with a sibling, a spouse, or your kids, having multiple user accounts will help each of you protect your privacy. In Jelly Bean for tablet, there is an option for you to create multiple user accounts. You can create another general account for anyone who wants to use your device. The option is under the Settings > Users section.

8) Prepare A Backup Of Your Data

A backup of your precious data is a must-have in the day and age of smartphones. Picture the worst case scenario where your Android device has been stolen or hacked. The last thing you can do is perform a remote wipe (see #10). Without a backup, you will lose all your information in your device.
Even if you could retrieve your stolen phone, chances are that hackers that have managed to access your device will render it useless. If you have a backup however, you can still restore your Android device back to its original state. You can choose to backup important information to the Cloud, your desktop or even to a flash drive, for insurance.

9) Track Your Lost Device

So you have a backup already but you really want to get your lost device back. Well, as the smartphone industry would have it, your phone is built to be trackable, via GPS. The catch is, you have to enable GPS on your phone for it to be tracked. Fret not because, there are plenty of device-tracking apps for Android that can help you locate your lost or stolen device, some can even turn on the GPS on your phone remotely.

10) Enable Remote Wipe

So you are at the point where you have everything installed and ready to go. But, you still need one last feature – the ability for you to wipe your device remotely. This is necessary, especially when you are sure that your Android is lost (forever). There’s no crying over spilt milk now – we can only prevent them from turning it into cheese.
I recommend 3CX Mobile Device Manager because it is free and easy to use. You can sign up for the account here and let just hope that the day you need to use their remote wipe feature will never come.



Tuesday, July 23, 2013

How to Override Windows password

I have found for you a very easy and effective method for breaking windows Password with this software you can easily break Administrator password , user account passwords . In fact, I had tried it myself recently, by breaking into one of my own Laptop (this is how you do Pen-test). You can also break advance level of passwords like SYSKEY password , Facial Expression Password , and Thumb Recognition passwords. the SKSKEY password is very strong password if you forget the password there is no option to recover this password .you will have to install new windows. But now there is no need to install windows .you can easily break any password of windows in any OS. If you have forgotten your password, or your computer is locked out, or you do not have access to the password of the system, you only need to boot from this software from CD/DVD/USB to reset your lost password. Then you can get back into your system in a minute. No need to call a technician, no need to re-install anything, and you certainly don’t need to reformat. It's very easy, if you follow step by steps. Remember, this is just a brief coverage on the subject, you can always learn more about it by searching it on Google. Good Luck 

Download ISO File ::  Windows Password Recovery

5 Places let you Hack like a Pro

There’s a caveat that I have to share before diving into these sites. Hacking isn’t a single subject that anyone can pick up overnight. In the title of this article, I mention hacking like a pro. This can not be accomplished after reading one article and visiting a few of these sites – the phrase is used to imply that in time and with lots of practice, you can in fact learn to hack like a pro.
For our many readers that are already at that expert-hacker level, a few of these sites may not be for you. They may feel to simple and basic – for “script-kiddies” as some might say. The truth is, we all had to start somewhere, and these websites are offered as a starting point for those people just embarking down the wrote toward hackerdom.
Your intention for learning how to hack is completely your own. I do not judge. However, it should be noted that there are two forms of hacking – “white hat” and “black hat”.  White hat hackers call themselves “ethical hackers”, in that they find vulnerabilities simply to make systems and applications more secure for everyone. However, there’s a whole othercommunity of hackers – the black hats – who find vulnerabilities only to exploit them as much as possible. Now that you know what sort of community you may be entering, let’s get on with the list of top sites where you can learn to hack.

 1) Hacking Tutorial: Tech Tips and Hacking Tricks

Sometimes, perfect English isn’t everything. Hacking Tutorial is an example of when the writing skill of the author doesn’t necessarily equate to the quality of his or her technical knowledge. This is actually the case over at Hacking Tutorial, where the author offers articles like “Client Side Attack Using Adobe PDF Escape EXE Social Engineering”, “Exploiting MS11_003 Internet Explorer Vulnerability”, and “Hacking Using BeeF XSS Framework”.


The articles are usually short, but actually offer highly technical, step-by-step instructions on how to do the task at hand, and the tricks and tweets absolutely work, unless the exploit has been patched.  It’s a small blog, but it’s a good one for the volume of technical tricks that you’ll find there.

2) EvilZone Hacking Forums

EvilZone is one of the largest forum communities that you’ll find on the subject of hacking. With over 13,042 members and over 50,000 posts (and counting), this community likely has the skills and knowledge to answer any programming question you could possibly have. Just be careful about coming across as a “noob” – these guys don’t handle newcomers with kid gloves, so be careful.

You’d definitely be best off working through the programming and encyclopedia sections first, where you’ll find areas with projects, tutorials and a lot more that will help you become educated and well-versed in hacking techniques and terminology.

3) Hack a Day

We have "Computer hacking", "Hardware hacking" and many else in life can be hacked! Hack a Day definitely offers an amazing library of information for anyone looking for specific categories like cellphones, GPS or digital cameras. Over the years, Hack A Day has transformed the site into a fairly popular blog.



More than any other site, this particular “hacking” site is very much hardware based, and they redefine the meaning of the word hacking by helping you learn how to hack up electronic devices like a Gameboy or a digital camera and completely modifying it, or building electronics for the sole purpose of hacking other commercial devices. You’ll also find a popular and busy forum section as well – a high point of the site.


While I personally don’t find the articles themselves very detailed (as an EE, I like schematics and elaborate descriptions), the site makes up for it with video demonstrations throughout.

4)  Hack In The Box

Hack In The Box has really change significantly through the years. It is rebranded as HITB, and the site is completely transformed into what looks like a WordPressed-based platform. Still, today Hack In The Box remains focused on security and ethical hacking. However, it has obviously shifted gears at some point and changed to a more content-focused approach with a greater volume of news, and fewer in-depth articles with detailed hacks.


This transition makes it less of a place to go for actually technical hacking tips, and more of a daily spot to get your latest fix of hacking news. The site is updated frequently, and of course you can also go for the print version of the HITB-branded magazine if you want.

5)  Hack This Site!

As always, saving the best for last – I’d like to introduce Hack This Site! This website is one of the coolest, free programmer training sites where you can learn how to hack accepting one of the challenges along the left navigation pane of the main page.


The site designers offer various “missions,” where you need to figure out the vulnerability of a site and then attempt to use your new-found hacking skills (you’ve carefully studied all of the articles on the site, right?) to hack the web page. Missions include Basic, Realistic, Application, Programming and many others.

But before you start learning Computer Hacking, be sure to learn a few more Computer Operating system first. As you know, people doesn't use the same OS, some using Windows, some is using Linus-distros and so on so forth. If you’re able to figure out how to properly hack any of the most difficult missions on this site, then you’ve definitely earned the title of professional hacker.
Have you ever tried any of the tips offered at any of these websites and do they work? Do you have any good resources of your own for readers to learn how to hack like the pros? Share your insight in the comments section below.