Wednesday 17 June 2015

// // Leave a Comment

Apple iOS 9 to give four extra hours of iPhone battery life

Apple has unveiled the next update of the iOS iPhone and iPad operating system, which includes a new intelligent search assistant, greater speed and security.
The Guardian reports that the free update to be available in September, is aiming to refine features and styles implemented last year with iOS 8, instead of launching big new features.
ADVERTISING

It quoted Jony Ive, Apple's Chief Design Officer, as saying that Apple is concentrating on optimising iOS to run smoother and faster with lower power consumption, adding an extra hour to the iPhone's battery life. He also said that an additional low-power mode will add another three hours of iPhone battery life.
The new search assistant that is an advance on Apple's Spotlight search facility, integrates with Siri to create a Google Now competitor, capable of displaying data from apps and the web, and controlled via text or voice.
Apple iOS 9 to give four extra hours of iPhone battery life
Siri can now offer directions based on invitations pulled automatically from email, as well as when to leave reminders based on events.
The information displayed is context sensitive, including the ability to understand that the user is looking at something in particular when they say "remind me about this later today".
Users can plug in headphones in one location and always get the music app, for instance.
Apple's search app Spotlight will also be able to pull information straight from the web and apps such as recipe app Yummly.
Siri will also be able to search via voice for photos and other apps.
Apple has also launched a new news aggregation app called "News" - a Flipboard-style interface for content from third-party publishers including the New York Times and ESPN.
It will be available in the US, UK and Australia.
Videos can also be played in a picture-in-picture windowed mode, while the virtual keyboard gained text editing features and enhanced support for bluetooth keyboards, taking aim at Windows tablets and laptops.
One of the big changes will be in the sizes and speeds of apps built using Apple's Swift language. The programming language, open sourced by Apple, will form an integral part of the new operating system.
The operating system will also take up a smaller amount of space on the device, requiring 1.3GB of free space to install. iOS 8 required more than 4GB to install, which caused issues for users requiring them to delete apps.
Security has been improved in iOS 9 to help fend off hackers. Stronger end-to-end encryption will be used for syncing information such as notes and reminders, while a new set of security extensions will prevent unauthorised access to secure files.
Read More

Tuesday 16 June 2015

// // Leave a Comment

Facebook Hacking techniques!

1. Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.


 


2. Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

 

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it's still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.

 

6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software's used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.

 

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

 

8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.



9. Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.
Read More

Tuesday 2 June 2015

// // Leave a Comment

5 Tools to Maximize Your Productivity

Two non-sports related articles in one day?! Who are we kidding... if the blazers, dodgers, or oregon ducks arent playing... Is the world ACTUALLY turning? Here at the Dodger blog we are always trying to get better in the off season. So lets be savvy and productive while we wait for another day of meaningful sports...

Frank Addante, CEO of Rubicon Project, came up with this list of his favorite productivity tools.

1.  SaneBox: Smart Email Filtering Tool

SaneBox uses advanced algorithms to organize your email into low and high priority buckets. It works with any email client, email service or device. I was slightly hesitant about handing over control of my inbox, but I honestly don’t know how I ever lived without it.  SaneBox has saved me hours of time and works amazingly well.
Check your @SaneLater folder (low priority email) twice a day and mail from senders you don’t want to hear from again to @SaneBlackHole.
http://www.sanebox.com


2.  Evernote (Organizes your notes):

Evernote stores your notes in the cloud and makes them accessible from any computer or device.
Tips:  Evernote is for business and personal use. I use it to take all of my meeting notes and jot down general personal items.  I also use Evernote to scan/fax important documents that I need to keep on hand. Evernote is also helpful for keeping track of project notes and critical documents such as driver’s license, passport, insurance documents, etc.

3. Consolidate your social networks: HootSuite

This website allows you to use Twitter, Facebook, LinkedIn, Yammer, and others all from one place.

Tips: I tend to have pockets of time when I can read and post on social media. Try HootSuite's new "auto schedule" feature, so you can spread out your posts and don't flood your networks with many in a row.


4. Store your documents in the cloud: Google Drive

While many people talk about Dropbox and Box, we are extremely bullish on Google Drive. You can securely file away your digital documents in the cloud, so you can find and work on them from any computer or mobile device later. Plus, it seamlessly integrates with Google Apps.

Tips: We create a specific Google Drive folder for every client with the same sub-folders every time. This serves as our document and project management tool, plus Google Drive allows us to share specific files or documents with specific people.


5.  Assemble your travel plans: TripIt

TripIt files all your itineraries in one place. You can even have it automatically send your itineraries to your significant other, kids, or always-worried mom. The Pro version alerts you of flight delays and gate changes.

Tips: Download the mobile app and put it on your home screen. Create a contact for plans@tripit.com and forward all itineraries to that contact.
Read More

Monday 1 June 2015

// // Leave a Comment

Windows 10 Will Be Available July 29

Microsoft kicked off June with news that Windows 10 will ship on July 29, just a little under two months from now. The next big update for MS is designed as a unifying platform that will offer continuity across mobile, desktop, tablets and even the Xbox One gaming console, and it will be a free upgrade for Windows 7 and 8 users for the first year. To help ensure easy updates (and probably as a way to try to get a large installed base of Windows 10 users right away), Microsoft is also using a “reservation” system that allows users to sign up to be notified when the update is available, and to schedule it to install when you want.
A big new feature addition for Windows 10 is Cortana, so here’s a message the company prepared from its virtual assistant ant announcing the news.
What else do you get? Well I’m glad you asked – here’s a quick look at the highlights:
  • Microsoft Edge: The successor to Internet Explorer, designed around minimalism and collaboration tools, plus with Cortana integration.
  • Word, Excel and PowerPoint built in.
  • Xbox Live and Xbox app for doing things like recording gameplay, interacting with your Xbox friends and also streaming Xbox games to the desktop.
  • Windows Continuum, which lets you smoothly jump between multiple Windows 10 devices, and which lets you use your phones like a PC with external input accessories.
  • Windows Hello, a new login method that uses face, iris or fingerprint recognition to log you in without a password, depending on hardware support.
Microsoft is doing everything it can to make the transition smooth, like ensuring it’ll work with your existing applications. Windows 8 was sort of an awkward generation, so here’s hoping the skipped numeral results in something that suits everyone’s needs.

Read More