Tuesday, February 23, 2016

This is what the ‘i’ in iPhone means

Ever wondered what “i” in the iPhone stood for? Here is the answer!

Apple has been naming its devices with a i prefix. We have the iMac, iPod, iTunes, iPhone, iPad all of which have the omnipresent “i” prefix since the release of the first iMac in 1998. Have you wondered what the “i” in all the prefixes means? Why Apple prefers naming its products starting with a “i”.
Well there have been many answers to this question. In fact last week, Internet has been abuzz with Apple fanboys remembering exactly what Apple’s “i” stands for. We briefly try to answer the question.
In 1998, at an Apple event in 1998, Steve Jobs introduced the iMac. Jobs explained the link between “i” and “Mac.”

“iMac comes from the marriage of the excitement of the Internet with the simplicity of Macintosh,” he said. “We are targeting this for the no. 1 use that consumers tell us they want a computer for, which is to get on the Internet simply and fast.”
In 1998, the “i” in iMac stood for Internet. Jobs followed these statements with a slide that expanded upon what else the “i” means to Apple:
iAppleSlide
Besides Internet, Apple’s prefix also stood for individual, instruct, inform and inspire. It should be noted that Apple didnt have Internet in mind when naming the iPod and Internet in the “i” came much later.
When the iPhone was announced in 2007, one of its three key ingredients was Internet communication, bringing the “i” back to its original intended meaning of Internet. (The other two fundamentals were music and phone calls.)

Since then, “i” for Internet has lost the meaning because all the Apple products now have some form of Internet connectivity built in. But as Apple grows, the “i” has emerged has some soft of brand niche for Apple. Though it abandoned the “i” while branding its smartwatch and TV boxes. Instead of iWatch and iTV, we have Apple Watch and Apple TV.
But sooner or later, Apple will return to its iconic “i” because it sells!

It’s official: Facebook Messenger for Android supports multiple accounts

Facebook Messenger now supports multiple accounts, but only for Android devices

Facebook has officially launched the multiple account support for its Messenger, which it had been testing for a while now with beta users and some non-beta users. This feature would allow multiple people to log in and use Messenger from a single device.
According to Facebook’s post, messages will remain private amongst accounts, so you can use and pass someone else your phone and need not worry about them reading your messages. “The beauty of this new feature is that your messages stay completely private. Anyone else who shares the device will just see the number of notifications of messages that you have, but they will never be able to see the content of your messages.”
Facebook wants families to be able to potentially be able to use Facebook Messenger while sharing the same device. This is how the new feature can be activated in Facebook:
– In the Messenger for Android settings, look for a section called ‘Accounts’.
– Add the accounts related to each person – signing up with Messenger. You are not required to be logged in Facebook for this.
– The first time someone switches from another account on a phone to their account, it will require a password. After this, the user can choose whether to require a password each time they access their account, or leave it open for anyone to access.
While users can see notifications for new messages and unread counts for all accounts on their shared device, the actual contents of an account’s messages will only be visible if you switch to that account. However, if you want to stop sharing a phone, you need to simply remove your account from that particular device. If accounts are password protected, the number of new messages they have will show up in-app.
Currently, the feature will be available only for the Android version of Messenger. However, there’s no word on when the feature will roll out to iOS users or the Web versions of Messenger. Unfortunately, till then they will have to keep signing in and out if they want to use multiple accounts.

World's first smartphone with 6GB RAM and Snapdragon 820 processor World’s first smartphone with 6GB RAM and Snapdragon 820 processor

Vivo to unveil world’s first 6GB RAM smartphone

The fight for those extra GBs will continue this year with Vivo planning to launch the world’s first smartphone with 6GB RAM. The Chinese smartphone manufacturer will be launching Xplay 5, its flagship smartphone on 1st March before any other company has a chance to launch world’s biggest RAM smartphone.
It was earlier reported that Huawei would launch its P9 with 6GB RAM to take the honours of being world’s first 6GB smartphone. But according to reports, Huawei P9 may not have 6GB after all, thus paving the way for Vivo.
Vivo is leaving no stones unturned to publicise the massive RAM in its Xplay 5. It has already started releasing teasers which detail the awesome Xplay 5 configuration. According to GizmoChina, the Xplay 5 will have 6GB RAM and Qualcomm’s Snapdragon 820 processor to make it perhaps the most powerful phone yet. Aside from the powerful hardware configuration, we also know the Xplay 5 will come with a dual-edge display that will probably support Quad HD (2560 x 1440 pixels) resolution.
Vivo XPlay 5 6GB RAM
While Vivo has kept other specs in dark to create hype, rumors suggest that Xplay 5 could have a 16-megapixel rear-facing camera, an 8-megapixel camera in the front, and a massive 4,300 mAh battery.
If no other smartphone maker manages to hoodwink Vivo and come out with their own 6GB offering by 29th Feb, then Vivo Xplay 5 will become the world’s first handset to pack such a high amount of memory.
While Vivo is publicising the Xplay 5 with gusto, it has so for not revealed the price of the fact whether Xplay 5 will be available for users outside China.

Can a broken Android phone be turned into a toy robot? Yes it can!

Tired of keeping your broken Android phone as a worthless paperweight? Try this instead!

Smartphone repairs are hard to execute and can sometimes result in the entire device going up in smoke rather than tackling the hardware issue that was found in the first place. This happened with an Android smartphone owner who also owns a YouTube account ElectroBOOM. His smartphone’s integrated power-management circuit apparently blew, rendering his mobile phone completely useless, at least that is what he thought after he decided that there was another use for it after all.
Thanks to the combined efforts of ElectroBOOM and his daughter, they tried to come up with several ways to salvage the parts of the device that still worked. So what were they able to create after accumulating all the parts together? An adorable toy robot whose primary body comprises up of the head of a toothbrush.
broken-android-robot
This is how the talented duo were able to transform the broken Android phone into a toy robot; after taking the phone’s vibrator module, a coin cell battery, a switch and some wire, both of them mounted these items on top of the top of the toothbrush head. Flipping the switch would make the device vibrate, which resulted in the toothbrush head move around in circles.
While it might not be the most sophisticated of creations to be made from a broken Android phone, it is still better than having a device that would be sitting around powered off as a paperweight or be turned to scrap after it has been discarded in a trash bin. There is a video posted below showing how ElectroBOOM and his daughter were able to make this creation so watch the video and tell us what you think.

like us facebook Click here

Tuesday, February 16, 2016

This Wi-Fi can only be accessed by squeezing a banana

Gooey Wi-Fi : You can only access this Wi-Fi by squeezing a banana

Every office has a unique Wi-Fi password which guest need to access the Internet. This office has a unique Wi-Fi which can only be accessed by squeezing a banana. Yes, you read it right! You need to squeeze the banana to access the guest network in this office.
The contraption is designed by Danish network engineer Stefan Milo and made by wiring a piece of fruit to a Makey Makey board and a Raspberry Pi mounted on acrylic glass. According to Milo, the cost of this contraption is $100 but the fun it provides to guests is immense.
The Register notes that this is perhaps the most novel way of accessing Wi-Fi. Milo told The Register that most offices normally have a ticket-based system that physically prints a code unique for each visitor. Guests have to get the unique code needed for accessing Wi-Fi network.
Video Player
Error loading this resource
“When you go to $corp, and the receptionist hands you a small piece of paper that someone printed out on an A4, and then spent time on cutting out into small pieces, I cringe,” he explained. “Even if you have a small voucher printer, it still involves the receptionist, installing of the printer, support when the printer driver effs up etc. And it still involves paper – what is this? 1999?”
Exasperated at what he saw, Milo decided to design his banana squeeze novel way for accessing Wi-Fi. The gadget is based on a simple bash shell script on Raspberry Pi. When a banana is pressed by the guest needing the Wi-Fi password, Milo’s script is triggered via the Makey Makey board. This activates the Raspberry Pi which will then show the key on its monitor. The user then enters that key as their guest login credential.
Milo told The Register that his banana contraption will be able to serve only five guests a week, but with a simple expansion of the voucher file (and regular banana changes), the setup could run for years on end, accommodating thousands of office guests.

If you are interested in Milo’s banana squeezing Wi-Fi password is worth a try, he has published the details on a Reddit thread here.
“It’s important to me that tech is useful,” he said, “but if you can put a smile on peoples’ face while they’re using it, then I’m a happy packet-pusher.”

Facebook to introduce 3D Touch on its iOS FB App

iPhone users can soon use 3D Touch with Facebook App

Here is some good news for all iPhone 6s and iPhones 6s Plus users as Facebook will introduce 3D Touch within the FB timeline and News Feed. However, the latest 3D Touch tricks will be initially rolled out to ‘a small group of people’ with everyone else getting it ‘over the coming months.’
In conversation with TechCrunch, a Facebook spokesperson said, “We are excited to start rolling out support for 3D Touch in our iOS app so people can quickly and easily peek into a preview of anything they are interested in on Facebook, and pop into that content to see more.”
3D Touch will allow users to hardpress on FB timeline posts to preview content and take further action on the options instead of tapping and swiping
The 3D Touch feature in Apple smartphones was codenamed ‘peek and pop’ and was introduced on Apple’s new smartphones last year. Many developers are yet to take full advantage of the 3D Touch option in iPhones.
Facebook App will soon have this feature which will work with web links, profiles, Facebook Pages, Facebook Groups, Facebook Events, photos, profile pictures, and cover photos.

Lenovo’s SHAREit App for Android and Windows found to leak passwords

Lenovo’s SHAREit App for Android and Windows smartphones has multiple vulnerabilities

SHAREit is a popular App for Android smartphones and Windows Phone which users use to transfer large files between two smartphones. The App which has been developed by PC maker, Lenovo, transfers files very quickly between PCs and smartphones using Wi-Fi and has upwards of 5 million downloads world over has been found to besieged with multiple vulnerabilities.
The researchers from Core Security’s CoreLabs have discovered that the SHAREit App can leak information as well as passwords due to flaws. According to the researchers, Lenovo SHAREit version for Android 3.0.18_ww and Lenovo SHAREit version for Windows 2.5.1.1 were found to have multiple vulnerabilities which could result in integrity corruption, information leak and security bypasses.
According to the CoreLabs researchers, the SHAREit for Windows Phone is particularly risky because has hardcoded password which can be easily exploited by potential hackers.Core Security said that when the app is configured to receive files from devices, it sets up a Wi-Fi hotspot with the same 12345678 password every time.
The updated app removes that default password, but not before it opened the door to another hole that could allow attackers to remotely browse a device’s file system.
“When the WiFi network is on and connected with the default password (12345678), the files can be browsed but not downloaded by performing an HTTP Request to the WebServer launched by Lenovo SHAREit,” Core Security said in its advisory, and also shared the request used to carry out the attack.
CoreLabs researchers also noted that the SHAREit App for both the Windows and Android version transferred files in plain text over HTTP which can be sniffed by any potential hacker easily. “An attacker that is able to sniff the network traffic could to view the data transferred or perform man in the middle attacks, for example by modifying the content of the transferred files,” Core Security said.
The final vulnerability affects only the Android version of the app, which when configured to receive files, it does so over a Wi-Fi hotspot that is created by the app without a password. “An attacker could connect to that HotSpot and capture the information transferred between those devices,” Core Security said.
CoreLabs has informed Lenovo about the vulnerabilities in SHAREit App for both Windows and Android smartphones and Lenovo on its part has updated the App for both the platforms.
You can download the update App for your Android smartphone and tablet from here and for your Windows Phone from here.

Uninstalling Facebook App can save 20% of smartphone battery life

Uninstalling Facebook app saves up to 20% of Android battery life

It is known that Facebook does not have the greatest track record with its Android app. Since it was launched, users have been complaining about performance issues with the Facebook App as well as its battery guzzling feature. The matter is being taken seriously by Facebook even as chief product officer, Chris Cox asked FB employees to ditch their iPhones and move to Android until the engineers sorted out all the issues with the Facebook App.
However, both the performance and the battery usage issue are yet to be sorted out. This prompted Android blogger Russell Holly to dump the app. Holly’s decision to dump the App spawned an chain reaction in the Android community. Many Android users dumped their Facebook app to study the performance their Android smartphone post Facebook App.
Prompted by Holly’s revelation that life on Android was better without Facebook’s app, Reddit userpbrandes_eth tested the app’s impact on the performance of an LG G4.
He found that as soon as Facebook and Facebook Messenger apps were uninstalled, other apps on the smartphone launched 15% faster. He also found that the battery life of his Android based LG G4 increased by 20% post the uninstall.
He 15 separate apps viz. 20 Minuten, Kindle, AnkiDroid, ASVZ, Audible, Calculator, Camera, Chrome, Gallery, Gmail, ricardo.ch, Shazam, Spotify, Wechat and Whatsapp, using DiscoMark benchmarking app (available in Google Play) and documented the findings, leading other reddit users to test other devices.
Another user, cloudbasejunkie also got similar results :
Many other users have supported Holly’s ditch Facebook App campaign. One thing is for certain, if you dump FB App and Messenger, you can have a faster, more comfortable experience on your Android smartphone.
It is time you used Facebook only in browser till FB engineers find time to release a optimal App.

Beware: Some Android games host malicious code inside images

Is your device at risk? Only Google knows

If you frequently download and use Android gaming applications on your device, then this part might frighten you slightly. According to a blog post by Dr.Web, over 60 Android games present on Google Play Store had Trojan-like attributes that effortlessly allowed them to download and execute malicious code hidden inside images.
A group of researchers from Russia discovered these rogue apps from Russian antivirus vendor Doctor Web and had been reported to Google last week, referring to them as Android.Xiny.19.origin. Before the tech giant decided to look carefully on its Play Store, malicious Android apps were an omnipresent element. Google managed to keep things in rigorous checks through an automated scanner called Bouncer that used emulation and behavior-based detection.
While bypassing Bouncer detection is not impossible, it is sufficient enough to keep most malware creators at bay. However, the authors of Android.Xiny.19.origin were much more ambitious. This is because their trojanized games are functional, but in the background they collect identifying information from targeted devices. This information could range from the phone’s unique IMEI and IMSI identifiers, along with its MAC address, mobile operator, country and language settings, operating system versions and several more things.
Additionally, these attackers also have the capability to instruct the apps to display advertisements, and to either install or delete apps silently if root access is enabled on the phone. The researchers have posted their findings below:
Games-Android-Apps-on-Google-Play-1024x492
“Unlike cryptography that is used for encryption of source information, which may arouse suspicion, steganography is applied to hide information covertly. Virus makers presumably decided to complicate the detection procedure expecting that security analysts would not pay attention to benign images.”
After the crafted image is downloaded, the Trojan extracts an APK from it by using a special algorithm. It then loads the malicious code in the device’s memory by using the DexClassLoader Android function. Also, the two researchers displayed that they could hide an APK inside an image file while keeping the image valid when opened. However, when applying a decryption algorithm to it, they could recover the APK.
Furthermore, the researchers mentioned that DexClassLoader can be used to dynamically load the APK into memory, exactly as Android.Xiny.19.origin does now. Now that Google has been notified of this, hopefully the will come up with a suitable fix, or fixes.

Here is how to unlock hidden Chess game in Facebook Messenger

This is how to unlock and play Facebook Messenger’s hidden Chess game

Every tech company has some sort of Easter Eggs built into their products and Facebook Messenger has one too. The Easter Egg in Facebook Messenger lets you play chess with a friend directly in a Facebook chat window.
However, to launch the game and play, you need to input special phrases.
BetaNews shares the instructions:
  1. During a conversation, type @fbchess play and a board will appear. Your friend will go first.
  2. Select a piece using K for king, Q for queen, B for bishop, N for knight, R for rook, or P for pawn.
  3. Then add the letter and number representing the space you want to move it on the board.
So, for example, you’d type @fbchess Pd4 to move it to that space. If more than one piece can go there, you’ll be asked which one to move.
This is how to unlock and play Facebook Messenger's hidden Chess game
if you want a larger view of the chess board, click on the chat menu settings icon and select “See Full Conversation.”


Sounds a little complicated. Maybe you should stick to the full fledged chess games available online. However if you like easter eggs or would like to surprise your Facebook friend who doesnt know about this Easter Egg, now’s your chance.

Twitter has banned more than 125,000 ISIS-linked accounts

Twitter has blocked 125,000 ISIS linked user accounts for promoting terrorist acts since mid-2015

Twitter has since the middle of 2015 deleted more than 125,000 “terror-linked” accounts, mostly connected to the Islamic State group, in an increased effort to counter threats stemming from violent extremism.
ISIS has been effectively using social media, especially Twitter and Facebook, to get recruiters and spread their ideology.
The accounts frozen since mid-2015 were targeted “for threatening or promoting terrorist acts,” said Twitter, which is under pressure from governments to act but is also keen not to be seen as effectively censoring free speech.
“Like most people around the world, we are horrified by the atrocities perpetrated by extremist groups. We condemn the use of Twitter to promote terrorism and the Twitter Rules make it clear that this type of behaviour, or any violent threat, is not permitted on our service,” Twitter said in a post on Friday.
Twitter, which places itself as a defender of speech rights, said that “we have always sought to strike a balance between the enforcement of our own Twitter Rules covering prohibited behaviors, the legitimate needs of law enforcement, and the ability of users to share their views freely – including views that some people may disagree with or find offensive.”
The announcement comes after the United States and other governments urged social networks to take more aggressive steps to eradicate activity aimed at recruiting and planning violent acts.
Seeking to rebut criticism that it has not done enough to counter extremism on its platform, Twitter noted it has increased the size of its teams that review reports of abuse. It was driving up enforcement by boosting staff and using technology to filter violence-promoting content, which in turn has reduced response time considerably.
“As many experts and other companies have noted, there is no ‘magic algorithm’ for identifying terrorist content on the Internet, so global online platforms are forced to make challenging judgment calls based on very limited information and guidance,” Twitter said.
“In spite of these challenges we will continue to aggressively enforce our rules in this area and engage with authorities and other relevant organizations to find viable solutions to eradicate terrorist content from the Internet and promote powerful counter-speech narratives.”
In addition to suspending such suspicious accounts, Twitter is also taking several other steps to fight terrorism, extremism and radicalization. It is using proprietary tools for fighting spam to check for “potentially violating accounts,” which will then be reviewed by Twitter agents.
“We have already seen results, including an increase in account suspensions and this type of activity shifting off of Twitter,” the company said.
A study last year had shown that ISIS’ social media success lies in “hyper” Twitter accounts created by the group’s supporters, stating that ISIS Twitter accounts had about 1,000 users each on an average.
The Islamic State group’s official social media experts disseminated information such as pictures and videos through smaller accounts, which were then shared by other accounts, the study said.
Whenever it was necessary, the microblogging platform has worked with law enforcement agencies and is teaming up with organizations such as People Against Violent Extremism and the Institute for Strategic Dialogue that look to counter extremism in the online environment.
Twitter’s global policy team is also frequently attending training sessions and events concentrating on countering violent extremism.

WhatsApp users tricked into opening Malware sent by friends which steals their personal data

New WhatsApp scam deceives users into opening malware sent by ‘friends’

WhatsApp, the world’s largest cross-platform messaging app has allegedly been the target of a new scam, which misleads users into disclosing personal information that might be used against then.
According to The Independent, the links appear to come from friends and leads users to a discount page which asks for personal details of the user.
Some unsuspecting users are then led to a fake website via the links, which in turn infects the user’s phone with malware, allowing the scammer to obtain sensitive information about the user.
Kaspersky Lab principal security researcher David Emm said WhatsApp’s prevalence in India and Europe has caught the attention of scammers. Emm has said in the report, “We have noted that this WhatsApp scam has been actively circling for some time. It ‘speaks’ several languages so the attacks can be customised for each market.”
“The message convinces the user to forward the message to 10 contacts, so he/she can receive a certain promotion (such as £5 discount at Starbucks, Zara etc),” Emm added.
The message spreads like wildfire because scammers convince users to forward the message to their 10 contacts so that they can receive a certain promotion. Some scam messages require users to register with their basic details such as name, email, phone number and address. Fraudsters then install malware on the unsuspecting user’s phone.
Recently, WhatsApp crossed a billion users in the world and has over 65 million users in India, making it an attractive ground for fraudsters. As a result, the effect of the malware attack can be far reaching.
The company of late waived off the 99 cents annual subscription charge. So, if users receive a message asking to share it with unspecified number of contacts to avoid suspension, it is a scam. Similarly, messages that include suspicious links to websites with a promise to offer discounts are scammers who are attempting to infect the device and obtain personal information. It’s best to avoid clicking on any links unless verified by the trusted sender.
If users receive such links from friends, contact them separately through a different medium (SMS or call) if possible, to verify its legitimacy.
This is not the first time WhatsApp has been used as a platform to attack users. Earlier, another scam in the app was exposed by the security researchers that posed a threat to all users by attempting to access and retrieve information from banking apps on users’ smartphones. Similarly, several cases were reported last month where Android users were trying to update the messaging app, but they accidentally installed malware that stole their data.

Skype users targeted by malware which takes screenshots and records conversation

T9000 Backdoor Malware Targets Skype Users, Records Conversations

Skype users should beware of a new backdoor trojan that steals files, takes screengrabs, and records Skype conversations. The trojan which is named as T9000 is a hybrid version of a older T5000 which was spotted in the wild two years ago. The T9000 specifically targets human rights activists, the automotive industry, and governments in the Asia-Pacific region.
Security researchers Palo Alto Networks spotted T9000 inside spear phishing emails received by US organizations. However, the researchers say that T9000 is versatile enough to be used against any target the attacker wants to compromise.
The researchers noted that T9000 targets computers through malicious RTF attachment in an email This RTF attachment exploits the CVE-2012-1856 and CVE-2015-1641 vulnerabilities to get a foothold on the victim’s PC.
Compared to its earlier version, T9000 is much complex and special efforts have been made to avoid getting detected. T9000 features a multi-stage installation process, which checks before each phase for the presence of malware analysis tools and 24 security products such as Sophos, INCAInternet, DoctorWeb, Baidu, Comodo, TrustPortAntivirus, GData, AVG, BitDefender, VirusChaser, McAfee, Panda, Trend Micro, Kingsoft, Norton, Micropoint, Filseclab, AhnLab, JiangMin, Tencent, Avira, Kaspersky, Rising, and Qihoo 360.
If everything checks out, and the internal verifications go through, after installing itself, the malware will first collect information on the infected system and send it to a C&C server, so it can mark the target and distinguish between each victim. The C&C server will than send specific set of instruction based on the information that resides in the victim’s PC.
Palo Alto researchers have identified three main modules.
The first and most important module, tyeu.dat is responsible for spying on Skype conversations. As soon as the module is downloaded and launched into execution, the next time the user will start Skype, a message will appear at the top of his window saying “explorer.exe wants to use Skype.”
 T9000 message shown to Skype users
T9000 message shown to Skype users
This message is shown because the backdoor taps into the Skype API and shows this notification at the top. Once the victim presses ‘Allow access’ the malware can than freely spy on him/her. T9000’s Skype module can record both audio and video conversations, along with text chats, while also taking regular screenshots of video calls.
The second T9000 module is vnkd.dat, and this module is loaded only when the malware’s author wants to steal files from the user’s computer. Support is included for taking data from local removable storage devices with extensions such as doc, ppt, xls, docx, pptx, and xlsx.
The third module qhnj.dat, is the most dangerous of the three. It allow C&C server to send commands to each computer and tell T9000 to create files&directories, delete files&directories, move files&directories, encrypt data, and copy the user’s clipboard.
Palo Alto researchers indicated that the author of the malware seemed a thorough professional, “The author of this backdoor has gone to great lengths to avoid being detected and to evade the scrutiny of the malware analysis community.”
Microsoft stated that now its security program, Windows Defender identifies and quarantines T9000 trojan. Microsoft spokesperson reached out to us with a emailed statement :
“To further protect our customers, we’ve added detection for the malicious software known as ‘T9000’ to Windows Defender. Customers that have installed security updates released in 2012 (MS12-060) and 2014 (MS14-033), either manually or by enabling automatic updates, will already be protected. Our recommendation is to enable automatic updates, which installs the latest security protections, and use the latest version of Skype.”
As such all Skype users are advised to update their Windows Defender to protect their Skype conversations from being spied upon.

5 most dangerous computer viruses of all time

Read about the 5 deadliest computer viruses which haunted computer users

Computer viruses can be dreadful that might cause extensive damage to your innocent device. It can significantly disrupt your system’s performance and has the potential to wipe out everything on your hard disk.
So, what is a computer virus? A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be “infected”, making your device helpless and sick.
Also, ever since people could write code there have been individuals known as hackers who have sought to make that code malicious in nature. While some pranksters created virus-like programs for large computer systems, it was really the introduction of the personal computer that brought computer viruses to the public’s attention.
Computer viruses have inundated the computer user for a long time now. Here are five most dangerous computer viruses of all time:

1. ILOVEYOU

This was perhaps the most dangerous computer virus ever created that in the form of a worm — it was a standalone program capable of replicating itself. Known as ILOVEYOU, this virus initially traveled the Internet by e-mail and managed to crash PCs all across the world. To make it even more alluring, the subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU.TXT.vbs. The moment someone opened the file, the virus emailed itself to the first 50 contacts available in the PC’s Windows address book. The virus caused a total damage of around $10 billion affecting almost 10% of the world’s PCs connected to the Internet.

2. Melissa

Melissa was the first mass-mailing macro virus for the new age of e-mailing which became the breaking news across the world on March 26, 1999. Based on a Microsoft Word macro and built by David L, Melissa was spread in the form of an email attachment by the name “list.doc.” When the attachment was clicked upon, the virus replicates itself and seeks for the Microsoft Outlook address book to e-mail itself to the first 50 names on the list with a message, “Here is that document you asked for…don’t show anyone else. ;-)” Later on, FBI arrested David L and slapped him with a fine of $5000 for unleashing the fastest virus of its time.

3. My Doom

My Doom explored its way to the malware world on 26th January 2004 and sent a shockwave around the world, as it scattered exponentially via e-mail through email with random addresses of senders and subject lines. My Doom destroyed the cyber world by activating a tremendous denial of service attack that infected close to about two million PCs. It transmitted itself in a particularly deceitful manner through e-mail as what receiver would first reckon to be a bounced error message as it reads “Mail Transaction Failed.” But, as soon as the message is clicked upon, the attachment is executed and the worm is transferred to email addresses found in the user’s address book. The damage caused by this fastest-spreading mass mailer worm was a whopping $38 billion.

4. Code Red

It debuted in late 2001 taking advantage of the Microsoft Internet Information Server’s flaw. The variations of the virus plagued the Internet for several months. The interesting thing about this deadly virus is, it did not require you to open an e-mail attachment or run a file; it just required an active Internet connection with which it ruined the Web page that you opened by displaying a text “Hacked by Chinese!” And in less than a week’s time, “Code Red” brought down more than 400,000 servers including the White House web server. This virus caused a total damage of approximately $2.6 billion dollars by hitting almost one million PCs.

5. Sasser

The 2004 worm virus affected Windows OS primarily, and was devastating to many critical infrastructures. It didn’t spread through e-mail unlike other viruses. Instead, once the virus infected a computer, it looked for other vulnerable systems. It contacted those systems and instructed them to download the virus. The virus would scan random IP addresses to find potential victims. The virus also altered the victim’s operating system in a way, making it even hard to reset without cutting the power. Sasser functioned by attacking the security controller Local Security Authority Subsystem Service, as it had a buffer overflow vulnerability. The worm affected hospitals, public transportation, airlines, news agencies and much more. After one million infections, there was an estimated 18 billion dollars in damage recorded.

Twitter begins rolling out its Facebook like algorithmic timeline Twitter begins rolling out its Facebook like algorithmic timeline

Twitter starts rolling out its algorithmic timeline worldwide but it is opt-in for now

Twitter has finally become like Facebook. After years of giving users ‘first as they come tweets’ the micromessaging service today began rolling out a algorithmic timelines for its users worldwide.
This changes come after years of debate and months of user testing. Earlier this week, BuzzFeed made it public that Twitter was following Facebook in pushing most liked tweets to the top of the page. The idea was not liked by twitterati around the world and they trended #RIPTwitter to show their protest against the change. So much so that Jack Dorsey, CEO of Twitter had to come out to clear the apprehensions of Twitter users.
The new feature is based on the algorithms that power Twitter’s “while you were away” feature, which show you a selection of tweets based on how popular they are, and whether you regularly interact with the person tweeting them. When you open Twitter after some time away, highly ranked tweets will show up at the top of your timeline in reverse-chronological order. The rest of your timeline appears underneath as usual.
The algorithmic timeline tweets may not be like by some so Twitter has not enabled the by default. If you are interested in the tool, you will have to enable “Show me the best tweets first,” feature in settings.
However, Twitter is looking to switch the new timeline on for all users, letting them know via a notification in the timeline. If you don’t like it, you can turn it off in settings.
The algorithmic timelines can be seen on Twitter desktop version as well as on Twitter App in Android and iOS devices. Strangely, TweetDeck and Twitter for Mac are not included in the scheme of things as of now.
People who have tested the algorithmic timeline have reported mixed feelings, with some saying they appreciate getting caught up more quickly, and others saying that the new timeline sometimes splits up conversations. Advocates for a ranked timeline say it always outperforms chronological timelines in user surveys, even when users say they prefer the latter. Which will prove true with Twitter users? With the company set to report earnings later today, there’s a lot riding on the answer.

Soon you can track your Bluetooth devices directly over the internet

You can control Bluetooth Devices from far away through Internet in near future

We often face a problem with Bluetooth devices which are not able to connect to Internet. As such we are not able to control such devices especially when we are physically far away from such devices.  A lot of devices especially old feature phones and budget smartphones, rely solely on Bluetooth for connectivity, but they always require another device to provide them with a link to the internet. Which means you need to be physically present near the smartphone or feature phone.
Not any more, the nifty Bluetooth will soon be able to connect to an internet gateway without requiring a phone, tablet or another in-between gadget. This was announced today by the Bluetooth overseeing group, the Bluetooth Special Interest Group. It said that all future versions of its connection will “ allow any Bluetooth sensor to relay data to the cloud and back again.”
This facility will also give users “the ability to monitor and control fixed Bluetooth sensors from a remote location, like turning off your lights while on vacation or unlocking your front door for a pet sitter.”

How can you control Bluetooth devices from far?

This is how it will work. The new devices having this feature will add a layer of connectivity to your home wifi network that allows other devices to communicate with Bluetooth hardware, without you or your presence in the vicinity of the device.
The implications of the update are enormous has you will now be able to control gadgets such as routers, thermostats, or security systems through your Bluetooth from far away without having a middleman.your home. You’ll then be able to control the Bluetooth devices using these middle-men.
The Bluetooth Special Interest Group stated that development kit’s have already been made available for manufacturers for implementing this feature. But it may take a while the feature enabled devices to percolate down to you.

This shoe charges your smartphone while walking

Energy harvested from this walking shoes can be used to charge your smartphone

Our shoes may become our next energy source. Thanks to a new energy harvesting and storage technology developed by the mechanical engineers at the University of Wisconsin-Madison. This technique can reduce reliance on batteries in mobile devices and charge your smartphone as you walk.
Tom Krupenkin, professor of mechanical engineering, and senior scientist J Ashley Taylor described the innovative energy-harvesting technology that can capture the power of human motion to charge mobile electronic devices such as smartphones and laptops.
kinetic-shoe-2
This could enable a footwear-embedded energy harvester that captures energy produced by humans during walking and stores it for later use.
Power-generating shoes could be especially useful for the military, as soldiers currently carry heavy batteries to power their radios, GPS units, and night-vision goggles in the field. The advance could also provide a source of power to people in remote areas and developing countries that lack adequate electrical power grids.

“Human walking carries a lot of energy. Theoretical estimates show that it can produce up to 10 watts per shoe and that energy is just wasted as heat. A total of 20 watts from walking is not a small thing, especially compared to the power requirements of the majority of modern mobile devices,” explained Krupenkin.
Krupenkin and his colleague J. Ashley Taylor believe that this technology could be a game-changer in the energy space that could power a wide range of devices from your phone to your tablet to just about anything that requires batteries for operation.
A typical smartphone requires less than two watts of energy.
“We have been developing new methods of directly converting mechanical motion into electrical energy that are appropriate for this type of application,” Krupenkin noted in a paper published in the journal Scientific Reports.

The team has been working to develop new method of converting mechanical energy into electrical energy that would work for generating power from a human walker. The process the team is working on now is known as reverse electrowetting. This technique uses a conductive liquid that works with a nanofilm-coated surface that is able to produce electricity.
Researchers developed a ‘bubbler’ method, which combines reverse electrowetting with bubble growth and collapse. A bubbler has no moving mechanical parts and uses a pair of flat plates with a conductive liquid between them. The tiny holes in the bottom plate allow pressurized gas to enter and form tiny bubbles. The bubbles grow until they are large enough to touch the top plate, which causes the bubble to collapse.
The speedy, repetitive growth and collapse of bubbles pushes the conductive fluid back and forth, generating electrical charge. This method produces around 10 watts per square meter of surface and in the space of a shoe; the team believes that making 10 KW of power might be possible.
The findings were published in the journal Scientific Reports.
The engineers are looking for industry to commercialise the technology through their startup company, InStep NanoPower.