Thursday, July 3, 2014

Facebook Messenger App for iPad Finally Available for Download


Facebook has finally made its dedicated Messenger application available for iPad users across the globe, letting users do away with utilising the enlarged iPhone app on the tablet.
The Facebook Messenger app for iPad comes with a multi-window feature that gives users a list of chats on the left-side of the screen, and the current active chat enlarged on the right side.
Some of the other features included in the Facebook Messenger app for iPad are chat stickers, easy group navigation and VoIP calling. However, the iPad Facebook Messenger app misses on some of the latest features introduced by Facebook on the mobile apps, like split-screen selfie camera or quick video recording feature by simple tap-and-hold gesture. These features were introduced for Androidand iPhone last month. We assume these features will arrive soon as an update.
Additionally, Techcrunch noted that if users have both Facebook and Messenger apps on their iPad, tapping on the messages section on the Facebook app will lead them to the Messenger app with the desired conversation open.

The Facebook Messenger app for iPad is available to download from the App Store, and is compatible with iPad tablets running iOS 7 or later versions.
In April, Facebook Messenger was reported to have surpassed the 200 million monthly active users mark, and its latest appearance on iPad tablets will bump up the numbers. With more number of Messenger users, Facebook seems to be trying hard to make its mark in thee instant messaging sector. The firm notably acquired WhatsApp messaging service in February and also introduced its own Snapchat-like Slingshot messaging app last month.
The Slingshot app allows users to sign up for the service with their mobile phone number and connect with friends in their phone's contact list or, if they want, by finding their Facebook friends.

APPLE IMAC 21.5-INCH (2014) REVIEW


Back in June, Cupertino lowered the price on its iMac desktops from $1,299 to $1,099. Though still spendier than many PC competitors, getting an iMac suddenly got significantly more affordable.
Our review iMac had the stock 500GB mechanical drive upgraded to a 1TB Fusion Drive, adding $250 to the price for a total of $1,349. Other specs match the base model, including a 1.4GHz Intel Core i5 dual-core processor, 8GB of RAM, and Intel HD Graphics 5000.
Apple envisions its newest iMac as the perfect computer for basic day-to-day use – tasks like Web browsing, email, and light gaming. While it may fit that description, $1,349 – or even $1,099 – is a lot to pay. So, does the iMac’s performance justify the new, lower price?

Nothing new here

Aside from a change in specs and price, this 21.5-inch iMac doesn’t sport any radical changes on the design front.
The iMac’s chassis is made of aluminum, and feels as premium as any computer we’ve ever laid our hands on. The system is thin, measuring 5mm at its edge, and rests on a solid L-shaped pedestal. Tilting the display up and down is so effortless you can do it with one hand – no need to grab the base to steady it.
The iMac feels as premium as any computer we’ve ever laid our hands on.
If there’s one word that comes to mind when we look at the iMac, it’s “neat.” The computer looks slick and will get a double take from anyone who passes by your desk. Power for the entire machine comes from a single cable, which minimizes clutter on and around your desk. We like that.
Apple’s dislike for cables extends over to the bundled peripherals, a standard keyboard and Magic Mouse, both of which are wireless. While they’re pretty, they are both small. If you’re used to a full-size PC keyboard, Apple’s flat wireless QWERTY will seem especially tiny.
Our other design complaint is that the power button is mysteriously located around the back left, where it’s difficult to find. Eventually, you’ll develop the muscle memory that ends the “find the power button” hunt, but we wish it was placed in the front. In fact, we think the Apple logo under the display would make a great power button.
The iMac’s 21.5-inch 1080p display produces crisp, luminous images, even if the gloss can be distracting when viewing at an angle. The built-in speakers will be more than good enough for most people, though audiophiles will probably want to add a nice pair of headphones, or some chic speakers.
Read more: http://www.digitaltrends.com/desktop-computer-reviews/apple-imac-2014-review/#ixzz36Tgrj4iT 

Tuesday, July 1, 2014

BlackBerry Z3 With 5-Inch qHD Display Launched at Rs. 15,990

Canadian smartphone manufacturer has launched its recently unveiled large-screen smartphone in India, the BlackBerry Z3, priced at Rs. 15,990. The BB10 OS-based smartphone will be available to pre-order from Flipkart, The Mobile Store, and BlackBerry stores from Wednesday, and go on sale from July 2.

The BlackBerry Z3 is the first phone to be launched by BlackBerry since new CEO John Chen took the helm late last year.

The Z3 runs BlackBerry 10 OS (version 10.2.1) and features a 5-inch qHD (540x960 pixels) display offering an aspect ratio of 16:9. It is powered by a dual-core 1.2GHz Qualcomm Snapdragon 400 (MSM8230) processor with 1.5GB of RAM.

BlackBerry's Z3 sports a 5-megapixel autofocus rear camera and also houses a 1.1-megapixel fixed-focus front-facing camera. The smartphone includes 8GB of inbuilt storage, which can be expanded up to 32GB via microSD card. 

The smartphone packs a 2500mAh battery, which is rated to deliver up to 15.5 hours talk time and up to 384 hours of standby time. Connectivity options on the BlackBerry Z3 include Wi-Fi, Bluetooth, 3G, GPS, NFC and Micro-USB.

The BlackBerry Z3 smartphone also comes preloaded with some BlackBerry services such as BlackBerry Hub, BBM, Time Shift, Story Maker camera features, and BB10 browser.

The Z3 was initially announced in Indonesia and is one of the first devices being made with FIH Mobile Ltd, a unit of the Taiwanese Foxconn Technology Group best known for building devices such as the Apple iPad and iPhone. 

The smartphone was made available for the Indonesian market starting in mid-May, and was priced less than $200 (roughly Rs. 12,000).

Android L Preview Source Code Now Available for Nexus Devices

 
After releasing the Android L developer preview images for some Nexus devices, Google has now posted the source code on the AOSP (Android Open Source Project) for an even wider range of devices.
Notably, Google's Android Git repo page lists the source code for the following Nexus devices - Nexus 4, Nexus 5, Nexus 7 (2012), Nexus 7 (2013) and Nexus 10.
9to5Google points out that the source code does miss out few things such as binary packages and kernel source.
Google, at its I/O 2014 Keynote, announced the "L" release of Android and called it the most ambitious Android release yet. Currently known only as Android L, there's no codename or even a formal version number yet. Android L is expected to release later this year, though an exact date isn't known.
With Android L, Google has refreshed the interface design of the entire operating system. The company identifies it as the new "Material Design" which is bolder, more colourful, and more animated. Various changes to UI include a new dialler, refreshed Android navigation buttons, redesigned transition animation and more. Overall, the design theme focuses on elevation values of UI elements within apps.
The default Chrome browser has been upgraded on Android L as well and the Google search results can now be links that trigger an app, rather than links to websites. Google has notably ditched the Dalvik runtime in Android L and has introduced ART for 64-bit, which allows apps to run faster, and is compatible with ARM, x86 and MIPS architectures.
Other than improved performance, Google is also aiming for a better battery life in Android smartphones with its Android L. The introduced Project Volta improves the "instrumentation" of battery data through a tool called "Battery Historian." Google has also added a "Battery Saver" mode in "L" which can be triggered manually or configured to be enabled automatically when the battery is low.
Earlier, HTC and Nvidia announced Android L updates for some of their devices as soon as Google makes it publicly available.
Read More: http://gadgets.ndtv.com/mobiles/news/android-l-preview-source-code-now-available-for-nexus-devices-551532

Microsoft Joins Qualcomm-Backed Alliance in Bid for Connected Homes


Microsoft Corp has joined Qualcomm Inc and other technology companies in a bid to establish standard ways for household devices like light bulbs and thermostats to talk to each other.
The Qualcomm-backed AllSeen Alliance is among a growing number of efforts for companies working alone or in groups to promote protocols for how smart devices should work together in a trend increasingly referred to as the Internet of Things.
Microsoft on Tuesday joined 50 other members in the AllSeen Alliance, including major consumer electronics players Panasonic Corp, LG Electronics Inc and Sharp Corp, the group said.
But chipmakers that compete with Qualcomm plan to launch a rival standards consortium as early as next week, an industry source who was familiar with the plans but not authorized to discuss them, also told Reuters on Tuesday.
Battle lines are being drawn as manufacturers roll out growing numbers of Internet-connected burglar alarms, televisions and baby monitors. But like the early days of video cassette recorders, many of the smart home products being launched are incompatible with each other.
Qualcomm and other tech companies believe the quick establishment of standards across home-connected gadgets, cars and wearable computing devices will accelerate the introduction of new devices by manufacturers.
Making it easy for software developers to design apps that let household devices work together in useful ways, like making living room LED light bulbs flash red when food is burning on the stove, may also stir more interest from consumers who have yet to become excited by smart products currently on offer, the companies hope.
To that end, Qualcomm led the development of a connection standard called AllJoyn and made it free for other companies to use in their products.

Read more: http://gadgets.ndtv.com/internet/news/microsoft-joins-qualcomm-backed-alliance-in-bid-for-connected-homes-551497

APPLE KICKS OFF ‘BACK TO SCHOOL’ PROMOTION WITH $50-$100 GIFT CARDS


Apple isn’t exactly well known for discounting its products, but it does offer good deals for students, teachers, and their parents now and then. Apple just kicked off its “Back to School” promotion with a slew of discounts and gift cards on iPads, iPhones, and MacBooks.
All incoming freshmen, current college students, K-12 kids, and teachers are eligible for the discounts, as are students’ parents, provided they’re buying the device for their kid. Basic education discounts range from $30 to $200, depending on what product you buy. Apple will also throw in a $50 or $100 gift card, to sweeten the deal.
If you buy an iPad Air, iPad with retina display, iPad Mini with retina display, or just a regular iPad Mini, you’ll get $30 off your purchase, plus a $50 gift card to the Apple Store.  Those who purchase an iPhone may not get the education discount, but they will get a $50 gift card. The deal includes the iPhone 4S, iPhone 5C, and iPhone 5S.
Naturally, discounts on Apple’s Macs are much higher, seeing as these laptops and desktops will actually be used in heavy-duty school work (and are priced higher). MacBook Airs are $50 off and come with $100 gift cards, while MacBook Pros cost $100 to $200 less and include $100 gift cards.
Apple also took $50 to $100 off of the price of the iMac and added $100 gift cards. Mac Pros are the most heavily discounted of the Apple products, with price reductions ranging from $200 to $300 in addition to $100 gift cards. Even so, that promotion won’t take too much off the $3,000-plus price tag.
The Back to School promotion lasts until September 9. After that date, education discounts will still be in effect, but Apple won’t offer the gift cards anymore. The promotion is in effect for all students and educators who buy online or at Apple’s retail stores. Similar discounts are also available in Canada, the U.K., and Germany.
Copyright : http://www.digitaltrends.com/mobile/apple-back-to-school-promotion-2014/#!69RHt

Samsungs new 850 Pro SSDs are super fast, and start at $130


Samsung just announced that it is launching a brand new lineup of SSDs.
Dubbed the 850 Pro, these drives are powered by the company’s 3D V-NAND tech. According to Samsung, V-NAND “features a proprietary vertical cell structure and represents a breakthrough in overcoming the density limit currently facing planar NAND architecture used in conventional flash memory, yielding significant speed, endurance and energy efficiency improvements.”
Samsung claims that its new 850 Pro drives will shuttle data at blazing rates, which doesn’t surprise us one bit. The company says these new SSDs will reach read speeds of up to 550MB/s, and write speeds of up to 520MB/s. For what it’s worth, according to this page, the Samsung 840 Pro has the same write speed, but is 10MB/s slower on the read speed front (540MB/s).
From an aesthetic standpoint, Samsung didn’t do much, if anything, to switch things up with the 850 Pro’s exterior. In fact, it looks identical to the 840 Pro, right down to the orange square underneath the logo, along the side of the drive’s top panel.
The Samsung 850 Pro will come in one of four storage varieties. The entry level version packs 128GB, and costs $129.99. The next step up is the 256GB model for $229.99. From there, Samsung doubles the storage to 512GB, and attaches a $429.99 asking price to the drive. Finally, there’s the 1TB version, which will run you a whopping $729.99.
Though Samsung hasn’t provided us with an exact release date for their new 850 Pro drives, we have been told that they should be released sometime later this month. Once we get more precise release date information, we will update this article accordingly.

Monday, June 30, 2014

List of Siri Commands

With the introduction of iOS7, Siri is finally out of beta. Apple rarely ever slaps BETA on to anything. Since the launch of the iPod, their legacy has been to deliver finished products. Now that Siri is out of BETA, it’s more powerful and faster than before. There are a huge list of things Siri can now do. Take a look at some of them below.


Phone

  • Call (name)
  • Call (name) home
  • Call (name) on his work phone
  • Call (number)
  • Call home
  • Get my call history

Facetime

  • Facetime (name)
  • Make Facetime audio call

App Launching

  • Launch photos
  • Play Infinity Blade II
  • Open Facebook

Messaging

  • Tell (name) I’ll be right there
  • Send a message to (name)
  • Send a message t0 (name) saying ‘How about tomorrow?’
  • Send message to (number)
  • Text (name) and (name), ‘where are you?’

Calendar

  • Set up a meeting at (time)
  • Set up a meeting with (name) at (time)
  • Meet with (name) at (time)
  • Set up a meeting about (description & time)
  • Move 3pm meeting to 4:30
  • Reschedule appointment with (name) to (date)
  • What does the rest of my day look like?
  • What’s on my calendar?
  • Cancel (event)
  • When is my next appointment?

Sports

  • Did (team name) win?
  • How did (team name) do last night?
  • What was the score last time (team name) played (team name)?
  • Show me the football scores from last night
  • When do (team name) play next?
  • What does the Premier League table look like?
  • Who is the highest goal scorer in the Premier League?

Navigation

  • Navigate to (destination)
  • Navigate home
  • Navigate to work
  • Walking directions to (destination)
  • What’s my next turn?
  • Are we there yet?
  • What’s my ETA?
  • Find (place)
  • Show me (place)
  • Where is the closest (store)?

Twitter

  • Tweet (whatever you would like to tweet)
  • Tweet (whatever you would like to tweet) with my location
  • Search Twitter for (your search terms)
  • Show me my tweets
  • What’s trending on Twitter?

Facebook

  • Post to Facebook (whatever you would like to post)

Movies

  • Where is my closest cinema?
  • What’s playing at my closest cinema?
  • Show me reviews for (film)

Music

  • Play (name of song)
  • Play (artist)
  • Play (album)
  • Play (playlist
  • Play
  • Pause
  • Skip
  • Play iTunes Radio
  • Play more songs like this one
  • Don’t play this song again

Reminders

  • Add (whatever you want) to (name of list)
  • Remind me to call (name) at (time)
  • Remind me to take my medication at (time)
  • Read my to-do list
  • Remind me to call (name) when I get (destination)

Email

  • Email (name) about (whatever you like)
  • New email to (name)
  • Check email
  • Any new emails from (name)
  • Reply to (name)

Weather

  • What’s the weather for today?
  • What’s the weather for tomorrow?
  • How’s the weather in (place)?
  • What’s the weather for this evening?
  • Is it windy?
  • When is sunrise/sunset?

Clock

  • Wake me up at (time)
  • Set an alarm for (time)
  • Turn off alarm
  • Delete alarm
  • What time is it in (place)
  • What is today’s date?
  • What’s the date this Saturday?

Timer

  • Set time for five minutes
  • Show timer
  • Pause timer
  • Resume timer

Contacts

  • What’s (name) address?
  • What is (name) number?
  • When is my wife’s birthday?
  • Show (name)
  • My mum is (name)
  • My brother is (name)
  • Call mum

Notes

  • Note (whatever you’d like to note)
  • Find meeting notes
  • Show my notes from last week
  • Read my last note

Settings

  • Turn on airplane mode
  • Turn on bluetooth
  • Make screen brighter
  • Go to Twitter settings
  • Show me privacy settings
  • Enable Wi-Fi
  • Open mail settings
  • Turn on Do Not Disturb
This list is not comprehensive and there are a lot more commands that Siri will respond to. If you know of any such commands, do let us know in the comment section below.

Copyright: http://www.honeytechblog.com/list-of-siri-commands/

What If Google Play Looked Like This?


Formerly known as Android Market, Google Play is great overall. The reason why we all love the PlayStore is that all our favorite apps and games are just some install permissions away. It also makes browsing apps easier as you dont have to browse them from the device. You can simply browse the apps on your desktop’s larger screen estate and install them. The browsing experience is much better than the iOS store which is trapped on the iDevices.
However one thing that’s always bugged me is the design of the Play Store. Sure it’s not hideous but it could look a lot better. Google, the web experts, the people who make absolutely stunning apps for both Android and iOS, haven’t put much design effort into the second biggest app store in the world. The user experience though is amazing, like most Google services.
Enes Dani? agrees with us and obviously thought the same. So in his free time he came up with a random concept that keeps most of the elements of the original design but makes it a lot prettier and professional. Of course with this being an experimental concept, things are far from perfect. Though the vision is there, that’s the main thing. Check out the concept below.

 copyright: http://www.honeytechblog.com/what-if-google-play-looked-like-this/

Facebook Turns Into Mental Research Asylum As Half Million Users Forced To See Depressing Posts

There is a serious uproar & protests going on in the social media world after news came in that Facebook has conducted some secret psychological research on it’s users, without informing them. Termed as a‘disturbing emotional experiment’ users and social media experts are demanding apology and justification from world’s biggest social network.


What Happened?

Researchers from Cornell University and the University of California collaborated with Facebook and devised an psychological experiment wherein news feed of more than 6.5 lakh users were specially tweaked.
These users, who unwittingly became part of this experiment, were forced to see positive and negative posts based on the experiment.
Some of these users’ newsfeed on Facebook only showed positive posts and the rest of the user’s newsfeed only showed negative posts.
Termed as an ‘emotional experiment’, the scientists then recorded the response of these users based on the positive or negative newsfeed. After evaluating the results and responses, the study was published in the journal called “Proceedings of the National Academy of Sciences of the USA”, and as per the published journal, “Emotions expressed by friends, via online social networks, influence our own moods, constituting, to our knowledge, the first experimental evidence for massive-scale emotional contagion via social networks.”
Hardly any surprises over here as the human mind will react and respond accordingly, based on the positive or negative news from their friends and family.

What is the fuss?

Privacy advocates, social media experts and lawyers are demanding to know that why Facebook conducted such an emotional and psychological experiment without informing 6 lakh+ users, and how far is this allowed as per the law.
At a time when Facebook has 1 billion+ users, with a wealth of private information about everyone, is it ethical to conduct such ‘social experiment’ on unaware users?
Politicians in UK have demanded a judicial enquiry into this experiment done by Facebook in manipulating user’s newsfeed as one of the parliamentary member quoted, “This is extraordinarily powerful stuff and if there is not already legislation on this, then there should be to protect people..”

Read more: http://trak.in/tags/business/2014/06/30/facebook-mental-research-depressing-posts/

Twitter Acquires Mobile Advertising Firm Tap Commerce


Twitter announced Monday that it has cut a deal to buy mobile ad firm Tap Commerce to bolster money-making tools at the popular one-to-many messaging service.San Francisco-based Twitter did not disclose how much it paid for Tap Commerce, which is located in New York City, but technology news website Recode.net reported the deal to be valued around $100 million.
Tap Commerce specializes in getting people to "re-engage" with applications installed, then ignored, on smartphones or tablet computers.
"Advertisers spend aggressively to get new users, but re-activating existing or previous users can provide just as attractive a return on investment," Twitter said in a blog post about the Tap Commerce acquisition.
"Together with the Tap Commerce team, Twitter will be able to offer mobile app marketers more robust capabilities for app re-engagement, tools and managed service solutions for real-time programmatic buying, and better measurement capabilities."
Twitter maintained that working with Tap Commerce would result in the service offering mobile gadget users better and more relevant ads in applications on devices.
For the latest technology news and reviews, like us on Facebook or follow us on Twitter and get the NDTV Gadgets app for Android or iOS.

Copyright:  http://gadgets.ndtv.com/social-networking/news/twitter-acquires-mobile-advertising-firm-tap-commerce-550741

Windows 9 public preview ‘likely’ coming this fall



According to ZDNet, a public preview of Windows 9, which is code-named Threshold, will be released sometime this fall, in preparation for release “around”  Spring 2015. This upcoming version of Windows will reportedly aim to lure desktop-based PC users to Microsoft’s newest version of its longtime OS after millions were put off by Windows 8 and its mish-mosh of concepts.
Details are a little hazy at this point, but the Windows 9 experience will reportedly differ depending on what kind of device you’re using, and could consist of multiple versions. On the flavor meant for traditional desktop and laptop PCs, the classic desktop UI will be the centerpiece of the OS, while hybrid devices will allow you to switch between the desktop and a tiled, Metro-ish mode.  One report suggests that users may be able to turn the tiled portion of the UI on and off in the final release of Windows 9.
On top of that, the desktop/laptop version of Windows 9 will allegedly feature a return of the Start menu, or some form of it. Users of this variant will also be able to run windowed Metro apps in the familiar desktop environment. These were expected, and unsurprising changes though, assuming they turn out to be accurate. Microsoft teased a new Start menu at Build 2014.
Microsoft has already started to make overtures towards desktop users with Windows 8.1, and with Windows 8.1. Update 1 as well. With those two updates, which arrived in October and this April, respectively, Microsoft has added a handful of smaller functions aimed at desktop users. They include a psuedo-Start button for the desktop UI, the ability to run Metro apps in the classic desktop UI, a dedicated button for shutting down, restarting, or putting your device to sleep in the Metro UIs Start screen, and more.
While Microsoft is expected to continue with this push to appeal to desktop users, there’s no guarantee that whatever changes they make with Windows 9 will have Windows XP and Windows 7 diehards flocking over to Windows 9 once it’s released. The Windows 9 public preview, should it be released sometime this coming fall, may go a long way towards telling us whether Microsoft is on the right or wrong path.

Copyright from : http://www.digitaltrends.com/computing/windows-9-public-preview-reportedly-coming-fall-will-target-desktop-users/#!6JST7

Sunday, June 29, 2014

You are Over Confident that your Home PC Won’t get Hacked


Imagine a complete stranger rifling through your purse, glove box, pockets and phone. You’re not comfortable with that, are you?
Nowadays, home PCs hold a myriad of personal files and information that most people wouldn’t be comfortable sharing. Search history, emails, instant messages, bank usernames and passwords, tax details and a host of other sensitive data can now be found on your home PC – and without adequate protection from cybercrime, this information could fall into the wrong hands.
Identity thieves and hackers target home computers because they know families often do not maintain adequate security protection on their PCs. This makes these family users easy, lucrative marks. Many hackers access your personal information in order to steal your money and your identity. Others might want to use your home computer as a shield to mask their identity as they steal from others.
But it won’t happen to me!
Identity theft is more common than you think – and the advent of the Internet has simplified the process for would-be thieves. It’s estimated that a quarter of all cases of identity theft originate on the Internet. More specifically, according to the Internet Fraud Complaint Centre, email and web pages dominate the fraud methodology, and the vast majority of victims actually have email contact with the perpetrator.
How can identity theft occur?
Anyone can fall victim to identity theft. Here’s how:
  • Accessing the Internet from an unsecured PC—Without a security layer between your computer and the Internet, you invite hackers to steal your identity, destroy your files, or use your PC to attack others
  • Obtaining potentially unwanted programs like spyware or adware on your PC—Malicious software programs may monitor your keystrokes, track your Internet logins, transmit your confidential information, or redirect your browser to fake web sites
  • Sending personal information over the Internet—Hackers can easily retrieve sensitive data that is sent over an unsecured Internet connection
  • Downloading files from friends and family or accepting unknown emails—You can obtain a virus, worm, or Trojan simply by accepting files from your friends, family, or others
  • Not recognizing phishing scams or spam— Ever received a dodgy looking email claiming you’ve won big? All you have to do is send over your bank account details… Phishing scams use fraudulent emails and web sites to lure unsuspecting users into revealing private account or login information.
  • Leaving your wireless network unsecured—Since your wireless network’s radio waves travel through walls, a hacker with a simple antenna could attack you from miles away to steal your information or to launch attacks from your PC
How you can fight identity theft
Common sense dictates some very obvious measures to protect yourself, your family and your computer. Make sure to set up parental controls to keep the kids from accidentally clicking on untrusted ads and websites. This includes not downloading files or clicking on hyperlinks sent by strangers, avoid storing financial information on your computer and using a secure browser.
Over-sharing on social media has desensitised our notion of online privacy, and it can be very easy to fall into complacency when sharing your personal information online. There are a number of ways that hackers can compromise your home PC and access information, most of which can be avoided with adequate security protection and a little online vigilance.
- See more at: http://www.blogsolute.com/home-pc-identity-theft-protection/29369/#sthash.23HtODSR.dpuf
Imagine a complete stranger rifling through your purse, glove box, pockets and phone. You’re not comfortable with that, are you?

Nowadays, home PCs hold a myriad of personal files and information that most people wouldn’t be comfortable sharing. Search history, emails, instant messages, bank usernames and passwords, tax details and a host of other sensitive data can now be found on your home PC – and without adequate protection from cybercrime, this information could fall into the wrong hands.

Identity thieves and hackers target home computers because they know families often do not maintain adequate security protection on their PCs. This makes these family users easy, lucrative marks. Many hackers access your personal information in order to steal your money and your identity. Others might want to use your home computer as a shield to mask their identity as they steal from others.

But it won’t happen to me!

Identity theft is more common than you think – and the advent of the Internet has simplified the process for would-be thieves. It’s estimated that a quarter of all cases of identity theft originate on the Internet. More specifically, according to the Internet Fraud Complaint Centre, email and web pages dominate the fraud methodology, and the vast majority of victims actually have email contact with the perpetrator.

How can identity theft occur?

Anyone can fall victim to identity theft. Here’s how:

    Accessing the Internet from an unsecured PC—Without a security layer between your computer and the Internet, you invite hackers to steal your identity, destroy your files, or use your PC to attack others

    Obtaining potentially unwanted programs like spyware or adware on your PC—Malicious software programs may monitor your keystrokes, track your Internet logins, transmit your confidential information, or redirect your browser to fake web sites

    Sending personal information over the Internet—Hackers can easily retrieve sensitive data that is sent over an unsecured Internet connection

    Downloading files from friends and family or accepting unknown emails—You can obtain a virus, worm, or Trojan simply by accepting files from your friends, family, or others

    Not recognizing phishing scams or spam— Ever received a dodgy looking email claiming you’ve won big? All you have to do is send over your bank account details… Phishing scams use fraudulent emails and web sites to lure unsuspecting users into revealing private account or login information.

    Leaving your wireless network unsecured—Since your wireless network’s radio waves travel through walls, a hacker with a simple antenna could attack you from miles away to steal your information or to launch attacks from your PC
 
How you can fight identity theft

Common sense dictates some very obvious measures to protect yourself, your family and your computer. Make sure to set up parental controls to keep the kids from accidentally clicking on untrusted ads and websites. This includes not downloading files or clicking on hyperlinks sent by strangers, avoid storing financial information on your computer and using a secure browser.

Over-sharing on social media has desensitised our notion of online privacy, and it can be very easy to fall into complacency when sharing your personal information online. There are a number of ways that hackers can compromise your home PC and access information, most of which can be avoided with adequate security protection and a little online vigilance.
Imagine a complete stranger rifling through your purse, glove box, pockets and phone. You’re not comfortable with that, are you?
Nowadays, home PCs hold a myriad of personal files and information that most people wouldn’t be comfortable sharing. Search history, emails, instant messages, bank usernames and passwords, tax details and a host of other sensitive data can now be found on your home PC – and without adequate protection from cybercrime, this information could fall into the wrong hands.
Identity thieves and hackers target home computers because they know families often do not maintain adequate security protection on their PCs. This makes these family users easy, lucrative marks. Many hackers access your personal information in order to steal your money and your identity. Others might want to use your home computer as a shield to mask their identity as they steal from others.
But it won’t happen to me!
Identity theft is more common than you think – and the advent of the Internet has simplified the process for would-be thieves. It’s estimated that a quarter of all cases of identity theft originate on the Internet. More specifically, according to the Internet Fraud Complaint Centre, email and web pages dominate the fraud methodology, and the vast majority of victims actually have email contact with the perpetrator.
How can identity theft occur?
Anyone can fall victim to identity theft. Here’s how:
  • Accessing the Internet from an unsecured PC—Without a security layer between your computer and the Internet, you invite hackers to steal your identity, destroy your files, or use your PC to attack others
  • Obtaining potentially unwanted programs like spyware or adware on your PC—Malicious software programs may monitor your keystrokes, track your Internet logins, transmit your confidential information, or redirect your browser to fake web sites
  • Sending personal information over the Internet—Hackers can easily retrieve sensitive data that is sent over an unsecured Internet connection
  • Downloading files from friends and family or accepting unknown emails—You can obtain a virus, worm, or Trojan simply by accepting files from your friends, family, or others
  • Not recognizing phishing scams or spam— Ever received a dodgy looking email claiming you’ve won big? All you have to do is send over your bank account details… Phishing scams use fraudulent emails and web sites to lure unsuspecting users into revealing private account or login information.
  • Leaving your wireless network unsecured—Since your wireless network’s radio waves travel through walls, a hacker with a simple antenna could attack you from miles away to steal your information or to launch attacks from your PC
How you can fight identity theft
Common sense dictates some very obvious measures to protect yourself, your family and your computer. Make sure to set up parental controls to keep the kids from accidentally clicking on untrusted ads and websites. This includes not downloading files or clicking on hyperlinks sent by strangers, avoid storing financial information on your computer and using a secure browser.
Over-sharing on social media has desensitised our notion of online privacy, and it can be very easy to fall into complacency when sharing your personal information online. There are a number of ways that hackers can compromise your home PC and access information, most of which can be avoided with adequate security protection and a little online vigilance.
- See more at: http://www.blogsolute.com/home-pc-identity-theft-protection/29369/#sthash.23HtODSR.dpuf

The Core i7-5960X, Intel’s first 8-Core desktop CPU: Fast, expensive, and coming soon

8-coreCPUs2 
 

After countless articles and much anticipation, Intel is reportedly about to release some of the first processors based on its Haswell-E specifications, which will, of course, support DDR4 memory and 8-core processors. However, of the three Haswell-E Core i7 CPUs expected, only one of them, the Core i7-5960X, will actually come with 8 cores, and it will sell for $999. The other two, the i7-5930K and i7-5820K, will contain only 6 cores, which is the same number found in the current Ivy Bridge-E generation processor.

Eight cores and more

Dubbed the Core i7-5960X Extreme Edition, the flagship CPU of the first Haswell-E lineup will be Intel’s first 8-core processor. With two more cores and four more threads than the company’s current Ivy Bridge-E based Core i7-4960X Extreme Edition processor, the i7-5960X will be aimed at gaming and hardware enthusiasts. Built around the 22nm Haswell architecture, this new 8-core CPU, due primarily to the increased power efficiency of the Haswell micro-architecture, will provide improved inter-process communication (IPC) while using close to the same amount of power.
The Core i7-5960X will be clocked at a 3.0GHz base, with a 3.3GHz boost frequency. It will also include support for the latest DDR4 2133MHz memory, and 20MB of L3 cache as well. In addition, its power rating will be 140 watts TDP, or only 10 more watts than the 6-core i7-4960X. The new DDR4 memory controller resides on the processor itself, through which the RAM is directly connected to the CPU, and the DDR4 modules themselves use only 1.2 volts of power, compared to DDR3’s 1.65/1.5 volts.

Overclocking

Designed for enthusiasts, Haswell-E processors will, like their Ivy-Bridge-E predecessors, offer versatile overclocking options. Memory and the CPU can be overclocked in numerous ways, including:
  • Unclocked core ratios in 80/100 increments
  • XMP mode support
  • Unclocked turbo limits
  • Support for memory up to 2667MHz
  • Unlocked memory controller
  • Unlocked voltage limits
And that’s a short list of the ways you can tweak this processor to get every last ounce of power out of it.

Two other new-generation chips

In addition to the 8-core Core i7-5960X, as mentioned above, we’ll see two other Haswell-E Core i-7 chips soon: the Core i7-5930K, and the Core i7-5820. Both are 6-core, 12-thread processors. Aside from clock speeds, their specifications are primarily the same. The i7-5930K runs at a 3.5GHz base, about a 3.9-4.0GHz boost, and it will list for around $550. The i7-5820K, on the other hand, will run at a 3.3GHz base, with a 3.6-3.8GHz clock boost. It will list for around $300. Both will support a 15MB L3 Cache.

Read more: http://www.digitaltrends.com/computing/core-i7-5960x-intels-first-8-core-cpu-fast-expensive-coming-soon/#ixzz366GmRaiz