Flickr

Results for Technology

New age glasses for Gen Z

Smart glasses are taking the world by storm as they are not only documenting and providing information about the visuals that the user is experiencing but also hear and process sounds and can translate different languages for the user.
The smart glasses can be attached to phone via Bluetooth and also set up manually.
The team behind the idea wanted to create a pair of smart glasses that could be worn all day. They wanted to put the batteries and all the technology without compromising on the weight of the glasses. They wanted it to look and feel both like normal glasses.
The glasses show reveal small displays of notifications and directions and connects through Bluetooth with android or Apple phone. The genius of the glasses is that they don’t look like the user is carrying any technology on their nose.
New age glasses for Gen Z New age glasses for Gen Z Reviewed by Arslan Bashir on 10:27 Rating: 5

Self-piloted flying taxis being tested in New Zealand Listen

Wellington: Self-piloted flying taxis are being tested in New Zealand as part of a project backed by Google co-founder Larry Page that supporters say will revolutionise personal transport.
New Zealand regulators on Tuesday approved plans for Zephyr Airworks, a subsidiary of Page´s company Kitty Hawk, to develop and test the futuristic air taxis.
Known as Cora, the electric aircraft has a dozen lift fans on its wings, making it capable of vertical take-off and landing like a helicopter.
But developers say it is much quieter, meaning it could transport passengers in urban areas using rooftops and car parks as landing pads.
"We are offering a pollution free, emission free vehicle that flies dependably, we think this is the logical next step in the evolution of transportation," Zephyr chief executive Fred Reid said.
The Cora prototype being tested in New Zealand´s South Island uses three on-board computers to calculate its flight path and is capable of carrying two passengers.
It has a range of 100 kilometres (62 miles) and can fly at 150 kmh at an altitude of up to 900 metres (3,000 feet).
Zephyr said using the air taxi would be a simple experience for passengers, similar to taking a ride-share in a car.
"You wouldn´t have to know anything about flying a plane. Cora could fly for you," it said in a promotional video.
"And it would be all-electric, helping to build a sustainable world."
It said Cora took eight years to design but then developers needed a suitable environment to safely test the new technology.
They settled on New Zealand because of its uncongested airspace and rigorous regulatory environment, with Reid saying local officials had embraced the idea.
"We had no idea what to expect," he said.
"They could have laughed us out of the room. We were pitching something that sounded like science fiction."
Cora has been given an experimental airworthiness certificate from the New Zealand Civil Aviation Authority.
Trialling the flying taxi service will reportedly take six years, with operations based around the city of Christchurch.
"This aircraft represents the evolution of the transport eco system to one that responds to a global challenge around traffic and congestion, and is kinder to the planet," Christchurch mayor Lianne Dalziel said.
Self-piloted flying taxis being tested in New Zealand Listen Self-piloted flying taxis being tested in New Zealand Listen Reviewed by Arslan Bashir on 10:23 Rating: 5

Stephen Hawking: a brief history of genius

LONDON: Stephen Hawking, who has died aged 76, was Britain´s most famous modern day scientist, a genius who dedicated his life to unlocking the secrets of the Universe.
Born on January 8, 1942 -- 300 years to the day after the death of the father of modern science, Galileo Galilei -- he believed science was his destiny.
But fate also dealt Hawking a cruel hand.
Most of his life was spent in a wheelchair crippled by amyotrophic lateral sclerosis (ALS), a form of motor neurone disease that attacks the nerves controlling voluntary movement.
Remarkably, Hawking defied predictions he would only live for a few years, overcoming its debilitating effects on his mobility and speech that left him paralysed and able to communicate only via a computer speech synthesiser.
"I am quite often asked: how do you feel about having ALS?" he once wrote. "The answer is, not a lot.
"I try to lead as normal a life as possible, and not think about my condition, or regret the things it prevents me from doing, which are not that many."
Stephen William Hawking, though, was far from normal.
Inside the shell of his increasingly useless body was a razor-sharp mind, fascinated by the nature of the Universe, how it was formed and how it might end.
"My goal is simple," he once said. "It is complete understanding of the universe, why it is as it is and why it exists at all."
Much of that work centred on bringing together relativity -- the nature of space and time -- and quantum theory -- how the smallest particles in the Universe behave -- to explain the creation of the Universe and how it is governed.
 Life on Earth at risk
In 1974, he became one of the youngest fellows of Britain´s most prestigious scientific body, the Royal Society, at the age of 32.
In 1979 he was appointed Lucasian Professor of Mathematics at Cambridge University, where he had moved from Oxford University to study theoretical astronomy and cosmology.
A previous holder of the prestigious post was the 17th-century British scientist Isaac Newton.
Hawking eventually put Newton´s gravitational theories to the test in 2007 when, aged 65, he went on a weightless flight in the United States as a prelude to a hoped-for sub-orbital spaceflight.
Characteristically, he did not see the trip as a mere birthday present.
Instead, he said he wanted to show that disability was no bar to achievement and to encourage interest in space, where he believed humankind´s destiny lay.
"I think the human race has no future if it doesn´t go into space," he said.
"I believe life on Earth is at an ever-increasing risk of being wiped out by a disaster such as sudden global warming, nuclear war, a genetically engineered virus or other dangers."
More recently he said artificial intelligence (AI) could contribute to the eradication of disease and poverty, while warning of its potential dangers.
"In short, success in creating AI could be the biggest event in the history of our civilisation.
"Alongside the benefits, AI will also bring dangers, like powerful autonomous weapons, or new ways for the few to oppress the many," Hawking said in 2016, at the opening of a new AI research centre at Cambridge University.
 Pop culture and politics-
Hawking´s genius brought him global fame and he become known as a witty communicator dedicated to bringing science to a wider audience.
His 1988 book "A Brief History of Time" sought to explain to non-scientists the fundamental theories of the universe and it became an international bestseller, bringing him global acclaim.
It was followed in 2001 by "The Universe in a Nutshell".
In 2007, Hawking published a children´s book, "George´s Secret Key to the Universe", with his daughter, Lucy, seeking to explain the workings of the solar system, asteroids, his pet subject of black holes and other celestial bodies.
Hawking also moved into popular culture, with cameos in "Star Trek: The Next Generation" and "The Simpsons", while his voice appeared in Pink Floyd songs.
Beyond scientific debate Hawking also weighed into politics, describing Donald Trump as "a demagogue who seems to appeal to the lowest common denominator" ahead of his election as US president.
Hawking also warned Britain ahead of the Brexit referendum in 2016 against leaving the European Union: "Gone are the days when we could stand on our own against the world."
 Making the most of ´every minute´
Hawking first married Jane Wilde in 1965 and had three children. The couple split after 25 years and he married his former nurse, Elaine Mason, but the union broke down amid allegations, denied by him, of abuse.
The love story between Hawking and Wilde was retold in the 2014 film "The Theory of Everything", which won Britain´s Eddie Redmayne the best actor Oscar for his portrayal of the scientist.
The Oscar triumph was celebrated by Hawking, who has reportedly said there were moments watching the film when he thought he was watching himself.
He was also the subject of a 2013 documentary, "Hawking", in which he reflected on his life: "Because every day could be my last, I have the desire to make the most of each and every minute."
Stephen Hawking: a brief history of genius Stephen Hawking: a brief history of genius Reviewed by Arslan Bashir on 10:19 Rating: 5

Google to ban ads on cryptocurrencies, related products

Alphabet Inc’s Google said on Wednesday it will ban advertisements for cryptocurrencies and related content starting in June.
Under the new policy, the company will ban ads for unregulated or speculative financial products like binary options, cryptocurrency and financial spread betting among others.
In a separate blog post, Google said it took down 3.2 billion ads that violated its advertising policies in 2017, nearly double the number of ads it removed in 2016.
"Improving the ads experience across the web, whether that's removing harmful ads or intrusive ads, will continue to be a top priority for us," Scott Spencer, director of sustainable ads, said.
In January, Facebook Inc said it will ban ads promoting financial products and services tied to cryptocurrencies and initial coin offerings.
The policy will be implemented across its platforms, including Facebook, Audience Network and Instagram, the company said.
Google to ban ads on cryptocurrencies, related products Google to ban ads on cryptocurrencies, related products Reviewed by Arslan Bashir on 10:17 Rating: 5

Facebook introduces new features for Pakistani market

With the expansion of broadband internet services in Pakistan, the technology companies like Facebook are taking keen interest to enhance their user base in this country, addressing their core interest and issues with the introduction of new features and tools.
According to Internet World Stats, there are 32 million users of Facebook registered from Pakistan out of 44.6 million internet users in the country by end of 2017. The country is ranked 25 throughout the world with considerable growth in the number of people using the social-networking sites.
These users are consuming social-network sites not only for infotainment and networking but also for commercial purposes and social causes as well.
Recently, Facebook introduced various features specifically for Pakistani market. These include a feature of facial recognition, registering yourself as a possible blood donation candidate, and now a profile photo guard tool.
Among these features and tools, the latest one is picture profile guard which is believed to be extremely helpful for subscribers of the Facebook in Pakistan especially for female users. It is anticipated that the number of female users will increase with this new tool.
Nashwa Hussien Aly, Head of Policy, Middle East and Africa, Facebook, explains the reason behind the launch of picture profile guard in Pakistan.
“Profile pictures are an important part of building community on Facebook because they help people find friends and create meaningful connections. But not everyone feels safe adding a profile picture. In Pakistan, we have heard that people want more control over their profile pictures, and we have been working over the past year to understand how we can help. This launch is part of our ongoing commitment to keeping people safe online,” Nashwa Hussien Aly, Head of Policy, Middle East and Africa, Facebook, says.
“Women are underrepresented on the internet in Pakistan today, and we are trying to help make Facebook a safe place for them to be online, she added. Facebook cares about bringing more women online in Pakistan. It cares about keeping women safe online.
At Facebook, we carried out regular research, including our Future of Business research in collaboration with The World Bank and OECD, to understand the entrepreneurial desires, barriers and challenges facing women in the region. We work with several safety experts and NGOs to train women on how to stay safe online. We also have a female representative on our global Safety Advisory Board from the region.”
We are always looking for ways to improve people experience on Facebook. In our research with people and safety organizations in India, Egypt, Pakistan and Bangladesh, we have heard that some women choose not to share profile pictures that include their faces anywhere on the internet because they're concerned about what may happen to their photos. These tools will be available to both men and women as they continue to roll out more broadly”
Aly further said the profile picture guard prevents misuse by disabling some ways of saving, downloading and screen-shotting.
“Though we were able to disable screenshots on some versions of the Android app, we understand there are other ways people can gain access for misuses, such as camera-to-screen and desktop screenshots. The profile picture design is intended to help deter people from using these additional ways to gain access for misuse.
We are continuously looking for ways to make people feel welcome and free to express themselves on Facebook, and are committed to helping people build a safe community on Facebook. We are working to understand the best way to address this issue in partnership with safety experts and NGOs. This is a pilot test that gives people more control over how other people interact with your profile picture which will help us understand the impact of different features,” said she.
Facebook introduces new features for Pakistani market Facebook introduces new features for Pakistani market Reviewed by Arslan Bashir on 10:15 Rating: 5

Protect Your Android Device From Malware


The reception rate of cell phones keeps on taking off, with Android driving the way. The open-source working framework that is driven by Google is presently found on the greater part of all cell phones. This enormous client base has gotten the consideration of cybercriminals, who have started to twofold down on their endeavors to unlawfully acquire individual data from Android proprietors. While most versatile malware is found in nations like Russia and China, clients from Europe and the United States aren't totally safe.

There are a couple of straightforward advances you can take to abstain from getting your information secured up an encoded imprison.

Application source 

Just download applications from dependable sources like the Google Play Store. Be careful about any webpage that enables you to download paid applications for nothing.

Application consents 

Notwithstanding while downloading from the Google Play Store you should be watchful. Check the consents the application requests. Regularly, applications that incorporate malware will request a great deal of authorizations with the goal that they can rapidly pick up control of the majority of your telephone's information.

Settings 

Google incorporates various settings in the Android working framework that can avoid malevolent assaults. Gadgets running Android 2.2 or higher, which basically implies almost all Android gadgets, approach Google's malware scanner. Preceding introducing an application, you downloaded outside of the Play store, Google will examine the application and caution you of any potential dangers.

Programming refreshes

While this may not be a possibility for most clients, if there is a refresh for your gadget ensure you download and introduce it. Producers, transporters, and Google are always pushing out updates with bug fixes, upgrades, and new highlights that can influence your gadget more to secure.

Antivirus Application

The Google Play store is likewise home to several antivirus applications that can offer an additional layer of insurance. Organizations like Avast, AVG, BitDefender, Kaspersky, Sophos, Symantec (Norton), and TrendMicro have long and set up histories as the absolute most confided in brands in the business.

Go down your information 

Keep your gadget went down. You can do this:

On your PC.

Utilizing a cloud based move down administration like Google Drive.

On a compact hard plate like a USB pen drive.

Tips on Android ransomware evacuation

The guidelines gave underneath should help you to expel Android ransomware too:

Reboot your telephone into Safe Mode:

Discover the power catch and after that press it for a couple of moments until the point when you see a menu. Snap Power off.

When you get a discourse window that recommends you to reboot your Android to Safe Mode, select this choice and press OK.

On the off chance that this did not work for you, simply kill your gadget and afterward turn it on. When it ends up noticeably dynamic, have a go at squeezing and holding Menu, Volume Down, Volume Up or both these catches together to see Safe Mode.

Uninstall pernicious as well as any suspicious and obscure applications:

At the point when in Safe Mode, go to Settings. At that point, tap on Apps or Application chief (this may vary contingent upon your gadget).

Here, search for the already specified suspicious app(s) and uninstall them all.

Current Malware dangers are developing constantly yet making these strides will make it significantly harder for programmers to pick up control of your information. More often than not digital hoodlums are hoping to exploit senseless errors that individuals are make each day. Remain cautious and 99% of the time you'll remain safe!
Protect Your Android Device From Malware Protect Your Android Device From Malware Reviewed by Arslan Bashir on 11:14 Rating: 5

Tips to Stay Safe on Public Wi-Fi


In a current study, 75% of tablet proprietors and 57% of cell phone/cell phone proprietors expressed that they utilize open Wi-Fi hotspots. The quantity of free open Wi-Fi hotspots is developing, however only one out of every odd hotspot can give the assurance of a private home system, information sent through open Wi-Fi can without much of a stretch be blocked, numerous cell phone and portable PC clients are taking a chance with the security of their own data, advanced character and cash. Moreover, if their gadget or PC isn't ensured by a compelling security and hostile to malware item the dangers are significantly more prominent.

In the event that you need to keep your data and documents secure, read these basic hints for shielding yourself when you're far from home.

Kill Sharing 

You may share your music library, printers or records, or even permit remote login from different PCs on your Wi-Fi organize in the protection of your own home. Unless you debilitate these settings previously interfacing with an open Wi-Fi organize, any other person in the region might have the capacity to hack into your PC.

In case you're utilizing a Windows PC, you'll need to begin by opening the propelled sharing settings of the Homegroup segment of the Network and Internet settings in the Control Panel. From here, you'll have the capacity to flip record and printer sharing and also organize revelation, which will make your PC obvious to anybody associated with a similar system. For Mac, simply go to System Preferences, at that point Sharing, and ensure none of the choices are checked.

Practice Good Internet Hygiene

Maybe the first and greatest suggestion we can give you, past programming, and past apparatuses that guarantee to ensure your protection, is to hone great web cleanliness. Abstain from working with-in any event online-delicate information when you're utilizing unsecured, open Wi-Fi. It might be a decent time to check the news or read your most loved websites, however it's likely not the best time to do your internet managing an account, on the off chance that you get my float. Obviously, on the off chance that you have strategies to secure yourself like the ones we specify beneath, you can rest somewhat less demanding in such manner, however recollect, you should think about security on that coffeehouse arrange. It's improbable that somebody's snooping on it, however it just takes once to prompt data fraud, or more terrible.

Abstain from utilizing particular kinds of site

It's a smart thought to abstain from signing into sites where quite possibly's cybercriminals could catch your character, passwords or individual data -, for example, person to person communication destinations, internet keeping money administrations or any sites that store your Mastercard data.

Dodge Automatically Connecting to Wi-Fi Hotspots

Your cell phone or tablet might be set to naturally interface with any accessible Wi-Fi hotspot, a setting that can genuinely imperil your security. Not exclusively will this enable your gadget to associate with open systems without your express authorization, you may likewise be consequently interfacing with noxious systems set up particularly to take your data.

Most present day cell phones have this alternative handicapped as a matter of course, yet this isn't generally the case, and it's a setting you should constantly twofold check. In the first place, open the Wi-Fi segment of your telephone's settings application. On the off chance that you don't see an alternative to cripple auto-interfacing, you're as of now sheltered. Something else, kill this setting.

Think about utilizing your cell phone 

In the event that you have to get to any sites that store or require the contribution of any touchy data - including long range interpersonal communication, web based shopping and web based keeping money locales - it might be beneficial getting to them by means of your cell phone arrange, rather than people in general Wi-Fi association.

Utilize HTTPS 

Customary sites move content in plain content, making it a simple focus for any individual who has hacked into your system association. Numerous sites utilize HTTPS to scramble the exchange information, yet you shouldn't depend on the site or Web administration to keep you ensured.

You can make this scrambled association with the program expansion HTTPS Everywhere. With this module empowered, all site associations are secured with HTTPS, guaranteeing that any information exchange is protected from prying eyes.

Ensure Your Passwords 

Utilizing interesting passwords for various records can help on the off chance that one of your records is traded off. Monitoring different secure passwords can be dubious, so utilizing a secret word chief, for example, KeePass or LastPass can help keep you protected and secure.

Both KeePass and LastPass are free, yet they store your data in various ways. KeePass keeps a scrambled database record on your PC, while LastPass stores your qualifications in the cloud. There are advantages and disadvantages to each approach, yet the two administrations are totally secure.

Run Anti-Virus Software 

Continually running state-of-the-art against infection programming can help give the principal caution if your framework has been traded off while associated with an unsecured system. A ready will be shown if any known infections are stacked onto your PC or if there's any suspicious conduct, for example, alterations to registry documents.

While running hostile to infection programming won't not get all unapproved action, it's an awesome approach to secure against generally assaults.

Turn on Your Firewall 

Most OS's incorporate a worked in firewall, which screens approaching and active associations. A firewall won't give finish assurance, however it's a setting that ought to dependably be empowered.

On a Windows scratch pad, find your firewall settings in the Control Panel under System and Security. Tap on Windows Firewall, at that point click Turn Windows Firewall On or Off. Enter your head watchword, at that point confirm that the Windows Firewall is on.

These settings are in System Preferences, at that point Security and Privacy on a Mac. Explore to the Firewall tab and snap Turn On Firewall. In the event that these settings are turned gray out, tap the lock symbol in the lower left, enter your watchword, at that point take after these means once more.
Tips to Stay Safe on Public Wi-Fi Tips to Stay Safe on Public Wi-Fi Reviewed by Arslan Bashir on 11:09 Rating: 5

Password Tips to Protect Your Data


As digital assaults appear to end up plainly progressively more common, broad and enduring in their harm, it's more imperative than any other time in recent memory that you and your representatives do everything conceivable to secure your organization's information. One frequently ignored approach to protect delicate data is giving careful consideration to secret key security.

Passwords are esteemed cash in the Digital Age, and utilizing solid passwords to counteract unapproved get to is a need," says Stacy King, official chief of the Federal Bar Association. "The capacity to exchange client information, customer documents, medicinal records, representative records, money related records and other significant and touchy data has exhibited another universe of lawful dangers."

Things being what they are, would you say you are doing what you can to ensure yourself and your business?

Secret word ought to be novel and fascinating.

The propensity to improve your passwords and rehash them makes them inclined to assault. In case you will have a security framework, you need it to work, correct? Powerful passwords are adequately long (at least 8 characters) and consolidate upper and lowercase letters alongside numbers and images.

Utilize Lengthy Passwords

Length can exponentially build the security of your secret key. A solid secret word ought to be no less than eight characters, with 12 to 14 being a prescribed standard. Make certain to utilize a blend of alphanumeric characters and images, alongside capitalization.

Try not to rehash your Password.

Try not to utilize a similar secret key for more than one site. On the off chance that you do, when one secret word is stolen it can be utilized to bargain more than one record. Think about a framework that sounds good to you, however isn't effortlessly speculated by others, to shift your passwords.

Secure your secret key.

In the event that you should record your secret key, don't spare it electronically. In the event that your PC is hacked, at that point you've quite recently given the criminal access to every one of your records when he unearths your "my passwords" report. Store any composed passwords in a safe area, similar to a safe.

Utilize two-factor or multi-factor verification.

Adding an additional progression to your sign in accreditations supports your assurance. It may be a unique mark, a stick sent to your telephone, or a security question you have to reply. Stolen qualifications may wind up plainly futile to a cheat in the event that you have this additional layer of insurance. Check your record settings and include MFA if it's accessible.

Keep away from the Automatic Login Feature.

It may spare you time and disappointment, however programmed, spared login data, including passwords, may make it more probable that your organization could be hacked, says Michael Bruemmer, VP of character assurance at Experian. (In this way, you might need to abstain from utilizing the "recall secret key" element.)

Watch what you share on the web.

Giving the world understanding into your own life via web-based networking media or somewhere else can influence passwords and answers to security to questions less demanding to figure. It likewise gives cybercriminals data to dispatch viable lance phishing assaults. Oversharing rises to more presentation to cybercrime.

Change your secret key.

The reasoning on the estimation of general changes to passwords has advanced. You should change your secret word in the event that you will reinforce it, however transforming it time after time may bring about weaker passwords or rehash passwords if your imagination and persistence runs short. Obviously, if there's an occasion that recommends your secret word may have been traded off, definitely, transform it.
Password Tips to Protect Your Data Password Tips to Protect Your Data Reviewed by Arslan Bashir on 11:06 Rating: 5

How to Choose Anti-Virus Software


While considering the present situation of the digital world it is vital to have a compelling digital security arrangement. Security and right web security programming is currently turned into a key part for any business, as it ensures your PCs, server, and applications from perilous digital assaults including infections, malware, programmers, spyware and then some.

Be that as it may, it is very hard to pick right digital security answer for the business as there are number of choices accessible in the market.

Before obtaining any digital security arrangement it is vital to figure out what you require from your security programming as not all security bundles do precisely same employments. Presently how about we figure out what we require from a security device:

What necessities to ensure?

It is extremely essential to decide what number of servers, PC and cell phones you have to introduce security programming

In the event that you as of now have a security programming:

You can spare your cash by redesigning your current programming

What amount of specialized information do you have?

It is critical to know the specialized skill of your IT group as some product is anything but difficult to deal with where some are extremely intricate. You can give staff individuals more control just in the event that they comprehend the dangers.

What is the future arrangement of your business?

On the off chance that you expected to extend your business, at that point ensure security programming enables you to add more gadgets to the system.

What sort of web security do you need?

By and large, there are two kinds of security programming Standalone and Centralized, albeit numerous antivirus share same highlights yet it is extremely significant to comprehend the contrast between them.

Independent security programming:

It is very simple to introduce independent programming as it should be introduced and overseen in various frameworks independently. Nonetheless, it is additionally simple for staff to debilitate it that leaves business information powerless and unsecured.

Brought together programming:

With this sort of hardware, you can deal with various associated gadget with a control board. This sort of security apparatus gives you the certainty that everything is ensured in your system.

What do you have to check before acquiring security programming?

Security has turned into a critical piece of business security, so once you waitlist the security bundles, you can additionally consider the beneath focuses:

Does your framework run it? antivirus programming needs a great deal from your framework as continually examining the distinctive record out of sight. In this way it is critical that your framework satisfies the product's request.

You should check whether it is conflicting with other existing programming or not. Since security programming gets to every one of your information on the framework, it can at times conflict with other programming too.

It should cost under the financial plan.

These are some essential viewpoints that will enable you to discover right security to apparatus for your business.

The creator is an expert at avast, A firm that conveys online PC repair. Alongside avast antivirus bolster couple of different administrations are advertised.
How to Choose Anti-Virus Software How to Choose Anti-Virus Software Reviewed by Arslan Bashir on 11:04 Rating: 5

Rogue Facebook Friend Requests and How to Keep From Being Taken Advantage Of


What to do when you get a companion ask for from somebody you don't have a clue, and there are no regular companions? Or then again somebody from a gathering or diversion you are dynamic on? Or then again a companion of a companion who looks bad with reference to why a demand would come? Or then again from somebody you know you are now companions with? Think before tolerating - including individuals for including individuals is really sure you'll discover issues fly up - you'll be cloned (somebody will set up another FB profile, professing to be you, finished with your photograph and individual data lifted from your profile), or you'll be posting maverick things, without knowing you're posting them (because of a rebel companion who now approaches you), or your own data and propensities are currently known by outsiders (and abandoning you helpless against theft or more terrible).

On the off chance that you meet somebody in a gathering, or diversion, or application, you truly don't know whether the individual is who he says he is. The individual could be in there, planning to pick up affinity with others so she can associate with all and begin sending fake offers and supplications. There is no assurance anybody on FB is who they say they are. Regardless of whether the character is valid, that doesn't mean their thought processes are unadulterated.

On the off chance that you get a demand from somebody who you know you are now companions with, don't acknowledge - check with your companion in the first place, as it's conceivable the new demand is from a clone. You can regularly take a gander at their page connection and notice it's not quite the same as an ordinary page interface - not only the individual's name. Once in a while, it might be true blue (one companion overlooked her secret key and instead of have FB get a reset, she set up another profile).

Cloners need to claim to be you, or any other individual, to access your companion list - sending companion solicitations to every one of those companions. Once another companion list is made, at that point maverick posts and demands begin posting - request cash, present things on tap on that are endeavoring to exploit you, or phishing plans (to accumulate data from you), and so forth. It might look safe, however gives a heap of data to a rebel individual. Tests make pointed inquiries - gathering data that will, for some, individuals, be one of their passwords.

In some cases a honest to goodness companion gets hacked - somebody has signed in as that individual and is posting things that wouldn't be posted by the genuine individual. On the off chance that you see such, caution your companion in a way not associated with Facebook - email, telephone call, content, or Messenger.

Rebel companions are unsafe to you, as well as to your companions. Once your make a companion, that individual approaches every one of your companions - and any individual who hasn't influenced their companion to list private, is additionally defenseless against being cloned. Your companions are likewise going to be reached to companion "you" once you get cloned.

I'm expecting all the more cloning and fakes to occur from these affiliations. I would propose you do what I've done - make your information private to just your companions and influence your companion to list private to you as it were.

On the off chance that you have posted tests with a heap of your data, or made notes on Facebook with bunches of individual data - dispose of anything that contains data you would use as a watchword or secret key expression.

FB is loaded with rascals, spammers, and cloners. Be cautious. Try not to give them all your data. Try not to tap on posts - many, if not most, will attempt to get data from you (your passwords, access to your profile, for instance). A test that requests a great deal of individual data (giving a heap of data to have the capacity to figure passwords) is once in a while something to be thankful for to reply. Posting when you are on an excursion tells individuals you aren't home - your posts descend other people groups' bolsters when their basic companions "like" or remark or respond to your post. While tolerating an application, or turning into an individual from a gathering (that might be shady), your data and authorizations regularly come to the general population who run the application. Maverick individuals can accumulate such a great amount of data from hiding on FB.
Rogue Facebook Friend Requests and How to Keep From Being Taken Advantage Of Rogue Facebook Friend Requests and How to Keep From Being Taken Advantage Of Reviewed by Arslan Bashir on 11:02 Rating: 5

Cyberattack leaves millions without mobile phone service in Venezuela

CARACAS: A massive cyberattack that took down government websites in Venezuela earlier this week also has left seven million mobile phone users without service, the government said Thursday.
A group that calls itself The Binary Guardians claimed responsibility for attacks that targeted the websites of the government, the supreme court and the National Assembly.
"These terrorist actions which affected the Movilnet´s GSM platform on Wednesday left without communication seven of the state operator´s 13 million users," Science and Technology Minister Hugbel Roa said.
Venezuela has two other private mobile phone operators: Spanish-owned Movistar and Digitel.
Roa said the outage was part of a wave of attacks that began Monday when dozens of government and private company websites were hacked.
Roa said there also have been nine cuts in the country´s fiber optic network, which has cut off already precarious internet service to seven states.
"The attacks were carried out with the help of foreign agents, trying once again to disrupt our country´s connectivity," Roa said, adding that an investigation was underway.
Cyberattack leaves millions without mobile phone service in Venezuela Cyberattack leaves millions without mobile phone service in Venezuela Reviewed by Arslan Bashir on 22:25 Rating: 5

Facebook discretely fields China photo-sharing app

San Francisco: Facebook´s interest in China has led it to discretely create a photo-sharing application released there without the social network´s brand being attached.
"We have long said that we are interested in China, and are spending time understanding and learning more about the country in different ways," a Facebook representative said Friday in an email response to an AFP inquiry.
"Our focus right now is on helping Chinese businesses and developers expand to new markets outside China by using our ad platform."
A source close to the matter confirmed a New York Times report on Friday that Facebook took the unusual step of creating an app called Colorful Balloons and releasing it through a local company with no hint that the social network was involved.
Colorful Balloons has features similar to Facebook´s Moments application.
Facebook has long been keen to find a way into mainland China, where the social network has been banned since 2009.
Google, YouTube, Instagram, and Facebook are among Silicon Valley stars not allowed to operate on China´s tightly controlled internet.
Facebook chief and co-founder Mark Zuckerberg has made high-profile visits to China and met with political leaders there, and is even studying Mandarin.
Colorful Balloons was released early this year through a separate Chinese company, according to the New York Times. It quoted someone close to the matter who did not want to be identified, citing the political sensitivity of the situation.
Facebook is interested in learning how apps win fans in China, without having a prominent company name associated with it. This could help explain the quiet approach.
Having a company in China distribute the application can be more efficient due to local business connections and familiarity with local rules.
Facebook discretely fields China photo-sharing app Facebook discretely fields China photo-sharing app Reviewed by Arslan Bashir on 22:16 Rating: 5

Amazon´s Jeff Bezos becomes world´s richest person

NEW YORK: Amazon founder Jeff Bezos on Thursday became the world´s richest person, as a jump in the share price of the US tech giant enabled him to overtake Microsoft founder Bill Gates, Forbes magazine estimated.
The magazine said its real-time tracking of personal fortunes showed Bezos with a net worth of $90.5 billion, ahead of the $90 billion for Gates.
Bezos owns around 17 per cent of the equity of Amazon, which has been expanding from its original mission as an online retailer to a diversified tech firm in cloud computing, online video, computing hardware and artificial intelligence.
The company also recently announced plans to acquire US grocer Whole Foods, which could help Amazon expand in that sector.
Amazon shares were up 1.7pc at $1,070.72 and have risen some 24pc over the past four months, adding some $17 billion to the net worth of the 53-year-old Bezos.
According to Forbes, Gates has been the richest person in the magazine´s annual rankings in March for the past four years and 18 of the past 22 years. Mexican telecom magnate Carlos Slim overtook Gates from 2010 to 2013.
Among the billionaires gaining ground is Facebook founder Mark Zuckerberg, who has an estimated worth of some $72.9 billion.
While most of Bezos´s wealth is in Amazon, he also owns the private space firm Blue Origin and the Washington Post newspaper.
Amazon´s Jeff Bezos becomes world´s richest person Amazon´s Jeff Bezos becomes world´s richest person Reviewed by Arslan Bashir on 06:45 Rating: 5

Three-man crew reaches space station to boost research

CAPE CANAVERAL: A new crew arrived at the International Space Station on Friday, giving NASA for the first time four astronauts to boost U.S. research projects aboard the orbiting laboratory.
A Russian Soyuz capsule carrying three spaceflight veterans slipped into a docking port aboard the station at 5:54 p.m. EDT (2154 GMT) as the $100 billion research outpost sailed about 250 miles (400 km) over Germany, a NASA TV broadcast showed.
Strapped inside the capsule, which blasted off aboard a Soyuz rocket from Kazakhstan six hours earlier, were Randy Bresnik, with the U.S. National Aeronautics and Space Administration; Sergey Ryazanskiy, with the Russian space agency Roscosmos; and Italy's Paolo Nespoli, with the European Space Agency.
The men will join two NASA astronauts and a Russian cosmonaut already aboard the station, a project of 15 nations.
Their arrival means the U.S. space agency now has four crew members instead of three available for medical experiments, technology demonstrations and other research aboard the station, the U.S. space agency said.
The extra astronaut will effectively double the amount of time for research, program manager Kirk Shireman said at a station conference last week.
NASA does not oversee the Russian staff, which was reduced to two in April until a long-delayed research module joins the station next year.
Previously, Russia flew three cosmonauts, with the remaining three positions filled by a combination of European, Japanese, Canadian and U.S. astronauts, who are trained and overseen by NASA.
By the end of next year, NASA intends to begin flying astronauts aboard space taxis under development by SpaceX and Boeing. Both spaceships have room for a fourth seat, bumping the station’s overall crew size to seven once Russia returns to full staffing.
NASA is using the station to prepare for human missions to the moon and Mars and to stimulate commercial space transportation, pharmaceutical research, manufacturing and other businesses.
The agency also conducts physics, astronomy and Earth science investigations aboard the outpost, which has been staffed by rotating crews of astronauts and cosmonauts since 2000.
Bresnik, 49, last flew on the space shuttle in 2009 during a space station assembly mission. Ryazanskiy, 42, spent five-and-a-half months aboard the station in 2013-2014. Nespoli, 60, is making his third space flight, having previously served on both space shuttle and space station crews.
Three-man crew reaches space station to boost research Three-man crew reaches space station to boost research Reviewed by Arslan Bashir on 06:39 Rating: 5

Apple fails to end lawsuit claiming it 'broke' FaceTime


Apple Inc has failed in its bid to dismiss a lawsuit claiming it disabled the popular FaceTime video conferencing feature on older iPhones to force users to upgrade.
US District Judge Lucy Koh ruled late on Friday that iPhone 4 and 4S users can pursue nationwide class action claims that Apple intentionally "broke" FaceTime to save money from routing calls through servers owned by Akamai Technologies Inc (AKAM.O).
Neither Apple nor lawyers for the plaintiffs immediately responded on Monday to requests for comment.
Apple began using Akamai's servers after losing a lawsuit in 2012 in which VirnetX Holding Corp claimed that FaceTime technology infringed its patents.
Testimony from a 2016 retrial in that case showed that Apple paid Akamai $50 million in one six-month period.
The plaintiffs said Apple eventually created a cheaper alternative for its iOS 7 operating system, and in April 2014 disabled FaceTime on iOS 6 and earlier systems.
Koh said the plaintiffs alleged some measurable loss to their phones' value, and could try to show that Cupertino, California-based Apple's conduct constituted a trespass and violated state consumer protection laws.
The San Jose, California-based judge twice quoted from what the plaintiffs said was an Apple employee's internal email characterizing iOS 6 users as "basically screwed" because of the disabling of FaceTime.
She also rejected Apple's argument that the plaintiffs suffered no economic loss because FaceTime was a "free" service.
"FaceTime is a 'feature' of the iPhone and thus a component of the iPhone's cost," Koh said in a footnote. "Indeed, Apple advertised FaceTime as 'one more thing that makes an iPhone an iPhone.'"
The plaintiffs are led by Christina Grace of Marin County, California, and Ken Potter of San Diego County, California, who both owned the iPhone 4. Akamai was not named as a defendant.
The case is Grace et al v Apple Inc, US District Court, Northern District of California, No. 17-00551.
Apple fails to end lawsuit claiming it 'broke' FaceTime Apple fails to end lawsuit claiming it 'broke' FaceTime Reviewed by Arslan Bashir on 06:37 Rating: 5

Other planets may never be as hospitable as Earth

PARIS: Scientists dealt a blow Monday to the quest for organisms inhabiting worlds besides Earth, saying our planet was unusual in its ability to host liquid water -- the key ingredient for life.

It was thought likely that distant worlds orbiting stars similar to our Sun would go through water-rich phases.
This would happen when the young, dim star of an icy, lifeless planet -- such as early Earth -- starts warming, becomes Sun-like, and melts the ice on planets orbiting it at just the right distance -- the so-called "Goldilocks" zone.
Icy orbs in our own Solar System, including Jupiter´s moon Europa and Saturn´s Enceladus, or "exoplanets" in other star systems, may become habitable in this way, the theory goes.
But a team wrote in the journal Nature Geoscience on Monday that this was unlikelier than had been imagined.
Jun Yang, of Peking University in China, and a team used climate models to simulate the evolution of icy planets.
Without atmospheric greenhouse gases -- a feature of Earth -- the energy required to thaw an icy planet would be so high that it would transit from frozen to inferno without an intermediate, liveable phase, they found.
"We find that the stellar fluxes that are required to overcome a planet´s initial snowball state are so large that they lead to significant water loss and preclude a habitable planet," the team wrote.
Some icy bodies, they suggested, may therefore never pass through a habitable Earth-like state.
Among these, Europa and Enceladus will likely morph from iceballs into fireballs by the time the Sun reaches it´s super-hot red giant phase heat in billions of years from now, said the team.
Earth was an example of an icy world that thawed just enough, some 600-800 million years ago, thanks to planet-warming atmospheric greenhouse gases emitted by volcanic eruptions during its snowball phase, the team said.
This meant that less solar heat would have been required for the ice to melt, enabling our planet to achieve a temperate middle ground.
Greenhouse gases, which are naturally present in the atmosphere but also released by humans burning coal, oil and gas, are what has kept our planet warm enough for humans, animals and plants to inhabit.
But humankind´s addition of mainly CO2 since the Industrial Revolution has caused the atmosphere to retain ever more solar heat, to a point that scientists say we are harming Earth´s perfectly-balanced climate beyond repair.
Other planets may never be as hospitable as Earth Other planets may never be as hospitable as Earth Reviewed by Arslan Bashir on 06:35 Rating: 5

Satellite launched to monitor climate change and vegetation

Cayenne: Two satellites including one dedicated to monitoring the effects of climate change on vegetation were successfully launched into orbit late Tuesday, launch company Arianespace said.
They were launched from Korou, in French Guiana, at 10:56 pm (0136 GMT).
The Vegetation and Environment monitoring on a New Micro Satellite -- or Venus -- is a joint effort between France´s National Centre for Space Studies (CNES) and Israel´s space agency.
Venus will photograph 110 specific sites across the world every two days for two-and-a-half years, charting the impact of climate change on ecosystems and agriculture as well as studying carbon stocks and plant evolution.
The other satellite is on a reconnaissance mission for Italy´s defence ministry.
Satellite launched to monitor climate change and vegetation Satellite launched to monitor climate change and vegetation Reviewed by Arslan Bashir on 06:28 Rating: 5

A Chinese 3D print studio fuses ancient art with modern tech

BEIJING: The small, ornate figurines look like relics of a bygone age: a serene Buddha´s head from the Tang dynasty, or a collection of stone-faced soldiers from the Qin era.
The creation process, however, is decidedly modern.
In northwest Shaanxi province´s capital of Xian, home to such historic sites as the clay Terracotta Army and the 1,000-year-old Giant Wild Goose Pagoda, a small studio and factory uses 3D printing technology to replicate ancient art.
"All the intricate details of the original design are preserved in a 3D mould," Xi Xin, the president of the Xian Chizi Digital Technology company, told AFP.
"Human workers may not be able to produce everything we want in the design, but the printer can do it all."
The firm, whose products are sold at museum shops and to personal collectors, is among the businesses taking advantage of China´s foray into 3D printing -- a rapidly-growing industry that has been incorporated into the country´s national manufacturing strategy.
"In the last five years, 3D printing in China has grown from a one billion yuan ($149 million) industry to a more than 100 billion yuan ($14.9 billion) industry," Luo Jun, the head of the China 3D Printing Technology Industry Alliance, told AFP.
Technological breakthrough 
3D printing came to China in the 90s, Luo said, after Tsinghua University and Huazhong University of Science and Technology professors brought the technology back from the United States.
Domestic development of the methods were slow at first, but the industry has gained momentum with government support.
The Chinese State Council´s "Made in China 2025" industrial development plan lists the promotion of "new breakthroughs in 3D printing" as a priority for growth into the next decade, while the Ministry of Science and Technology counts 3D printing among its thirteen priority projects for technological innovation.
"Now the scale of China´s 3D printing industry has surpassed those of Europe and the US," Luo said.
The Xian Chizi Digital Technology company has developed its 3D design technology over the last ten years, using a stereolithography machine to print carefully constructed digital replicas of historic artifacts.
The design process can take between one to three months, while printing requires up to several weeks of time for the more elaborate pieces.
Once the prototype is complete, it will be mass-produced in a factory using the sane material -- usually wood or copper -- as the relic it was modelled on.
"Our clients don´t buy our products because of the 3D printing aspect, but it does make things easier," Xi said.
For instance, if a customer decides that she wants an 80-centimetre elephant instead of a 50-centimetre one, it´s a simple matter of programming the 3D printer accordingly.
Xi´s company also makes 3D printed moulds for sculptors who use them as models for their own handcrafted artworks.
The final products -- painted miniatures sold for between 20 yuan ($3) and 500 yuan ($74) -- are popular among the tourists who flock to Xian, known as the oldest of China´s four great imperial capitals.
The figurines are now being sold at the mausoleum for Qin Shi Huang, China´s first emperor, and his Terracotta Warriors.
There, at the burial place dating back to 200 B.C., visitors can hold the 3D "artifacts" of China´s future in the palm of their hands.
A Chinese 3D print studio fuses ancient art with modern tech A Chinese 3D print studio fuses ancient art with modern tech Reviewed by Arslan Bashir on 06:27 Rating: 5

Microsoft Paint brushed aside

San Francisco: Microsoft on Monday announced the end of days for its pioneering Paint application as it focuses on software for 3-D drawing.
Paint drawing and image processing software that made its debut in 1985 with the Windows operating system was among the applications listed as "removed or deprecated" in a Windows 10 Fall Creators Update set for release later this year.
Features or functions on the list "are not in active development and might be removed in future releases," according to the US technology company.
For decades, Paint was among applications installed by default on Windows-powered personal computers and drew a strong following.
Fans of the application will be able to take solace in a Paint 3-D version launched early this year.
Microsoft Paint brushed aside Microsoft Paint brushed aside Reviewed by Arslan Bashir on 09:33 Rating: 5

Amazon takes on WhatsApp, WeChat, Google’s Allo with ‘Anytime’

WASHINGTON: Considering the importance of messaging apps in daily life and the success WhatsApp, Facebook Messenger, Google’s Allo, WeChat and other such communication tools have achieved, retail giant Amazon is considering to tap the business by launching one of its own app.
Amazon.com is reportedly working on launching its own messaging app called ‘Anytime’, according to a report from AFTV News. The company has begun to survey its customers about potential features, although it’s not clear what form the final product will take.
The report explains that Anytime appears to be “an all-in-one feature rich service that could even rival social networks,” with a focus on messaging, voice and video calls, and photo sharing, with users able to apply filters to pictures and videos, @mention other users, use sticker and Gifs, and play games.
It further added: “Users would be able to call (audio and video) other individuals or groups, contact businesses to order products or make reservations. The images taken from the survey showed that the service would be secured and encrypted, and would work on a variety of desktop and mobile devices”.
Amazon has already made inroads into the messaging and communications market in recent months.
Earlier this year, it announced Chime, a video conferencing app for its business users, designed to compete with existing services such as Skype for Business or WebEx. Amazon also recently added voice calling and messaging features to its Alexa-equipped devices.
Amazon takes on WhatsApp, WeChat, Google’s Allo with ‘Anytime’ Amazon takes on WhatsApp, WeChat, Google’s Allo with ‘Anytime’ Reviewed by Arslan Bashir on 09:30 Rating: 5
ads 728x90 B
Powered by Blogger.