Friday, February 20, 2015

6 time-saving Safari gestures for iPhone and iPad

6 time-saving Safari gestures for iPhone and iPad

safari tricks swipe forward or back 4IMAGE: BEN PATTERSON

Safari is likely one of the most-used apps on your iPhone or iPad. But even if you are an experienced Safari surfer, it's possible you aren't aware of some of these time-saving gestures that can help you do things a little more easily or with fewer tabs. You don't have to poke at a tiny X to close a tab, or dig into the Bookmarks menu to access your browser history. Try these gestures instead.read more

How to design an environmentally friendly website

istock 000044787048 medium

Your website could be doing a lot more harm to the planet than you think. It might seem like a flash on a screen couldn’t cause much damage, but every small feature of your site has a discernible impact on the environment, with more complex features requiring greater resources to maintain. Over time and in great quantities, it adds up. Many factors - from the color palette you choose to where you host your site - can influence your site’s carbon footprint.read more

Apple wants its cars in production by 2020, report says


carplay apple 100248503 largeAPPLE

Restore a Windows 8 or Windows 7 image backup to an unbootable PC



0129 primary
Sam McCurry wisely created an image backup of his internal drive. Now he wants to know how that backup can help him should Windows fail to boot.
An image backup copies the complete contents of your drive, including the partition table and the boot sector, to a single file—usually stored on an external drive. Other forms of backup are fine for protecting documents and photos, but only an image backup can restore your personal Windows environment.read more

Thursday, February 19, 2015

12 Things You Can Replace With a $38 Tablet


The Ubislate 7Ci isn't a very good tablet, but as a wall clock, it's fantastic!
When Steve Jobs introduced the world to the "magical" world of modern touch-screen tablets in 2010, he surely didn't have Datawind's $38 Ubislate 7Ci in mind.read more

Inside the Dark Web


Dark Web Feature











hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
If our popular culture is to be believed, most people assume there's a place online where the worst of the headlines you read about drugs, money laundering, murder for hire, and vast child pornography rings are born. It's called many things, though "Dark Web" is the most dramatic.read more

How Secure is Your Android? Mobile Antivirus Apps Tested

AV-Test

hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
Most of us will never see our Android antivirus apps spit out a warning because most of us will never encounter malware on our phones. So how can you tell if your Android antivirus is actually protecting your phone against the malware that sometimes sneaks onto Google Play or is installed by anoverbearing spouse? Independent testing lab AV-Test is here with the answers.read more

10 Must-Have iPhone Apps

10 Must-Have iPhone Apps

hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
Look at any list of the best iPhone apps, and you could be there a while. Even if you narrow down your search to just the best free iPhone apps, there are still a lot of recommendations to consider. This list of ten must-have iPhone apps is for busy people who want to cut to the chase. These ten apps are the most essential ones that I think everyone should downloadread more
.

Windows 10 on Phones: What to Expect

Windows 10 PC / Phone Synnergy


hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
Microsoft's announcement of Windows 10 for phones was a really good first step. If you look at my wish list of what I was hoping to get in the new OS, Microsoft hit some of the key points: a better browser in Spartan, Xbox integration, and "universal apps" that could help speed app transitions over to the new OS.read more

Hands On With Microsoft HoloLens

Microsoft HoloLens


hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
REDMOND, Wash.—It is safe to say that no one in the audience at the Windows 10 launch event expected Microsoft to announce a Holographic platform.

When Alex Kipman, a technical fellow on Microsoft's OS team, first said the word holography, I thought I had misheard him. My mind flashed back to when holograms made their way onto charge cards as a security measure.read more

The 100 Best iPhone Apps of 2015

Top 100 iPhone Apps



;;
;;00000000000000000000000000000000000000000000000000000000000000000000Do you need new iPhone apps? Are you tired of the same old same old? This list of the 100 best iPhone apps is designed to help you find new or new-to-you apps that will make life with your smartphone simply better.read more

10 million stolen passwords were just released – here’s how to see if yours is one of them

10 million stolen passwords were just released – here’s how to see if yours is one of them
hackers-hacking-2
Earlier this week, noted security researcher and consultant Mark Burnett made waves when he posted 10 million stolen usernames and passwords on his blog. Of course, the security expert didn’t post the passwords with malicious intent. Instead, his goal was to “release a clean set of data” that gives the world insights into user behavior, and also to draw attention once again to the arrest and prosecution of Barrett Brown.read more

Facebook Now Lets You Choose Who Controls Your Account After You Die



Facebook Now Lets You Choose Who Controls Your Account After You Die

Facebook is putting its users in control of what happens to their accounts after they die. Starting today, users in the US will be able to chose to have their accounts deleted after death or grant another person on Facebook permission to manage an account on their behalf. Facebook calls this person an account’s “legacy contact,” and users will be able to choose that person through the website’s or app’s security page.read more

Firefox tiptoes toward a world without Adobe Flash

Mozilla's Shumway project aims to run the Web's Flash programs without the Flash plugin. It's now running by default for some video tasks in the cutting-edge version of Firefox.


Flash logo
Flash logo

Through a Firefox project called Shumway, Mozilla on Thursday took an important early step toward building a Web that works without Adobe Systems' Flash Player.read more

Wikileaks Steamed Over Google's Lengthy Silence on FBI Snooping

Wikileaks Steamed Over Google's Lengthy Silence on FBI Snooping
Prosecutors often seek a gag order when they believe disclosure of a warrant would jeopardize an investigation. However, an order lasting two and a half years is "very surprising to me," said Joel R. Reidenberg of the Center on Law and Information Policy. "The length of time that has elapsed between the subpoena and the disclosure to WikiLeaks of [its] existence seems quite striking."read more

Repairing the DJI Phantom 2 Vision+ Drone

When you fly an aerial camera drone around at 20 miles per hour, relying on your eyes and a live video feed from an ultra-wide angle lens to navigate, you're bound to have an accident. I experienced this with the DJI Phantom 2 Vision+ while recording some aerial footage at the historic Sleepy Hollow Cemetery in the small New York state hamlet of the same name. I had a shot in mind that took the drone from the ground, up past a tall monument mounted on a column, and forward to capture some video of the row of mausoleums dubbed Millionaire's Row.read more

How to Create an Anonymous Email Account

Why You Need To Protect Your Email Address
hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
Not long ago, the sharing economy seemed to have taken over. Privacy was dead, and no one cared. But that was until revelations about government spying and worse came to light. Today, it seems just as many people are sharing...but many do so with more caution.read more

Facebook Launches ThreatExchange to Stymie Cybercrime

The launch of Facebook ThreatExchange "is about Facebook being one of the larger threat vectors for phishing attacks and looking to share this threat information so companies can be aware and be proactive to prevent cybercriminals using its platform as the threat du jure," said Frank Dickson, network security program director at Frost & Sullivan.read more

Obama's Cyberthreat Intel Aggregator Plan Divides Security Experts

Obama's Cyberthreat Intel Aggregator Plan Divides Security Experts
Whether the various U.S. intelligence agencies will cooperate remains in question. "One of the big challenges with interagency intelligence sharing will be internal politics that come into play," commented Ken Westin, senior security analyst at Tripwire. "There has been a history of this within these agencies which has impacted the effectiveness of several cyberdefense programs." read more

Samsung Smart TV Owners Fume Over Sneaky Pop-Up Ads

Samsung Smart TV
Samsung Smart TV owners, already shaken by news earlier this week that their TVs can transmit voice commands and other private data to third parties, have been hit by another revelation -- that the devices sneak ads into movies they're watching, without the owner's knowledge or consent.read more

POS Terminals Rich Vein for Gold-Digging Hackers

POS Terminals Rich Vein for Gold-Digging Hackers
Since the Target breach, hackers have been busy developing POS malware and expanding its target environment. "We're seeing targeting of parking and airport kiosks," said Trend Micro's Christopher Budd. "The bad guys have figured out that within the U.S., the swipe-and-sign credit card technology is incredibly weak from a security point of view, and ... they're swarming everywhere they can." read more

There's a GHOST in Linux's Library




There's a GHOST in Linux's Library

As security flaws go, the recently discovered GHOST hole is pretty scary. Patching it could be more trying than fixing other recently discovered Linux vulnerabilities, according to Coverity's Jon Passki. "Patching a bug like Shellshock and rolling out a new version could be much easier than patching GHOST, as libc is a core library for many packages and the host operating system in Linux." read more

Canada Levitates Data from File-Sharing Sites

Canada Levitates Data from File-Sharing Sites
Canadian spies apparently have been on a gigantic fishing expedition, scouring file-sharing sites -- for the most part unsuccessfully -- for information that might reveal terrorist plots. The activity has outraged privacy advocates. "We built our societies on the idea that law enforcement can't just fish in people's private affairs for clues about their behavior," said the EFF's Danny O'Brien.read more

A Little Dab of Credit Card Data Can ID Customers

A Little Dab of Credit Card Data Can ID Customers
So-called "anonymized" customer data really isn't anonymous at all, MIT researchers have discovered. It takes very little credit card information to correctly trace transactions with specific customers. "As this becomes a bigger problem, smarter companies will enter the market that use consumer data privacy as a main part of their value proposition," said David Giannetto, author of Big Social Mobile.read more

China May Write New Rules for US Businesses Selling Tech to Banks

China May Write New Rules for US Businesses Selling Tech to Banks
A group of U.S. businesses are hoping to forestall a new policy that would require them to build in back door access into Internet and ICT products sold to Chinese banks, and to provide the Chinese government with the products' source code. "Both countries are tightly intertwined financially," said tech analyst Rob Enderle, but "China may not blink this time." read more

Good and Samsung Partner to Harden Android Security

Good and Samsung Partner to Harden Android Security
The two biggest issues regarding Android's security are the size of the Android market and fragmentation of the Android ecosystem. Those issues impact all mobile platforms, not just Android, according to Charles King, principal analyst at Pund-IT. "The former point is an issue since, as Microsoft learned to its sorrow with Windows," King remarked. read more

Infected Android Apps From Google Play Affect Millions

Infected Android Apps From Google Play Affect Millions
Google's app scanning process may have missed the malware because "they rely mostly on static code analysis and the app in question may have used a 'time bomb' method -- waiting a period of time before downloading and executing the malware," said Patrick Murray, vice president of products at Zimperium.
Millions of Android users have been hit by malware posing as games on Google Play, according to Avast security researcher Flip Chytry.read more

Destroying your hard drive is the only way to stop this super-advanced malware





toshiba hard drive remove
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.
Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency.read more


Saturday, February 14, 2015

Welcome to hexabite.blogspot.com

Hi,
Hexabite is a blog that bring tech news over the world in to one place.not only ours but also form other sites.our main target is to bring all the tech news in one specific stream in to one place.so the people who have specific interest in our stream can join and follow us they'll get tech news form all over the internet to one blog.sounds simple.lot to do so let's start!

Admin,
Hexabite,
2015/02/14 15:53 GMT