Sunday, 2 September 2012

Samsung Unveils the ATIV S: First Windows 8 Smartphone


Make way for the ATIV S, which raced to be the first officially announced smartphone powered by Windows Phone 8. Samsung became the first handset maker to announce a smartphone using Microsoft's latest mobile software after announcing the Samsung ATIV S at IFA event in Berlin. This comes out to be an astounding news for many, as Nokia was expected to lead the way (Sorry Nokia, consider your Strike stolen).  ATIV marks the family of Samsung's new line of products powered by Windows 8 OS.


Besides running on Windows Phone 8, the phone has typical smartphone specifications. It features a thin 8.7 mm brushed aluminium chassis and looks quite elegant. The manufacturer says it's designed for "work and entertainment" with native inbuilt support for the very popular Microsoft Office suite. Samsung ATIV S flaunts a 4.8” HD Super AMOLED display backed by a 1.5GHz dual-core processor and 1 GB of RAM. It also features HSPA+42 connectivity, but nothing's being said about LTE connectivity as of now. The ATIV S sports an 8 Megapixel Auto Focus Camera with LED Flash on the back and a secondary 1.9 Megapixel VT Camera in front for Video Communication. 

It looks like Samsung considered the Connectivity options way too seriously. The ATIV S is packed with Bluetooth® 3.0, USB 2.0 connectivity and NFC(near-field communication) along with GPS n' Glonass. For Hassle free Wireless Internet access Samsung has encompassed Wi-Fi 802.11 a/b/g/n connectivity as well. Also you'll discover the same connecting ability that Samsung incorporated in Samsung Galaxy Note II; yes we're talking about the "tap to share" feature. Coming to storage capacity, It'll be available in two segments - 32 & 64 GB. The manufacturers didn't raise the curtain over the price and availability of ATIV S, but will have to be after the release of Windows 8 - October 26th.



Specifications:



Dimensions137.2 x 70.5 x 8.7 mm, 135g
Display4.8 inch (121.9mm ) HD Super AMOLED
OSWindows Phone 8
Processor1.5 GHz dual-core processor
CameraRear: 8 Megapixel Auto Focus Camera with LED Flash
Front: 1.9 Megapixel VT Camera
VideoCodec: H.263, H.264, WMV, MP4, M4V, MOV
Full HD(1080p) Playback & Recording
AudioCodec: MP3, WMA, MP4, M4A, AAC
3.5mm Jack
Sharing Features    Tap to Share (File sharing with NFC and BT/Wi-Fi)
Samsung Family Story
Content FeaturesSamsung ChatOn mobile communication service
& ServicesSamsung Hub
Music Hub
Media Hub (US only)
Samsung Zone (Windows Phone Marketplace)
Photo Editor
Mini Diary
Now (Daily Briefing)
NetworkHSPA+ 42Mbps 850/900/1900/2100MHz
EDGE/GPRS 850/900/1800/1900MHz
GPSA-GPS
Glonass
ConnectivityBluetooth® 3.0
USB 2.0
Wi-Fi 802.11 a/b/g/n, Wi-Fi Direct, Wi-Fi Channel Bonding
NFC(Near-field Communication)
3.5mm jack
SensorProximity, Accelerometer, Geomagnetic, Ambient Light, Gyroscope
Memory16/32GB Storage
1 GB RAM
microSD (SDXC support)
BatteryStandard Li-ion battery,2300mAh

Friday, 24 August 2012

Essential Password Safety Tips


Your password is the first line of defense against cyber attacks. With phishing, identity theft and other Internet crimes becoming more frequent everyday, it is important to choose a password that cannot be easily guessed or deduced by others. An ideal password is one that is easy to remember, hard to forget, and harder to crack. You can create a good password by following the Teqknow tips offered below

  • Create unique paswords

When you use the same password on multiple websites you are at risk of having hijackers figure out and steal your password from a less secured website and use it to access other important online accounts. Use unique passwords for your accounts, especially the more important ones like those for e-mail and online banking.

  • Change password often




Even if you are using a hard-to-guess password, it is not impossible for a hacker to crack the password, it will just take him more time. A hacker can keep accessing your account or network as long as the password is valid. Updating your password regularly, will significantly limit the utility of that password to the hacker. This is why you should change your passwords periodically.



  • Combine letters, numbers, and symbols

By combining numbers, symbols and both lower and upper case letters in your password you make it a lot more difficult for others to guess or crack your password. This might blow your mind but, Did you know that an 8-character password with numbers, symbols, and mixed-case letters has more than 6,000,000,000,000,000 possible variations? :O


  • Keep it in a secret place


Never leave your password written on notes at your computer or desk. Anyone walking by can easily steal and use it to access your accounts. If you want to save your passwords in a file on your computer, make sure to use a unique name for that file that does not reveal what type of information is contained in the file. You must avoid obvious names such as "My Passwords" when naming a file. Another solution is to use a password manager, a software that helps a user organize passwords and PIN codes. There are many of these available as a desktop software, portable applications, or web based service. Spend some time researching them, checking their reputation, and reading reviews. The time and effort you invest in researching them will help you select the one that best suits your password-security needs.


  • Use a phrase acronym

You can create an acronym with the first letters of the words in a phrase or sentence and use it in a password. For example, from the sentence "Johnny, Johnny, Yes, Papa, Eating sugar? No, Papa", you would get "jjypesnp". Using an acronym makes the password easy to remember but difficult to guess.


  • Keep recovery options updated and secure

Keep any e-mail address you use for recovering and resetting your password updated. The same goes for any phone number that you use to receive password reset codes by text message. There are also many websites that let you choose a question to verify your identity if you ever forget your password. Make sure to create a question-answer combo that only you know and can't be guessed from information already posted online. You can also make your answer unique by typing it in an unusual way so others won't be able to enter the answer properly.



  • Make it hard for others to guess

Always create a password that is unrelated to your personal information. Don't use simple words like "password" or "letmein,"or keyboard patterns such as "qwerty", or sequential patterns such as "abcd1234", which would make your password easier to guess. Choose a random word or phrase, and insert letters, numbers, and symbols into the beginning, middle, and end to make it much more difficult to guess.

  • Add extra measures of security


Another way you can add an extra layer of security is by enabling a 2-step verification process. Although, not all Internet accounts provide this option, some like Google do. The 2-step verification process requires you to have access to your phone, your username and password to sign in. If someone else steals your password, they can't sign in to your account because they don't have your phone. You are now protected with something that only you know and something that only you have, your pasword and your phone.


  • Never ever share your password with anyone

You know this, right? ;)

We hope the information in this article helps you protect your password and online accounts.





Sunday, 29 July 2012

Top 15 Free Online URL Scanners

URL Scanners are the tools available over Internet to check the safety of link or web pages by scanning it for threats, drive-by downloads and web exploits. URL Scanners can be used to investigate content of a web-site with multiple reputation engines & domain blacklists, to verify whether specified web site is safe to browse.



Below we name 15 Free Online URL Scanners, to help Internet users looking for tools that check the safety of websites to simply browse or download content.
















Safe Browsing Happy Browsing :)

Monday, 28 May 2012

Break and Make Files using FFSJ


Worried about freeing up huge swaths of space on a storage medium?
Giving up on emailing an attachment just because it’s just too big?
With FFSJ (The Fastest File Splitter & Joiner), you’ll never have to...





What is FFSJ


FFSJ is a small utility tool which consists of a Splitter and a Joiner, thus letting you split files into multiple smaller parts, then join them up again just like the whole Original. You may use FFSJ to split any file into as many parts as you need to, then continue doing what you usually do! It works on any type of file, whether you’re working with documents, text files, spreadsheets, presentations, audio, video or even executables! And the best part of the story, FFSJ is only a single .EXE file which does not need to be installed, you can directly run FFSJ by double-clicking FFSJ.exe

Features

Very fast: FFSJ can optimize disk-cache and memory usage, this makes FFSJ 3-5 times faster than HJ-Split, WinSplit, MasterSplitter in both splitting and joining tasks. Of course, it is much faster than any compression program.
Simple: FFSJ works well on all Windows platforms. It doesn't need any requirement of installations or complicated DLLs.
Small: FFSJ is small enough to fit on a floppy disk.
Easy to use: FFSJ has a friendly user-interface, it can be used to split any file.
Easy to be integrated: Since v3.0, FFSJ published its command-line interface. End-users can split/join multiple files using a .BAT file. Developers can write their own interface (in any language) to perform splitting/joining tasks from their applications.
Secure: FFSJ uses an advanced encryption algorithm to make your data much more secure from unauthorized access. Since v2.9, MD5 checksum algorithm has also been integrated to verify data integrity.
Compatible: FFSJ can join parts produced by HJ-Split.

How to use FFSJ

How to split a file?

1. Open FFSJ.exe and switch to the "Splitting" tab.



2. Select the source file.


3. Change output directory, number of split parts, part limit and set the other parameters as
    per your need.
     (Just mark the "Encrypt data" checkbox while setting your preferences to apply password to the split parts.)


4. Click the "Split" button, enter your password and click "OK" (if chosen) and wait till the 
    File Splitter completes the job.


5. You will see the message


You are DONE with Splitting of file....


How to join split parts together?


1. Open FFSJ.exe and switch to the "Joining" tab.



2. Select the first split part (.001 or .__a file). 
    (All split parts must have the same name, except for their extensions - .001, .002, .__a, .__b, etc.)


3. Check the list of split parts from drop-down list.


4. Change output file, specify if your split parts are in different locations, choose if you want   
    to delete the split files after joining is done through specified parameters.

5. Click "Join" button, enter the password if required and wait till the File Joiner completes 
    the job.



6. You will now see the message


Voila!!! You have the original whole piece of file with you...

Friday, 27 April 2012

Google "Zerg Rush" and gear up to protect your Browser

In a move that’s sure to annihilate the efficiency of a million offices round the globe, Google have programmed a mini-game into their search engine. Head over to Google and type in the words “zerg rush” to find out what happens.

I won't Spill the beans, but it involves a lot of clicky-clacky task, and will grant you a hi-score at the end of game that you can share with the world on Google+.


 Let the Fun begin!!!

Monday, 19 March 2012

Security risks in Cloud Computing


This is an era of mobile broadband, smart phones, and users who run multiple computers and devices. Therefore it makes sense to move e-mail, photos, documents, calendar, notes, finance, and contacts to impressive web applications like Gmail, Evernote, Flickr, Google Docs, mint, etc. But the transferring of data to hosted web applications has its potential pitfalls and risks that are lost in all the hype around Cloud-centric systems.

Cloud Computing is one of the biggest changes in IT, with computing functions as a service with promising innovations that we can not yet imagine. Customers are both excited and nervous about the prospects of cloud computing. They are excited by the possibilities of reducing capital costs and the ability to strip them of infrastructure management, and focus on core competencies. What excites them most is the agility offered by the demand supply of computing and the ability to align information technology along business strategies.

At the same time, customers are also very concerned about the security risks of cloud computing and the loss of direct control over the systems they are responsible. Whether a company uses Software as a Service (SaaS) version of customer relationship management (CRM), creating offsite backups of company data, or setting up a page of social media marketing, it is trusting a third-party organization with business information.

While cloud computing can provide significant business cost reducing benefits, the service does come with some security risks. As per Gartner, a leading analyst firm, cloud computing is loaded with security risks. Customers must demand transparency, avoiding vendors that refuse to provide detailed information on security programs. It is very important to understand the qualifications of policy makers, architects, programmers and operators; risk control processes and technical mechanisms and the level of testing been done to verify that the service and control processes work as expected, and that vendors can identify unanticipated vulnerabilities.


  • Secure data transfer - All of the traffic in a network through clouds of the Internet, must be on a secure channel.
  • Secure software interfaces - Companies must be aware of software interfaces, or APIs, which are used to interact with cloud services, otherwise risk of being exposed to a variety of security issues related to confidentiality, integrity, availability and accountability arises.
  • Secure the data stored - Data should be securely encrypted when it is on the provider's servers and while it is being used by cloud service. According to Forrester, another analyst firm, some cloud providers ensure the protection of data used in the application or for disposal of your data.
  • User Access Control - Data stored on the server of a cloud provider can potentially be accessed by an employee of this service. Companies should ask suppliers for details on the people who manage their data and the level of access they have to it.

  • Separation of data - Each cloud-based service shares space on the provider's servers and other parts of the provider's infrastructure. Dangerous Subdivision Techniques, such as poor data encryption, may give other customers of the service an easy access inside your virtual container.
  • Lower Privacy Protection by Law - To search for a home or office, the authorities need a search warrant. But they do not need any warrants to obtain information stored on third-party's Web servers. Moreover, such research can also occur without the knowledge of the company.
  • Unavailability of the Server and Account Lockout - A great advantage of storing data on a server cloud is that the firm does not need to take backups anymore. But what would happen if the servers go down, and employees are dependent on the cloud for e-mail or to access the PowerPoint slideshow for an important presentation?


In conclusion, although a company must meet these safety issues with the cloud provider before entrusting their data to its servers, these risks should not be a stumbling block. Cloud computing also offers companies many benefits, so that instead of rejecting cloud computing, companies should establish strictcontrols and security measures in place.

Sunday, 18 March 2012

Green Computing/Green IT: Need of the Hour



The exponential growth of the IT industry has brought with it new inventions and infrastructure needs, which resulted in inappropriate use of resources and production of environmentally unfriendly products. It is as if the whole IT / ITES community ignored the impact on the environment, while they were busy ideating and creating new versions of the same gadgets and use of resources such as paper, water, plastic and electricity,
without giving much thought to the environment.
When Al Gore started waking powers to the injury, which took place on the environment on a global scale, many stood up and noticed. Not only did folks started being environmentally friendly, companies began to "care" for the environment. Soon, with the celebs jumping on the bandwagon and showing the error of our ways, large companies joined the initiative to "go green", thus leading the way for other companies. Finally, the IT industry to realized that they too can do its bit and began to contribute towards the environment. The Outcome? Green Computing - or Green IT to some - is touted as one of the major trends in the recent years.



What is Green IT anyway? We all are doing our bit for the environment, right? Well, Green IT is an organization's way to go green. There are many definitions / explanations that can be found over the Internet.
Here is the exact one found on Wikipedia: The study and practice of design, manufacture, use, and disposal of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems—efficiently and effectively with minimal or no impact on the environment (Source: Wikipedia.org). Green IT also aims to achieve profitability and improve system performance and utilization, while maintaining our social and ethical responsibilities. So, Green IT includes dimensions of environmental sustainable development, economics of energy efficiency and total cost of ownership, which includes the cost of disposal and recycling. It is the study and practice of using computing resources efficiently.
Too much information? Simply put, it is the practice of using computing resources more efficiently, while maintaining or increasing overall productivity. The aim is to reduce consumption of hazardous materials, maximize energy efficiency and promoting recycling or biodegradation of non-existent products and factory waste.Easier said than done, for the company to go green overnight. Instead of looking at the company's position as a single unit, companies will have to take a step back and see the Green IT in the big picture. For example, when building the infrastructure owners will have to think about building a 'Green Campus': where you have one side of the building consisting of glass, rather than bricks and mortar, or building where there is natural ventilation and lighting. Usage of resources such as electricity, paper and water should be significantly reduced. Buying "green computers" will save energy and causes less damage to the environment, virtualization reduces the consumption of paper documents, buying new services: hardware and software that improve performance saves time and money by finding areas that take up a lot of electricity and addressing those areas also reduce costs.



We, as responsible citizens can always do our bit, too. Here are some ways (which I found across various websites):
1. Switch the computer off if you do not use it, especially at night, and if the whole day.
2. Print wisely - only print when you really need to have a hard copy and resist the temptation to print "All pages" when all you need is/are some particular page(s).
3. Use Google alternatives, such as the Smallest Google, which saves energy, time and bandwidth.
4. Buy a laptop. Laptops consume less energy than a desktop.
5. Choose a wired keyboard and mouse over the wireless.
6. Advanced users can get rid of unnecessary fans and drives. If you have a spare CD-ROM, use it once in a while and then unplug it.
But wait, green computing is not cheap. Did you know that these energy-saving software and hardware upgrades cost a bomb? Many companies, especially small and medium-sized companies have to think twice as they try to balance their desire to go green, and their financial resources. But again, looking at it from another perspective, by resorting to green computing, these companies are saving money and  the environment as well. Big companies also use a lot of manpower and energy. To reduce energy consumption will lead to lower efficiency. But analysts predict that the advantages of going green will encourage companies to look at technology and energy models that will use less energy and saving energy. I think it is a big plus.
Being a tree hugger myself, I hope that Green IT is here to stay and start now in any way possible. We also need to educate people around us about green computing, if they are not already aware of. And remember that in everything you do, Go Green!!!