Tech News

Sunday, October 23, 2011

Computer game solves AIDS mystery - IDG.se

"In the computer game Foldit is quite ordinary players with virus researchers succeeded in determining the shape of one of the virus that causes AIDS, the M-PMV virus. "
Computer game solves AIDS mystery - IDG.se:
'via Blog this'

Add to Technorati Favorites

Wednesday, October 19, 2011

Introducing Galaxy Nexus. Simple, beautiful, beyond smart - YouTube

Introducing Galaxy Nexus. Simple, beautiful, beyond smart - YouTube: ""

'via Blog this'

Add to Technorati Favorites

Android 4.0 Platform | Android Developers

"Android 4.0 is a major platform release that adds a variety of new features for users and app developers. Besides all the new features and APIs discussed below, Android 4.0 is an important platform release because it brings the extensive set of APIs and Holographic themes from Android 3.x to smaller screens. As an app developer, you now have a single platform and unified API framework that enables you to develop and publish your application with a single APK that provides an optimized user experience for handsets, tablets, and more, when running the same version of Android—Android 4.0 (API level 14) or greater."

for details: Android 4.0 Platform | Android Developers:
'via Blog this'

Add to Technorati Favorites

Saturday, October 8, 2011

IT Industry Competitiveness Index 2011

"The IT Industry Competitiveness Index compares 66 countries on the extent to which they are capable of supporting a strong IT production sector. The Index and analysis as well as this site were created by the Economist Intelligence Unit for BSA"

America, Finland, Singapore, Sweden and UK are ranked top five.

Saturday, October 1, 2011

free fall joy

Experience Zero Gravity from Betty Wants In on Vimeo.

70 Things Every Computer Geek Should Know. | Arrow Webzine

70 Things Every Computer Geek Should Know. | Arrow Webzine: "

1. Default Password List

One of the best list of default passwords. http://www.searchlores.org/defpasslist1.htm 1A. Usability of passwords http://www.baekdal.com/tips/password-security-usability.

2. A bit, about How to hack some common gadgets.

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. It’s amazing how few people know how to do this. If you’re unsure, hit up the link below to find out how: http://www.aagneyam.com/blog/?cat=708

3. Identify Keyloggers

Internet cafes are the most likely place you’ll find them, followed by library, perhaps, and maybe even you own house if you’ve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system? Here’s what one looks like: Hit up this link for excellent info on keyloggers on public computers and how to protect yourself: , http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/

4. Surf the Web Anonymously

We won’t make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible. Aside from the safest method–which is using a connection that is not yours–you will need the ultimate in proxies…Tor. Tor is an onion-routing system which makes it ‘impossible’ for someone to find out who you actually are.

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldn’t use this to gain unlawful access to a computer. If you’re a geek, however, you’ll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation. See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux. http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people don’t realize that. If someone is harassing you via AIM and you can’t get them to stop, discovering their IP and sending it to them–with a nicely worded threat of law enforcement involvement should they not stop–is likely enough to send them scamping away with tail between legs. http://www.ehow.com/how_5529416_someones-ip-address-aim-chat.html

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but there’s always the chance of them being discovered. A password protected RAR is the best choice, but it’s a bit obvious despite the most boring title you could give it. A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through. http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/

8. Crack a Wifi Password

This is one of those things you don’t need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people don’t want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words. A good overall tutorial on wifi and cracking can be found here: http://www.aagneyam.com/blog/?p=623

9. Monitor Network Traffic

The Internet is a vast place with a bit of everything. Whether you’re curious about what your roommate is downloading, your kid is getting into, or any leeches living around you who’ve unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill. Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

10. Recover Master Boot Record

A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record. Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm"

'via Blog this'

Add to Technorati Favorites

Swedish app developers to pay VAT twice - The Local

Swedish app developers to pay VAT twice - The Local: "As of October 1st, the Swedish developers will in effect have to pay VAT twice - once within Sweden and a second time in the country where the app is purchased, if they sell the apps via an intermediary like Facebook, the Apple Store or other third parties, according to a report from Sveriges Radio (SR).

The VAT burden could end up being as much as 25 percent, making it very hard for Swedish companies to be competitive, according to developers, especially as these rules do not apply to those in other EU countries."

'via Blog this'

Add to Technorati Favorites

Subscribe Now: poweredby

Powered by FeedBurner