Google Pie Google Pie

Sunday 22 February 2015

Samsung Galaxy Note Edge launched at Price Rs 64,900,Specifications



Visit Our New Awesome Tech Mashup at >> The Webious Tech Blog <<

Samsung has launched Galaxy Note Edge, the first smartphone in the world to have a display on the side in India, at a market price of Rs 64,900. It will be available for sale from January first week through select retailers in "charcoal black," and "frost white" colour variants. 
#samsung

The display curves on the right edge and looks like a stripe that can display additional information as the user operates the phablet. The curved display is secured inside metal brackets and the left side is curved slightly as well. 

Samsung Galaxy Note Edge sports a 5.6-inch Quad-HD+ (1600x2560 pixel) Super AMOLED display. The phablet boasts of a unique design wherein the right edge of the screen is curved and provides quick access to frequently used apps, alerts and device functionality.

It is powered by a 2.7GHz Qualcomm Snapdragon 805 quad-core processor. The smartphone features a 3.7MP front camera and 16MP rear camera. It has 3GB RAM and 32GB internal storage, expandable up to 128GB via MicroSD card. 

The phone runs Android 4.4 KitKat. It also comes with additional software optimized to make use of the accompanying S Pen stylus. Users can multitask in multi-window mode, which supports minimizing apps as floating widgets. It also has text selection and crops selected areas on the screen for later viewing. The S Note app gets its own widget, so that users can access the core functions of the stylus as soon as they unlock it. 



The Note Edge supports Wi-Fi 802.11 a/b/g/n/ac (2X2 MIMO). NFC, Bluetooth 4.1 (BLE),ANT+, USB2.0, MHL 3.0 and IR LED connectivity options. It has a 3000mAh beattery with support for quick charging. 

Samsung had announced that Galaxy Note Edge would be available in selected markets only as it was a 'limited edition concept.' 

Other than India, Galaxy Note Edge is expected to be launched in Germany, Netherlands, United Kingdom, Australia, Russia, Singapore and Italy. 

Watch Video of Unboxing Samsung Galaxy Note Edge



"Samsung continues with its legacy of pioneering extraordinary innovations and setting new benchmarks in the mobile industry. The Galaxy Note Edge is a stunningly beautiful device equipped with a unique curved screen which not only makes the smartphone distinctive but also delivers a unique way to access information and optimizes functionality," Asim Warsi, VP, mobile & IT, Samsung India, said.

Tuesday 17 February 2015

Uninor Going To Provide Huge Internet speed



 Uninor is on the hunt for high-speed data spectrum, including in the 900 MHz band, through the upcoming auctions and other means such as an acquisition, with Videocon Telecom being "a viable option" for a buy, its new chief executive said.

"We want to prepare ourselves as the market is changing from being voice-centric to data-centric in the future," Vivek Sood told ET. "This would mean more data spectrum." He, however, added that while 3G and then 4G would be the way to go for the industry in, say, two years from now, there is still juice in 2G data with just over a quarter — 27% — of its nearly 44 million users using mobile internet.

He added that for now, the company would continue playing its 'Sabse Sasta' card to attract and retain subscribers, which has seen it gain 1 percentage point user market share in 2014.

Backed by Norway's Telenor Group, which now fully owns the company, Uninor offers 2G prepaid services in six circles, but doesn't have a 3G bandwidth. And with 4G not expected to be widely adopted for some years now in India, analysts fear Uninor may be left far behind in the rush by operators to bag higher-paying data customers unless they get data airwaves soon.

Sood admitted that that the company would in time need to migrate to the 3G and 4G technologies and said it will upgrade its networks to support the surging data-driven traffic over the next 15-18 months, which would include improving transmission, network transformation and acquiring spectrum. "The game is changing now".

Uninor on Monday applied for acquiring airwaves in the auctions beginning March 4, where the government is putting up 177.8 MHz in efficient but expensive 900MHz band, 99.2MHz in 1,800 MHz band and 5 MHz in 2,100 MHz band that is used for 3G services. Sood, 50, who took over as CEO around two months back, said banks are willing to fund the unleveraged company in their expansion efforts.

When asked specifically whether Uninor would be interested in acquiring Videocon Telecom, which has liberalised spectrum in the 1800 MHz in seven circles but operates in only four, Sood said: "Yes, it's a viable option. I don't know what they are thinking, but there is an obvious compatibility since both of us have got the liberalised spectrum".

Sood, however, clarified that Telenor has not held any formal talks with the Videocon Group, whose co-promoter Rajkumar Dhoot recently said it was open to selling 49% and cede management control in its telecom venture. Videocon has licences in MP/Chhattisgarh, UP (E), UP (W), Bihar/Jharkhand, Gujarat, Punjab and Haryana.

Uninor, which operates in UP (West), UP (East), Bihar (including Jharkhand), Andhra Pradesh, Maharashtra and Gujarat, said spectrum in some circles in the 900 MHz band could also be of interest in the coming airwaves sale. "There is a big opportunity we have in our own circles, we still have to be prepared for the next technology move which comes, but it does not mean that others (circles) are not attractive," he said.

Spectrum in the 900 MHz band in Madhya Pradesh, West Bengal, Bihar, Odisha and the Northeast, owned by incumbents, including Reliance Communications, which is up for renewal in the upcoming auctions, could give a fillip to Uninor's existing footprint as 3G services can be offered on this band, say analysts.

In the 2014 auctions, Uninor acquired airwaves in a new circle of Assam besides additional spectrum in UP East, UP West, Andhra Pradesh, Bihar and Jharkhand in the 1800MHz band. Sood said the government was yet to grant microwave spectrum or access spectrum in Assam, after which it will take three to four months to roll out operations in the new circle.




 
The Webious Blog

Saturday 10 January 2015

ASUS Zen Phone 2

The ZenFone 2 is the latest flagship from ASUS. It's packed with a large 5.5-inch display, a quad-core Intel Atom processor, 2GB or 4GB of RAM and the latest version of Android, 5.0 Lollipop! At the CES 2015, the ASUS ZenPhone 2 was announced as a flagship device. It comes with a 5.5-inch full HD IPS panel display and is powered by an Intel Atom Quad-Core Processor with an option of either 2GB or 4GB of RAM.The ZenPhone 2 comes with a really nice and well-rounded design. Its back side has a metallic frame with the volume rockers strategically placed. Meanwhile, the power button has been placed on top of the ZenPhone 2. As for the software, the ZenPhone 2 runs on the latest Android 5.0 Lollipop and ZenUI update. With its Intel Atom chip, the phone creates a smooth and nice user experience.The phone also comes with a 13MP rear camera that can capture videos, and a secondary 5MP front-facing camera.Availability of the 2 GB RAM model will be in Q1 of the year for $199. A higher model for the 4 GB RAM with faster Intel Atom chip will be announced at a later date.

Friday 9 January 2015

The Pirate Bay: Internet Outlaw or Internet File-Sharing Freedom Fighter?


Torrent site The Pirate Bay is in limbo following a raid by Swedish police that took down the service, for the second time in its storied existence, and while there's no resurrection yet in site clones services are popping up all over to fill the void. 

While it's pretty likely the file-sharing service will be back online at some point in the near future, it's interesting to note the Swedish raid, and ongoing police action, is just the latest chapter in The Pirate Bay's rather long history of being viewed as an outlaw by industry and law enforcement organizations.

But what many may not realize is that The Pirate Bay didn't set out to be an outlaw on the Internet. At least, not at the start.

The Pirate Bay was first founded in September 2003 by Swedish pro-culture and anti-copyright organization Piratbyrån, which translates as "The Piracy Bureau." Gottfrid Svartholm and Fredrik Neij first ran the service, which initially had no real structure.

At the time, BitTorrent was an up-and-coming file-sharing technology and the team behind The Pirate Bay wanted to start its own file-sharing site to help promote the sharing of information. The site was first brought online in Mexico by Gottfrid Svartholm, who hosted the website on a server that was owned by the company that he was working for.

The site was soon moved to Sweden, where it was hosted on Svartholm's Pentium III laptop, which had a whopping (or not...) 256 MB of RAM.

The Pirate Bay soon outgrew its limited server capacity, drawing around a million users and 60,000 torrent files by the end of 2004. Also around this time, the team began realizing its site was getting some international attention.

By the end of 2005, the service boasted 2,500,000 users, and that traffic volume was getting serious attention. Copyright holders began sending notices to the operators, demanding The Pirate Bay take down certain content, citing copyright infringement. It was the site's lack of reaction to the increasing requests that eventually led to the site being raided for the first time by Swedish police.

On May 31, 2006, 65 police officers entered the company's Stockholm data center with the goal of shutting down The Pirate Bay. While the raid did bring down the site, within three days it was back online.

And that's when The Pirate Bay hit the mainstream, which drew even more users and, of course, more law enforcement scrutiny.

In 2009, the four founders of The Pirate Bay were found guilty of assisting copyright infringement, sentenced to one year in jail and faced fines of $3,620,000. The decision was appealed in 2010, with the jail time being reduced but the fines were increased to $6.5 million. It also spurred the site's owners to make some technical changes to avoid law enforcement issues going forward.

In 2012, The Pirate Bay stopped offering torrent files for larger torrents, instead moving to magnet links. This allowed the company to save on resources and made it easier for the site to run proxies. Because The Pirate Bay is a censored site, the proxies, which mask the location of a user allowing them to bypass these censors, brought in millions more users.

(To explain, a magnet link is a hyperlink that holds the hash code for a torrent, which the user's torrent client can use to find people sharing those files. A hash code is a unique code that only that torrent has, like a catalog item number. And a torrent file is a small file that contains information on the larger files you want to download. And now back to your regularly scheduled programming...)

Later in 2012 the company announced it was switching its entire operation to cloud-based storage, using a number of servers worldwide. This not only made the site faster, but also made it harder to take down.

But clearly not hard enough, given the second raid on Dec. 9 by Swedish police. Law enforcement once again seized servers and computers. The issue, though, is that likely what was on those servers and systems is backed up in the cloud, far out of law enforcement's hands.

It is unknown whether or not The Pirate Bay will fully return to action, but it appears it's being brought online somewhat by ISOHunt at ThePirateBay.org. While The Pirate Bay's future remains in limbo, one thing is for sure. File-sharing services and operators aren't going away any time soon and in fact continue to thrive.

Founders of The Pirate Bay

Gottfrid Svartholm   


Fredrik Neij  Image result for fredrik neij


Peter Sunde Image result for peter sunde

Smartphones without internet can be hacked too



Hackers may be able to sneak into your laptop or smartphone just by analyzing the low-power electronic signals your device emits even when it is not connected to the internet, researchers say. 

Researchers at the Georgia Institute of Technology are now investigating where these information 'leaks' originate so they can help hardware and software designers develop strategies to plug them. 

By studying emissions from multiple computers, the researchers have developed a metric for measuring the strength of the leaks — known technically as 'side-channel signal' — to help prioritize security efforts. 

"People are focused on security for the internet and on the wireless communication side, but we are concerned with what can be learned from your computer without it intentionally sending anything," said Alenka Zajic, an assistant professor in Georgia Tech's School of Electrical and Computer Engineering. 

"Even if you have the internet connection disabled, you are still emanating information that somebody could use to attack your computer or smartphone," said Zajic. 

Side-channel emissions can be measured several feet away from an operating computer using a variety of spying methods. Electromagnetic emissions can be received using antennas hidden in a briefcase, for instance. 

Acoustic emissions — sounds produced by electronic components such as capacitors — can be picked up by microphones hidden beneath tables, researchers said. 

Information on power fluctuations, which can help hackers determine what the computer is doing, can be measured by fake battery chargers plugged into power outlets adjacent to a laptop's power converter. 

Some signals can be picked up by a simple AM/FM radio, while others require more sophisticated spectrum analyzers. 

And computer components such as voltage regulators produce emissions that can carry signals produced elsewhere in the laptop. 

As a demonstration, Zajic typed a simulated password on one laptop that was not connected to the internet. 

On the other side of a wall, a colleague using another disconnected laptop read the password as it was being typed by intercepting side-channel signals produced by the first laptop's keyboard software, which had been modified to make the characters easier to identify. 

"There is nothing added in the code to raise suspicion," said Milos Prvulovic, an associate professor in the Georgia Tech School of Computer Science. 

"It looks like a correct, but not terribly efficient version of normal keyboard driver software. And in several applications, such as normal spell-checking, grammar-checking and display-updating, the existing software is sufficient for a successful attack," said Prvulovic. 

Currently, there is no mention in the open literature of hackers using side-channel attacks, but the researchers believe it is only a matter of time before that happens. 

12 million driverless cars to be on the road by 2035



DETROIT: Fully automated driverless cars could make up nearly 10% of global vehicle sales, or about 12 million cars a year, by 2035, the Boston Consulting Group said on Thursday. 

BCG said 44% of US drivers it surveyed would consider buying a fully autonomous vehicle within the next 10 years, and that 20% would be willing to pay an extra $5,000 or more for the advanced technology required to operate such a vehicle. 

"This will be as radical a change as the auto industry has seen in 100 years," said Thomas Dauner, head of BCG's global automotive practice. 

Vehicle manufacturers, including General Motors Co, Volkswagen AG's Audi and Daimler AG's Mercedes-Benz, already are working on semi-automated systems that will still require some human involvement. 

The first such systems, which will automatically control steering, braking and throttle in certain situations, are being phased in this year and next. They will appear initially in such premium cars as the 2016 Cadillac CT6 and the 2017 Audi A8. 

But it will be a long, slow ramp-up from semi-automated systems to fully self-driving cars, according to the vehicle manufacturers, many of which expect that the first truly autonomous cars will not reach the market until 2025. 

Enhanced safety is one of the key factors attracting consumers to automated cars, BCG said, but also the ability to perform tasks other than driving while in the car. Lower insurance and fuel costs also were cited. 

Manufacturers and suppliers are rapidly rolling out new hardware designed to speed adaptation of self-driving systems. 

At this week's Consumer Electronics Show in Las Vegas, Mercedes-Benz, Audi and BMW showed vehicles with various autonomous capabilities. 

Daimler's chief executive, Dieter Zetsche, and Audi's chief technology officer, Ulrich Hackenberg, said they expect various autonomous systems to be rolled out in stages over the next five to 10 years. 

As part of its study, BCG said it expected so-called autopilot systems that assist with parking and negotiating traffic jams to begin appearing in two years, followed in 2018 by a highway autopilot system with automated lane-changing capability. 

Farther down the road, fully driverless vehicles, including 'robo-taxis,' could prompt a dramatic shift in urban driving, with more car sharing helping to reduce traffic density, pollution and fuel consumption. 

Twenty years from now, "people will not own cars in large cities," thanks to widespread adoption of autonomous vehicles, said BCG's Xavier Mosquet.

GooglePie

Facebook acquires video streaming company Quickfire

facebook acquires quickfire



Facebook has acquired second company this year, and we are just nine days into 2015. The company is called Quickfire, and it provides technology that converts video formats, and allows high quality videos to stream at less bandwidth. They announced the acquisition on their website.

With this acquisition, Facebook makes it clear that when it comes to video, they are not messing around. The financial terms and conditions of this deal have not been disclosed, but Quickfire confirms that the office will close down its operations. “As part of this, some key members of our team will be joining Facebook and we will wind down our business operations,” it announced on its website.

Quickfire’s expertise will be a big boost for Facebook’s strategy to push video further. With its core product offering, Facebook users with limited Internet access, particularly in emerging markets will be able to enjoy good quality video on Facebook in the future. The end result of this deal, less buffering of HD quality videos on your Facebook timeline.

Facebook, just last year in September announced that the number of video views on Facebook grew by 50 percent between May 2014 and July 2014 and that between June 2014 and September 2014 people collectively averaged 1 billion video views on Facebook each day.

Just yesterday Facebook announced that users were posting 75 percent more videos to Facebook than they did a year ago. The growth has been particularly great in the US, where people are posting 94 percent more videos to the social network.

Monday 5 January 2015

Ubuntu Linux Phone from bq to Ship in February 2015



Ubuntu Linux fans could be sporting smartphones that run the open source operating system by next Valentine's Day. Device manufacturer bq has confirmed that phones powered by Canonical's Ubuntu Touch OS will hit the market in February 2015.




When Canonical founder Mark Shuttleworth announced the company's partnerships with Meizu and bq last February, he promised Ubuntu phones by the end of 2014. That timeline has been pushed back a bit, but the news that bq will begin selling its Ubuntu smartphone, the Aquarius E4.5, will please open source fans who have waited a long time for a phone that runs on a full-fledged Linux distribution (which Android is really not).

bq's phone will go on sale only in the European market, but there should be no restrictions in place that would prevent consumers from using it elsewhere. And since the device, like most of bq's hardware, will likely be available for purchase online, there's no reason people in other regions should have difficulty getting hold of an Aquarius E4.5 (which, by the way, is aptly named, given that the phone will likely appear in Aquarius's zodiac month).



bq has not announced what the Ubuntu phone will cost, but the Android version of the same device—which is a mid-level smartphone, probably just what Canonical needs to have a shot at building a real user base that extends beyond the die-hard Linux-loving crowd—currently runs €159.90, or just under $200.

Along with Meizu, bq is one of only two hardware vendors that partnered with Canonical to deliver smartphones running Ubuntu Touch, the variant of Ubuntu oriented toward mobile devices that Canonical has been working on for a while. Meizu has also promised to release an Ubuntu phone in early 2015, but has not yet set a date.

WhatsApp about to land on your desktop PCs

Is WhatsApp about to land on your desktop?


www.searchtapari.in
The world's most popular social mobile messaging app is rumored to be developing a PC version of its service.
Dutch blog AndroidWorld.nl has uncovered references to a web client version of WhatsApp while sifting through code connected to the current Android smartphone app.
The code in question also suggests that rather than coming as a desktop app, those of us that want the app on our computers as well as our mobile devices will be able to access it via the web -- it looks as if the web app will be compatible with Google's Chrome browser whether running on a Mac or a PC.
It might seem strange at first to take a mobile service and make it immobile, but WhatsApp wants to compete with Google Hangouts and Apple's iMessage, both of which work seamlessly across devices.
If you're working on your computer when a message arrives, isn't it better that it appears on the desktop rather than on a phone which could be buried at the bottom of a bag?
Continuity of services across devices is set to be one of the standout trends of the coming year. Microsoft has confirmed that Windows 10 will have features baked in that will let users shuffle documents and content from desktop to handset and even game consoles.
Samsung is also developing its own system for its ever growing product line that will let its smartphone users get notifications on their smart TVs and push computer files and video content between video players, tablets and smartphones too.

Saturday 3 January 2015

One Plus One Full Specification and Price



BASIC PARAMETERS
1.Color Silk White/Sandstone Black
2.Dimensions 152.9 x 75.9 x 8.9 mm
3.Weight 5.71 ounces (162 g)
4.Operating System Cyanogen 11S based on Android 4.4
5.CPU Qualcomm© Snapdragon™ 801 processor with             2.5GHz Quad-core CPUs
6.GPU Adreno 330, 578MHz
7.RAM 3 GB LP-DDR3, 1866MHz
8.Storage 16/64 GB eMMC 5.0, available capacity variesSensors Accelerometer, Gyroscope, Proximity and Ambient LightBattery Embedded rechargeable 3100 mAh LiPo battery
9.Max. SAR Head: 0.270 W/kg, Body: 0.540 W/kg  

CONNECTIVITY
1.Connectivity GSM: 850, 900, 1800, 1900MHz
2.WCDMA: Bands: 1/2/4/5/8
3.LTE: Bands: 1/3/4/7/17/38/40
4.Wi-Fi Dual-band Wi-Fi (2.4G/5G) 802.11 b/g/n/ac
5.Bluetooth Bluetooth 4.0NFC 65T (software card emulation, payment methods and multi-tag support)Positioning Internal GPS antenna + GLONASSDigital Compass

DISPLAY
1.Size 5.5 inch JDI
2.Resolution 1080p Full HD (1920 x 1080 pixels), 401 PPI
3.Type LTPS IPS with TOL
4.Protection Corning© Gorilla© Glass 3

CAMERAS
1.Sensor 13 Megapixel - Sony Exmor IMX 214
2.Lenses 6 lenses to avoid distortion and color aberration
3.Flash Dual-LED
4.Aperture f/2.0
5.Front Camera 5 Megapixel - Distortion freeVideo 4K resolution video with stereo recording Slow Motion: 720p video at 120fps


AUDIO

1.Speakers Bottom Facing Dual Speakers
2.Microphones Tri-microphone with noise cancellation

MULTIMEDIA

1.Audio supported
  formats Playback: MP3, AAC, AMR,OGG, M4A, MID,      WMA, FLAC, APE, AAC, WAV
  Recording: AAC, M4A
2.Video supported  
  formats Playback: MP4, H.263, H.264, RMVB, FLV720P
  Recording: MP4
3.Image supported 
  formats Playback: JPEG, PNG, GIF, BMP
4.Output: JPEG, RAW

PORTS, SLOTS, BUTTONS AND INDICATORS
1.Ports Data & Charging: Micro USB 2.0
2.Audio:  Jack 3.5mm
3.Buttons Power Button, Volume Rockers                           Capacitive / On-screen buttons
4.SIM 1 slot - Micro SIM
5.Indicators    1 LED notification light (multicolored)

IN THE BOX

1.1x OnePlus One
2.1x USB Cable
3.1x SIM Tray Ejection Tool
4.1x Additional SIM Tray (Nano SIM)

Price 

16 GB = $299 
64 GB = $349

How to Make Window 7 Genuine.

Torrent Link: >> Download << 100% Tested
Install this torrent file and Reboot your computer.. 



Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.

1. Go to “Start Menu -> All Programs -> Accessories” . Right click on “Command             Prompt” and select “Run as Administrator“. 

    If you are not the administrator then you are prompted to enter the password, or else       you can proceed to step-2.

2. Now type the following command and hit enter
    slmgr -rearm

3. You will be prompted to restart the computer. Once restarted the trial period will be       once again reset to 30 days. You can use the above command for up to 3 times by             which you can extend the trial period to 120 days without activation.

4. Now comes the actual trick by which you can extend the trial period for another 240         days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the           following location


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Software
ProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1.

6. Now you will be able to use the slmgr -rearm command for another 8 times so that you       can skip activation process for another 240 days. 
    So you will get 120 + 240 = 360 days of free Windows 7 usage.

    120 days using “slmgr -rearm” command before registry edit
+   240 days using “slmgr -rearm” command after registry edit
 =  360 Days



windows 7 keys are:


H3RCX-HC6QD-DB492-YWGHP-3PB4C
PVBHT-4796G-KM9Q3-7V8HD-J6V7M
FGXGR-D4GTB-6YY24-HG67D-FPQJV
PMMB7-VPWQM-R4TBJ-RQW4F-4J6JB
H2CF9-HX9MM-KY3XQ-26W9C-BYYYX
MKCRW-7BVW9-QT44X-QK7J3-RTJ79
6D72M-BGMX8-R8C6H-PFD72-Q3W6F
VVCFH-4P4X2-KMFG2-PBPK3-G9X93
W3DDG-QM7B8-4J499-J8Q22-R3QW6
Q7WQW-QJBW8-C72H6-M8TX9-P4TB6
W2RQF-RRR9B-3BF7T-K2WYB-M7M8Q
XJBCD-6QCVR-RFBWX-939GC-KHC9J
4DMCV-P3RYB-YRTVW-RW4Q6-BVM9P
2VY3F-F8WVR-7D3VV-YYF37-QVQKV 

Thursday 1 January 2015

World's first hack-proof computer network being built to stop eavesdroppers snooping on state secrets

Great firewall of China:


  • 1.China said to be building the world's first hack-proof computer network 
  • 2.£60million fibre-optic cable is being developed between Beijing and Shanghai
  • 3.Network will secure government, financial and military information from hackers


  • China is building the world's first hack-proof computer network in a bid to give it the edge in its cyberwar against the West, it has been reported.
    A £60million fibre-optic cable between Beijing and Shanghai is being developed that will secure government, financial and military information from eavesdroppers.
    The network will be up and running in two years time and will transmit quantum encryption keys to keep information safe.

    China is said to be building the world's first hack-proof computer network, top stop eavesdroppers it has been reported (file picture) 

    It is being funded by the central government and at first will be used for money transfers by ICBC, the world's largest bank.
    The project is being led by Professor Pan Jianwei, a quantum physicist at the Unversity of Science and Technology of China (USTC).
    He told the Telegraph: 'We learnt after the Edward Snowden affair that we are always being hacked.

    'Since most of the products we buy come from foreign companies, we wanted to accelerate our own programme. This is very urgent because classical encryption was not invented in China, so we want to develop our own technology.'
    Quantum Key Distribution (QKD) – delivers private data using the smallest possible packets of light.
    If the line tries to be tapped into, it will disturb the encoding and will be detected, providing security.
    The news comes after a a representative study on internet attack traffic has revealed that China is the country where the largest number of attacks originate.
    By monitoring connections on the web it was shown that 43 per cent of online attacks originated in China, more than three times Indonesia in second place with 15 per cent.

    Quantum Key Distribution (QKD) – delivers private data using the smallest possible packets of light (file picture) 

    And the researchers add that general internet users can keep themselves safe by frequently updating their software.
    The attacks in the study refer to attempts by a computer to connect to specific ports on the internet, which would indicate a hacked or infected computer that was trying to connect to other computers.
    Akamai’s David Belson, Editor of the report, explains to MailOnline that the results should not be taken as a view of the Internet as a whole, but rather only as representative findings.
    ‘We’re basically saying from the systems we’ve got out there, 43 per cent of the attacks we observe are coming from China,’ he says.
    When asked if he’d expect similar results if every connection on the internet was monitored, he says: ‘It’s hard to say if they’d be similar. 
    'Other attack traffic studies have placed China in top spot [like Akamai], others have placed other countries top.’

    Thank you for reading

    10 Best Hackers The World Has Ever Known

    Shutterstock



    In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity.

    1. Gary McKinnon

    Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the efforts to satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.” Well, looks like McKinnon was something, if he could shut down the US Military’s Washington Network of about 2000 computers for 24 hours, making the hack, the biggest military computer hack of all time!

    2. LulzSec

    LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. While the group claims to have retired from their vile duties, the motto of the group, “Laughing at your security since 2011!” stays alive. There are assertions of the group having hacked into the websites of the newspapers like The Times and The Sun to post its retirement news. Many, however, claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.

    3. Adrian Lamo

    Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst. A guy who would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?

    4. Mathew Bevan and Richard Pryce

    Targeting the over-sensitive nerves, what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. The duo hacked the US military computers and used it as a means to infiltrate the foreign systems. The crucial contents of Korean Atomic Research Institute were dumped into USAF system. However, the contents were majorly relevant to South Korea and hence, less volatile. But this, nonetheless, could have led to a huge international issue.

    5. Jonathan James

    The first juvenile to be imprisoned for a cyber-crime at the age of 16, Jonathan James or better known as c0mrade, hacked into Defense Threat Reduction Agency of US department. Further, he installed a sniffer that scrutinized the messages passed on between the DTRA employees. Not only did he keep a check on the messages being passed around, in the process, he collected the passwords and usernames and other such vital details of the employees, and further even stole essential software. All this cost NASA to shut down its system and to pay from its pocket $41,000. c0mrade, however, had a bitter ending as James committed suicide in 2008.

    6. Kevin Poulsen

    How far would you go to win your dream car or a dream house? How far will you go to win an online contest or a radio show contest? Perhaps, you shall keep trying your luck, unless you are Kevin Poulsen! Poulsen infiltrated a radio shows call-in contest just so he could win a Porsche. Dark Dante, as he was better known, went underground after FBI started pursuing him. He, later, was found guilty of seven counts of mail, wire and computer fraud, money laundering and the likes. What turned out to be rewarding in Dark Dante’s case is – his past crafted his future. Poulsen now serves as a Senior Editor at Wired.

    7. Kevin Mitnick

    Clad in an Armani suit, when a bespectacled face in his mid-40s smiles at you from the computer screen, you can hardly consider the man a cyber-criminal. Such is the case with Kevin David Mitnick. Once upon a time, the most wanted cyber-criminal of US, now is an affluent entrepreneur. Kevin, who is now a security consultant, was convicted of hacking Nokia, Motorola and Pentagon. He pleaded guilty to seven counts of fraud that included wire fraud, computer fraud and of illegally interception a wire communication. After five years of incarceration that included eight months of solitary confinement, Mitnick now has started afresh. However, his knack with the computers is still reminisced and was even depicted on celluloid in the films Takedown andFreedom Downtown.

    8. Anonymous

    The concept of being a “digital Robin Hood” was far from being conceived, but in the computer age, it is very likely that someone somewhere has bagged this title. A “hacktivist group” called Anonymous are known with the penname of being the “digital Robin Hood” amongst its supporters. Identified in public by wearing a Guy Fawkes Masks, Anons, as they are widely known, have publicized themselves by attacking the government, religious and corporate websites. The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets. Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.

    9. Astra

    Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.

    10. Albert Gonzalez

    How safe is internet banking? When we browse through the profile of this mastermind, we are certain that one ought to use the World Wide Web with immense care. For two long years, Albert Gonzalez, stole from credit cards of the netizens. This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. He did so by installing a sniffer and sniffing out the computer data from internal corporate networks. When arrested, Gonzalez was sentenced to 20 years in Federal prison. 


    This article is just for information.
    Hacking is crime.
    Thank you for reading.

    Blog Archive