Friday, September 19, 2008

EasyShare V1273, great digital camera

When looking for digital camera, people will first ask about it resolution, which is correct, but resolution is only the part of those features offered in a digital camera. And its means that people only care to the result, they are not asking the battery life, the control panel ability and what lenses are used; first they always asked the resolution.


Kodak EasyShare V1273 is a new Digital camera that has great features like 12.0 megapixel, 1/1.72″ CCD, 3x (37-111mm) Schneider-Kreuznach Variogon, f/3.1-5.7, 3.0″, 230K-pixel TFT LCD with touch interface and also the standard ISO 64-3200 (6400 in High ISO mode).

Beside that, EasyShare V1273 is a perfect digital camera, why? The material used is the best rated first grade material, and the control panel is touchable. The most important it will able to produce high resolution pictures in any condition with or without lamp.

Take a look more detail at techpedia.biz

Tuesday, September 2, 2008

Life with PlayStation start soon

To be honest, I am impressed by many of the things that Sony wants to do with its gaming console. The Vidzone service interesting, Home will likely change the way players relate to one another, and the forthcoming movie Rental Service looks set to rival the partnership between Microsoft and Netflix. The only real problem is that Sony is plagued by delays. The latest one announced concern Life with PlayStation, which has been pushed back to an undetermined date.

Access to Life-functions will be fast, requiring only a little movement around the XMB. Life with PlayStation will deliver live feeds loaded with content directly to the PS3 as long as you have Internet cord. You will receive news and weather information related to any location you want, just by picking it in a soil map. The general rule is that the PlayStation 3 a hub, which allows users to listen to music while you surf the news delivered to him without a need to set up a traditional PC or turn on another TV.

It also appears that Life with PlayStation will be delivered complete with integrated Folding @ home. This means that when you use the service PlayStation 3 players will also run the Folding @ home in the background. This project, inspired by other distributed processing concepts, such as the one behind the SETI, will use the spare capacity of Sony console made to process data on various scientific projects, like one that is dedicated to finding a cure for Alzheimer's.

Life with PlayStation appear to be a good initiative that can provide the PlayStation 3 users a better experience with their consoles, but Sony may notice that the effect of a variety of initiatives to the current driver, for example, homes and lives, can be significantly reduced if they are delayed for too long.

Host Images with Right-Click 2.0 - Free software

Now you can upload any images from other site to the free Images hosting with simply right click on your mouse. This free add-on will added new features to firefox, so that you can easily host any images from other website.

in order to install this add-on you need a firefox any version



Developer:

License / Price:

Size / OS:

Last Updated:

Category:
Mecho Download
Freeware / FREE
27 KB / Windows All
September 2nd, 2008, 08:37 GMT
Download Host Images add-on for free




Sunday, August 31, 2008

Scammers try to convince people that they have won a fake Yahoo! lottery

Ryan Knight, Community Manager at Yahoo! Mail, warns people not to fall for the last trick involving one of the company's products. A so-called Yahoo! Lottery, promising prizes worth £ 250,000 (over $ 450000), ask users to disclose certain personal data to a "servant" to get the sum.

In this case, it is difficult to believe that one cannot really say that "lottery" is nothing more than just a hoax. And it's not just because, generally speaking, what sounds too good to be true probably is, but because of the e-mail sent by scammers is written in such a broken English that it makes all other ill-worded texts employees by people who are looking for an easy buck to fall into the background.

A fragment of the text goes like this: "This is to inform you that your e-mail has won prize money of two hundred and seventy five thousand British pounds in a lottery promotion organized by Yahoo Lottery INC. for the introduction of all new Yahoo Mail Beta and Yahoo Male Classic as all Yahoo users are required to replace." For one, the text includes different spellings for the name of the company, including a version written in all capital letters, and with or without the exclamation point. Another easily noticeable typo is "price" referring to what should have been a "price" in the lottery.

But a few errors and inadvertences in the so-called "announcement" are actually quite hilarious. "Yahoo Male" is, of course, for one of the new products to be released by the company. In the meantime, the email address of the contact is by Google, Yahoo! S long time rival.

"While phishing messages are known for their poor grammar and spelling, this one really sinks to new lows." At the same time, he reminds people to keep their personal data for themselves, since no company would ever ask them to reveal it. Also, official websites should be accessible from their website and not through links that exist in the mail, adds the officer.

Thursday, August 28, 2008

XSS-filter architecture

A detailed XSS-filter architecture and implementation article was published on the Security Vulnerability Research & Defense blog. The primary objective of XSS filters integrated in IE8 is to prevent the exploitation of cross-site scripting vulnerabilities without breaking the Web.
Cross-site scripting (XSS) is a type of vulnerability common for Web applications, which allows the injection of malicious code to a legitimate Web page seen by other users. Depending on the injected code, the results can have serious consequences. According to Mitre, XSS Type-1 vulnerabilities among the most common on the Internet than buffer overflow types who came first in many years. The rise of XSS vulnerabilities prompted browser developers to carry out serious security features. Microsoft's response is XSS filters for Internet Explorer 8, which will be included in Beta 2 version.

The XSS-filter is built with a number of considerations: to reduce disruption of genuine data / content to a minimum, to reduce the risk of subverting it without compromising on performance, and to move as quickly as possible. In order to intercept requests and replies in the browser, the filter built directly into the rendering engine of IE8 (MSHTML), while a beginning, it was carried out as a mime filters.

In order not to slow down browsing, the filter only comes into action when cross-site navigation is present or when the source of a rendered part cannot be determined. The ability to disable the filters for some areas, such as intranets is also available.

The filter works in two stages. In the first scan GET / POST data using heuristic, in order to identify XSS attacks. If a match is found, a signature is built to detect harmful note. The signature is then used as the HTTP response, and they identified the markup is changing and blocked while keeping the rest of the page intact. The focus of heuristic sets and signatures are regular expressions. Each heuristic contains a list of safe characters. The rest of the characters un-safe will be replaced by a neutering award, which will take notes inactive.

Despite this, XSS filters are not perfect. Some compromises must be made to achieve a good balance between security, compatibility and performance, and not break the sites. At the same time as it protects from the public and the most common forms of XSS attacks, some specific attack scenarios, like the "referrer" based injection, is still not covered. David Ross, Security Software Engineer at SWI team notes that "over time, we will continue to increase XSS filters to maximize efficiency, but we will not compromise site compatibility in the process."

Perspectives Firefox Extension Released

The Carnegie-Mellon University (CMU) made available a Firefox extension developed at its School of Computer Science and the College of Engineering, which enhances security in Firefox, by protecting against man-in-the-middle attacks. The extension, called Perspectives, is available only for Firefox 3 and works on Windows, Linux (32-bit) and OS X (Intel), with support for Linux (64-bit) and the Open Solaris is in the experimental stage of development.

A man-in-the-middle attack is carried out through the interception of traffic between a user and a resource that he is trying to access. This can be achieved by taking advantage of several vulnerabilities, as well as the latest DNS cache poisoning or Gmail accounts hacking incidents show.

Once access to a server resource using secure protocols SSL or SSH, a proper identification of the server is required. This is achieved by digitally signed certificates. Due to the certificates issued by trusted authorities like VeriSign are expensive; it became common practice for small companies and websites that use their own certificates.

When the browser encounters such a certificate for the first time, it raises a warning saying it cannot check the certificate and leave the final decision for the user. Because of this, users have developed a habit of accepting such certificates without paying too much attention. But this also makes it possible for an attacker to intercept the applications to fool users to send sensitive information by those false self-employed persons signed the certificate. Prospects for Firefox will override the default warning, which is often ignored by users, and carrying out their own additional verification methods to determine the validity of a certificate.

It achieves this by researching the "notary network servers." These are servers that automatically contact sites and record changes in their certificates keys for longer periods of times. When encountering a self-signed certificate, Perspectives extension download a list of important changes recorded certificate from notary servers, and uses this information to determine if the certificate belonging to the server, the user is trying to access. A setting allows the user to increase or decrease the level of security, by extension, which affects the way the validity of the certificates is established.

Based on the information received from notary servers, just as the last recorded key, the presence of the most important in a number of notary servers or former key changes, by extension, either automatically accepts the certificate or it gives the user more relevant information of a possible man-in-the - middle attack. The user can then make informed decisions based on this additional information gathered from notaries.

The extension protects users' privacy by allowing them to opt for lodging each time a notary server must be contacted. In addition, the notary servers do not keep any record of IP issues. The code is open source and people are encouraged to contribute their ideas, patches, bug submissions, GUI design or by offering to host notary servers. More technically oriented users can also read the newspaper published by the author that describes the development and its concepts in more detail.

Download Norton Safe Web Plug-in 3.0.0.1

Norton Safe is a new Web site rating service from Symantec. Our servers crawl the Web and analyze what we find to see how it will affect you and your computer.

Norton Safe Web plug-in was to let you know how safe a particular site can be before you visit it. If you need to find out more about how a site can react, we give more detailed information about Norton Safe Web Report.

Spot malicious search results
Norton Safe Web marks up search results for the most popular search engines to help you discern safe from potentially harmful sites.


Avoid visiting malicious Web sites
Norton Safe Web warns you about sites with malicious content before you navigate the site.

View detailed site report
Norton Safe Web Report provides detailed s
ite safety information along with user community reviews.

Important Notice: Norton Safe Web requires Norton Internet Security 2009 English beta and has been optimized for U.S. users. If you have installed a non-English version of Norton Internet Security 2009, Norton Safe Web functionality will not be available.

Requirements:
Norton Internet Security 2009 English beta

Developer: Norton
License / Price:
Freeware / FREE
Size / OS:
5 MB / Windows XP / 2003 / Vista
Last Updated:
August 13th, 2008, 09:31 GMT
Category:
Security, Antivirus

Download Norton Safe Web Plug-in 3.0.0.1

Wednesday, August 27, 2008

A screenshot from one of Apple's iPhone 3G TV ads, 'Unslow'

The ASA has concluded that the iPhone cannot access sites that use Java or Flash, despite Apple's claim that "all parts of the Internet are on the iPhone." Two members of the public complained about the TV ad, therefore, received ASA tell Apple Britain to stop airing the ads



"Two viewers believed the claim that all parts of the Internet was available was misleading because they understand that the iPhone does not support Flash or Java, both integral to many web sites," Advertising Standards Authority (ASA) said. Since Java and Flash is not enabled on the iPhone, users might be tempted to believe that they would have the features of the sites that are based primarily or exclusively on Flash or Java.

According to the ASA, Apple felt that the allegations "You never know what part of the Internet, you need" and "all parts of the Internet are on the iPhone" implied users would be able to access all web sites and see them in their entirety. The ASA, however, thought otherwise. "We felt that because the ad had not explained the restrictions, viewers were likely to expect to be able to see all the content on a site that is normally accessible through a PC, instead of just having the ability to reach the site," advertising agency.

Apple, for its part said that the purpose was to highlight the benefits of the iPhone, which offers all sites on the Internet, while other, less powerful mobile phones, offering access to the WAP versions of the same sites or sites selected by the service providers. Apple therefore defended its claims by saying the ad referred to access to web pages, rather than their specific appearance. Despite this, ASA could not accept this, because not one but two members of the public had found the ad misleading.

"We concluded that the ad gave a misleading impression of the Internet features of iPhone because Apple had not explained the restrictions that surfing on the iPhone compared to a PC," said the ASA in its judgments.

DNS Cache Poisoning Attack

Websense Inc., a large company that offers Web Security filtering and solutions, have discovered that the DNS servers in China Netcom (CNC), one of the leading providers of Internet services, is compromised. The servers that are suffering from poisoned DNS records injection, as a result of the exploitation of errors in the DNS system kernel, revealed earlier this year by Dan KAMINSKY.

The error in the DNS system is considered to be one of the biggest security problems ever discovered, and has been surrounded in secrecy in an attempt to quickly find a solution. The vulnerability, if exploited successfully, it is possible for an attacker to inject false DNS records in a DNS server. This makes it possible for users to be redirected to a malicious Web site even if they try to access an otherwise genuine URL.

The security researchers and companies working on that developed a patch that has been deployed to an impressive number of DNS servers around the world. But, as we previously reported, the patch proved to be ineffective by only lowering the success rate of an attack and increase the time needed to take advantage of it, instead of completely block any such attempts.

The security researchers who work for Websense lab in Beijing discovered the attack by mistyping a URL. Some of the scientists who work for the lab have Netcom as their Internet service provider. When a user enters an address that does not exist in the browser address bar, Netcom DNS servers are supposed to redirect him to a local ad service instead of an error page. ISPs use this type of methods to attract additional revenue.

The successful exploitation of the vulnerability of CNC's DNS servers made it possible for attackers to redirect users to rogue Web sites instead of the ads. These include an iframe that serve malicious code in an attempt to exploit vulnerabilities in browser plug-ins, such as Real Player and Flash Player, or computer applications such as Microsoft Snapshot Viewer.

Security Research Manager for Websense European lab, Carl Leonard, noted that other DNS poisoning attacks have also noticed what makes this attack so interesting is the method used, which means "the malcode authors are trying to keep under the radar." If successful exploitation of vulnerabilities in the above-mentioned applications occurs, a Trojan is downloaded into the victim's computer. Although these applications have been patched to their developers, the fact that the aggressors still chose this approach makes Mr. Leonard think that "people have not applied these spots."

There are other more effective ways to distribute malware via DNS poisoning, but while these attacks have a greater impact and can affect a larger number of users, but also makes them easier to detect and block. This particular attack was intended as a low-profile one and last longer, and even if China Netcom have been notified, it is still uncertain whether the affected servers have been patched.

The Atom-powered Galaxy mobo

Intel's Atomic processor has been designed to meet the requirements of small desktop computer systems and sub-notebooks (also known as netbooks). In fact, the increasingly expanding netbook market has been the main catalyst for Intel's impressive sales figures with its Atom CPU. But some motherboard manufacturers have decided to Atom is perfectly suited for other computer systems, which can be built with the help of a full-sized ATX mobo with an Atomic CPU soldered on it.

As mentioned in several of our previous articles, Atom is among the main causes of Intel's CPU successful business in Q2 of this year. Apparently, the company's Atomic business segments will continue to grow, given the increasing demand for more netbooks and nettops system, as well as other small-power computer systems. Such a system could be built on an ATX form-factor mobo, much like the one the guys in Expreview has encountered.

Although no direct evidence that this actually is a Galaxy-made mobo According to the above-mentioned site, depicted the motherboard has been designed by Hong Kong-based manufacturer. By looking at the specifications list, we can say that users should expect a board layout with two memory slots, four SATA ports, a PCI Express x16 slot, five PCI slots and one VGA port on the I / O plate.

One of the most interesting things about the new mobo is the little Atomic processor that is soldered on it. From the overall layout of the mobo, we could say that Atom is fairly similar in size with the CMOS battery. In addition, according to the information published on Expreview, this particular Atom is designed with a core speed of 1.6GHz, while the Board itself is based on 945GC chipset.

No details about when and where the line will become available but in view of the increasing interest in small, low-power, and, ultimately, low-cost computer systems, it's likely it will surface in upcoming ATX computer systems.

Yamaha's new BD-S2900 player


What is the first to come to mind when people hear the name "Yamaha"? Probably a very quick and aggressive Japanese motorcycle or at least that is the case with yours truly. But the company is also one of the most famous names of A / V product market, as it has come up with a very solid variety of speakers and receivers over the years, so there is really no surprise that it has decided to jump on the Blu-ray bandwagon as well.

Unfortunately, Yamaha plunder in this particular market segment has not exactly been very successful, at least in terms of the company's latest model is concerned. And it is because the BD-S2900 Blu-ray player, launched just a few days ago, giving what can only be described as standard features, while the retail trade for a completely ridiculous price.

Like most other products before, BD-S2900 can output 1080p via HDMI in 24fps and even 12-bit Deep Color compatibility, to be able to deliver the 4096 shades of each of the three primary colors for a total of 68.7 billion possible colors. It also offers some upscaling capabilities through Chroma Upsampling engine.

In addition, high-bit rate audio signals (Dolby TrueHD, Dolby Digital Plus, DTS HD Master Audio and DTS HD High Resolution Audio) are fed directly from the player to the receiver (via an HDMI cable) without conversion to PCM. The unit also offers support for BONUSVIEW features such as Picture-in-Picture and Virtual Package.

Using the BD-S2900 remote control, users can view an alternative picture of the main picture, with compatible Blu-ray discs. In addition, the BD-S2900 can eject the secondary audio. Virtual Package allows viewers to combine information from a Blu-ray Disc with content on an SD card to enjoy additional multimedia and interactive opportunities as they become available.

But as mentioned earlier, the BD-S2900 does not have the exact number of things that would have made it really competitive, namely, support for BD-Live and an Ethernet connection. In this way, the unit cannot perform firmware upgrades and cannot access the online content available for some discs. And the worst is behind us ... this thing sells to the high price of 1200 dollars, which could make you a PS3 and a decent HDTV to watch Blu-rays.

blogger templates | Make Money Online