Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

seo upcoming laptop 2013 2013

Seo Master present to you:

Samsung Series 3 NP350V5C Review


Samsung Series 3 NP350V5C
Samsung Series 3 NP350V5C is a lightweight mid-range gaming laptop with Intel Core i7-3610QM, AMD Radeon HD 7670M GPU, 750GB hard drive and 8GB of RAM. The laptop delivers sufficient computing and multimedia performance. Priced at 999 euro, the Samsung Series 3 NP350V5C is significantly cheaper than more serious gaming behemoths. The 15-incher machine comes with a diverse array of ports; a couple of USB 3.0 ports, VGA port, full-sized HDMI port. The laptop uses 15” 1366 x 768 full HD LED-backlit display, which unfortunately shows annoying reflection when used outdoors.
The upper mid-range hardware configuration offers adequate performance for average gaming. Skyrim scores about 35fps at high detail settings, but slumps to 19fps when battery-saving mode is enabled. The notebook pleasantly hums at 32dB at idle with occasional clacking noise from the hard drive. It runs for 5 hours 40 minutes at idle, with minimal brightness and WLAN turned off; and slightly more than one hour under full load with maximum display brightness.

AMD will Release Brazos 2.0 Processors in 2013


AMD Brazos 2.0 Processors
Netbook users would be familiar with AMD’s APU solutions, which combines a processor and integrated graphics solution. Unlike Intel’s built-in graphics capability, AMD’s platforms work more like dedicated graphic cards, allowing fluid full HD video playback and DirectX 11 representations. After releasing the highly efficient C50/C60 and the more powerful E350/E450, the company released the E2-1800, which turned out to be a disappointment with its slight performance increase compared to the E450.
In 2013, we would start to see ultra-portable laptops running the new E2-2000 dual-core processor clocked at 1.75GHz. The APU will feature 1MB of cache the Radeon HD7340 GPU (538-700MHz). From the technical standpoint, this would easily look like AMD’s attempt to rebrand the earlier E2-1800, as the 50MHz clock increase would offer nearly indiscernible performance boost during daily usages.
Significant improvements wouldn’t arrive until AMD releases APUs with 28nm Kabini core, which will be aimed to replace all Brazos chips in the market.

Asus BU400A Ultrabook Will be Available in 2013



Asus BU400A Ultrabook


Consumers will start seeing the Asus BU400A ultrabook with touchscreen display in January 2013. The machine is aimed for enterprise use and although it doesn’t look quite as svelte as Asus’ Zenbook lineup, the BU400A is still a lightweight enough for any traveling businessperson. The laptop features a spill-resistant keyboard, HD display and solid carbon frame, as well fingerprint scanner, trusted protection module and data encryption.
The anti-shock system would easily protect the data stored within the mechanical hard drive. A more ultrabook-like version comes with a SSD for extra performance and reliability. The BU400A supports Windows 8 OS and its features, including the gestures. Weighing about 3.6lbs, the sleek laptop features SD card ports, VGA and USB 3.0.
In terms of processing and graphical powers, Asus BU400A will be equipped with 3rd generation Intel Core processors and Nvidia NVS 5200M graphic card. The Computrace LoJack and Intel’s Anti-Theft technology would help users retrieve stolen or lost notebooks and prevent harmful intrusions to enterprise data.

Retina Macbook Air Will Be Unveiled in 2013


MacBook Air

Analysts say that there will be some big changes in Apple’s lineup in 2013. The company may introduce a Retina Display version of MacBook Air along with Retina iPad Mini in 2013. The new MacBook could have the new Mac OS X 10.9 under the hood and the iOS 7 would be released some point next year too.
Loyal Apple fans should get excited with other new devices the company plan to release in 2013. For example, huge Apple TV sets with screen sizes somewhere between 42” and 55” would be available for about $2000 at around Christmas 2013. The TV will serve as a hub that connects multiple iDevices near the area. The TV may include FaceTime, Siri and support for iOS apps.
Along with the Retina MacBook Air, the company will also launch the iPad Mini 2, which currently lacks full-HD resolution. This would address one significant issue that plagues the original iPad Mini. The display technology would also significantly enhance user experience for MacBook Air owners.

Intel Bay Trail-T Laptops Will be Released in 2013


Intel Bay Trail-T Laptops


The Bay Trail-T is a direct follow-on of the current Clover Trail platform. With the 22nm architecture, these new processor models will require only half the power consumption of the 32nm Clover Trail. A leaked document shows that a machine running Bay Trail-T can go for about 11 hours, whereas the older Clover Trail offers only 9 hours of operational time with the same battery capacity.
The Bay Trail-T has bumped the number of cores to four, with clock rate ranging from 1.5GHz to 2.1 GHz, which means the new platform should provide nearly 60 percent of performance increase compared to the Clover Trail.
Bay Trail-T processors are fully optimized for Windows 8 notebooks, with the Intel HD 4000 integrated graphics solution, also used by the current Ivy Bridge chips. This would allow Bay Trail-T machines to have up to 2560 x 1600 pixels resolution and three-fold boost in performance

Touchscreen Notebook Manufacturers May Face Serious Supply Problems in 2013


New Notebook





PC maker looking delivers a large number of touchscreen notebooks may suffer supply problems in 2013. Major vendors like Asus, Acer, Lenovo, HP, Sony and Dell are struggling to acquire a steady supply of touchscreen component for their notebooks. Current touch panel makers are still concentrating on huge demands in smartphones and tablet market.
Also, there is almost no indication that consumers want touch-based Windows 8 notebooks, although the new OS version is fully optimized for touch operations. Acer expects that touchscreen notebooks will account for 15 to 30 percent of its total shipment in 2013, if Windows 8 successfully reshapes the PC industry by encouraging people to use the touch-based interface more.
As touch panels makers are still fully committed to satisfy demands in mobile industry, notebook vendors will experience poor yield rates. Compal further reiterates this prediction that in 2013 the biggest hurdle for touch-based notebooks is not the lack of demand but supply.

How Windows 8 Would Affect Laptop Market in 2013?



Windows 8 Laptop
It is an undeniable fact that Microsoft Windows is dominating the computing world with its appealing user-friendly interface and support for a wide range of devices. Although some would quickly argue that Windows OS isn’t the best in the market, Microsoft has improved significantly and Windows 7 was often praised as its best Windows version yet. Windows 8 will arrive soon and the market would be inundated with new PCs and laptops designed specifically for the new OS.
If you are planning to purchase a Windows 8 laptop next year, there are a few changes to consider. Touch capability may finally arrive to laptops, as Windows 8 interface are fully optimized for both mouse/keyboard input and touch. It is also important to expect a lot of convertibles and hybrids, as Windows 8 finally allows these devices to work properly. It is also quite possible that there will be close integration between Windows Phone 8 smartphones and Windows 8 laptops.

Laptops with Haswell Processor Will Be Released in 2013



Laptops with Haswell Processor
Some new laptops released in 2013 are expected to deliver twice the performance and battery life with the new Intel “Haswell” Core processor. The new processor family will succeed Intel’s current mainstream processor family, the Ivy Bridge. Haswell will deliver twice the battery live and double the performance of Ivy Bridge. When used in Ultrabooks, this could be equal to approximately 6 to 8 hours of battery life.
The processor giant shed some light on the processor last September at the Intel Developer Forum. It claimed that the power consumption has been reduced sharply to the point where Haswell processor can run in tablets. The most power-efficient model of Ivy Bridge draws 17 Watts, while low-power versions of Haswell processors will draw 10 Watts during idle.
More powerful 15 Watts and 17 Watts models are also available for standard laptops. Haswell tablets running Windows 8 could reach performance levels never achieved before in the mobile industry. The ultrabook market has stagnated following the slumping PC industry and the Haswell processor family can create a spark that everybody needs.

Ultrabooks in 2013 Will Have Touch Capability



New Ultrabooks


Ultrabooks are known for their elegant, lightweight and slim design that delivers full-scale performance without sacrificing battery life. These devices are more portable than standard laptops and can be used anywhere. Despite its small footprint, they have all the features you need, including SSD drive and USB 3.0 ports.
Apparently, some manufacturers are noticing the eventual convergence between tablets and notebooks. Some tablets models can transform into netbooks with their docks or integrated physical keyboard, and in turn, some ultrabooks models in 2013 will have touch capability. This would significantly close the gap between two computing devices and offer consumers significantly much more options.
Future release of touch-capable ultrabooks is announced during the Annual One Summit in New Delhi, India. Intel and Microsoft are currently working to develop an exceptional touch experience in Windows 8 environment. Intel has also worked with Nuance to create an immersive voice-based capability, which allows voice commands on PC and laptops.

Thank you. If you think this post may help your friends then please don't forget to share with facebook, twiter or google plus.



2013, By: Seo Master

seo Flexible Samsung phone 'ready in early 2013' 2013

Seo Master present to you:
Samsung will soon begin mass production of phones with displays using plastic rather than glass, a move that will make mobile devices unbreakable and bendable.
 

The company is sampling the displays with "a few customers", reports the Wall Street Journal, and is "in the last phase of development" for the devices, which are expected to be released in the first half of next year, according to its source.
Using a plastic polymer instead of glass, Samsung has produced displays that can roll and bend, and survive falls and blows from the clumsiest of customers.
Samsung is seeking to differentiate itself from other mobile brands in an increasingly cutthroat marketplace, and flexible displays could boost their profile by offering a unique product.
Organic light-emitting diodes (OLEDs), used in televisions and smartphones, have made the flexible phone technology possible, as they are compact and can withstand being placed on ductile materials such as plastic and foil.
More than a year has gone by since Samsung showcased its Galaxy Skin, which purported to offer a high-resolution 800×480 flexible OLED screen and eight megapixel camera, and has still yet to be released.

Companies are also trialling the technology for potential use in digital posters and clothes with digital displays.
The 2012 Plastics show in Birminghamthis week showcased some of the technology, although consumers will have to wait at least until the new year before they become commercially available.
2013, By: Seo Master

seo By 2013, computers will be 1000 times faster 2013

Seo Master present to you:
London: Get ready for the next-generation computers and smart phones that are up to 1,000 times faster than the systems you use today.
Computer maker IBM is developing “skyscraper” computers using huge sandwiches of silicon chips by sticking layer after layer of chips covered with tiny components together.
The process, for which IBM has roped in glue maker 3M, will make PCs and smart phones up to 1,000 times faster than the existing ones and are expected to be available in market as early as 2013.
3M currently makes heat resistant glues, adhesives used in the aerospace industry and sticky tapes, but the hi-tech glues created for IBM could actually be the key step towards making the next evolutionary leap in computing, the Daily Mail reported.
The attempts at piling chips vertically - known as 3D packaging - has so far been suffering from overheating. But, the new glues could potentially conduct heat through a stack of densely-packed chips and away from logic circuits that could be burnt out by the heat. The research aims to create “stacks” of up to 100 layers of silicon, the report said.
Mike Bowman, marketing manager for 3M, said, “This material fits underneath computer chips when they’re attached to printed circuit boards - the unique part of what we’re doing is that our glue conducts heat out to the edge of the sandwich. “Our glue will spread heat more evenly through the chip. With conventional chips, with just one or two layers, but once you’re stacking chips, the problem can become very severe.”
According to the researchers, a ball of advanced adhesive is placed between layers of chips, allowing up to 100 chips to be stacked without overheating.
”Today’s chips including those containing 3D transistors are in fact 2D chips that are still very flat structures,” Bernie Meyerson, a vice president of IBM research, said in a statement.
So far, most increases in computing power have been driven by scientific breakthroughs that allow chip makers to etch ever-smaller circuits onto ever-smaller chip wafers. The new ‘3D’ approach could accelerate gadgets such as tablet computers to unheard-of new speeds.
“Our scientists are aiming to develop materials that will allow us to package tremendous amounts of computing power into a new form factor - a silicon skyscraper,” said Meyerson. “We believe we can advance this, and create a new class of semiconductors - faster, with lower power usage, ideal for tablets and smart phones.”
Other 3M glues are used in hi-tech industries such as solar power, as well as in markedly lower-tech environments such as carpentry.
Both companies did not speculate on a release date for the new technology, but insiders said such versions could be on the market as early as 2013.
2013, By: Seo Master

seo Make Your Own Laptop A Touch Screen 2013

Seo Master present to you: Today's artist is not limited to pencil and paper. The digitization of the world has long been a part of the creative crowd and with the availability of touch screen laptopstoday even the most amateur can get a taste of expressing art directing into digital form.

Most artists, or anybody for that matter, have the foresight to purchase a laptop designed specifically with touch screen technology. And while many computers have the life expectancy of two to five years, most people don't have the inclination to fork over extra money for a new laptop. Most people simply didn't know there exist such a feature.

Regardless of your specific situation, anyone who desires the touch screen laptop functionality now can have it for less than two hundred dollars by the way of the TabletLaptop by NAVIsis. It allows for the touch screen functionality as an add-on option.

The minimum PC requirements are easy enough that only the dinosaurs of computers won't be able to meet. In fact, if you have a laptop any less than the minimum requirements, and you would like to upgrade, just go out and buy a new laptop. They aren't even expensive these days. But back to the point, most Windows home operating systems with a Pentium 500MHz or equivalent will do. The input is the later version USB 1.1 so every machine with a USB will do and an optical disk drive for the CD.

Some of the cool features are programmed to work integrated with Microsoft products. For example, in Microsoft Outlook, the add-on allows for creating and sending handwritten emails. The device is easy to install and allows for all the standard features of a touch screen laptop or tablet pc such as dynamically manage and control objects and applications without the need for a mouse.

The main complaint observable is that it further complicates the intended mobility of a laptop. The website promises a compact design, and as compact it can be, there is a physical size requirement that no amount of innovation, to today's knowledge, can eliminate. An effective detriment the laptops purpose of being portable.

Some specific design problems as differentiates the add-on from acting completely like a true native touch screen tablet. These laptops, such as the Toshiba touch screen laptop, offer a swivel screen that flips and twists and folds backwards that an ordinary laptop with an add-on cannot. Being able to fold backwards allows the user to write on the screen much more intuitively than a regular laptop screen.2013, By: Seo Master

seo Urine Powered Generator 2013

Seo Master present to you:

A urine powered generator


Possibly one of the more unexpected products at Maker Faire Africa this year in Lagos is a urine powered generator, created by four girls. The girls are Duro-Aina Adebola (14), Akindele Abiola (14), Faleke Oluwatoyin (14) and Bello Eniola (15).
1 Liter of urine gives you 6 hours of electricity.

The system works like this:
  • Urine is put into an electrolytic cell, which separates out the hydrogen.
  • The hydrogen goes into a water filter for purification, which then gets pushed into the gas cylinder.
  • The gas cylinder pushes hydrogen into a cylinder of liquid borax, which is used to remove the moisture from the hydrogen gas.
  • This purified hydrogen gas is pushed into the generator.
Along the whole way there are one-way valves for security, but let’s be honest that this is something of an explosive device…


2013, By: Seo Master

seo Create xml alternative sitemap for Blogger and submit Google, Bing for increase your website traffic 2013

Seo Master present to you:
Do you know what is xml-sitemap?
An xml site map is a map that contains your all blog or website pages which that you want to submit into a search engine.
Why you create a site map?
For indexing your blog or web pages quickly into a search engine to get a better traffic from search engine.
Today my discussion topic is "Create xml alternative sitemap for Blogger and submit Google, Bing for increase your website traffic". I know it is not possible to upload an xml file as a sitemap into blogger platform. But you can use an alternative. To use this alternative you don't need to upload any kind of files.
Upload sitemap into Google webmaster tool
First, Go to https://www.google.com/webmasters/tools/ and sign in with your Gmail account and password. If you have no Gmail account first create an account. If you need any help to create Gmail account you can read How to I create a free email (gmail) account step by step.
Second, after log in your account click on "ADD A SITE" if your site is not listed yet. And verified with meta tag option or with upload a HTML site. You can read How to I upload a HTML file into my blogspot and verify my blog.
Third, Then click on your blog url and you are now your webmaster dashboard. Then click "Sitemaps" under Optimizations.
Fourth, Click "ADD/TEST SITEMAP" and paste /feeds/posts/default?orderby=UPDATED and finally click "Submit Sitemap". Now your site is successfully submitted. If your blog pages are more than 25 then similarly paste /atom.xml?redirect=false&start-index=1&max-results=500 (for first 500 pages) /atom.xml?redirect=false&start-index=501&max-results=1000 (for second 500 pages) /atom.xml?redirect=false&start-index=1001&max-results=1500 (for third 500 pages)..........
Upload sitemap into Bing webmaster tool
First, Go to http://www.bing.com/toolbox/webmaster and sign in with your hotmail or live account and password. If you have not hotmail or live account click "Sign up with Microsoft Account" and create an account first.
Second,  For first time it shows you Add a Site interface. If not, click Add a Site link. And give your blog url http://www.yourblog.com into URL* field and paste http://www.yourblog.com/feeds/posts/default?orderby=UPDATED into Add a sitemap field and click ADD. Your site also successfully submitted into Bing. If your blog pages are more than 25 then similarly paste /atom.xml?redirect=false&start-index=1&max-results=500 (for first 500 pages) /atom.xml?redirect=false&start-index=501&max-results=1000 (for second 500 pages) /atom.xml?redirect=false&start-index=1001&max-results=1500 (for third 500 pages)..........
If you think this article is helpful for you please don't forget to give me a comment.
2013, By: Seo Master

seo Verify your blog or website right now 2013

Seo Master present to you:
Today I needed to verify my blogspot blog in Pinterest. Unfortunately they have only one method. So I fall into a problem. But I needed solution. So I try my self and find out a solution. Now I tell you this tricks. And you can try this tricks also other websites. If you be success with this tricks please don't forget to leave a comment.
1. First download your HTML file which need to upload into your Database and save to your Hard Disk with your suitable location.
2. Then open your uploaded HTML file with your browser.
3. Now click your mouse right button and view source code of this HTML file.
4. Select all code with your mouse cursor or from Keyboard press Ctrl+A.
5. Now log in you Blogger account and create any new page with any name.
6. Click on your page HTML option and remove all code. Then paste your copied codes (Your downloaded HTML source codes).
7. Save and view your page. Your address bar shows your page link. It should be something like this: http://www.yourdomain.com/p/your-page-name.html. From this link we will need /p/your-page-name.html
8. Log in your account where your blog will be verified and go to your verify page. Click on Verify Website or this type button. It shows you "Sorry our system not found http://www.yourdomain.com/verification.html page." or this type error message. Don't worry. I am with you.
9. From here copy /verification.html. Actually this URL is your downloaded HTML last part. file:///computer-hard-disk/folder/sub-folder/verification.html.
10. Now we apply our main tricks. Go to your Blogger Dashboard>More options>Settings>Search preferences.
11. Click Customs Redirects Edit button. Now paste /verification.html link into From field and paste /p/your-page-name.html link into To field.

12. Now tick on Permanent box. Then Save and Save change. Your Blogger part is complete.
13. Now again click Verify Website button and I hope your blog will be verified.2013, By: Seo Master

seo OTON: The Future Gaming Console! 2013

Seo Master present to you:
Everybody has heard of OUYA $8.5 Million story. OUYA is an Android-based videogame console which reached the record of fastest project to ever reach the million-dollar pledge mark (8 hours 22 minutes) and having taken in $2,589,687.77 worth of pledges in the first 24 hours.

A company in Alabama has promised to release a gaming console from future. They call themselves EnGeniux team.

OTON is powered with custom software built on top of a custom version of Ubuntu OS, called "Otonomous". The system will undergo updates regularly to support many game formats.

OTON is said to be capable of running Linux, Android, HTML and even other kind of apps too.

While interviewing the CEO, Derrick Samuels he told me:
OTON development is different. OTON is more like a virtual assistance for developers. So the process will be easy. We are working to have Android support and Linux games. When you call OTON a console..it will stand by that name! Play anything!

The best part of OTON is that it can generate the games instantly without any human effort.

OTON will be the first game console to support artificial intelligence capabilities. The system learns and will add an extra layer of challenge for only the worthy gamers. Enhanced game levels, characters, and game-play are just a few challenges only the elite gamers will dare challenge.

In future, OTON is expected to include updates, game music creation, photo creation, website creation, educational gaming creation, document creation and media content creation!

The games would also be updated with daily updates which will cost nothing!

An internal camera on the front of the system is designed to make motion gesture gaming possible as well as direct interaction with the operating system/ user interfaces.

The game can also create a blog or website to publish his games and thats too for FREE!

The OTON system will unlock unlimited possibilities for gamers, educators, and business, medical and game developers unlike any other console before.


The gamer can also transfer his game or app to his/her smartphone. It would also support online multiplayer games.

I wish these innovative guys the best!
2013, By: Seo Master

seo Michael Dell is said to be encouraged by board to raise offer 2013

Seo Master present to you: Michael S Dell may have to dig deeper into his pockets if he wants his $24.4 billion bid for the computer company he founded to succeed.

A special committee of Dell's directors encouraged him over the weekend to raise the deal's offer price of $13.65 a share, a person briefed on the matter said Tuesday.

While Dell listened to the suggestion, he did not commit to a course of action. Furthermore, Dell and his private equity partner in the deal, Silver Lake, have not had any discussions about raising the current price, according to a person close to the firm.

Yet pressure is building on the buyout as two big Dell shareholders - Carl C. Icahn and the asset manager Southeastern Asset Management - continue to attack the deal with a shareholder vote drawing rapidly near.

The special committee is growing worried that the buyout offer will fail to win a majority of Dell shares that excludes Michael Dell's 16 per cent stake at the vote July 18, the person briefed on the matter said. Some 43 per cent of the Dell shares need to be voted in favor of the offer. The directors have already taken a number of meetings with major investors that have left them pessimistic about the bid's prospects, and now believe that a major shareholder advisory firm is poised to recommend a rejection of the takeover.

Dell's offer, made in partnership with Silver Lake, has been criticized for months by a number of big outside investors. But any bump in price would most likely come from the company founder, who already made concessions to reach the current price.

Silver Lake, which had refused to raise the bid beyond $13.60 at one point, has become increasingly worried about the deterioration of Dell's business, a person close to the firm said. At the moment, it would not be devastated if the deal fell apart.

That has left Michael Dell - who agreed to contribute his 16

per cent stake in the company at a price of $13.36 to leave more money for other shareholders - the most likely source of additional money.

Yet any bump in price from Dell would still need the assent of Silver Lake, since that would affect the returns on its investment.

A representative for Michael Dell was not immediately available for comment.

The pressure on the current offer stems from the billionaire Icahn and Southeastern Asset Management. They are campaigning for an alternative plan: a huge stock buyback that would pay investors $14 a share and leave the company publicly traded.

Icahn pressed his attack in recent days, outlining the $5.2 billion in debt financing he has arranged with the investment bank Jefferies to support his proposal.

Other shareholders appear to have been little moved by Icahn's announcements: Dell's stock has risen 0.2 per cent over the past five days, ending Tuesday at $13.38.

The special board committee has heard from a number of investors that the current offer price was insufficient. And a tough meeting with Institutional Shareholder Services, the most influential proxy advisory firm, left directors with the impression that it would urge shareholders to vote down the transaction.

ISS is expected to release its recommendation next week, and could still recommend that shareholders adopt Michael Dell's offer. It has told Dell's committee that it is weighing the merits of the management buyout against inaction, and would not factor in an alternative plan like Icahn's.

Traditionally, ISS' recommendations have held enormous sway over institutional investors, although in recent years the firm's influence appears to have waned somewhat. Still, Dell's special committee believes that a recommendation for the buyout would ensure its passage.

The special committee's approach was reported earlier by a TV channel.

Source: Economic Times2013, By: Seo Master

seo Blockchain.info - WatchOnly address scam 2013

Seo Master present to you:
Blockchain.info provides a nice to use feature "WatchOnly Address"

Watch Only - Watch Only addresses allow you to view transactions at an address without storing the private key in your wallet.

With use of watch only address you can add address to your wallet to keep track of its balance. This is useful when you have offline wallet and you would like to see its balance in your blockchain.info account. This is possible because blockchain.info will also add balance of this address to your wallet balance and will show it as total balance in your account. For example, you have balance 2 BTC in your wallet and you add a watchonly address having 3 BTC balance , blockchain.info will show you 5 BTC as your total balance. Good.

Since it is just an address added to your wallet and not actual private key you will not be able to spend bitcoins from this address. If you will try to spend, it will ask you to provide private key.

How the scam works :

Scammer creates a brand new blockchain.info account and adds an address as watchonly. So now it will show you balance of that address as balance in the account.

Scamer confirms trade with some one for BTC. Scammer says to seller that he is a noob and dont know how to operate blockchain.info account. He gives account access to seller. Scammer asks seller that he will give access to his blockchain.info wallet to seller and seller sends him agreed upon goods ( most probably LTC or any other crypto currency ). Seller checks account and sends him goods. Seller tries to withdraw BTC and he can not.

Normally new users get stuck with this. One of my customer got this issue

So now onwards make sure you do not accept blockchain.info wallet access as payment. In case you do make sure you transferred coins to your wallet first.

In any case you should never trust wallet coming from other party as he may always have access to private keys. Always make sure bitcoins are transferred to address under your control only before completing the deal.

By buysellbitcoin of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=237439
2013, By: Seo Master

seo Introduction to modern Cryptography 2013

Seo Master present to you:
Hi, so I decided that, as i have the entire week to my self i will put in an introduction to Cryptography, for all who are interested in the subject. I will be updating the post, for the next week with new information and sections on cryptography.

Okay, before we move into the real interesting subjects of cryptography like, key exchange protocols, signatures, certificates, Symmetrical cryptography and Asymmetrical cryptography, hash fictions, and prime numbers. We will first look into the history of cryptography and its origins.

History of the Hidden Language.

During ancient times, when leaders and generals needed to send messages to their troops, with instructions on what they should do. It was very easy for the enemy to intercept those messages , by ambushing supply routs (in modern time its equivalent is the man in the middle attack), So this meant the message was easily read and the enemy would know what the other side was planning. to prevent this from happening there was only two ways of preventing this from happening, First, was to hide the message so that it looks just like a normal every day thing (Steganography). Steganography the art of hiding messages so that it is only known to the person receiving the message that a message is hidden in it, a good example is invisible ink. Now, the Second way was to make the message unreadable for any person who was not the intended recipient. And this is what many did, because unlike stenography encryption could be taught to people easily and could be done with much less resources. so In a war situation teaching generals and messengers how to put cryptography was much more efficient.

Early encryption techniques were rather simple and you yourself may have played with it when you were kids.

Two main cipher system used were:
Transposition cipher
Substitution ciphers


A Transposition cipher uses a very simple method of encryption one of the most popular ones were the scytale, basically the scytale is a piece of wood, on which a strip of paper is wounded up to revel what message. so the person sending the message to some one would have an identical scytale as the other and would wind the paper on it and write the message then unwind the paper and fill the empty space with random words. if another person intercepted the message and used a different size scytale the message would not show.
Problem with this was the sender and the receiver required identical scytale.

A Substitution ciphers is another simple cipher that substituted the actual alphabets with some other alphabets or numbers. The Caesar Cipher is by far the most famous of them all, used a simple shift technique to substitute the alphabets, Used by Caesar himself and the roman empire Eg bellow.

Three shift right →
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Planetext - Bitcoin is a crypto coin
Ciphertext- Efqzlfk fp x fovmql flfk
Notice there is repetition of the same alphabets that have been substituted.

So, looking at the cipher above you can now encrypt any length of message through substitution, and all the receiver has to know when receiving the message is how many shifts are used.

However all these methods are venerable to cryptanalysis techniques, like a frequency analysis. All a person has to do is count the alphabets and make a note of each of the alphabets and the number of times it appears. In the english language some alphabets appear more that some, using this, we can determine which symbol or alphabet was replaced.

English Letter Frequency


Polyalphabetic cipher

Due to the ease of all these Cipher being broken a new system was requires, one which could not be so easily broken using a frequency analysis. many new ciphers came in and out. One being predominantly used for hundreds of years was the Polyalphabetic cipher on which normal frequency analysis attack method did not work. and it used a key. The Vigenère cipher the best known of them all and its harder cousin Autokey cipher remained one of the most used ciphers during the 15th and the 16th and up to mid 18th century, remained unbroken.

It was a variant of a Substitution ciphers but with multiple shifts and alphabets and also the use of a key made it versatile and impenetrable.

This is how a Vigenère cipher looks like.


Vigenere Cipher

Eg:-

Message - TO BE OR NOT TO BE THAT IS THE QUESTION
KEY - RELATIONS

Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY

Notice there is no repetition of the same alphabets that have been substituted .

This kind of ciphers remained active for many hundreds of years and was used widely in Europe and the middle east. However the fate of this cipher system was doomed, when a brilliant man who we all know and admire in the computing world came along, the father of computer Charles Babbage, he broke both the Vigenère cipher and the much harder Autokey cipher.

Tomorrow we will touch upon mechanical ciphers, used in the second world war and then enter the world of modern cryptography, in the digital age.


The Rise of the Machine

The era of the second world war, was the proving grounds for modern encryption methods, ideas and innovation. In my opinion, if it was not for the Mathematicians, code-breakers and revolutionary thinkers, the modern computer age, the internet and space travel would not have been possible at all. The birth of computing devices, to conduct tasks through programmed inputs were all tested and innovated, by codebreakers trying to break the German Enigma code. The use of early computers was at England, in a place called Bletchley park. In fact, the first discovery of modern public key encryption system and early experiments on One Time Pads was done during this time.


World War 2 Machines
Enigma Machine *Germany*(Left)  |  SIGABA *USA* (Middle) |   TypeX *UK*(Right)

World War 2 Machines

During the War the Germans used one of the most successful, mechanical crypto systems called the Enegma machine, it was a rotor cipher machine, similar to a Polyalphabetic cipher but with the difficulty increased by the rotor, if the allies broke the code all the germans did was change the configuration and may be add rotors giving another huge headache for code-breakers.

The US and the UK also used similar machine called the SIGABA and the TypeX. However, a code system that was never broken by the enemy was not mechanical at all, but were the Navajo code talkers who played a vital role in the success in the pacific war theater. There's even a movie called the Windtalkers played by Nicolas Cage although it concentrated more on the nipless cage than the Code talker.


Modern Cryptography

With progress happening in the Cryptography community one of them was by far the most revolutionary, the public key crypto system, the RSA algorithm that allowed people to have two keys one public and one private. this solved many problems of key transfer and security and validity of a encrypted message. This algorithm was already made during the second world war, but was classified. Until 1977 when a group in MIT rediscovered this algorithm on their own, hence the name RSA algorithm, the first alphabet of their surname Ron Rivest, Adi Shamir, and Leonard Adleman.
RSA Small Logo

The advent of modern cryptography gave rise to secure communication, safe banking transaction, and greater communication, and social revolution. We use some form of encryption every day and sometimes we don’t even know that encryption is being used.

Cryptography, before the dawn of the Information age was confined to the intelligence community, with many of the technology kept classified and inaccessible to the general public. It was nearly impossible for a person without a connection to the intelligence community, or a large corporation like IBM to do any work on Cryptography. But, that all changed when the internet was born. People from around the world collaborated to bring cryptography to the masses. With the advent of the internet people were able to disseminate information about cryptography, and develop software for everyone to use.

This shift in knowledge from an intelligence based community to a worldwide public community, gave rise to many social changes. With people openly advocating the use of encryption to promote privacy, Bring down corrupt government, safeguard whistleblowers. During the late 80's many BBS's hosted score of text files relating to cryptography and around the early 90's a cypher punk mailing list was started, the birthplace of the cyberpunks, with the major discussion on technical issues, alternative uses of cryptography privacy, government surveillance, freedom of speech, civil society, and related issues. There have been many influential individual who have shaped this movement Eric Hughes, Jim Bell, Philip Zimmermann, Julian Assange just to name a few.

The roots of bitcoin can be traced back to the early discussion, within the cyberpunks and the cryptoanarchistic groups for an anonymous banking system. May be Satoshi Nakamoto might be one of the early cypherpunks, who was able to solve the problem of anonymous banking. But, we shall never know.

Cryptography has now become an integral part of our lives, in this modern day society it is rare not to come across technology that does not utilize some sort of encryption. I believe that the future for Cryptography is bright, because this is the only thing that can solve many of the world problems of secure communication, Tyrannical governments, greedy Banks, and immoral super corporations.

Tomorrow we shall finally talk about the technical part of modern Cryptography. Thinking about what to talk about tomorrow . I am a bit torn about where to start this from, and after a cigarette break I have decided to start with the basis of modern cryptography, the math’s behind it, so the topic for tomorrow would be Prime number related math’s, and will touch upon a Diffie and Hellman key exchange protocol.


The Numbers Game

The building blocks of every thing in maths my opinion is and always, the prime number. This number can form so many different numbers of any length, and a number of a particulate digit can be factorized to a smallest number being prime.

What is a prime number?

A prime number is a number divisible by it self and one. (basic old school definition)
take it this way, a number which cannot be divided equally without creating fractions of it.

2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71...............

so, lets take for example an integer which Factorizes to
56984 = 2 × 2 × 2 × 17 × 419

What is prime factorization?

Prime factors of a positive integer are the prime numbers that divide that integer exactly like the example above.

So why is this useful to cryptography and online security? 

Well the simple fact is that, it is easy to multiply two large prime numbers, but while trying to find the prime factor of that integer become a tedious task taking alot of time
a simple example like.

7703 × 6421 = 49460963

the output a compost number is going to take a long time to be factored, the example above may not be the best example of a large prime number being used but just Imagine a prime number P1 and P2 both the length of about 100 digits long or much longer and multiply those tow together the composite number would be hard to factorize the limit being the time taken to compute the result.

g mod p

42 mod 12 = 10

Working with prime modulus.

3^29 mod 17 = 12

so here calculating this makes it easy when we have the generator as 3 raised to the power 29 . However when we have the result as 12 and need to find 3 raised to the power x . this becomes a time consuming task.

3^x mod 17 = 12

This problem is also know as a discrete logarithm problem. Therefor this creates a One way function. easy to compute harder to decipher.


Therefore, if the size of the prime increases the time taken for a computer to compute the result of that, would take a very long time.

Clock arithmetic :

If we consider prime numbers as the ingredients in our encryption recipe, the modular arithmetic is utensil for cooking it up. we shall see a simple use of [ mod ] in a few examples while talking about the Key exchange protocol especially the Diffie and Hellman key exchange protocol.

Diffie and Hellman key exchange protocol

Problem of Exchanging Keys :-

Lets take an example of two people who are honest employees in a corrupt government service, Alice and Bob, and lets take for example their Evil boss is Eve.

Alice and Bob want to communicate with each other but, does not want any one to read their messages, as they know Eve would most likely be reading their emails.
so how would the two communicate without Eve being able to read their messages.

Firstly, Alice and Bob has to agree on a secret key so that they can use that key to encrypt messages and send to each other but, the problem is that if they send the key without encrypting it , Eve would know what the key is and can read all the messages Alice and bob send each other. This is where the Diffie and Hellman key exchange protocol would be most useful.

So how does it work?
Alice and Bob agree on a generator and a prime modulus.

g = 3
p = 17

What Alice does :-
She chose a random number
and then raises that on the generator, result q = 15

g^x mod p = q
3^54 mod 17 = 15

Alice, then sends this result 15 over the insecure line to Bob

What Bob does
He chose a random number Bob.
and then raises that on the generator, result r = 16

g^y mod p = r
3^24 mod 17 = 16
Bob, then sends this result 16 over the insecure line to Alice

What Alice does is,
uses Bob's result as a generator raised to the power of the random number Alice chose to calculate a secret key s
r^x mod p = s

16^54 mod 17 = 1

Bob also does the same thing using the number Alice sent Bob. to generate a secret key
q^y mod = p = s

15^24 mod 17 = 1

Here Both Bob and Alice was able to compute the secret key s without transmitting the key over the insure line.

Meanwhile, Eve who is reading the messages coming in, can only intercept the following details from Bob and Alice
the generator 'g', prime modulus 'p' and the two results of the calculation by Alice and Bob 'q' and 'r'.

What Eve is missing is the private numbers that Alice and Bob used to generate the Secret 's' . without the 'x' and 'y', it is impossible for Eve to determine what secret key Alice and Bob is using to encrypt their messages.


Alice '(m)' → Bob
s(m)              s(m)


So, here Alice sends Bob an encrypted message using a secret key 's', which Bob then uses the Secret key 's' to decrypt the message Alice Sent him.


As you can see with this protocol many of the problems of secret key transfer is solved. This also leads us to the path of asymmetrical encryption and the use of the later RSA algorithm's public key cryptosystem to encrypt messages.

I hope this was simple to understand, i tried to put in as much details without making it confusing, i hope you all like it and understand. Next, i will cover the public key cryptosystem namely the RSA algorithm, and then touch upon Hashing, one time pads and a few single key encryption on block ciphers.


By subvolatil of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=246307
2013, By: Seo Master

seo Review: Guns of Icarus Online Game 2013

Seo Master present to you:
Guns of Icarus is one the best and the most thrilling multiplayer games that delivers real co-op and the most aggravating experiences.

On its deck, most have a role to play. Some will have to man its guns, steer the hulking bird and take necessary action when objects catch fire and alas go to hell. When individuals slack off or work haphazardly, the lives are over. In spite of few glitches and frustrations owing to inconsistent crewmates, there is still a level of satisfaction that occurs from handling an intense battle with the ships held together by chicken wire and duct tape.


Different Duties performed by Gunners, captains and engineers

From scrappy vessels to the flying sluggish fortress, every airship you choose features a distinct visual design, maneuvering and the deck layout. Duties performed here are categorized into three classes that will help in defining your role better. Captains have to indulge in maneuvering the ship while in battle so that gunners get great shots right from their position, making the orders as required, scouting the enemies to mark and flying the airship. But if you are a crappy captain you will earn yourself the ire with the possibility of spurring the mutiny. All the gunners in the scene are specialized in hot leads, pumping rockets and jetting fire into enemies. The Engineers here use handy tools like hammers, fire extinguishers and wrenches to rebuild and fix stuff that is destroyed when you are bombarded.

While duties of engineers, gunners and captains are entertaining stuff in their own rights, it’s all focused but very limited in scope. For instance, it hardly takes any time to get through different properties of each class, after a series of stages and you will realize and wish that you had more content to deal with.

The limitations 

Right now, raking up in the class does not unlock anything or even have a major impact on the character. With different objectives around every stage, most multiplayer games are the same and the tiny choice of map locations are very well designed and are distinct visually.

Guns of Icarus does a great job in shooting the excitement of airship crewing in the motoring combat above the clouds. The rough edges demonstrate work in progress which is much more than visual bugs, finished games and the glitches around. The awkward actions are jarring, considering how polished and beautiful the game feels and looks.

Not considering proper tutorials to demonstrate how the systems and gameplay functions getting acclimated to different roles is slightly puzzling from the moment it starts However, a positive sign is that developer Muse is working full-fledged to improvise the game and increase content to make the game a better one, give greater experience and also get involved better. That is more fun but one would think that there is a long distance to be covered before the game reaches its final potential.


The final verdict

This game has a lot of attractive elements that few other rivals can match. It feels unique, very refreshing and gives a co-op experience. But in spite of the impressive execution and visual beauty, the game drags a bit and tests your patience.
2013, By: Seo Master

seo The Cool KOLOS Gaming Wheel for Apple iPad 2013

Seo Master present to you:
The Apple iPad has always been a special gadget with its HD graphics. It is indeed a perfect tablet for gaming geeks who love playing from any place like a bus, train on the move or even while at home. The gaming experience for Apple lovers has just got better with the new Kolos Gaming Wheel designed for racing fanatics.

A befitting design for iPad series


Custom-made for the 9.7-inch Apple iPad, the Kolos steering wheel is designed to fit Apple iPad 2 (2nd Generation) and Apple The new iPad (3rd Generation). It also fits the Apple iPad with Retina Display (4th Generation). Available in black and grey colours, the 12.3-inch diameter wheel is made out of a light weight, high quality, metallised plastic.

The clamp of the wheel is constructed out of Acrylonitrile butadiene styrene (ABS) which is lightweight and has great strength. The base of the wheel system is curved and symmetric to the wheel itself. To enhance the stability of the wheel, there are three rubberised large circles for support. It has an anti-perspiration coating to ensure that your hands do not slip off in all the adrenaline-pumped action.

A gripping hold at the start line

It is quite easy to fit the wheel with the iPad. You have to place your iPad in the space provided and pull the clip down on it to lock it in place. The gadget will be locked in tight grips and will remain stable and steady throughout the game. It is designed to accommodate a double or single-handed action, so you can try to swerve on a free virtual driveway packed with action.


Transform your desk into a driving seat

The wheel has a clamping system that can be used to attach to desks. The clamp can be attached to surfaces that are as thick as two inches. You can take it, slip in through your study desk and turn the screw at the bottom to tighten the grip.



Gaming taken to a new dimension

Since the wheel holds the iPad, you can play all one-finger touch games without having to hold it. Moreover, the wheel is detachable. So, you can have fun with air gaming anywhere with the easy and compact design. The best part is the Kolos wheel is not just for racing, it can be used for playing any touch game or motion sensor air game on the iPad.


iOS games for KOLOS play

A few examples of racing games enhanced by KOLOS are Asphalt 7: Heat, Highway Rider, Sonic & SEGA All-Stars Racing, Riptide GP, Carmageddon, etc. Apart from racing, action and air games like Sky Gamblers: Air Supremacy, MetalStorm: Wingman, Boost 2, etc., can also be played on the iPad attached to the KOLOS wheel. One-finger touch games like Fruit Ninja HD, Angry Birds Space HD, Facebook games, etc., can be played hands-free using KOLOS wheel base system to hold the iPad.
2013, By: Seo Master

seo Speed Up Your Computer 2013

Seo Master present to you:
We have a list of things which will increase speed of your computer.

Fragmented Hard Drive

One of the most common causes of a slow computer is a fragmented hard disk drive. Checking the disk for fragmented data won’t take too long and can help with dealing with slow performance issues. In Windows 7, open Start > All Programs > Accessories > System Tools > Disk Defragmenter.

Too Many Permanent Temporary Files

Temporary folders are supposed to make using Windows and your browser faster by providing easily accessed files that can be loaded up quickly.

When your hard disk drive becomes over 90% full you will find that performance drops. In order to fight this, one of the best things you can do is delete your Windows temporary files. While deleting your Internet history and temporary Internet files is something you can do from your browser, CCleaner is a good option for tidying up the Windows temp folders.

System Startup

Booting Windows typically takes around the same length of time on any computer. As you install software to your PC, any that is required to launch as part of the Windows startup will result in poor performance of your computer, and perhaps even freeze your computer.

To fix this you will need to reduce the number of applications that are loading at the startup.

Viruses & Spyware

Malicious software is one of the main reasons for slow or poor system performance, and can add themselves to your computer while you install software downloaded from the web. Malware doesn’t just come in the form of viruses, worms and Trojans.

You can deal with malicious software by ensuring that your computer is fully equipped with anti-virus.

Old Hardware

Old hardware can prove deadly to your computer. It’s a familiar tale – the computer bought years ago slowly upgraded component-by-component until it eventually has all brand new shining parts that simply cannot hope to perform as intended.

Windows Registry

When you uninstall software on Windows, the uninstaller doesn’t necessarily remove everything from your computer.

The Windows Registry is like a database of filepaths and instructions for the operating system and installed software, and it can become corrupted and overloaded. These issues will cause slow boots, poor performance and a very slow shut down.

You can CCleaner to fight this problem.
2013, By: Seo Master

seo How to optimize your blog for mobile 2013

Seo Master present to you:
Why optimize your site for mobile? To encourage visitors to return! Have you ever tried to surf a site not optimized for mobile? They are often unreadable, and are often too hard to navigate. Optimization allows websites to adapt their ergonomics to make them more user-friendly and more fluid for use by mobile users. To optimize its SEO is another reason why you should make your blog optimized for mobile. There are mobile factors that are taken into account by search engines to determine the position of a website on the results page, and they are different depending on whether you are connecting from a desktop computer or a mobile device. For example, how the page is displayed on a laptop affects its indexing, but a site that is not optimized for searches via a mobile device will be at a disadvantage when competing for mobile device traffic.

A WordPress Blog

If your website/blog is developed in WordPress then there is nothing easier than optimizing it for mobile use. Install the plugin WP Touch and let yourself be guided during installation. The setting of preferences and graphics via this plugin is all you need to make your blog readable from any laptop or mobile device.

A Joomla Blog

Your website is developed in Joomla with their CMS (Content Management System), and you want it to be readable on Smartphone or tablet? You can download the extension “Joomla Mobile” that allows you to make it more readable on mobile devices. This is a custom-made plugin, so all you need to do is install it and follow its instructions.

HTML and CSS

If your website is developed hard with HTML and CSS, you must create a style that is uniquely for mobile reading. You will need to do this and name the file “mobile.css.” One of the most important things to do in order to optimize your site for a Smartphone is to create a style that is usable with a Smartphone, because you’re not going to want to display the same thing on a PC and a Smartphone. You are going to need to omit some things are like the sidebar, and some images. Other things you may need to add or change to make it perfect–this is why we must create a style sheet (mobile.css).

Adding the file to your host/server

Once you have created your style sheet, it needs to be added to your host or server, which may be done through embedding it into your current website and uploading pages. How you get your style sheet online is going to depend upon your own circumstances. You may be using HTML or your own CMS, so this is a part you will have to figure out yourself (for your own circumstances).

Check on your efforts

Once you are sure that you have created and uploaded your mobile website, you are going to have to check to see if it works. There are online tools that will help you to check the functionality of your mobile website. They are good if you want to thoroughly check every feature, but if you just want a brief overview of whether it functions or not, you need simply to access your site via a smart phone. Explore your mobile website and check any of its tools and a few of its links. If you are happy with it then you can leave it for now and run a full online analysis the next time you update it.

Duplicate content


The rules on this are a little bit blurry, but many people are saying that if your mobile website has the same content (duplicate) as your desktop website–it will be considered duplicate content. This means that one or both of your websites are going to be punished. How true this is–is unknown, but it does not seem like a risk worth taking.
2013, By: Seo Master

seo 6 Best Enterprise apps for Android 2013

Seo Master present to you:
In past, the people used mobile phone for only communication purpose but at present this situation has completely changed after the emergence of android smartphone. This android guy has brought many changes in our personal and professional lives. This handset comes with speedily growing application market named as Android market or Google play. From this store, every person can grab one application of his choice. However, it’s me who will today focus on enterprise applications. The main purpose of introducing these applications for android platform is to enhance the overall productivity level of employees and workers. So, let’s peep into the detail of famous and useful applications for corporate environment.

1. Think Free Mobile


When you imagine an office, first thing which come into your mind is an office with table having many files. In old days, employees needed to compose and to store a lot of files physically but after android tablet and smartphone, they are capable to create, edit and store as much files as they want. For their assistance, android market comes with Think free mobile application. It’s a word processor that makes it simple for you to compose file and then to store them in your personal or public cloud storage. In addition, you can share between personal cloud and mobile devices.

2. Quick Office Pro

The employees need to work with presentations and different databases along with word files therefore; it’s Quick Office Pro that adds ease into their life. This enterprise application will make it simple for them to create, edit and share their Microsoft word, spreadsheets and presentations on the move. A businessman will definitely find it a handy application as he can check his office work while travelling.

3. Egnyte App

No matter where you actually are, this application allows you to access, edit, store and share files from any where any time. Just you need to have a smartphone for getting the most from this application. I really like the permission control feature of this application which permits the user to limit the access of files to only authorized people. One more special feature of it is file synchronization from smartphone with computer.

4. Critix Receiver

There are many enterprises which have started using critix receiver as it enhances efficiency of worker in a robust manner. This application permits the authorized users to access enterprise files, desktop and application from anywhere. Sharing of file through this receiver is indeed a delightful task.

5. Mango Apps

The real-time collaboration between employees is made possible with the help of Mango applications. When a company gets this application for employees, it becomes simple for every worker to get news and updates from the same platform. In addition, there is an instant messenger available on every interface just to make sure that employees can communicate with one another in an instant manner. They can make groups and then share files with their group members in a comfortable way. You can create the modules of your choice like collaborations, tasks, groups, files, applications, ideas, etc. The company can create private groups and projects for maintaining collaboration with customers and partners.

6. Yammer

It is one of the best enterprise applications available in Google play. This application lets you to create a private social network for your company. Co-workers can easily communicate with each other through a private social platform. They can update their status and get latest news of business right from here.
2013, By: Seo Master

seo Instagram's VIDEO feature 2013

Seo Master present to you: Instagram now lets you record and share short videos using a few taps of a finger on a mobile device. On Thursday, Instagram photo-sharing app added video feature, much like its competitor Vine.

Download the latest version on your iPhone or Android device. Open it and tap the camera icon on the bottom of the screen. This will take you to a new screen with a video camera icon. Another tap and you're ready to go.2013, By: Seo Master

seo The grinch who stole data 2013

Seo Master present to you: We are all but too familiar with the nasty Grinchs out there that are eying the prize by plotting to steal precious data off our system through hacking, malware, keylogger software, backdoor exploits etc. Let’s take a look at how data was attacked by one nasty Grinch after the other in 2012, and how it affected the data industry as a whole.


Source: MobiStealth.com2013, By: Seo Master

seo Project Loon: When, Where and How? 2013

Seo Master present to you:
Google has launched a small network of balloons over New Zealand in an experiment it hopes could bring reliable Internet access to the world's most remote regions, the company said late Friday.

Project Loon balloons float in the stratosphere, twice as high as airplanes and the weather. They are carried around the Earth by winds and they can be steered by rising or descending to an altitude with winds moving in the desired direction. People connect to the balloon network using a special Internet antenna attached to their building. The signal bounces from balloon to balloon, then to the global Internet back on Earth.

Project Loon starts in June 2013 with an experimental pilot in New Zealand. A small group of Project Loon pioneers will test the technology in Christchurch and Canterbury.

The 30 balloons deployed in New Zealand this month will beam internet to a small group of pilot testers and be used to refine the technology and shape the next phase of Project Loon, Google said.

Google announced the project on its official blog post.

Project Loon balloons travel around 20 km above the Earth’s surface in the stratosphere. Winds in the stratosphere are generally steady and slow-moving at between 5 and 20 mph, and each layer of wind varies in direction and magnitude. Project Loon uses software algorithms to determine where its balloons need to go, then moves each one into a layer of wind blowing in the right direction. By moving with the wind, the balloons can be arranged to form one large communications network.

The balloon envelope is the name for the inflatable part of the balloon. Project Loon’s balloon envelopes are made from sheets of polyethylene plastic and stand fifteen meters wide by twelve meters tall when fully inflated. They are specially constructed for use in superpressure balloons, which are longer-lasting than weather balloons because they can withstand higher pressure from the air inside when the balloons reach float altitude. A parachute attached to the top of the envelope allows for a controlled descent and landing whenever a balloon is ready to be taken out of service.

Each balloon can provide connectivity to a ground area about 40 km in diameter at speeds comparable to 3G. For balloon-to-balloon and balloon-to-ground communications, the balloons use antennas equipped with specialized radio frequency technology. Project Loon currently uses ISM bands (specifically 2.4 and 5.8 GHz bands) that are available for anyone to use.



2013, By: Seo Master

seo New Surveillance Cam Technology Saves Investigation Time 2013

Seo Master present to you:
Reviewing of boring surveillance footage just got more fun! Almost everyone’s got one or many surveillance cameras shooting away 24-7, leading to hours and hours of viewing time required to spot a sought-after event. Now a video analysis system has been developed which not only speeds up the process, but makes it more effective.



BriefCam’s Video Synopsis system has been credited with helping to catch the Boston Bombers. With the power to isolate an object or event, time-stamp multiple events shown simultaneously and slow down or speed up the footage, the investigators were able to focus on the backpack, which suddenly appeared. They were able to ignore all the slack time before its appearance, as an hour of footage was condensed into one minute. This was possible because of the simultaneous view feature. With ten hours of footage from one camera, BriefCam software can condense it to ten minutes as events are presented simultaneously. The zoom feature also lets the viewer zoom in on targets when their movements have changed during the filming. For these reasons, it has been called a “search engine for video”.

Boston proved the worth of BriefCam’s ingenuity, but many investigative types already appreciated that, as it’s been used in several countries besides the US, China, and Taiwan, since its inception three years ago.



The company’s intent is to enable the efficient viewing of cam footage for safety and security reasons. Winner of several awards -- the 2013 SIA New Product Showcase for Video Analytics; the 2012 Israel HLS Technology Innovation Award; the 2011 ASIS Accolades Award – Surveillance; the 2010 IFSEC Security Industry Award – Best CCTV System Product; the 2010 Wall St. Journal Technology Innovation Award – Physical Security and others – the BriefCam is compatible with several operating systems. The software is easy to install on existing systems. An additional feature is that it allows the export of the synopsis/original as evidence video file.



For those who want to get a bit technical, during recording, motion detection algorithms are used which separate the non-moving background images from the moving target images. The motions are tracked and analyzed within the frame. With this information, a database of backgrounds, events, objects and activities is created. The moving items are collected to make the synopsis.



It’s easy to see how BriefCam technology helps companies with security-related issues. By the looks of the website, the company markets the systems to businesses and government entities. So far, it’s not intended as a homeowner’s toy, though it is described as easy to use without special training.



Surveillance cameras can even be accessed remotely by mobile phone, no matter the distance. Nanny cams and even puppy surveillance systems make being away from home that much less worrisome. Many apps are available for download. They can be custom-built as well, with all the features a person wants, with an app builder such as the one offered by mobile.conduit.com



If a person can find their way around an iPhone, they can design their own surveillance cam app, since the Conduit app creator provides the templates and instructions to succeed. This could become a necessity for all web-cam users, so that surveillance and peace of mind goes everywhere the mobile goes.
2013, By: Seo Master
Powered by Blogger.