Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

seo Larger, brand-friendly ad sizes available in AdSense: 300x600 2013

Seo Master present to you:
Larger, brand-friendly ad sizes available in AdSense: 300x600

As screens grow and web content continues to become richer, the format and capabilities of ad units continue to evolve as well. One of the top requests from publishers in the last year has been to add larger ad sizes to our network, and today we’re excited to announce that the popular 300x600 unit will soon be available in your AdSense account.


The 300x600 unit, sometimes referred to as a half page unit, provides a larger space for advertisers to get their message across and can offer users rich engagement. As mentioned in our recently released Display Business Trends, the 300x600 is one of the fastest growing sizes by impressions and is indicative of a trend where publishers are offering more visually impactful ad sizes that are preferred by brand advertisers. Because this unit is new to our network, you’ll currently see a large number of text ads in these placements. Over time we’ll continue to build a wide range of text and display ad inventory eligible to appear in this full slot as well.

As with all ad sizes, it’s important to carefully consider the placement of ad units to ensure both users and advertisers have a great experience with your site. If you’d like more information on the performance of potential placements, check out our heat map in the AdSense Help Center.

If you have feedback about the 300x600 ad unit, feel free to leave a comment on our AdSense +page and discuss your thoughts with other publishers.

Source: http://adsense.blogspot.com

2013, By: Seo Master

seo OTON: The Future Gaming Console! 2013

Seo Master present to you:
Everybody has heard of OUYA $8.5 Million story. OUYA is an Android-based videogame console which reached the record of fastest project to ever reach the million-dollar pledge mark (8 hours 22 minutes) and having taken in $2,589,687.77 worth of pledges in the first 24 hours.

A company in Alabama has promised to release a gaming console from future. They call themselves EnGeniux team.

OTON is powered with custom software built on top of a custom version of Ubuntu OS, called "Otonomous". The system will undergo updates regularly to support many game formats.

OTON is said to be capable of running Linux, Android, HTML and even other kind of apps too.

While interviewing the CEO, Derrick Samuels he told me:
OTON development is different. OTON is more like a virtual assistance for developers. So the process will be easy. We are working to have Android support and Linux games. When you call OTON a console..it will stand by that name! Play anything!

The best part of OTON is that it can generate the games instantly without any human effort.

OTON will be the first game console to support artificial intelligence capabilities. The system learns and will add an extra layer of challenge for only the worthy gamers. Enhanced game levels, characters, and game-play are just a few challenges only the elite gamers will dare challenge.

In future, OTON is expected to include updates, game music creation, photo creation, website creation, educational gaming creation, document creation and media content creation!

The games would also be updated with daily updates which will cost nothing!

An internal camera on the front of the system is designed to make motion gesture gaming possible as well as direct interaction with the operating system/ user interfaces.

The game can also create a blog or website to publish his games and thats too for FREE!

The OTON system will unlock unlimited possibilities for gamers, educators, and business, medical and game developers unlike any other console before.


The gamer can also transfer his game or app to his/her smartphone. It would also support online multiplayer games.

I wish these innovative guys the best!
2013, By: Seo Master

seo Asus launches Transformer Book in India 2013

Seo Master present to you:
Mumbai: Taiwanese firm AsusTek Computers Inc has launched its Windows 8-powered Transformer Book TX300 in the Indian market, priced at Rs 91,999.

 The 13.3-inch notebook has a detachable tablet, which has a Full HD IPS Touch panel and comes with an Intel Core i5 processor.

 The company said this is the world's thinnest windows 8 tablet.
2013, By: Seo Master

seo A Guide To Advertising On Facebook 2013

Seo Master present to you:
1. The power of internet

The internet today is one of the most popular places for business to advertise in. With hundreds of millions of people visiting the internet on a daily basis from all over the world, you can be sure that advertising here will definitely increase your sales.

Internet advertising reached $99 billion in 2012, says a study from GroupM, which they say is representing a 16.2% increase over the previous year and accounting to 19.5% of all advertising expenditure that same year, worldwide.

According to internet world stats by the ICT the share of the world population using the internet has grown from 18% to 35% between 2006 and 2011. During this time the world population grew from 6.5 billion to 7 billion. The developing world has seen more of an increase in this 5 year study too, China increasing their share of internet users from 44% to 62% in the 5 years leading to 2011.


2. About Facebook

Today there are 62 million people using social media site Facebook. The social networking site is now considered to the biggest and most widely known social networking website existing. As the spread of internet users increases, worldwide, there is a constant increase in new users becoming Facebook members.

Facebook is also one of the most evenly balanced social networking websites in terms of user age and gender.

In a study of American SNS users by Pew Internet, Facebook had the second highest score for ages 50-65, at 19%, second only to LinkedIn at 23% and higher then Twitter at 13%.

The study also says Facebook is used by 92% of all SNS (social networking sites) users, followed by MySpace at 29%. The interesting fact is though that people engage more on Facebook every day, some 52% in-fact, that’s higher then Twitter at 33% and far more frequent then MySpace 7% and LinkedIn 6%. Another way of looking at it is Facebook is the premium place for your company to showcase, advertise and network with their audience.

Facebook’s overall market research data suggests it is the most universal social networking site and it has the best results for users’ daily visits. MySpace and LinkedIn by comparison are only occasional places users visit.


3. Advertising on Facebook

Within your Facebook account you may set up a targeted advert. This may involve publishing your website URL, and attract new users or likes. You can set up event times with dates and places, such as summer concert. Each ad allows you to include a photo or a logo as a small icon.

It’s easy to create a new advert, you just log into the home page, click on the bar on the right-hand side, and look for the section marked “Sponsored” where the ads appear. A link that reads “Create an Ad” appears to the side of the “Sponsored” link.

Within the Create an Ad section, you can design and edit the look for the advertisement, with Facebook automatically creating a preview at the bottom of the pages, so you’ve got the assurance your advert will look great before proceeding forwards.


Destination

In the Facebook Ad, you’ve got the Destination Tab and several options to direct the user. Then you can include the body of your ad copy and an image or log. Destinations include a website URL or your Facebook page, Sponsored Story is really a nice feature; you can choose to have either a Page “Like” Story, displaying to the user a friend who likes your page, with a “Like” call to action. Page Post Story shows the user the excerpt and image from your most recent Facebook post. The CTA here is to comment, “Like” and Share.

Goals
Facebook offers a range of other options for you as a company. You can select goals that cover the following:
  • Promote Page Posts, for specific pages you’ve created, increasing chances of reaching their targeted audience.
  • Get New Users, to target people that are likely to want to want what your website offers, sign up to newsletters, download your apps.
  • Increase Attendance, for when you have an event, target people who may find your conference or event relevant to them.
  • Get More Page Likes, when people like your page, they’re more likely to see your posts, and the more likes you have means that you have more people in the audience every time your posts are published on Facebook.
User Filtering

You can advertise to your demographic, using targeted marketing at your end user. This type of marketing is in smaller numbers, but with bigger and greater results, which are easier to manage for you as well!

  • Advanced tartgeting includes demographics, such as age and weather you want to choose men, women or both
  • Likes and interests allows you to advertise on the users’ pages who’ve publicised this date in their profile
  • Location permits you to choose a city, province or country for where you’d like to send your advert out to
  • Within the advanced targeting section you can choose to promote an advert for people on their birthdays, what languages they speak, education and relationship status

Payment strategy

Choose with either a pay per click (CPC) or pay per impression (CPM), which both have great potential to boost user awareness. In the Campaigns, Pricing and Scheduling section you can choose the currency you want to use to pay for ads, daily budget, and dates and times when you would like to appear.


Finalizing your ad

 You will be required to do a final review of your ad before publishing, so you can check over your work, and have the chance to return to and edit any part of the ad you have designed. Then finally, you can check over your order, which you can pay for with credit card or PayPal. Now you’re away, you’ve created an advert and enhanced your chances of gaining more visitors and customers!


4. What we’re doing at the company where I work

Working within online marketing at The Genuine Gemstones Company, my business utilizes Facebook for online PR, for online marketing campaigns, getting the best of Facebook marketing for posts and advertising hand in hand.


A new promotion for emerald rings on Gems TV gets sent out on a Thursday afternoon, and we need to get it to as many people as possible; with over 8,000 members and 4,027 likes on Facebook (and steady growing) we can have the best platform for our customers to see our ad campaign banner.

Our brands Gems TV and Rocks TV are strong in the UK and USA respectively and our online marketing team over here consistently are working, planning and communicating. Facebook is one of our key areas we would like to grow, with more users, journalists, companies and bloggers engaging with us every day that leverages a wider spread of users and shares name, our quality, our services, using Facebook.

2013, By: Seo Master

seo Michael Dell is said to be encouraged by board to raise offer 2013

Seo Master present to you: Michael S Dell may have to dig deeper into his pockets if he wants his $24.4 billion bid for the computer company he founded to succeed.

A special committee of Dell's directors encouraged him over the weekend to raise the deal's offer price of $13.65 a share, a person briefed on the matter said Tuesday.

While Dell listened to the suggestion, he did not commit to a course of action. Furthermore, Dell and his private equity partner in the deal, Silver Lake, have not had any discussions about raising the current price, according to a person close to the firm.

Yet pressure is building on the buyout as two big Dell shareholders - Carl C. Icahn and the asset manager Southeastern Asset Management - continue to attack the deal with a shareholder vote drawing rapidly near.

The special committee is growing worried that the buyout offer will fail to win a majority of Dell shares that excludes Michael Dell's 16 per cent stake at the vote July 18, the person briefed on the matter said. Some 43 per cent of the Dell shares need to be voted in favor of the offer. The directors have already taken a number of meetings with major investors that have left them pessimistic about the bid's prospects, and now believe that a major shareholder advisory firm is poised to recommend a rejection of the takeover.

Dell's offer, made in partnership with Silver Lake, has been criticized for months by a number of big outside investors. But any bump in price would most likely come from the company founder, who already made concessions to reach the current price.

Silver Lake, which had refused to raise the bid beyond $13.60 at one point, has become increasingly worried about the deterioration of Dell's business, a person close to the firm said. At the moment, it would not be devastated if the deal fell apart.

That has left Michael Dell - who agreed to contribute his 16

per cent stake in the company at a price of $13.36 to leave more money for other shareholders - the most likely source of additional money.

Yet any bump in price from Dell would still need the assent of Silver Lake, since that would affect the returns on its investment.

A representative for Michael Dell was not immediately available for comment.

The pressure on the current offer stems from the billionaire Icahn and Southeastern Asset Management. They are campaigning for an alternative plan: a huge stock buyback that would pay investors $14 a share and leave the company publicly traded.

Icahn pressed his attack in recent days, outlining the $5.2 billion in debt financing he has arranged with the investment bank Jefferies to support his proposal.

Other shareholders appear to have been little moved by Icahn's announcements: Dell's stock has risen 0.2 per cent over the past five days, ending Tuesday at $13.38.

The special board committee has heard from a number of investors that the current offer price was insufficient. And a tough meeting with Institutional Shareholder Services, the most influential proxy advisory firm, left directors with the impression that it would urge shareholders to vote down the transaction.

ISS is expected to release its recommendation next week, and could still recommend that shareholders adopt Michael Dell's offer. It has told Dell's committee that it is weighing the merits of the management buyout against inaction, and would not factor in an alternative plan like Icahn's.

Traditionally, ISS' recommendations have held enormous sway over institutional investors, although in recent years the firm's influence appears to have waned somewhat. Still, Dell's special committee believes that a recommendation for the buyout would ensure its passage.

The special committee's approach was reported earlier by a TV channel.

Source: Economic Times2013, By: Seo Master

seo Blockchain.info - WatchOnly address scam 2013

Seo Master present to you:
Blockchain.info provides a nice to use feature "WatchOnly Address"

Watch Only - Watch Only addresses allow you to view transactions at an address without storing the private key in your wallet.

With use of watch only address you can add address to your wallet to keep track of its balance. This is useful when you have offline wallet and you would like to see its balance in your blockchain.info account. This is possible because blockchain.info will also add balance of this address to your wallet balance and will show it as total balance in your account. For example, you have balance 2 BTC in your wallet and you add a watchonly address having 3 BTC balance , blockchain.info will show you 5 BTC as your total balance. Good.

Since it is just an address added to your wallet and not actual private key you will not be able to spend bitcoins from this address. If you will try to spend, it will ask you to provide private key.

How the scam works :

Scammer creates a brand new blockchain.info account and adds an address as watchonly. So now it will show you balance of that address as balance in the account.

Scamer confirms trade with some one for BTC. Scammer says to seller that he is a noob and dont know how to operate blockchain.info account. He gives account access to seller. Scammer asks seller that he will give access to his blockchain.info wallet to seller and seller sends him agreed upon goods ( most probably LTC or any other crypto currency ). Seller checks account and sends him goods. Seller tries to withdraw BTC and he can not.

Normally new users get stuck with this. One of my customer got this issue

So now onwards make sure you do not accept blockchain.info wallet access as payment. In case you do make sure you transferred coins to your wallet first.

In any case you should never trust wallet coming from other party as he may always have access to private keys. Always make sure bitcoins are transferred to address under your control only before completing the deal.

By buysellbitcoin of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=237439
2013, By: Seo Master

seo Introduction to modern Cryptography 2013

Seo Master present to you:
Hi, so I decided that, as i have the entire week to my self i will put in an introduction to Cryptography, for all who are interested in the subject. I will be updating the post, for the next week with new information and sections on cryptography.

Okay, before we move into the real interesting subjects of cryptography like, key exchange protocols, signatures, certificates, Symmetrical cryptography and Asymmetrical cryptography, hash fictions, and prime numbers. We will first look into the history of cryptography and its origins.

History of the Hidden Language.

During ancient times, when leaders and generals needed to send messages to their troops, with instructions on what they should do. It was very easy for the enemy to intercept those messages , by ambushing supply routs (in modern time its equivalent is the man in the middle attack), So this meant the message was easily read and the enemy would know what the other side was planning. to prevent this from happening there was only two ways of preventing this from happening, First, was to hide the message so that it looks just like a normal every day thing (Steganography). Steganography the art of hiding messages so that it is only known to the person receiving the message that a message is hidden in it, a good example is invisible ink. Now, the Second way was to make the message unreadable for any person who was not the intended recipient. And this is what many did, because unlike stenography encryption could be taught to people easily and could be done with much less resources. so In a war situation teaching generals and messengers how to put cryptography was much more efficient.

Early encryption techniques were rather simple and you yourself may have played with it when you were kids.

Two main cipher system used were:
Transposition cipher
Substitution ciphers


A Transposition cipher uses a very simple method of encryption one of the most popular ones were the scytale, basically the scytale is a piece of wood, on which a strip of paper is wounded up to revel what message. so the person sending the message to some one would have an identical scytale as the other and would wind the paper on it and write the message then unwind the paper and fill the empty space with random words. if another person intercepted the message and used a different size scytale the message would not show.
Problem with this was the sender and the receiver required identical scytale.

A Substitution ciphers is another simple cipher that substituted the actual alphabets with some other alphabets or numbers. The Caesar Cipher is by far the most famous of them all, used a simple shift technique to substitute the alphabets, Used by Caesar himself and the roman empire Eg bellow.

Three shift right →
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Planetext - Bitcoin is a crypto coin
Ciphertext- Efqzlfk fp x fovmql flfk
Notice there is repetition of the same alphabets that have been substituted.

So, looking at the cipher above you can now encrypt any length of message through substitution, and all the receiver has to know when receiving the message is how many shifts are used.

However all these methods are venerable to cryptanalysis techniques, like a frequency analysis. All a person has to do is count the alphabets and make a note of each of the alphabets and the number of times it appears. In the english language some alphabets appear more that some, using this, we can determine which symbol or alphabet was replaced.

English Letter Frequency


Polyalphabetic cipher

Due to the ease of all these Cipher being broken a new system was requires, one which could not be so easily broken using a frequency analysis. many new ciphers came in and out. One being predominantly used for hundreds of years was the Polyalphabetic cipher on which normal frequency analysis attack method did not work. and it used a key. The Vigenère cipher the best known of them all and its harder cousin Autokey cipher remained one of the most used ciphers during the 15th and the 16th and up to mid 18th century, remained unbroken.

It was a variant of a Substitution ciphers but with multiple shifts and alphabets and also the use of a key made it versatile and impenetrable.

This is how a Vigenère cipher looks like.


Vigenere Cipher

Eg:-

Message - TO BE OR NOT TO BE THAT IS THE QUESTION
KEY - RELATIONS

Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY

Notice there is no repetition of the same alphabets that have been substituted .

This kind of ciphers remained active for many hundreds of years and was used widely in Europe and the middle east. However the fate of this cipher system was doomed, when a brilliant man who we all know and admire in the computing world came along, the father of computer Charles Babbage, he broke both the Vigenère cipher and the much harder Autokey cipher.

Tomorrow we will touch upon mechanical ciphers, used in the second world war and then enter the world of modern cryptography, in the digital age.


The Rise of the Machine

The era of the second world war, was the proving grounds for modern encryption methods, ideas and innovation. In my opinion, if it was not for the Mathematicians, code-breakers and revolutionary thinkers, the modern computer age, the internet and space travel would not have been possible at all. The birth of computing devices, to conduct tasks through programmed inputs were all tested and innovated, by codebreakers trying to break the German Enigma code. The use of early computers was at England, in a place called Bletchley park. In fact, the first discovery of modern public key encryption system and early experiments on One Time Pads was done during this time.


World War 2 Machines
Enigma Machine *Germany*(Left)  |  SIGABA *USA* (Middle) |   TypeX *UK*(Right)

World War 2 Machines

During the War the Germans used one of the most successful, mechanical crypto systems called the Enegma machine, it was a rotor cipher machine, similar to a Polyalphabetic cipher but with the difficulty increased by the rotor, if the allies broke the code all the germans did was change the configuration and may be add rotors giving another huge headache for code-breakers.

The US and the UK also used similar machine called the SIGABA and the TypeX. However, a code system that was never broken by the enemy was not mechanical at all, but were the Navajo code talkers who played a vital role in the success in the pacific war theater. There's even a movie called the Windtalkers played by Nicolas Cage although it concentrated more on the nipless cage than the Code talker.


Modern Cryptography

With progress happening in the Cryptography community one of them was by far the most revolutionary, the public key crypto system, the RSA algorithm that allowed people to have two keys one public and one private. this solved many problems of key transfer and security and validity of a encrypted message. This algorithm was already made during the second world war, but was classified. Until 1977 when a group in MIT rediscovered this algorithm on their own, hence the name RSA algorithm, the first alphabet of their surname Ron Rivest, Adi Shamir, and Leonard Adleman.
RSA Small Logo

The advent of modern cryptography gave rise to secure communication, safe banking transaction, and greater communication, and social revolution. We use some form of encryption every day and sometimes we don’t even know that encryption is being used.

Cryptography, before the dawn of the Information age was confined to the intelligence community, with many of the technology kept classified and inaccessible to the general public. It was nearly impossible for a person without a connection to the intelligence community, or a large corporation like IBM to do any work on Cryptography. But, that all changed when the internet was born. People from around the world collaborated to bring cryptography to the masses. With the advent of the internet people were able to disseminate information about cryptography, and develop software for everyone to use.

This shift in knowledge from an intelligence based community to a worldwide public community, gave rise to many social changes. With people openly advocating the use of encryption to promote privacy, Bring down corrupt government, safeguard whistleblowers. During the late 80's many BBS's hosted score of text files relating to cryptography and around the early 90's a cypher punk mailing list was started, the birthplace of the cyberpunks, with the major discussion on technical issues, alternative uses of cryptography privacy, government surveillance, freedom of speech, civil society, and related issues. There have been many influential individual who have shaped this movement Eric Hughes, Jim Bell, Philip Zimmermann, Julian Assange just to name a few.

The roots of bitcoin can be traced back to the early discussion, within the cyberpunks and the cryptoanarchistic groups for an anonymous banking system. May be Satoshi Nakamoto might be one of the early cypherpunks, who was able to solve the problem of anonymous banking. But, we shall never know.

Cryptography has now become an integral part of our lives, in this modern day society it is rare not to come across technology that does not utilize some sort of encryption. I believe that the future for Cryptography is bright, because this is the only thing that can solve many of the world problems of secure communication, Tyrannical governments, greedy Banks, and immoral super corporations.

Tomorrow we shall finally talk about the technical part of modern Cryptography. Thinking about what to talk about tomorrow . I am a bit torn about where to start this from, and after a cigarette break I have decided to start with the basis of modern cryptography, the math’s behind it, so the topic for tomorrow would be Prime number related math’s, and will touch upon a Diffie and Hellman key exchange protocol.


The Numbers Game

The building blocks of every thing in maths my opinion is and always, the prime number. This number can form so many different numbers of any length, and a number of a particulate digit can be factorized to a smallest number being prime.

What is a prime number?

A prime number is a number divisible by it self and one. (basic old school definition)
take it this way, a number which cannot be divided equally without creating fractions of it.

2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71...............

so, lets take for example an integer which Factorizes to
56984 = 2 × 2 × 2 × 17 × 419

What is prime factorization?

Prime factors of a positive integer are the prime numbers that divide that integer exactly like the example above.

So why is this useful to cryptography and online security? 

Well the simple fact is that, it is easy to multiply two large prime numbers, but while trying to find the prime factor of that integer become a tedious task taking alot of time
a simple example like.

7703 × 6421 = 49460963

the output a compost number is going to take a long time to be factored, the example above may not be the best example of a large prime number being used but just Imagine a prime number P1 and P2 both the length of about 100 digits long or much longer and multiply those tow together the composite number would be hard to factorize the limit being the time taken to compute the result.

g mod p

42 mod 12 = 10

Working with prime modulus.

3^29 mod 17 = 12

so here calculating this makes it easy when we have the generator as 3 raised to the power 29 . However when we have the result as 12 and need to find 3 raised to the power x . this becomes a time consuming task.

3^x mod 17 = 12

This problem is also know as a discrete logarithm problem. Therefor this creates a One way function. easy to compute harder to decipher.


Therefore, if the size of the prime increases the time taken for a computer to compute the result of that, would take a very long time.

Clock arithmetic :

If we consider prime numbers as the ingredients in our encryption recipe, the modular arithmetic is utensil for cooking it up. we shall see a simple use of [ mod ] in a few examples while talking about the Key exchange protocol especially the Diffie and Hellman key exchange protocol.

Diffie and Hellman key exchange protocol

Problem of Exchanging Keys :-

Lets take an example of two people who are honest employees in a corrupt government service, Alice and Bob, and lets take for example their Evil boss is Eve.

Alice and Bob want to communicate with each other but, does not want any one to read their messages, as they know Eve would most likely be reading their emails.
so how would the two communicate without Eve being able to read their messages.

Firstly, Alice and Bob has to agree on a secret key so that they can use that key to encrypt messages and send to each other but, the problem is that if they send the key without encrypting it , Eve would know what the key is and can read all the messages Alice and bob send each other. This is where the Diffie and Hellman key exchange protocol would be most useful.

So how does it work?
Alice and Bob agree on a generator and a prime modulus.

g = 3
p = 17

What Alice does :-
She chose a random number
and then raises that on the generator, result q = 15

g^x mod p = q
3^54 mod 17 = 15

Alice, then sends this result 15 over the insecure line to Bob

What Bob does
He chose a random number Bob.
and then raises that on the generator, result r = 16

g^y mod p = r
3^24 mod 17 = 16
Bob, then sends this result 16 over the insecure line to Alice

What Alice does is,
uses Bob's result as a generator raised to the power of the random number Alice chose to calculate a secret key s
r^x mod p = s

16^54 mod 17 = 1

Bob also does the same thing using the number Alice sent Bob. to generate a secret key
q^y mod = p = s

15^24 mod 17 = 1

Here Both Bob and Alice was able to compute the secret key s without transmitting the key over the insure line.

Meanwhile, Eve who is reading the messages coming in, can only intercept the following details from Bob and Alice
the generator 'g', prime modulus 'p' and the two results of the calculation by Alice and Bob 'q' and 'r'.

What Eve is missing is the private numbers that Alice and Bob used to generate the Secret 's' . without the 'x' and 'y', it is impossible for Eve to determine what secret key Alice and Bob is using to encrypt their messages.


Alice '(m)' → Bob
s(m)              s(m)


So, here Alice sends Bob an encrypted message using a secret key 's', which Bob then uses the Secret key 's' to decrypt the message Alice Sent him.


As you can see with this protocol many of the problems of secret key transfer is solved. This also leads us to the path of asymmetrical encryption and the use of the later RSA algorithm's public key cryptosystem to encrypt messages.

I hope this was simple to understand, i tried to put in as much details without making it confusing, i hope you all like it and understand. Next, i will cover the public key cryptosystem namely the RSA algorithm, and then touch upon Hashing, one time pads and a few single key encryption on block ciphers.


By subvolatil of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=246307
2013, By: Seo Master

seo Why Guest Blogging Might Get Risky in the Future 2013

Seo Master present to you:
Do you allow guest posts in your blog? Are you aware of any risks involved? For a long time, guest posting has been known to be a great way of generating top quality backlinks to your website. Additionally, it also allows the guest poster to get a lot of free traffic, a new readership and a new audience. In the online field, most good things start innocent but soon the bad guys get in, and Google has to inevitably slap a penalty.

The Risk

Guest blogs normally offer a great win-win solution to both the guest bloggers and the blogs they are submitting to. The guest bloggers get the free traffic while the blogs are able to get free content. Slowly, many blogs are starting to have more guest posts than original posts. This eventually has led to a whole new industry of guest bloggers.

Google has been pushing frequent updates cracking down on any unorthodox link building and SEO practices. Therefore, despite the fact that guest blogging started as something innocent, you should beware of the disadvantages below that could be risky to your blog:

1. Guest blogging allows for dofollow links from your blog to your guest bloggers’ websites. These links mean that you trust the websites you link to. In case you have a dofollow link that links to spammy pages, your site may get penalized by Google.

2. There are guest posters who may provide content that is not related to the niche of your blog. This could mess up with both your readers and Google.

3. Are you careful about the length of your guest posts? Very short posts or thin content could reduce your blog’s overall quality. This will also affect your rankings with both search engine bots and your blog readers.

4. While allowing for guest posts, be careful of duplicate content. Some guest bloggers may actually end up using their guest post content elsewhere on the internet. This will end up annoying any of your readers who will have had access to both contents. Remember that search engines also have low tolerance to duplicate content.

5. Your guest bloggers may not take your blog as seriously as you would. For this reason, they may end up submitting posts with an uncaring attitude and lack of attention to detail. Additionally, some writers may submit content that has either inaccurate or outdated information. In case such content gets past your editorial team, it will heavily lower the value of your blog.

6. There are guest bloggers who will write for you incomplete content in order to drive traffic to their blogs. This will force readers to go to their websites to get more information. This also ends up being a nuisance to your readers and lowers the quality of your pages.

Google’s Keen Eye

Google respects quality links in your articles. Recently, Google cracked down on paid text links and this resulted in some websites being heavily penalized or even being de-indexed in Google.

Sadly, guest blogging is heading in a similar direction; link buyers are now able to buy trusted links on top-ranking websites. Therefore, any website that is accepting guest posts has to be careful of the links they are accepting. Unfortunately, choosing to add nofollow links will only turn away guest posters and beat the purpose. Remember that Google is keenly watching and looking for ways to differentiate suspicious guest posting links from true editorial links.

Bottom Line

One big question that remains is whether you should accept guest posting on your blog or you shouldn’t. It is okay to accept them but first take your time to check out the author’s website. If it is not worth the link, then don’t accept it. Additionally, only accept posts that are accurate and likeable to both you and your readers.
2013, By: Seo Master

seo 6 Best Enterprise apps for Android 2013

Seo Master present to you:
In past, the people used mobile phone for only communication purpose but at present this situation has completely changed after the emergence of android smartphone. This android guy has brought many changes in our personal and professional lives. This handset comes with speedily growing application market named as Android market or Google play. From this store, every person can grab one application of his choice. However, it’s me who will today focus on enterprise applications. The main purpose of introducing these applications for android platform is to enhance the overall productivity level of employees and workers. So, let’s peep into the detail of famous and useful applications for corporate environment.

1. Think Free Mobile


When you imagine an office, first thing which come into your mind is an office with table having many files. In old days, employees needed to compose and to store a lot of files physically but after android tablet and smartphone, they are capable to create, edit and store as much files as they want. For their assistance, android market comes with Think free mobile application. It’s a word processor that makes it simple for you to compose file and then to store them in your personal or public cloud storage. In addition, you can share between personal cloud and mobile devices.

2. Quick Office Pro

The employees need to work with presentations and different databases along with word files therefore; it’s Quick Office Pro that adds ease into their life. This enterprise application will make it simple for them to create, edit and share their Microsoft word, spreadsheets and presentations on the move. A businessman will definitely find it a handy application as he can check his office work while travelling.

3. Egnyte App

No matter where you actually are, this application allows you to access, edit, store and share files from any where any time. Just you need to have a smartphone for getting the most from this application. I really like the permission control feature of this application which permits the user to limit the access of files to only authorized people. One more special feature of it is file synchronization from smartphone with computer.

4. Critix Receiver

There are many enterprises which have started using critix receiver as it enhances efficiency of worker in a robust manner. This application permits the authorized users to access enterprise files, desktop and application from anywhere. Sharing of file through this receiver is indeed a delightful task.

5. Mango Apps

The real-time collaboration between employees is made possible with the help of Mango applications. When a company gets this application for employees, it becomes simple for every worker to get news and updates from the same platform. In addition, there is an instant messenger available on every interface just to make sure that employees can communicate with one another in an instant manner. They can make groups and then share files with their group members in a comfortable way. You can create the modules of your choice like collaborations, tasks, groups, files, applications, ideas, etc. The company can create private groups and projects for maintaining collaboration with customers and partners.

6. Yammer

It is one of the best enterprise applications available in Google play. This application lets you to create a private social network for your company. Co-workers can easily communicate with each other through a private social platform. They can update their status and get latest news of business right from here.
2013, By: Seo Master

seo Instagram's VIDEO feature 2013

Seo Master present to you: Instagram now lets you record and share short videos using a few taps of a finger on a mobile device. On Thursday, Instagram photo-sharing app added video feature, much like its competitor Vine.

Download the latest version on your iPhone or Android device. Open it and tap the camera icon on the bottom of the screen. This will take you to a new screen with a video camera icon. Another tap and you're ready to go.2013, By: Seo Master

seo The grinch who stole data 2013

Seo Master present to you: We are all but too familiar with the nasty Grinchs out there that are eying the prize by plotting to steal precious data off our system through hacking, malware, keylogger software, backdoor exploits etc. Let’s take a look at how data was attacked by one nasty Grinch after the other in 2012, and how it affected the data industry as a whole.


Source: MobiStealth.com2013, By: Seo Master

seo Project Loon: When, Where and How? 2013

Seo Master present to you:
Google has launched a small network of balloons over New Zealand in an experiment it hopes could bring reliable Internet access to the world's most remote regions, the company said late Friday.

Project Loon balloons float in the stratosphere, twice as high as airplanes and the weather. They are carried around the Earth by winds and they can be steered by rising or descending to an altitude with winds moving in the desired direction. People connect to the balloon network using a special Internet antenna attached to their building. The signal bounces from balloon to balloon, then to the global Internet back on Earth.

Project Loon starts in June 2013 with an experimental pilot in New Zealand. A small group of Project Loon pioneers will test the technology in Christchurch and Canterbury.

The 30 balloons deployed in New Zealand this month will beam internet to a small group of pilot testers and be used to refine the technology and shape the next phase of Project Loon, Google said.

Google announced the project on its official blog post.

Project Loon balloons travel around 20 km above the Earth’s surface in the stratosphere. Winds in the stratosphere are generally steady and slow-moving at between 5 and 20 mph, and each layer of wind varies in direction and magnitude. Project Loon uses software algorithms to determine where its balloons need to go, then moves each one into a layer of wind blowing in the right direction. By moving with the wind, the balloons can be arranged to form one large communications network.

The balloon envelope is the name for the inflatable part of the balloon. Project Loon’s balloon envelopes are made from sheets of polyethylene plastic and stand fifteen meters wide by twelve meters tall when fully inflated. They are specially constructed for use in superpressure balloons, which are longer-lasting than weather balloons because they can withstand higher pressure from the air inside when the balloons reach float altitude. A parachute attached to the top of the envelope allows for a controlled descent and landing whenever a balloon is ready to be taken out of service.

Each balloon can provide connectivity to a ground area about 40 km in diameter at speeds comparable to 3G. For balloon-to-balloon and balloon-to-ground communications, the balloons use antennas equipped with specialized radio frequency technology. Project Loon currently uses ISM bands (specifically 2.4 and 5.8 GHz bands) that are available for anyone to use.



2013, By: Seo Master

seo New Surveillance Cam Technology Saves Investigation Time 2013

Seo Master present to you:
Reviewing of boring surveillance footage just got more fun! Almost everyone’s got one or many surveillance cameras shooting away 24-7, leading to hours and hours of viewing time required to spot a sought-after event. Now a video analysis system has been developed which not only speeds up the process, but makes it more effective.



BriefCam’s Video Synopsis system has been credited with helping to catch the Boston Bombers. With the power to isolate an object or event, time-stamp multiple events shown simultaneously and slow down or speed up the footage, the investigators were able to focus on the backpack, which suddenly appeared. They were able to ignore all the slack time before its appearance, as an hour of footage was condensed into one minute. This was possible because of the simultaneous view feature. With ten hours of footage from one camera, BriefCam software can condense it to ten minutes as events are presented simultaneously. The zoom feature also lets the viewer zoom in on targets when their movements have changed during the filming. For these reasons, it has been called a “search engine for video”.

Boston proved the worth of BriefCam’s ingenuity, but many investigative types already appreciated that, as it’s been used in several countries besides the US, China, and Taiwan, since its inception three years ago.



The company’s intent is to enable the efficient viewing of cam footage for safety and security reasons. Winner of several awards -- the 2013 SIA New Product Showcase for Video Analytics; the 2012 Israel HLS Technology Innovation Award; the 2011 ASIS Accolades Award – Surveillance; the 2010 IFSEC Security Industry Award – Best CCTV System Product; the 2010 Wall St. Journal Technology Innovation Award – Physical Security and others – the BriefCam is compatible with several operating systems. The software is easy to install on existing systems. An additional feature is that it allows the export of the synopsis/original as evidence video file.



For those who want to get a bit technical, during recording, motion detection algorithms are used which separate the non-moving background images from the moving target images. The motions are tracked and analyzed within the frame. With this information, a database of backgrounds, events, objects and activities is created. The moving items are collected to make the synopsis.



It’s easy to see how BriefCam technology helps companies with security-related issues. By the looks of the website, the company markets the systems to businesses and government entities. So far, it’s not intended as a homeowner’s toy, though it is described as easy to use without special training.



Surveillance cameras can even be accessed remotely by mobile phone, no matter the distance. Nanny cams and even puppy surveillance systems make being away from home that much less worrisome. Many apps are available for download. They can be custom-built as well, with all the features a person wants, with an app builder such as the one offered by mobile.conduit.com



If a person can find their way around an iPhone, they can design their own surveillance cam app, since the Conduit app creator provides the templates and instructions to succeed. This could become a necessity for all web-cam users, so that surveillance and peace of mind goes everywhere the mobile goes.
2013, By: Seo Master

seo Wikipedia to Get Visual Text Editor 2013

Seo Master present to you:
Wikimedia Foundation is finally rolling out its visual ‘WYSIWYG‘ editor for all the Wikipedia users. Wikipedia is still using its markup code known as Wikitext. The new text editor is expected to launch from early July. The text editor has been launched in alpha version.

The organization has been working on a WYSIWYG editor for several years, and it said it has been the “most challenging software project the Wikimedia Foundation has ever worked on.

You can enable the VisualEditor in your preferences section under the editing tab. Wikimedia is inviting all alpha users to submit any bugs they find.




2013, By: Seo Master

seo Google Will Soon Launch Google Web Designer; HTML5 Development Tool 2013

Seo Master present to you:
Google will soon launch Google Web Designer, an HTML5 development tool. Google will launch it within coming months and will be used to create cutting-edge advertising as well as engaging web content like sites and applications. The tool will be FREE.

2013, By: Seo Master

seo Tribal Wars W69 opening tomorrow! 2013

Seo Master present to you:
Tribal Wars, one of the GREAT browser game will be starting its new World 69 tomorrow. The world was already available for pre-registration. By tomorrow, the world will have maps, villages and other many things. More than 9000 people have already registered. Join our TRIBE Center for Noob Disarmament (Tag: CnD).
2013, By: Seo Master

seo Is it possible that tablets get extinct in five years? 2013

Seo Master present to you:
Before 2010, it is hard for us as well the computer manufacturers to give a definition for tablet, for there are too many types of companies all over the world engineered and produced their own tablets. It was until the release and success of iPad in 2010 that we begin to pay attention to the tablet we all wanted to own and to use on a daily basis. Just in the same year, we saw the advent of Samsung's Galaxy Tab. Both Apple and Samsung have since then released the successors 每 the iPad 2 and Galaxy Tab 10.1. Since then, the entire IT industry seems to be shifting its main focus from developing PCs to tablets. However, there are also some doubts on the future of tablets. Thorstein Heins, the BlackBerry CEO, publicly stated that tablets would cease to exist in 5 years' time. Is it possible or just nonsense?

There is no doubt that development of IT products should always undergo the demands of their users. Microsoft is always doing this. For example, when users find recovery Windows 7 password a troublesome thing, we can see there are picture password and PIN code developed in Windows 8 as supplement of text password in Windows. So, what features are right for the market demands and attribute to the success of tablets?

The success of tablets greatly owes to Bill Gates, who deserves a lot of the credit for pushing the slate form factor onto the general populace. "But a lot of those users are frustrated, they can't type, they can't create documents, they don't have Office there, so we're providing them benefits of something they've seen and made that a big category, but without giving up what they expect in a PC", he said. A key and common component among tablet computers is touch input, which allows the user to navigate easily and intuitively and type with a virtual keyboard on the screen. Tablet is also characterized by its wireless mobile browser, GPS satellite navigation, portable media player, docking station, etc. It seems that tablets are just what we want in the past several years.

However, the statement that the tablets is to extinct is also not groundless. We now have even high demand for it. We can see there are a variety of other portable and practical devices equipped with similar functions with tablets in the current market. The biggest threat of tablets comes from smartphones. Many of these advanced smartphones can wirelessly connect to your display, keyboard, and mouse, providing full-featured desktop functions. What's more, when compared to tablets, smartphones are more portable and with flexible and foldable displays. Ultra books are also increasingly popular for its reduced bulk without compromising performance and battery life. They are supposed to replace more and more laptops over time and help to eliminate netbook and tablets from the market.

The future of IT products is somehow hard to predict, even if it may be booming at this moment. I want to say, with so fierce competition in this industry, any products will definitely be eliminated sooner or later once it can't meet the demand of the market. For users, no matter you choose a tablet, a smartphone, or a notebook, the best choice is made according to your specific requirements.

I am Mike Leonnon. I am a freelance writer from New York. I am interested in IT produts and have been writing on PC for years. You can also find many tips for PC operation and security, say, how to recover password in Windows 8, tips to choose the right PC, etc.  
2013, By: Seo Master

seo 72,000 blogs defected from Tumblr after Yahoo acquisition news: Matt Mullenweg 2013

Seo Master present to you:
WordPress CEO Matt Mullenweg claims that once the news had broken on Sunday, defections from Tumblr to his own site had risen from 400-600 per hour to over 72,000.
2013, By: Seo Master

seo Yahoo adds tweets to online news pages 2013

Seo Master present to you:
Yahoo Inc. on Thursday began adding up its online news pages with real-time comments fired off at the Twitter.

 "Tweets have become an important information source for many of our users, so we are thrilled to announce our partnership with Twitter to bring tweets directly into the Yahoo! Newsfeed," Marissa Mayer, Yahoo! CEO, said in a blog post.

"Updates direct from politicians, celebrities, media outlets, and other publishers have become an important source of real-time news and information."

 Yahoo! will display "relevant and personalized" Twitter messages in news feeds, according to Mayer.

2013, By: Seo Master

seo Introducing Twitter #Music App 2013

Seo Master present to you:
Are you a Pandora guy? Love it or hate it, some seem to think music discovery services available today aren’t enough- or up to par. It is the folks behind Twitter who’ve step up to make amends this time. Their solution is Twitter #Music, a music discovery service like Pandora, though with a different approach. Why Twitter? Why now? Well, they have data, lots of them. Think of millions of followers popular artists have on the platform. Lady Gaga alone has 25 million. Justine Bieber seemingly has overtaken her now. People love music. And they love Twitter. Why not take this relationship to the next level? Twitter Music launch isn’t a big surprise after all. The social media giant had acquired ‘We Are Hunted’ last year, a start-up company recommending music from Rdio, iTunes and Spotify based on Twitter followers. Had you observed closely, you would’ve seen it coming.

Features

Services like Pandora make recommendations on music tracks based on previous tracks you’ve listened to. Twitter #Music instead recommends you music based on Twitter follower data. For instance, through the new service you can discover new artists and bands your friends have been following, yet you’ve never ever heard of. Or you can discover what your favorite artists listen to apart from their own music. It is a new way of discovering music. The app enables you to listen to a preview of the song up to 30 seconds. Options to buy the title off iTunes or listen to the full track via Rdio or Spotify are provided as well. For the latter you need to be a paid subscriber for Rdio or Spotify.

The Music App offers music recommendations under several tabs. For instance there is a ‘Popular’ list based on trending activities on Twitter. ‘Suggested’ tab lists artists similar to ones you are following. The app interface is simple, initiative and is a pleasure to use. However, that is not to say it is perfect. There are also some missing features most users would’ve loved to see. For instance there are no options to follow artists only from within the #music app, or tag them for listening at a later time. It has only been weeks since launch and hopefully it would get better over time.

Conclusion

Folks behind Twitter #Music have decided to start big and expand. That could be one of the reasons why they chose Good Morning America, a show with huge viewership to announce their new service. Along with the announcement they released a dedicated iOS app to access the service. It was speculated earlier that 300 million Twitter fans could see to the success of the new service. It was also highlighted as good news for Spotify and Rdio, since they get to expand their reach. It is still too early to comment on the success of the new service which in fact is limited to few countries yet. However its iOS app seemingly has hit few bumps just days after launch. Accordingly Twitter #Music app has lost its place among the top 100 free apps on US showing a decline in popularity. The service has also received positive reviews for its ability to recommend music based on followers’ data. It is also a great way to discover music interests of your favorite artists and bands, something you couldn’t do with Pandora. Twitter #Music isn’t the best thing out there, yet. It needs to work on refining existing features and adding new ones to be a game changer, but that’s not to say it isn’t useful at the moment either. Overall, it has the potential to become a great music discovery service, and hopefully we would see it expanding over many other countries as well.

Author Bio:

This post was provided by James Weaser. He is software developer of IQmango team. Now they are working on IQmango Music converter project.
2013, By: Seo Master
Powered by Blogger.