Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

seo OTON: The Future Gaming Console! 2013

Seo Master present to you:
Everybody has heard of OUYA $8.5 Million story. OUYA is an Android-based videogame console which reached the record of fastest project to ever reach the million-dollar pledge mark (8 hours 22 minutes) and having taken in $2,589,687.77 worth of pledges in the first 24 hours.

A company in Alabama has promised to release a gaming console from future. They call themselves EnGeniux team.

OTON is powered with custom software built on top of a custom version of Ubuntu OS, called "Otonomous". The system will undergo updates regularly to support many game formats.

OTON is said to be capable of running Linux, Android, HTML and even other kind of apps too.

While interviewing the CEO, Derrick Samuels he told me:
OTON development is different. OTON is more like a virtual assistance for developers. So the process will be easy. We are working to have Android support and Linux games. When you call OTON a console..it will stand by that name! Play anything!

The best part of OTON is that it can generate the games instantly without any human effort.

OTON will be the first game console to support artificial intelligence capabilities. The system learns and will add an extra layer of challenge for only the worthy gamers. Enhanced game levels, characters, and game-play are just a few challenges only the elite gamers will dare challenge.

In future, OTON is expected to include updates, game music creation, photo creation, website creation, educational gaming creation, document creation and media content creation!

The games would also be updated with daily updates which will cost nothing!

An internal camera on the front of the system is designed to make motion gesture gaming possible as well as direct interaction with the operating system/ user interfaces.

The game can also create a blog or website to publish his games and thats too for FREE!

The OTON system will unlock unlimited possibilities for gamers, educators, and business, medical and game developers unlike any other console before.


The gamer can also transfer his game or app to his/her smartphone. It would also support online multiplayer games.

I wish these innovative guys the best!
2013, By: Seo Master

seo Using social media to find your dream job 2013

Seo Master present to you:
Getting your dream job will by no means be an easy feat. You will have to invest time, money and a lot of hard work into getting your dream job, so it’s certainly not a case of using social media as a way of securing the perfect job. However you might find that social media can be very beneficial to finding your perfect job; by utilizing social media in the right way, and spending enough time, you could find that social media puts you way out in front of your peers.

Find what options are available

In the modern world, social media is a wonderful way of finding out what sort of jobs are out there, and what you need to do to get those jobs. You can follow people on Twitter who are in the industry that you are interested in; ask them questions about their job and how they got where they are, or simply follow their tweets to see what their lives are like. The same applies to YouTube: there are a variety of experts making videos on all sorts of videos, and you might even be able to find their email addresses to ask them questions pertaining to their job.

What are the perks of the job?

One of the great things about the accessibility of social media is that you are able to look at exactly what you will gain from your dream job. Twitter is yet another great way to look at what it’s like to have the job – are the employees staying in five-star rated hotels on a regular basis? Do their instagram accounts show that they are often out to dinner or breakfast? Do the chefs you follow make Facebook posts about the celebrities they’ve seen? Just get to know and understand the job and what it’s like.

How did they get there?

Perhaps the most important question you need to ask those that you follow on social media is exactly how they got there. Did they use their qualifications, or was experience more important in getting their position? Twitter and Facebook are both very useful for being able to contact people who otherwise would be inaccessible to most of us.

Don’t rely solely on asking questions to those that you are interested in; see if they have made blog posts or YouTube about their job and read them before asking questions. There is a wealth of knowledge on the internet about many dream jobs, as long as you take the time to search for it.


Research companies that might employ you in the future

The majority of businesses nowadays are on social media sites, such as Facebook or Twitter. It’s not just the major corporations that are making use of this new technology – many smaller, family-run businesses are catching on to the usefulness of using social media. There are many ways you can find companies that you could approach for jobs – take a look at advertising websites, as well as the company Facebook page and Twitter feed. Use Google to find companies that have offices close to you as well; just use the internet is any way you can to locate companies which you can go on to approach in the future.


Contact those with your job

Network with people who are in the industry or have the job that you are interested in. Make a LinkedIn profile and see who you can network with – you never know how important the initial contact you make with current employees could be. Having someone who can put in a good word for you might be the best way to successfully find that perfect job.


How best to apply for the job

Once you have networked, see if you can find a way to get your foot into the door of the company. Ask current employees if they can keep you updated on any future positions opening, and make sure that you have emailed your resume to companies for future reference. Be careful not to scare off current employees by being too bold and bothering them: networking is a slow process, but in the end it is likely to pay off.

Korah Morrison, working for College-Paper.org – the best student’s helper.
2013, By: Seo Master

seo A Guide To Advertising On Facebook 2013

Seo Master present to you:
1. The power of internet

The internet today is one of the most popular places for business to advertise in. With hundreds of millions of people visiting the internet on a daily basis from all over the world, you can be sure that advertising here will definitely increase your sales.

Internet advertising reached $99 billion in 2012, says a study from GroupM, which they say is representing a 16.2% increase over the previous year and accounting to 19.5% of all advertising expenditure that same year, worldwide.

According to internet world stats by the ICT the share of the world population using the internet has grown from 18% to 35% between 2006 and 2011. During this time the world population grew from 6.5 billion to 7 billion. The developing world has seen more of an increase in this 5 year study too, China increasing their share of internet users from 44% to 62% in the 5 years leading to 2011.


2. About Facebook

Today there are 62 million people using social media site Facebook. The social networking site is now considered to the biggest and most widely known social networking website existing. As the spread of internet users increases, worldwide, there is a constant increase in new users becoming Facebook members.

Facebook is also one of the most evenly balanced social networking websites in terms of user age and gender.

In a study of American SNS users by Pew Internet, Facebook had the second highest score for ages 50-65, at 19%, second only to LinkedIn at 23% and higher then Twitter at 13%.

The study also says Facebook is used by 92% of all SNS (social networking sites) users, followed by MySpace at 29%. The interesting fact is though that people engage more on Facebook every day, some 52% in-fact, that’s higher then Twitter at 33% and far more frequent then MySpace 7% and LinkedIn 6%. Another way of looking at it is Facebook is the premium place for your company to showcase, advertise and network with their audience.

Facebook’s overall market research data suggests it is the most universal social networking site and it has the best results for users’ daily visits. MySpace and LinkedIn by comparison are only occasional places users visit.


3. Advertising on Facebook

Within your Facebook account you may set up a targeted advert. This may involve publishing your website URL, and attract new users or likes. You can set up event times with dates and places, such as summer concert. Each ad allows you to include a photo or a logo as a small icon.

It’s easy to create a new advert, you just log into the home page, click on the bar on the right-hand side, and look for the section marked “Sponsored” where the ads appear. A link that reads “Create an Ad” appears to the side of the “Sponsored” link.

Within the Create an Ad section, you can design and edit the look for the advertisement, with Facebook automatically creating a preview at the bottom of the pages, so you’ve got the assurance your advert will look great before proceeding forwards.


Destination

In the Facebook Ad, you’ve got the Destination Tab and several options to direct the user. Then you can include the body of your ad copy and an image or log. Destinations include a website URL or your Facebook page, Sponsored Story is really a nice feature; you can choose to have either a Page “Like” Story, displaying to the user a friend who likes your page, with a “Like” call to action. Page Post Story shows the user the excerpt and image from your most recent Facebook post. The CTA here is to comment, “Like” and Share.

Goals
Facebook offers a range of other options for you as a company. You can select goals that cover the following:
  • Promote Page Posts, for specific pages you’ve created, increasing chances of reaching their targeted audience.
  • Get New Users, to target people that are likely to want to want what your website offers, sign up to newsletters, download your apps.
  • Increase Attendance, for when you have an event, target people who may find your conference or event relevant to them.
  • Get More Page Likes, when people like your page, they’re more likely to see your posts, and the more likes you have means that you have more people in the audience every time your posts are published on Facebook.
User Filtering

You can advertise to your demographic, using targeted marketing at your end user. This type of marketing is in smaller numbers, but with bigger and greater results, which are easier to manage for you as well!

  • Advanced tartgeting includes demographics, such as age and weather you want to choose men, women or both
  • Likes and interests allows you to advertise on the users’ pages who’ve publicised this date in their profile
  • Location permits you to choose a city, province or country for where you’d like to send your advert out to
  • Within the advanced targeting section you can choose to promote an advert for people on their birthdays, what languages they speak, education and relationship status

Payment strategy

Choose with either a pay per click (CPC) or pay per impression (CPM), which both have great potential to boost user awareness. In the Campaigns, Pricing and Scheduling section you can choose the currency you want to use to pay for ads, daily budget, and dates and times when you would like to appear.


Finalizing your ad

 You will be required to do a final review of your ad before publishing, so you can check over your work, and have the chance to return to and edit any part of the ad you have designed. Then finally, you can check over your order, which you can pay for with credit card or PayPal. Now you’re away, you’ve created an advert and enhanced your chances of gaining more visitors and customers!


4. What we’re doing at the company where I work

Working within online marketing at The Genuine Gemstones Company, my business utilizes Facebook for online PR, for online marketing campaigns, getting the best of Facebook marketing for posts and advertising hand in hand.


A new promotion for emerald rings on Gems TV gets sent out on a Thursday afternoon, and we need to get it to as many people as possible; with over 8,000 members and 4,027 likes on Facebook (and steady growing) we can have the best platform for our customers to see our ad campaign banner.

Our brands Gems TV and Rocks TV are strong in the UK and USA respectively and our online marketing team over here consistently are working, planning and communicating. Facebook is one of our key areas we would like to grow, with more users, journalists, companies and bloggers engaging with us every day that leverages a wider spread of users and shares name, our quality, our services, using Facebook.

2013, By: Seo Master

seo Introduction to modern Cryptography 2013

Seo Master present to you:
Hi, so I decided that, as i have the entire week to my self i will put in an introduction to Cryptography, for all who are interested in the subject. I will be updating the post, for the next week with new information and sections on cryptography.

Okay, before we move into the real interesting subjects of cryptography like, key exchange protocols, signatures, certificates, Symmetrical cryptography and Asymmetrical cryptography, hash fictions, and prime numbers. We will first look into the history of cryptography and its origins.

History of the Hidden Language.

During ancient times, when leaders and generals needed to send messages to their troops, with instructions on what they should do. It was very easy for the enemy to intercept those messages , by ambushing supply routs (in modern time its equivalent is the man in the middle attack), So this meant the message was easily read and the enemy would know what the other side was planning. to prevent this from happening there was only two ways of preventing this from happening, First, was to hide the message so that it looks just like a normal every day thing (Steganography). Steganography the art of hiding messages so that it is only known to the person receiving the message that a message is hidden in it, a good example is invisible ink. Now, the Second way was to make the message unreadable for any person who was not the intended recipient. And this is what many did, because unlike stenography encryption could be taught to people easily and could be done with much less resources. so In a war situation teaching generals and messengers how to put cryptography was much more efficient.

Early encryption techniques were rather simple and you yourself may have played with it when you were kids.

Two main cipher system used were:
Transposition cipher
Substitution ciphers


A Transposition cipher uses a very simple method of encryption one of the most popular ones were the scytale, basically the scytale is a piece of wood, on which a strip of paper is wounded up to revel what message. so the person sending the message to some one would have an identical scytale as the other and would wind the paper on it and write the message then unwind the paper and fill the empty space with random words. if another person intercepted the message and used a different size scytale the message would not show.
Problem with this was the sender and the receiver required identical scytale.

A Substitution ciphers is another simple cipher that substituted the actual alphabets with some other alphabets or numbers. The Caesar Cipher is by far the most famous of them all, used a simple shift technique to substitute the alphabets, Used by Caesar himself and the roman empire Eg bellow.

Three shift right →
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Planetext - Bitcoin is a crypto coin
Ciphertext- Efqzlfk fp x fovmql flfk
Notice there is repetition of the same alphabets that have been substituted.

So, looking at the cipher above you can now encrypt any length of message through substitution, and all the receiver has to know when receiving the message is how many shifts are used.

However all these methods are venerable to cryptanalysis techniques, like a frequency analysis. All a person has to do is count the alphabets and make a note of each of the alphabets and the number of times it appears. In the english language some alphabets appear more that some, using this, we can determine which symbol or alphabet was replaced.

English Letter Frequency


Polyalphabetic cipher

Due to the ease of all these Cipher being broken a new system was requires, one which could not be so easily broken using a frequency analysis. many new ciphers came in and out. One being predominantly used for hundreds of years was the Polyalphabetic cipher on which normal frequency analysis attack method did not work. and it used a key. The Vigenère cipher the best known of them all and its harder cousin Autokey cipher remained one of the most used ciphers during the 15th and the 16th and up to mid 18th century, remained unbroken.

It was a variant of a Substitution ciphers but with multiple shifts and alphabets and also the use of a key made it versatile and impenetrable.

This is how a Vigenère cipher looks like.


Vigenere Cipher

Eg:-

Message - TO BE OR NOT TO BE THAT IS THE QUESTION
KEY - RELATIONS

Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY

Notice there is no repetition of the same alphabets that have been substituted .

This kind of ciphers remained active for many hundreds of years and was used widely in Europe and the middle east. However the fate of this cipher system was doomed, when a brilliant man who we all know and admire in the computing world came along, the father of computer Charles Babbage, he broke both the Vigenère cipher and the much harder Autokey cipher.

Tomorrow we will touch upon mechanical ciphers, used in the second world war and then enter the world of modern cryptography, in the digital age.


The Rise of the Machine

The era of the second world war, was the proving grounds for modern encryption methods, ideas and innovation. In my opinion, if it was not for the Mathematicians, code-breakers and revolutionary thinkers, the modern computer age, the internet and space travel would not have been possible at all. The birth of computing devices, to conduct tasks through programmed inputs were all tested and innovated, by codebreakers trying to break the German Enigma code. The use of early computers was at England, in a place called Bletchley park. In fact, the first discovery of modern public key encryption system and early experiments on One Time Pads was done during this time.


World War 2 Machines
Enigma Machine *Germany*(Left)  |  SIGABA *USA* (Middle) |   TypeX *UK*(Right)

World War 2 Machines

During the War the Germans used one of the most successful, mechanical crypto systems called the Enegma machine, it was a rotor cipher machine, similar to a Polyalphabetic cipher but with the difficulty increased by the rotor, if the allies broke the code all the germans did was change the configuration and may be add rotors giving another huge headache for code-breakers.

The US and the UK also used similar machine called the SIGABA and the TypeX. However, a code system that was never broken by the enemy was not mechanical at all, but were the Navajo code talkers who played a vital role in the success in the pacific war theater. There's even a movie called the Windtalkers played by Nicolas Cage although it concentrated more on the nipless cage than the Code talker.


Modern Cryptography

With progress happening in the Cryptography community one of them was by far the most revolutionary, the public key crypto system, the RSA algorithm that allowed people to have two keys one public and one private. this solved many problems of key transfer and security and validity of a encrypted message. This algorithm was already made during the second world war, but was classified. Until 1977 when a group in MIT rediscovered this algorithm on their own, hence the name RSA algorithm, the first alphabet of their surname Ron Rivest, Adi Shamir, and Leonard Adleman.
RSA Small Logo

The advent of modern cryptography gave rise to secure communication, safe banking transaction, and greater communication, and social revolution. We use some form of encryption every day and sometimes we don’t even know that encryption is being used.

Cryptography, before the dawn of the Information age was confined to the intelligence community, with many of the technology kept classified and inaccessible to the general public. It was nearly impossible for a person without a connection to the intelligence community, or a large corporation like IBM to do any work on Cryptography. But, that all changed when the internet was born. People from around the world collaborated to bring cryptography to the masses. With the advent of the internet people were able to disseminate information about cryptography, and develop software for everyone to use.

This shift in knowledge from an intelligence based community to a worldwide public community, gave rise to many social changes. With people openly advocating the use of encryption to promote privacy, Bring down corrupt government, safeguard whistleblowers. During the late 80's many BBS's hosted score of text files relating to cryptography and around the early 90's a cypher punk mailing list was started, the birthplace of the cyberpunks, with the major discussion on technical issues, alternative uses of cryptography privacy, government surveillance, freedom of speech, civil society, and related issues. There have been many influential individual who have shaped this movement Eric Hughes, Jim Bell, Philip Zimmermann, Julian Assange just to name a few.

The roots of bitcoin can be traced back to the early discussion, within the cyberpunks and the cryptoanarchistic groups for an anonymous banking system. May be Satoshi Nakamoto might be one of the early cypherpunks, who was able to solve the problem of anonymous banking. But, we shall never know.

Cryptography has now become an integral part of our lives, in this modern day society it is rare not to come across technology that does not utilize some sort of encryption. I believe that the future for Cryptography is bright, because this is the only thing that can solve many of the world problems of secure communication, Tyrannical governments, greedy Banks, and immoral super corporations.

Tomorrow we shall finally talk about the technical part of modern Cryptography. Thinking about what to talk about tomorrow . I am a bit torn about where to start this from, and after a cigarette break I have decided to start with the basis of modern cryptography, the math’s behind it, so the topic for tomorrow would be Prime number related math’s, and will touch upon a Diffie and Hellman key exchange protocol.


The Numbers Game

The building blocks of every thing in maths my opinion is and always, the prime number. This number can form so many different numbers of any length, and a number of a particulate digit can be factorized to a smallest number being prime.

What is a prime number?

A prime number is a number divisible by it self and one. (basic old school definition)
take it this way, a number which cannot be divided equally without creating fractions of it.

2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71...............

so, lets take for example an integer which Factorizes to
56984 = 2 × 2 × 2 × 17 × 419

What is prime factorization?

Prime factors of a positive integer are the prime numbers that divide that integer exactly like the example above.

So why is this useful to cryptography and online security? 

Well the simple fact is that, it is easy to multiply two large prime numbers, but while trying to find the prime factor of that integer become a tedious task taking alot of time
a simple example like.

7703 × 6421 = 49460963

the output a compost number is going to take a long time to be factored, the example above may not be the best example of a large prime number being used but just Imagine a prime number P1 and P2 both the length of about 100 digits long or much longer and multiply those tow together the composite number would be hard to factorize the limit being the time taken to compute the result.

g mod p

42 mod 12 = 10

Working with prime modulus.

3^29 mod 17 = 12

so here calculating this makes it easy when we have the generator as 3 raised to the power 29 . However when we have the result as 12 and need to find 3 raised to the power x . this becomes a time consuming task.

3^x mod 17 = 12

This problem is also know as a discrete logarithm problem. Therefor this creates a One way function. easy to compute harder to decipher.


Therefore, if the size of the prime increases the time taken for a computer to compute the result of that, would take a very long time.

Clock arithmetic :

If we consider prime numbers as the ingredients in our encryption recipe, the modular arithmetic is utensil for cooking it up. we shall see a simple use of [ mod ] in a few examples while talking about the Key exchange protocol especially the Diffie and Hellman key exchange protocol.

Diffie and Hellman key exchange protocol

Problem of Exchanging Keys :-

Lets take an example of two people who are honest employees in a corrupt government service, Alice and Bob, and lets take for example their Evil boss is Eve.

Alice and Bob want to communicate with each other but, does not want any one to read their messages, as they know Eve would most likely be reading their emails.
so how would the two communicate without Eve being able to read their messages.

Firstly, Alice and Bob has to agree on a secret key so that they can use that key to encrypt messages and send to each other but, the problem is that if they send the key without encrypting it , Eve would know what the key is and can read all the messages Alice and bob send each other. This is where the Diffie and Hellman key exchange protocol would be most useful.

So how does it work?
Alice and Bob agree on a generator and a prime modulus.

g = 3
p = 17

What Alice does :-
She chose a random number
and then raises that on the generator, result q = 15

g^x mod p = q
3^54 mod 17 = 15

Alice, then sends this result 15 over the insecure line to Bob

What Bob does
He chose a random number Bob.
and then raises that on the generator, result r = 16

g^y mod p = r
3^24 mod 17 = 16
Bob, then sends this result 16 over the insecure line to Alice

What Alice does is,
uses Bob's result as a generator raised to the power of the random number Alice chose to calculate a secret key s
r^x mod p = s

16^54 mod 17 = 1

Bob also does the same thing using the number Alice sent Bob. to generate a secret key
q^y mod = p = s

15^24 mod 17 = 1

Here Both Bob and Alice was able to compute the secret key s without transmitting the key over the insure line.

Meanwhile, Eve who is reading the messages coming in, can only intercept the following details from Bob and Alice
the generator 'g', prime modulus 'p' and the two results of the calculation by Alice and Bob 'q' and 'r'.

What Eve is missing is the private numbers that Alice and Bob used to generate the Secret 's' . without the 'x' and 'y', it is impossible for Eve to determine what secret key Alice and Bob is using to encrypt their messages.


Alice '(m)' → Bob
s(m)              s(m)


So, here Alice sends Bob an encrypted message using a secret key 's', which Bob then uses the Secret key 's' to decrypt the message Alice Sent him.


As you can see with this protocol many of the problems of secret key transfer is solved. This also leads us to the path of asymmetrical encryption and the use of the later RSA algorithm's public key cryptosystem to encrypt messages.

I hope this was simple to understand, i tried to put in as much details without making it confusing, i hope you all like it and understand. Next, i will cover the public key cryptosystem namely the RSA algorithm, and then touch upon Hashing, one time pads and a few single key encryption on block ciphers.


By subvolatil of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=246307
2013, By: Seo Master
Powered by Blogger.