PC Supporter: We are writing reviews & overviews about latest Technology, Gadgets, Social-networks, HP Printers, Operating Sys, PC Games & Wallpapers

Showing posts with label iPhone. Show all posts
Showing posts with label iPhone. Show all posts

Sunday, 2 April 2023

10 Must Have Mobile Accessories for Just Under $10

Selecting a mobile Carrier isn't a big problem but choosing what mobile model, its make and operating system suites your needs, is really hard. But what after you buy a smartphone? You are buying tens of things related to it, which we call Mobile Accessories, like Car charger, data cable (few people needs longer ones and sometimes more than one) and other stuff.


Mobile accessories is more important than a smartphone itself, few times, specially when you out of data and there is no near WiFi and you need to send some files from you PC to your smartphone, you need a data cable. Reason why I always buy a separate pair of accessories for both my car and my home use.

Here I figure out few mobile accessories from Amazon, which must needed not only for travelers and business persons but for daily smartphone users also.

Saturday, 2 June 2012

How to Google 2-Steps Verification - Sync With Google Authenticator App

 

google authGoogle 2-steps verification gives you a total security on all Google apps & services  like Gmail, YouTube, Google Play Store and many other services, by sending you a six digits verification code on your phone or on Google Authenticator app - available for Android, Apple and BlackBerry. This six digit code should be input whenever you log-in to your Google account for verification after you turned on the 2-steps verification.

Besides that, if you are going to log-in and you can�t receive a verification code or you don�t have any device � Google Authenticator app installed on: Google alternatively gives you 10 more backup verification codes � you can put them in your wallet or save them to a file on your computer. You can use them when you have no mobile coverage.

After turning on the 2-steps verification - you can use both ways either text messaging or Google Authenticator app to get a six digit verification code for logging into Google services.

Lets how to turn on the Google 2-steps verification on step by step:-

1. You must have a Google account � already verified by a text message or by a voice call with your cell phone or a landline number.

2. Go to www.google.com and Sign-in with your current Email address and Password.

3. After log-in to your Google account, on the upper right corner � click on your profile picture, and click Account, here you can see all your Account information on the that page.

4. Inside �Security� tab (showing on left side-bar) you will find �2-steps verification� text with an Edit button on the right side (as shown in the picture below) click on Edit. You will prompt for Password again, just type your Password and Sign-in again. Its only for verification this time.

Step-4

5. Now here is the Setup starts. Click on Start Setup to go to next step.

Step-5

6.  The next step is to input your phone number you want to connect with Google services, and choose an option how you want to get a verification code for the next step (Step 7), and click Send Code (the Send Code button is not shown in this picture, but you can find it down the page).

Step-6

7. A text message will be sent from Google to your cell or landline number (you entered in the Step 6) including a six digit verification code. Enter that verification code in the box (as shown below) and click Verify (as the Verify button not shown in the picture again, same like in Step 6).

Step-7

8. On this step Google will ask you if you trust this computer? Trusted computers only asked for verification code once every 30 days. So if this is your single and Personal Computer, you can remain with ticked-mark on this option and click Next, incase this is not your Personal Computer, or you cannot trust on this computer, click in the check box to remove the tick-mark, an option will pop-pup for verification again, and select the option I don�t trust this computer and than click Confirm. All done you have successfully turned on the 2-steps verification for Google services, and from now every time you enter a password to log-in to any Google service, you will get a verification code on your phone number via text message.

In the next step (Step 9), see how to access your Google Account with Google Authenticator app.

Step-8

9. All the previous steps were about to how to enable 2-steps verification on Google services? In this step we will show you how to download Google Authenticator app on your Android, Apple or BlackBerry device, and how to use it with Google 2-steps verification?

First of all download any barcode read for your device. Now download Google Authenticator app for your device from the links given below and install it on your device:

Google Authenticator for Android

version 2.1 or later

Google Authenticator for Apple

iPhone iOS 3.1.3 or later

**Google Authenticator for BlackBerry

OS 4.5 - 6.0

Google Play Store

App Store

blackberry app world

**The Google Authenticator for BlackBerry Download link was not found the time we were publishing this article.

After installing the Google Authenticator app for your device, and completing the 2-steps verification process, its time to use Google Authenticator for log-in to Google account.

For Android Users Only:

10. The further steps are the same for all three platforms Android, iOS and BlackBerry. The only difference in-between is use of Google Authenticator app on your device. We will focus on Android app at the moment.

After completing the Step-8 you will referred to this page shown below. Here at the top you will see your phone number with a green tick mark on the left side, which means your phone number is successfully connected with Google services for 2-step verification.

To connect your account with Google Authenticator app � open the app on your device, and tap on Add Account. You will find two option to add an account to Google Authenticator, �Scan Barcode� and �Add account manually�, select �Scan Barcode� and the Barcode scanner app will starts. (we have tested ZXING TEAM Barcode Scanner for Android device).

Step-10

To �manage application-specific passwords�, see the video clip below:

how to manage application-specific passwords using Google 2-step verification.

11. Now on your computer, click on Android (as shown in the image below), it will open another page includes a Barcode. Scan the barcode with your barcode scanner (which was turned on in previous step) and you will find your account in Google Authenticator app on your device, and a 6 digit verification code will appear on your device, put that code in that page down below (as shown in the image below), and click Verify.

Step-11

Its all done and you successfully connect your Google Authenticator app with your Google account. I personally recommend that way to use Google more securely and personally.

This verification code is changing every 30 seconds on Google Authenticator app, which makes your Google account more and more secure. The amazing feature about Google Authenticator app is that its not required any internet connection to update the verification code online, and it totally works in offline mode. You can add more than one account in a single Google Authenticator app.

Share this article if you find it helpful for you. For any questions or feedback please feel free to write a comment below.

Thanks.

The PC Supporter Team.

Saturday, 26 May 2012

HTC One X � A Smart King

Stonking performance, a stunning screen and one of HTC�s best designs make this a new smartphone king.

[PC Supporter]

PC Pro [Jul 2012]

htc-one-x-pressFew of HTC�s offerings have threatened the smartphone industry�s top table of late, with its somewhat bland offerings largely overtaken by fancier phones from Samsung and Apple. But HTC�s latest flagship handset, the One X, looks set to take back lost ground.

It isn�t a phone we�d ever accuse of playing safe. The white rear, with its protruding silver camera lens, looks and feels superb, and we can�t fault HTC for build quality either. The One X is sturdy despite its 8.9mm-thick, 130g frame, and while there have been reports of the screen flexing when gripped tightly, that�s very fine indeed. The solid build can be put down to the construction, the One X is milled from a single block of polycarbonate, just like the Nokia Lumia 800.

It�s that screen that steals the show. It�s a 4.7in IPS panel with a resolution of 720 x 1280, that gives a pixel density of 312ppi not for behind the iPhone�s 330ppi and makes for consistently stunning experience. There�s plenty of space for full sized web pages, and text is pin sharp.

It isn�t only the increase in resolution; the quality is great, too. Its 490cd/m2 maximum brightness can�t math the iPhone�s 581cd/m2, but it�s far ahead of the Samsung Galaxy S II�s 300cd/m2, and it�s matched with a contrast ratio of 1138, lending images a real solidity and depth.

Processing power comes from Nvidia�s 1.5GHz quad-core Tegra 3 chip, partnered with 1GB of RAM. Is has 32GB of storage, of which 26GB can be used for data and apps, but there�s no microSD card slot to add more. For communications you get the choice of 3G, 802.11n WiFi and Bluetooth 4, and it has NFC.

The specification makes the One X the most powerful smartphone we�ve tested. Its Quadrant benchmark score of 4927 streaks ahead of the 3460 scored by the Galaxy S II, and it completed the SunSpider benchmark in 2071ms. that�s a third quicker than the Samsung, and just ahead of the iPhone 4S.

No game stretched the HTC�s GPU. High octane shooter Shadowgun ran flawlessly, 3D adventure title Dungeon Defenders was similarly slick, and Reckless Racing 2 also delivered rock solid frame rates. A word of warning, though: while things were fine away from the mains, running  these games while charging saw the handset grow unbearably hot. That aside, battery life was decent, with 60% of the 1800mAh power pack left after the 24 hour rundown test. Just don�t expect such longevity when gaming: a 30 minutes sting during a train commute saw the bar fall by almost a third.

The One X comes with Android 4 onboard, partnered with the latest version of HTC�s Sense UI. HTC has ditched the curved graphics at the bottom of each homescreen, replacing them with square icons, but it looks and functions as well as ever, with the usual line up of handy widgets.

HTC doesn�t bundle Beats branded headphones with this device, but the Beats audio kit inside the One X serves up bass heavy, a good quality sound.

It isn�t all good news, though. The Notification drawer has vanished, and virtually every app has a separate menu button that takes up a 96 pixel chunk across the bottom of the screen.

These are small complaints, however, with the 8 megapixel camera more than making amends. Quality is excellent, with sharp detail and accurate colors, and a flash is included. Shots are taken almost instantly, and there are panorama and burst modes too; the latter takes up to 99 shots as quickly as possible, and even picks the �best� one out for you. The camera also shoots 1080p video and, again, quality is excellent, autofocus is quick to lock on, and detail is extremely sharp.

The best camera & performance result, shown in this video clip.

It�s a fine all round package, then, but it�s impossible to ignore the shadow of Samsung�s impending Galaxy S III, It�s also said to have a 4.7in, 720 x 1280 screen, a 1.5GHz quad-core processor and Ice Cream Sandwich. If past standards are any indication, it may be the phone to beat.

For now, though, no other phone can match the HTC One X. It offers stupendous speed, a stunning screen, and a strong, attractive design, all of which combine to make it the best smartphone on the block. After something of a barren patch it�s good to see HTC back.

Wednesday, 1 February 2012

Top 10 iOS 5 Tips & Features





iOS 5 is an incredibly complex operating system, filled with hundreds of innovative, undocumented little touches, just waiting for your to stumble upon them. Here are Top 10 iOS 5 Tips & Tricks which will definitely helps you a little.





 Quick Split the Keyboard on iPad Quick Split the Keyboard on iPad



You can hold down the keyboard icon on the iPad�s digital keyboard to bring up a menu option to split the keyboard for more natural thumb-typing, but there�s a much faster way. Simply hold down on the keyboard with two fingers and spread them apart. The keyboard will split in half, just like that. Splitting your keyboard with this gesture is fast and easy, but not something you�ll likely stumble upon by accident.






 





 





Swipe to Seven-Day ForecastSwipe to Seven-Day Forecast



In Notification Center, switching between seven-day forecasts and a single-day forecast with more information is as easy as swiping the weather banner in either direction. A more detailed one-day forecast is just a swipe away.




 





Move the Split Keyboard on iPadMove the Split Keyboard on iPad



The iPad�s split keyboard is great, but positions itself in a weird spot�somewhere about halfway up the screen. that�s fine if you�re typing at the very top of the screen, but the second the text reaches your fingers, there�s no way to see what you�re typing. Fortunately, you can move that keyboard. Just touch and hold the keyboard button in the bottom right, and slide your finger up and down. The keyboard will follow. finally an iPad keyboard we can use !!!



Add iMessage Notifications to iPad




Add iMessage Notifications to iPad



Having a way to message friends on your iPad is great, but putting them in Notification Center is a must. Head to Settings > Notifications > Messages and slide the first item, Notification Center, to ON. Tapping the message will bring you right to the last sent item in your exchange.




 





 





 





Change Fonts in Notes Change Fonts in Notes



Marker Felt is no longer the default font in the Notes app, but unfortunately it�s been replaced by something just as cartoony. If you�d like to change your font, open Settings and tap Notes. Our advice? Change it to the universally loved Helvetica. Your notes will look much more professional. Finally a Notes font option that doesn�t make us feel like 12 year olds !!!




 





 








Shut Off Repeat Alerts Shut Off Repeat Alerts



A gentle reminder that you have an unread text message works well for some people, but others will be annoyed by the persistent buzzing of their phones. To shut off repeat alerts for messages, head to Settings > Notifications > Messages. Scroll down, tap Repeat Alert, and change to Never. Or, if you want to seem really popular, go ahead and crank that bad boy up to 10�




 





 





Turn on Private Browsing Turn on Private Browsing



Shopping for Summer season? Just head to Settings > Safari > and swipe on Private Browsing. Nothing you search for will be cached, so your wife will never know you�ve been looking at the Gift you buy from a Store online. You�ll know you�re using Private Browsing by the sleek black borders�




 





 





 





Swipe to Camera Roll Swipe to Camera Roll



iOS 5 provides quick access to your Camera Roll while you�re in the middle of shooting. While the camera is open, simply swipe from left to right and your Camera Roll will appear. Continue swiping from left to right to flip through your images. If you go too far, tap once to reveal the onscreen toolbar with image controls, and hit Done to immediately return to your camera. Swiping from the Camera app to the Camera Roll is especially great when you�re tired of your ugly mug�




 





 





Create Custom Vibration Alerts Create Custom Vibration Alerts



Customizing vibration alerts is easy in iOS 5, but the first step is to make sure the option is turned on. Head to Settings > General, scroll to the bottom and tap Accessibility. Under Hearing, turn on Custom Vibrations. Next, head to Contacts, open a contact, scroll to Vibration and choose Create New Vibration. The iPhone will allow you to tap or hold the screen to make all-new vibration patterns for each contact. Custom Vibrations combinations are limitless, and allow you to record extra long patterns.













Add Twitter Usernames to Contact Cards





Add Twitter Usernames to Contact Cards



First, visit Settings > Twitter, and sign in using your account. Then tap Update Contacts. Twitter will use email addresses and phone numbers from your previously organized contacts to add Twitter handles and photos to each contact it can find. Importing Twitter usernames can give you a good idea of how tech-savvy your friends are. We only had five friends with Twitter handles�

Thursday, 26 January 2012

Download Top Productive Apps for Your Gadget



You can be more efficient and boost your productivity with the help of some software designed to help you get your job done on a desktop, laptop or mobile (smartphone) device. By Jill Duffy



Top Productive AppsGadgets and devices are one thing, but the software and apps that runs on them is another, and it�s at the level of apps and services that we actually get things done.


Today we will make an overview of 4 Top Handy Productive apps for Android and Apple devices.


For Android Devices



Smartr Contacts for Android



Smartr Contacts for Android (free), formerly called Xobni for Android, creates a comprehensive picture of your contacts. Xobni is the company that makes the app, and it has been a relatively big name in contact management. The free app, which requires a Xobni account (also free) gathers your contacts from Gmail or Outlook, and finds additional information about them, including headshots, from Linkdin, Facebook, and Twitter, and meetings or text messages. For keeping up with email from your Android phone, Smartr Contacts can increase your productivity by removing a lot of the legwork that can sometimes be involved in keeping in touch. It orders your connections by how often you communicate, rather than alphabetically. And it handily merges multiple emails, so if you have an outdated email address for someone, but she has uploaded the most recent one to another platform, Smartr can find it.




SugarSync for Android



Android users looking for a way to make their files and photos available from anywhere should definitely check out SugarSync. It�s similar to Dropbox, but you get more space, 5GB, with a free account (Dropbox gives you 2GB). When your files are available to you from everywhere and automatically synchronized, you never waste time trying to sort out which version of what file you put where. Some of SubarSync�s goodies are hard to find, and others are hard to use, but for Android users looking for a more full featured alternative to DropBox, SugarSync is a pretty sweet deal.


For Apple Devices



Keynote (for iPhone)



Apple�s PowerPoint equivalent for iPhone is one of those marvels of software design, allowing you to easily and powerfully create compelling presentations on a device that fits in your pocket. It�s a dream for frequent flyers, especially those who are typically headed to a place where they will have to give a presentation or speech.


iWork for iPad


(how to use guide here)


With Apple�s iWork for iPad suite of office applications, Pages for word processing, Numbers for spreadsheets, and Keybote for presentations, you can do real work on iPad. This tablet version offers only a basic subset of features and functions compared to the high-powered OSX Version of iWork. The iPad�s cramped on-screen keyboard can slow down productivity, so if you�re serious about using the iPad for work, pick the Apple iPad Keyboard Dock ($69 direct), too.


,

Tuesday, 10 January 2012

CONTROL YOUR THERMOSTAT FROM YOUR PHONE



Control Your Thermostate from Your iPhone





Not planning to upgrade the office thermostat? Not even sure where it is? That�s about to change. The Nest ($249; www.nest.com) is a stylish, programmable thermostat that connects wirelessly to your network. Once the Nest is connected to your network, you can change settings and create a schedule via the Web or an app on your Android phone or iPhone. That�s right: You can change the temperature with a few taps on your phone. In fact, you don�t even need to do that: the Nest can use your daily adjustments to create its own schedule.

Wednesday, 4 January 2012

5 Most Handy Questions about Smartphones

The cloud refers to storage at a remote site accessible from the Internet instead of locally on your computer. Backing up data to the cloud is convenient because you can access it from anywhere�

Here are 5 most common questions about smartphones.

How is a Smarphone different from a standard cell phone?

There�s no official definition, but smartphones let you connect to the Internet, manage email, run software (called apps), and often have robust multimedia capabilities to play videos and music and let you take pictures and record video.

What is a �platform,� and why should I care?

A platform is the phone�s operating system (much like Windows is an operating system for PCs) and determines what features the phone has and what apps it runs. Apple�s iOS and Google�s Android are two examples. Because Apple controls both the operating system and production of the phones that use it, upgrading to the latest version of iOS is easy as long as your hardware is fast enough to support it. Android is different because each smartphone manufacturer using it can modify the core operating system and doesn�t always make updates of the latest version available to its customers.

What hardware specifications should I worry about?

The simple answer is to not get hung up on the specs and instead find a phone that does what you need it to do. Does it work with your email? Does it run the programs you want to use? Does it integrate with your existing services such as Netflix? Is it available from a carrier that provides great coverage in your area? Does it have adequate battery life for the type of things you plan to use it for? If the answer to any of those questions is no, it could be the fastest smartphone on the planet and be useless to you.

The said phones, with 1GB of RAM are nice because they can run multiple programs simultaneously more smoothly than can phones with less RAM. Also look for dual-core processors, as they can dramatically boost the speed of apps designed to take advantage of them. Finally, 16GB of memory is plenty for most users who don�t plan to haul enormous music or video libraries around with them, though 32GB or more is better if you plan to use a lot of apps, music, and video.

What�s the difference between 3G and 4G?

There refer to the speed of the cell carrier�s wireless data network. 3G stands for Third Generation standards and 4G for Fourth Generation standards. Each company implements these standards in different ways, so maximum speeds vary. In general, 4G networks let you download data at least 10 times faster than 3G networks do. This is great for nabbing large files or streaming high quality video, although battery life often takes a bit of a hit when 4G is activated.

Some smartphones will let me use the cloud for backup. What does that mean, and should I use that feature?

The cloud refers to storage at a remote site accessible from the Internet instead of locally on your computer. Backing up data to the cloud is convenient because you can access it from anywhere, and most companies employ encryption and backup redundancy to protect your data. If you don�t have an unlimited data plan, set up the cloud backup to only operate when the phone is connected to a Wi-Fi network. Otherwise, you risk blowing through your data plan without doing much of anything with the phone.

Wednesday, 28 December 2011

5 Smartphons that suits your needs



Smartphone that suits you wellChoosing a smartphones for your initial and entertainment needs is still not so easy to compromise with, because all the latest phones are ingenious, but make sure you get the right one to suit your needs, which are reviewed underneath category wise. Read and share if you like it.





Best for Apps






Apple iPhone 4s | �499 approx.



Apple is renowned for its huge app store � far bigger than those for Android and Windows � and its latest feature is another iPhone exclusive.


Siri, the voice controlled assistant, can intelligently recognize your spoken requests and source information from the web, working with WiFi and 3G. You can also dictate messages or notes with a simple tap of the microphone button, while future upgrades should enable Siri to locate nearby businesses such as restaurants and more.





Best for Business






BlackBerry Bold 9900 | �420 approx.



A 71mm touchscreen and an easy-to-use Qwerty keyboard make this BlackBerry, powered by a 1.2GHz processor, essential kit for business. Its notifications are configured to keep you on top of your workload and with BlackBerry Desktop Manager software, you can easily restore all your vital contacts from a previous model. It also has a chip for contactless payments � common in the US and growing in the UK � making it perfect for lunchtime meetings on the move.






Best for Adventure






Motorola Defy+ | �244.99 approx.



Now upgraded to be faster and last longer, the Defy+ remains the stand-out choice for any adventurer. It can survive being immersed 3ft (91cm) in water and its Corning Gorilla Glass is scratch and dust-proof. To further support your outdoor experience it comes with a preloaded Cardio Trainer app to monitor your progress, and with Motorola Media Link you can stream workout playlists from your desktops at home or work to enjoy wherever your travels take you.





Best for Music






HTC Sensation XE | �465.95 approx.



HTC has collaborated with Beats Audio to set the standard in mobile phone sound quality. The Sensation XE comes with bespoke earphones, which, when plugged in, tailor the phone�s EQ settings to the optimum sound profile for the music that�s playing. The result is a deeper bass and sharper vocals. The noise-cancelling microphones also improve cal quality and a 32GB microSD card adds to the phone�s 4GB of storage for your music collection.





Best for Camera






Samsung Galaxy SII | �409.99 approx


With its vast 109mm touchscreen and lightning fast dual-core 1.2GHz processor, this handset gets the best out of its camera without compromising the rest of its impressive features.


It has full HD video-recording capability and an 8-Megapixel camera with LED flash, assisted by a touch-to-focus function and multiple scene modes. It even has Flash-supported web browsing, so you can watch your clips on YouTube. It�s available free on a Vodafone contract.



Friday, 16 December 2011

The Future of Malware | News





The future of Malware | News from �PCadvisor.com�





Future of MalwareSecurity breaches look set to bet worse as hacker groups target smartphones and social media and release more information online. Jeff Vance reports.



Personal information leaked online is becoming an all too common occurrence. For example, Sony suffered a massive breach of its PlayStation Network earlier this year that led to the theft of names, addresses and possibly credit-card data belonging to 77 million users.


If you think the situation is bad now, just wait. Things will get worse as more information is dumped online by mischievous hacker groups such as Anonymous, and cybercriminals begin to target smartphones and social media.




In August, AntiSec (a collaboration between Anonymous and the disbanded LulzSec group) released more than 10GB of information from 70 US law-enforcement agencies. According to Todd Feinman, CEO of DLP vendor Identity Finder, AntiSec wasn�t motivated by money.


�AntiSec doesn�t like how various law-enforcement agencies operate and it�s trying to embarrass and discredit them,� he said.


But, he added, what it doesn�t realize is that when it publishers sensitive persona information, it�s helping low-skilled cybercriminals commit identity theft. Every week, another government department or business has its records breached � some 250,000 to 500,000 each year, estimated Feinman. Few details from those breaches are published online for all to see, however.


While certain high-profile attacks, such as the one on Sony, are intended to embarrass and spark change, the US law-enforcement breach could represent a shift in hacker thinking. AntiSec�s motivations appear to have a key difference, with the attackers consciously considering collateral damage as a strategic weapon. According to Feinman, AntiSec wrote online; �We don�t care about collateral damage. It will happen, and so be it.�




Social Networking




Facebook Malware

Experts say the future of malware is more about how potential victims will be targeted than how it will be engineered. Collateral damage won�t be limited to innocents compromised through no fault of their own.


Have you ever accepted a friend request on Facebook or connected to someone on Linkedin you don�t know? Perhaps you thought it was someone from school you�d forgotten about, or a former colleague whose name had slipped your mind. Not wanting to seem rude, you accepted them as a friend and quickly forgot about it. �When people make trust decisions with social networks, they don�t always understand the ramifications. Today, you are far more knowable by someone who doesn�t know you than ever,� said Kr Hugh Thompson, program chair of RSA Conferences.


We all know people who discuss everything they do on a social network or blog, from eating their breakfast to clipping their toenails. While most of us consider these people a nuisance and may hide their status updates, cybercriminals love them.


�Password-reset questions are easy to guess, and tolls such as Ancystry.com, while not created for this purpose, provided hackers with useful information,� said Thompson.


There are a few areas he believes the IT security industry needs to concentrate on: security for social media, ways to manage the information shared about you, and better methods for measuring evolving risks.




Enterprise Targets



mobile malware and your businessFake security software is the most common type of social-engineering attack that researchers at Blue Coat Systems come across. Chirs Larsen, head of the lab, explained that social network�s aren�t being used only to target individuals.


Larsen outlined a recent attack attempt where hackers targeted executives of a major corporation through their spouses.


The chances were at least one of the businessmen would have a poorly secured home PC that he shared with his non-tech-savvy wife. This would provide the backdoor needed to gain access to the company.


�Whaling is definitely on the rise,� said Paul Wood, senior intelligence analyst for Symantec.cloud. �Just a couple years ago, we saw one or two of these sorts of attacks per day. Today, we catch as many as 80.�


According to Wood, social engineering is by far the most potent weapon in the cybercriminal�s toolbox (automated, widely available malware and hacking toolkits are number two). Combine that with the fact that many senior executives circumvent IT security because they want the latest and trendiest devices, and cybercriminals have many valuable, easy-to-hit targets in their sights.


�Attacks on small businesses are increasingly dramatic because they are usually the weakest link in a larger supply chain,� said Wood.


There�s no sure way to defend against this. Until companies start scrutinizing the cyber-security of their partners and suppliers, they can�t say with any certainty whether or not they themselves are secure. While it�s common for large firms to keep a close eye on their suppliers, with factory visits that result in the implementation of an array of �best practices�, companies aren�t doing this when it comes to cyber-security.




Smartphone Threats



AndroidMalwareSmartphone threats are on the rise, but we�ve yet to see a major incident. This is partly due to platform fragmentation. Malware creators still get better results by targeting PCs or websites.


Larsen believes that platform-agnostic, web-based worms represent the new frontier of malware. Platform-agnostic malware lets legitimate developers do same of the heavy lifting for malware writers. As developers re-engineer sites and apps to work on a variety of devices, hackers can then target the HTML, XML, Jpegs and so on that render on any device anywhere.


Mobile phones are serving as a second identity factor for all sorts of corporate authentication schemes. Businesses that used to rely on hard tokens, such as RSA SSecureID, are moving to soft tokens, which can reside on mobile phones roaming beyond the corporation as easily as on PCs ensconced within corporate walls.


Two-factor authentication originally emerged because people couldn�t trust computers. Using mobile phones as an identity factor defeats two-factor authentication,� said Marc Maiffret, CTO of eEye Digital Security.


Today, Android is the big smartphone target, but don�t be surprised if attackers soon turn their attention to the iPhone � especially if third-party antivirus programs become more or less standard on Android devices. iPhone demographics are appealing to attackers, and security experts will tell you that Apple products are notoriously insecure.


Apple is reluctant to provide third-party security entities with the kind of platform access they need to improve the security of iPhones, iPads, MacBook Airs and so on. �Apple is very much on its own with security,� said Maiffret. �It almost mirrors late-90s Microsoft, and it�ll probably take a major incident or two to incite change.�


If we�ve learned anything about security in the past 20 years, it�s that another major incident is always looming just over the horizon. With the number of IP-connected devices climbing to anywhere from 50 billion to a Trillian in the next five to 10 years, tomorrow�s hackers could target anything from home alarms and air traffic-control systems to flood control in dams.




Thursday, 13 October 2011

Tips for Cell Phone & Cell Phone Battery Usage

There are just a few tips that will help you increase the life span of your cell phone and cell phone battery.

Below we are going to outline the most important tips:


Tips for Cell Phone - Cell Phone Battery Usage

1. Try not to drop your cell phone. When dropping your cell phone, especially on a hard surface, it can cause damage to your phone and cell phone battery. If you drop it and think you may have damaged it, be sure to take it to your nearest cell phone service center.

2. When necessary to take your batter out, be sure to not let it make contact with metal objects such as change and keys, this will make the battery not work properly.

3. Always be careful where you place your cell phone, don�t leave it in a car with extreme temperatures that may be too hot or too cold. Also be sure to not lay it down on a surface that may be wet as it will quickly ruin your phone this can corrode the inside of your phone.
Tips for Cell Phone & Cell Phone Battery Usage

4. One of the easiest ways to keep your phone in good condition is to take the time to read the manufacturers directions when you first purchase it. Be sure to follow the first charge instructions most importantly.

5. Do not use cell phone batteries and cell phone charges that are not compatible with your exact cell phones. Be sure if you buy a charger from the store that you have bought the correct one.

6. Many companies will recycle or reuse your cell phone, most times even giving you a credit toward the purchase of your new phone. Find ways you can reuse or recycle your phone and accessories. In fact, many people donate their phones to women that are in domestic situations, find a shelter near you to find more details.

7. Lastly your cell phone will most likely last you a year or two or more. Pick out a cell phone model that will help you with your needs, now is not the time to skimp, you want a phone that is easy for you and makes you want to talk!


Enhanced by Zemanta

Tuesday, 20 September 2011

Apple iPhone 5 � In Seeking List of Samsung To Be Sale�s Ban



Southeastern Peninsula's Samsung Electronics gift enter lawsuits to try to impediment the agreement of Apple's iPhone 5 as endeavor of its orbicular lawful tussle with the US technology hulk, a estimate said Tues.




The two firms are at loggerheads in a series of patent lawsuits over the technology and program of their smartphones and tablet computers.
Maeil Mercantilism Newspaper cited a Samsung lawyer as saying the steady would "strategically" begin the ratified actions as Apple was foreseen to start mercantilism the much-anticipated Smartphone succeeding period.
"We tally not yet definite whether to get the suits in Southwest Peninsula or in a gear region," the unknown authorized was quoted as expression.
It was unreadable whether Samsung would move a sales ban only in Southeastern Choson or internationally. A Samsung Electronics spokesman declined to observe.




image
image



Apple has accused Samsung of "slavishly" copying the discipline and designs of its market-leading iPhone and iPad.
It has filed complaints in countries including Deutschland and Continent, seeking a ban on sales of Samsung's Wandflower S and Beetleweed Tab.
Samsung, the domain's biggest retention blemish concern and the signal two movable phone business after Nokia, has launched counter-suits claiming its US contestant infringed its wireless subject patents.
The Suwon-based complement early this month was affected to jade its new paper PC from a starring electronics antimonopoly in Songwriter after a German assembly authorized a message from Apple to ban income and marketing.
Samsung yet vowed to refer, speech it would actively deal "all forthcoming measures, including ratified options" to argue its proximity in the Denizen mart.
The band said finally hebdomad it had filed complaints in Writer against Apple alleging wrongdoing of trine rotatable phone engineering patents in the US crunchy's iPhone and iPad.
The disorder was filed before a Town region authorities in July and the basic chance is likely in Dec.
Despite their legitimate battles, Apple is one of the greatest customers for Samsung's chips and representation screens.





Source: Yahoo News























Enhanced by Zemanta

Monday, 19 September 2011

iPhone 5 Pictures & Concepts � News & Reviews



Source: msnbc.msn.com � September 2011


Imaginative thinkers at French website nowhereelse.fr took an educated approximation at what the succeeding iPhone might perception like, supported on rumors and industry reasoning. This icon is not of Apple's iPhone 5 - but the proper one may end up perception a lot like this.



 



 iPhone 5 Concept



Concepts of people about iPhone 5, still awaiting till October 7�



By Ornithologist Rothman
The New York Times ran a repair Weekday speech that the succeeding iPhone is "just weeks departed," citing "an Apple employee who asked not to be titled because he was not allowed to communicate publically for the affiliate." Meanwhile, according to TechCrunch, the CEO of France Telecom is speech the phone's launch consort is Oct. 15 - for France at smallest.
Man Weintraub at 9to5Mac says that he's heard there give be two phones, an iPhone 5 and an "aggressively priced" variant of the iPhone 4, getable by Oct 7.
Our thought has been that the unveiling circumstance present likely befall on Oct. 3 or 4, and then the sound would be accessible within two weeks of that. These nuggets underpin that miracle pretty nicely, especially since iPhone availability in Writer could easily be afterward than in the U.S.
The Nowadays' Snick Bilton goes on to say that "an organise everyday with the new iPhone" told him it would be "fair dissimilar" than the iPhone 4, with an 8-megapixel camera and an A5 dual-core  , as we suspected. Furthermore, Bilton writes that sources told him that either this phone or the incoming one give comprise a telecom scrap made by Qualcomm which includes near-field act (NFC). This turns the sound into a so-called "digital notecase," that can be waved over a sensor to sort a credit-card commerce, for representative. Google's Nexus S sound already has NFC collective in.
Weintraub says that the new iPhone should be quite spellbinding:


More to read about iPhone 5�.



The iPhone 5 itself is a range to behold, we've been told. It is impossibly soft, yet often firmer than Samsung Coltsfoot phones which are hardbound in impressible. The camera rivals bushel and sprout cameras and faculty be a better marketing outlet for this maneuver.
It's designer noting that time nobody seems to affirm or control it, the iPhone 5 constitute dominates the reportage, patch the earlier rumored iPhone 4S lingo is nowhere to be open. Perhaps the lour end interpret gift be renamed iPhone 4S, but that doesn't quite urinate faculty because it's questionable to be cheaper than the rife iPhone, so why would it be faster?
Time all the fashionable millings seem to couple early iPhone 5 rumors, there is whatever alleged creation effort. According to Weintraub, at least on one construction pipe is "perception continuing ornament and creation delays," which could effort delays or at slightest shortages "all the way into 2012."
So if you truly deprivation an iPhone, you had outgo analyze your bivouacking paraphernalia, because you power end up sleeping exterior your local Apple Accumulation in the future weeks.






Enhanced by Zemanta

Saturday, 17 September 2011

Apple�s iPhone 5 in Review



Image representing Apple as depicted in CrunchBase


Image via CrunchBase



Things to know about iPhone 5�[PC Supporter]


Processor - Dual-core is decent the smartphone basic, so a processor delegate for the iPhone looks same a shoo-in. To palm with restored multitasking capabalities coming in iOS5, faculty suggests it'll get the similar A5 engine that's initiate in the iPad. That should have the Samsung S IIs of the domain at cove for now.

iPhone 5 [PC Supporter]


TouchScreen -


The iPhone 4's 3.5in touchscreen is starting to examine cross compared to Samsung and HTC's 4in-plus monsters, so Apple mightiness boost the iPhone 5's

covert to mate. The Retina Demo already offers the highest document out there; don't expect it to get any sharper.

 


Camera -


Apple isn't just acknowledged for leaving megapixel mad on the iPhone's camera, so Element boxing 12MP mutation looks implausible. Solace, the 5MP lineman on the iPhone 4 is looking lifelong in the tooth, and a designate up to 8MP would be recognize, especially given iOS5's new camera skills specified as red-eye reaction.

 


Body & look -


Apple's ornamentation ethos is all nearly state, so more await the iPhone 5 to persist the steps of the iPad 2 and MacBook Air by slimming way pile. Sources inform a devolve to aluminum for the chassis, with the troublesome aerial awhile to the Apple logo, where signalize interference fingers can't irrupt. There are already accessories but any school speculators guess it could turn improved into the close one. If so, it'd transport your sound into an 'e-wallet', allowing you to pay for crisps and cans of Tizer with no many than a swipe over a seek's pay restore. Could NFC be the iPhone 5's 'one solon attribute'? With gestures at the core of OS X Celebrity and multi-finger employment attendance in developer versions of the iPad's operative grouping, the iPhone 5 could be the basic digit and phoebe finger gestures practical, transferral up the toolbar without having to matter a secure.


iPhone 5 has to beat�.


Samsung Galaxy S II - Lightning fleet and thinner than an sufferer flatfish, the Galaxy S II's spirited AMOLED choose is the freezing on the Golem block. Google's brightest wish in the play against IOs.

BlackBerry Bold 9900 - Until we've proved the 9860, this touchscreen / QWERTY band is RIM's largest contender to the iPhone. The choose might be lesser, but it's razor salt.

HTC HD7 - The toiletries of the Windows Phone 7 set, HTC's HD7 strength lag down when it comes to apps, but Microsoft's OS has a streamlined content of cultural networking, contacts and telecommunicate.



Enhanced by Zemanta