South Korean Government Attacked By New Trojan:Korhigh

Amid a new wave of attacks hitting government and media networks in South Korea, researchers at Symantec have uncovered yet another piece of malware that destroys sensitive hard drive data and renders computers unusable.


The new malware program is called Korhigh (named by security firm Symantec) and contains the same kind of functionality that simultaneously shut down the networks of a half a dozen banks and broadcasters in March. Korhigh’s discovery on Thursday came a day after researchers at Symantec said they had identified the hacking group responsible for the March attacks. This newly identified DarkSeoul group is also responsible for a wave of attacks that hit South Korea on Tuesday and were apparently timed to coincide with the 63rd anniversary of the state of the Korean War. Like the earlier Jokra malware Korhigh can overwrite a hard drive’s master boot record, which contains information required for the computer to reboot and also permanently destroy stored data.  Korhigh can accept several commands that allow attackers to inflict additional damage inside a system, one such “switch” can change passwords on compromised computers to “highanon2013″ according to a blog post published Thursday by Symantec.  Another, wipes specific types of files, including those that end in .php, .dll, .gif  and 21 other file extensions.  Symantec researchers also wrote in their blog on Wednesday’s post “We can now attribute multiple previous high-profile attacks to the DarkSeoul gang over the last 4 years against South Korea, in addition to yesterday’s attack…The attacks include the devastating Jokra attacks in March 2013 that wiped numerous computer hard drives at South Korean banks and television broadcasters.’  The DarkSeoul group was also held responsible for the attacks on South Korean financial companies in May 2013.
As is almost always the case with network computer attacks, positively identifying the perpetrators is extremely difficult and sometimes prone to errors. It’s still not clear that the DarkSeoul gang is behind the newly discovered Korhigh Trojan. It’s also unknown if there are connections between the various groups identified and if any of them are sponsored by governments from other nations such as North Korea or China.
That having been said, these recent discoveries indicate that politically, nationalistically, or ideologically motivated computer attacks, often with the goal of causing physical destruction, are a growing and dangerously problematic threat.
Read More

The Windows 8.1 Preview is here!

Read More

WigWag: The Future Of Connected Homes?

Every technophile dreams of having the ultimate connected home. Perhaps, you’ve even made steps to attain that goal. It can start with the entertainment system being controlled via your phone and/or tablet. Then there are lighting schemes also controlled by smartphones, not to mention keyless locks. One appliance at a time, and pretty soon, you just might have one of those abodes we call connected homes.
WigWag: The Future Of Connected Homes?
Enter WigWag.
WigWag is an ongoing Kickstarter project, the ultimate goal of which is to equip you to “build intelligent environments anywhere with Internet-connected sensors and devices by letting you graphically write rules, “When” [this] happens “Then” do [that].  No complicated programming languages or computers necessary, rules are easily built on smartphones and tablets.  The more WigWag and third party devices in your account, the more you can do! ”
Isn’t that just the dream?
The brilliant thing about WigWag is that it allows you, the user, to define the IF condition and specify the THEN action as well. Some examples:
  • IF there’s motion sensed in the patio, you get a notification on your phone.
  • IF the humidity reaches a certain level, the fan turns on.
Obviously, in order for the system to work, you need to have sensors that will detect the conditions.
How does WigWag work?
There are four things to take note of:
  • Scan. Using either QR codes or NFC tags, you can deploy WigWag.
  • Control. Via your smartphone, you can control WigWag compatible devices.
  • Rules. Again, you use your smartphone to identify rules.
  • Share. If you live with other people, or you have friends staying the night, you can share the rules and controls with them.
Bottom line: WigWag has the potential to be THE system for connected homes of the future.
WigWag devices
This is just the beginning, but the makers of WigWag have come up with devices to get you going.

To find out more about these devices and how they work together, visit WigWag’s Kickstarter page, and be one of the first to get in the game!
Read More

Firefox 22 Launches

The popular internet browser Mozilla Firefox launched their first stable version of the new browser that supports the WebRTC protocol in the form of firefox 22 and includes support for asm.js JavaScript subset (this offers near-native performance for web apps).
Most browser releases with the exception of Microsoft’s I.E. have switched to a rapid-release schedule. Both WebRTC and asm.js, however, have the potential to change how developers create web apps.


Asm.js is a technology that has massive potential. Asm.js is a subset of JavaScript that runs with near-native speed within the browser itself. It is a sub-language that “effectively describes a safe virtual machine for memory-unsafe languages like C or C++.” said Mozilla’s Brendan Eich.  Thanks to tools which can compile C and C++ code asm.js, developers can also use it to convert their C and C++ programs to run in the browser.  Asm.js currently gets to within 2x of native performance and the team at Mozilla is working hard to speed it up further. You may test these new features with a game demo called BananaBread , which uses WebGL, Emscripten, asm.js and WebRTC to “show how you can deliver high-end 3D multiplayer games while still maintaining a fast and stunning experience.”  Other small updates in version 22 include improved WebGL rendering performance, a download progress bar in the Dock application window on Mac OS X and support for display scaling options on high-resolution displays on Windows OS.

Built-In WebRTC Support
WebRTC allows developers to create web apps with built-in video and audio calls and it allows file sharing without the need for any third-party software or plugins.  A number of companies are already pushing WebRTC. but, only Google’s Chrome browser until now supported this tool in its mainstream browser releases. Now that Firefox also supports it we will likely see a large number of startups and established companies examine this technology in better detail. Microsoft, so far remains the only major vendor who has decided to go ahead with a different standard for the same functionality, so it would not surprise me if in the future Internet Explorer will support WebRTC out of the box.
Read More

Facebook Bug Leaks Users’ Data

A Facebook bug in the company’s Download Your Information (DYI) tool has recently revealed more than it intended when a bug led it to leak the contact information of approximately six million users.
In an Facebook advisory posted on Friday, the company’s security team explained that the code the social network uses to make friend recommendations inadvertently caused the email addresses and phone numbers of potential contacts to be associated with other users’ account data. If those users then used the Download Your Information tool the incorrectly added contact information would be included in the download, whether the users were actually friends with the owners of the addresses or not. In all, the security team at Facebook has come to the conclusion that the addresses or phone numbers of approximately six million Facebook users were leaked in this way – that is the equivalent of about 0.54 per cent of the social network’s global user base.

facebook dyi
The bug was first brought to Facebook’s attention by an independent security researcher, whom the social networking site’s security staff say has already been paid a bug bounty for his efforts. In addition, Facebook has notified its regulators in the US, Canada, and Europe of the incident and is in the process of notifying affected users via email.
Facebook’s White Hat staff wrote:  ”After review and confirmation of the bug by our security team, we immediately disabled the DYI tool to fix the problem and were able to turn the tool back on the next day once we were satisfied that the problem had been fixed.”

Facebook‘s security staff have determined that each individual email address or phone number was typically only included in a download once or twice, meaning it was only leaked to one person. In addition to this, Facebook have assured that only the other people could have had access to the data, as opposed to advertisers or developers and no other financial or personal information was disclosed.  Although the social network has downplayed the severity of the leak and it doubts that the bug was ever exploited for malicious purposes, it’s still sheepish about the incident.
The White hat Team responded, “It’s still something we’re upset and embarrassed by, and we’ll work doubly hard to make sure nothing like this happens again…Your trust is the most important asset we have, and we are committed to improving our safety procedures and keeping your information safe and secure.”
That being said, does that make you feel safe and secure?
Read More

Photoshop CC Cracked In Under 24 Hours

Adobe announced back in May, that it was set to drop it’s Creative Suite as a boxed product, instead the company decided to focus wholly on offering its software via a subscription service. On June 17 2013, those subscriptions launched from the Adobe website with customers paying in the range of $19.99 and $74.99 per month for access to Adobe’s suite of applications.


A server connection is required to verify legal copies on a regular basis, but that’s not a 100% guarantee illegal copies of the software can’t and won’t appear. Proof of that comes in the form of a cracked version of Photoshop CC, which was made available in less than 24 hours after the subscriptions went live.
Adobe had thought that releasing its software via a subscription service would cut down on piracy of its products.  However, a torrent for the subscription version of Photoshop CC has appeared on The Pirate Bay. The torrent file is named “Adobe Photoshop CC 14.0 Final Multilanguage.” The comments on the torrent listing seem to confirm this is the latest version of Photoshop and it is in full working order.
In order for this torrent to exist and the software to function, Adobe’s Creative Cloud validation has been either bypassed or cracked. It therefore seems reasonable to assume other applications in the Creative Cloud suite will also appear as torrents any time soon.
Depending on how the software validation has been cracked, will determine whether Adobe can stop cracked copies of its products from functioning. If the cracked copies still contact Adobe’s servers and somehow pass themselves off as valid, then expect that to happen. However, if these copies function without ever needing to contact a validation server, there appears to be nothing Adobe can do to stop them functioning.
Unfortunately for a company like Adobe, the web does make it easier to obtain pirated material and until the day when there is a rock solid way to make a product un-crackable, there will always be ways to pirate software.
Read More

Samsung Kill Switch Coming Soon?

Is the Kill Switch coming soon?
Electronics giant, Samsung, are to allegedly release a kill switch feature into their smartphones  to improve mobile security and prevent device theft as soon as July.
The theft of Smartphones are on the rise and as the quality of the products increase, so does the value, making them more difficult to replace. Not to mention, the very real risk of sensitive personal information getting into the wrong hands.


As reported by TechBeat (Source)  recently, Samsung and other manufacturers have met with New York Attorney General Erich Schneiderman to discuss the future of smartphone security and how to prevent device theft, reportedly working on  kill switch functionality.  Now it looks like Samsung will be releasing this new feature as soon as July. The kill switch goes a step further than current security for mobile phones, not only allowing the owner to remotely wipe their device, but also essentially bricking the phone, rendering it completely unusable by thieves.

With Samsung being such a massive player in the smartphone industry, this is an opportunity for them to be among the market leaders in smartphone security, prompting other manufacturers to follow in their footsteps. Fellow smartphone competitor Apple, have already unveiled their new security system called Activation Lock, which is incorporated into the operating system itself and will take that security a step further by requiring the original owner’s Apple ID and password in order to access a stolen/lost/wiped iPhone.
On top of the user being able to remotely disable their phone, the new Samsung security system would also allow carriers to use the same features. The kill switch is speculation of course, as Samsung has yet to make any official announcement regarding the new security feature.
It would be nice to think that Samsung aren’t going to sit back on their laurels and let Apple take the first byte out of the kill switch bag!
Read More

New UEFI Security Features Now Available for Leading Linux Distributions

Leading Linux distributions are gearing up for better protection, and this is no surprise considering the innovative mindsets of hackers. In view of this, UEFI security features have been designed to meet the demands of Linux distributions. Compared to the number of people that use Microsoft, fewer individuals use Linux. However, with a significant following, Linux is considered important.
Announcement of New UEFI Security Features
Top providers of Unified Extensible Firmware Interface (UEFI) BIOS, today announced the availability of new UEFI security features, which include secure firmware update and Secure Boot for all major Linux distributions.

New UEFI Security Features Now Available for Leading Linux Distributions

This is good news for every Linux user not just because they can enjoy heightened security, but also because it sends a signal to users far and wide that Linux is an important force in operating systems. Indeed, it is important enough for UEFI to consider providing security updates for users.
UEFI decided to increase its attention towards areas that needed greater levels of security. This is in particular relation to a greater number of threats witnessed on the Internet in recent days.
UEFI Secure Boot is one such feature that is widely implemented now, as it is considered to be a crucial element in higher security blocks.

UEFI Secure Boot is Considered a Major Step in Internet Security for Linux Systems
The UEFI Secure Boot implementation is seen as one of the best measures against computer attacks. It offers computer systems the advantage of increased protection to combat malicious attacks at firmware, as well as malware like root kits, and a number of system intrusions.
Close coordination with Linux has allowed room for creating solutions for major foreseeable security problems. The idea was fundamentally directed at meeting the security needs of server platforms running Linux. With close coordination, a successfully validated UEFI Secure Boot was accomplished.
Additionally, there are tools available now to perform Secure Boot configuration changes. There are also signed secure firmware updates available that are applicable on systems that operate Ubuntu 12.04 LTS.

Major Discussions Over Latest UEFI Security
The solutions introduced were a major point of discussion at the most recent Intel Developer Forum. Insyde and Canonical co-presented the technical session on this issue in Beijing. The name of this session was: UEFI Firmware Enhances Linux Security and Adds New Benefits.
The immense focus on these issues shows the degree of importance that they have. According to experts, the collaboration with Insyde Software will certainly be of immense advantage to OEMs. It will allow a robust platform security for all systems that use Ubuntu 12.04 LTS.
The UEFI firmware technology that is currently addressing secure firmware updates and Secure Boot are considered to be crucial aspects of overall security in Ubuntu based systems.
Leading experts have worked in tandem to produce secure interfaces for safe OS boot protection. The solutions produced indeed address secure firmware updates and secure boot for Linux, delivering our OEM customers much-needed security and protection against system vulnerabilities.
As time goes on, malware and other forms of attacks will become more complex or even take on other forms. This means that the role of those increasing security measures is far from over. They have to keep on being creative as far as proverbially plugging the holes, and they must be innovative in order to combat future attacks.
Read More

Windows 8.1 Targets Mobile Devices

Technology is changing rapidly, and now you can see one more major change coming your way. With PC sales declining and mobile device sales rising, there is a trend developing. Moreover, mobile devices are beginning to appear in larger numbers in the market, and competition among their manufacturers is growing rapidly.
In contrast to this trend being observed, experts have been discussing and analyzing the operating systems. Windows 8 in particular is an immense subject for discussion alone. Since Windows 8 lacks the Start button and some other features, users have been complaining. However Windows has other plans for its 8.1 release.

Windows 8.1 Targets Mobile Devices

Will Smartphone Users Be Attracted to Windows 8.1?
Windows wants to add the Start button feature back, but it also wants to focus on the mobile device which it has actually built Windows 8 for. Windows believed that it could supply a programming system that would cater to both, the PC and the smart phone. However, it’s difficult to say how users will take to this either.
You don’t usually have an operating system that can be used for both platforms. Also, with the weight or one should say the typical PC features that Windows 8 carries, it can’t be said for certain whether smart phone users will adopt it.

Users Want their Smartphones to Remain Smartphones
Smartphone users are not expected to be impressed with a version of Windows on their phones that turns it into a PC. The whole idea they say is that it should their phones should remain as phones, and not become PCS. With larger screens, they want their phones to remain as engaging and easy -to-use phones.
Opponents of this idea as well as many other smartphone users believe that the smartphone or for that matter any other mobile device must sooner or later possess the capabilities of a PC. If the PC is eventually going to be obsolete, smartphones as well as other mobile devices will have to take their place.

Will the PC Become Irrelevant or Obsolete?
It’s unimaginable to think that businesses in particular would have to do without the PC. At the same time, it’s not practical to have a phone with an abundance of features that would be difficult to operate on s screen smaller than the size of a PC. So, moving either way completely does not seem to work.
A more practical approach would be to consider that the PC will never be obsolete. Its sales might decline and many home users might not purchase it anymore, but for business purposes, it seems unthinkable that the PC would become irrelevant anytime soon.
While some skeptics believe that Windows 8.1 will not be a viable operating system for the smartphone, as an operating system it will still be relevant for running PCs. While Windows aims at making its place as a smartphone or mobile device operating system, it will probably never ever be replaced as a major PC operating system.
Read More

Dell’s New Latitude E6540 Laptop Has Security Features & Intel Haswell Processors

These days, security means everything. Particularly when you use mobile devices that can so easily get lost, damaged or stolen, security becomes the number one priority. Manufacturers have been striving to produce devices with heightened security, and it looks like Dell has emerged with a product that fulfills users’ laptop security needs. However, this is not the only thing that Dell gives you with its new E6540 release.
Most laptops received a lot of attention when Intel’s new Haswell processors were launched. These were marketed and made available to the public, which is of course one of the reasons for the hype. While this happened Dell worked quietly and added a business notebook to its Latitude family by making use of the new CPUs.

Dells E6540 is Known for Its Solid Security Features as Well as Fresh Components

Dell’s New Latitude E6540 Laptop Has Security Features and Intel Haswell Processors
The new Latitude offers two different flavors of 15.6-inch display. Bothe these are LED-backlit:  1,920 x 1,080 or 1,366 x 768. This is the only Latitude that comes with a brawny Core i7-4800MQ processor. It presents users with the option of adding a discrete graphics card from any manufacturer.

The Latitude has a rough Tri-metal exterior, and it safeguards storage with rubber isolation of the hard drive. It also carries Dell’s Fast Response Free-fall sensor, which prevents disasters headed your way. The Latitude also provides protection in the shape of a RSA SecurIDs, fingerprint readers and a FIPS 201-certified smart card. It also has FIPS 140-2-certified TPM support.

Read More

Google or Facebook – Which Internship Would You Prefer?

Internships usually involve you doing all the jobs that everyone else hates, including making coffee for the whole office. But usually you can put up with the low pay (that is if you get paid) and the menial tasks because you’re just happy to be there.
Imagine though if you could land an internship with a yearly salary of almost $80,0000? Well, if you think you are an innovative software development genius, then you could apply for a coveted internship at Google or Facebook.

Google or Facebook - Which Internship Would You Prefer?

Google uses funky architecture to encourage creativity
Google has been ranked number 1 for the best internship, by Glassdoor. They have also recognized Facebook as number 1  best to work for.
Between them, Google and Facebook employ alomst 35,000 people, with Google being responsible for 30,000 employees worldwide.

Read More

Should Users Think about Dell in Networking?

Dell has been one of the top performers in the computer business over the years, and it has a strong influence in many areas of IT. While consumers enjoy its products, it is worth thinking about the possibility of Dell entering the networking domain.
Dell put out several products at the Day of Dell Enterprise Forum. This event was held in San Jose, CA, where some of these products included Version 6.4 of Compellent Storage Center. This version brings in an ‘intelligent data placement’ engine, which is capable of distinguishing inferior quality variants of Flash from high-performance types.

Should Users Think about Dell in Networking? 

 Dell’s Announcements at Day of Dell Enterprise Forum

At this forum, Dell also announced the SC280, which is an ultra-dense rack enclosed space that serves as a nifty storage space capable of storing data up to 336 terabytes. It can manage this easily in a 5U form factor.
Apart from these two additions, Dell also announced the release of FluidFS file system, version 3.0. This version supports a maximum of two petabytes of data within just a single namespace. It also encompasses de-duplication functionality that is policy-based. This allows administrators to shape tasks well in advance.

Dell’s Plans to Move Ahead in the Industry

It can clearly be observed that Dell’s storage strategy is preparing to move the industry to the next level by making use of new flash solutions. Experts, such as Stu Miniman, presented their views on this. Miniman delivered his analysis of Dell’s networking marketplace position.
According to Miniman, Dell created a huge impact when they introduced Force10. He says that when people think about Dell, networking hardly crosses their minds. The Dell Force10 solutions stand at only second place with Cisco leading.

Dell’s Position is Favorable for Further Growth

If you look at the general market share, you can tell that Dell has gotten a boost. They have managed to get their portfolio into an area where there is immense storage, an increasing presence in the data center, and also sufficient server environment.
Miniman further talks about HP separating itself as second place occupiers while Dell has begun to segregate itself from the entire lot in order to make them number three in general revenue according to the latest market data. Miniman says that if these giants carry on doing this, it is going to be interesting to see who maintains their positions and carries on struggling with a 3% market share. As everyone can see, Dell has made its position pretty clear in terms of where they believe they are heading.

Experts Suggest an Interesting Future for Dell and its Competitors

Indeed, it will be interesting to watch how things develop in time to come with Dell having its path apparently chalked out. There may be a hundred other opinions when it comes to how Dell will eventually move along. However, it appears that many experts would agree with Miniman’s analysis of the current situation and the possible targets that Dell has.
Given Dell’s reputation and where it would like to head and what it would love to achieve, users should be inclined to think of Dell in networking. With its performance over the years, this seems a viable prospect for the company.
Read More

ESET 7 Beta Released

What's new?

Stop heavily-encrypted threats that evade detection with Advanced Memory Scanner
Stay protected from threats or attacks trying to exploit network vulnerabilities with Vulnerability Shield
(ESET Smart Security only)
Eliminate extremely persistent malware and rootkits thanks to Improved Cleaning
… and More to Come!


TO TRY : GO HERE <-------------



System Requirements

Operating Systems
Microsoft Windows 8, Microsoft Windows 7, Microsoft Windows Vista,
Microsoft Windows XP, Microsoft Windows Home Server 2003, 2011
Read More

Google Face Gesture – No Need For A Password

Do you turn your nose up at having to remember yet another password? Well, maybe in future that’s all you’ll have to do  to unlock your Android phone or tablet! It has been announced that in June last year, Google filed a patent suggesting that users pull a specific face instead of using a password.

Google Face Gesture - No Need For A Password

The request of specific gestures is thought to stop the Face Unlock facility from being fooled by photographs. The Jelly Bean version of Android required that the user blink their eyes as a check but a group of security researchers from the University of British Columbia posted a video on-line showing that the system could still be fooled.
The patent filed by Google suggested that the software would track a “facial landmark”, making sure the user not only looks like the owner but also carries out a specific requested action, possibly
Read More

Linux Mint 15, Entitled ‘Olivia’ Launched

Linux Mint 15 ‘Olivia’ has been received with enthusiasm as users have been eagerly awaiting this release. It is considered an ambitious release due to features that were not anticipated. In contrast to previous releases, this release sets new standards due to the extra mile achieved.

Linux Mint 15, Entitled 'Olivia' Launched


Linux Mint 15’s New Driver Manager

New features in the Linux Mint 15 ‘Olivia’ release include a Driver Manager that is meant for installation of proprietary AMD and NVIDIA graphics drivers. Quite contrary to the program in Ubuntu, this Driver Manager shows details of the driver version that are available. There is also a package repository manager that adds more control to managing PPAs.
Users can get this release with the MATE and the Cinnamon desktops, which is something that is pretty much expected with Linux. Cinnamon 1.8 is the one being used and it was released a month ago with notable new features. These included desklets, which is a type of new screen saver along with a screen locking tool. It also has software for controlling Spices, which are bundles of extensions, themes and desklets.
It must be noted that Cinnamon’s newly introduced Control Center features do not require users to depend on GNOME’s Control Center when setting up particular components. The components referred to here are those that Cinnamon adopts from GNOME 3.

The Linux Mint 15 Facilitates Better Theming

There is the Mint variant with MATE, which is the desktop-distinguishable component from GNOME 2, and needs version 1.6 to function. This was released for users two months ago. This function allows users to enjoy better theming support that is meant for GTK3 applications. The file manager that is associated with this, which is the Nautilus-2-based Caja, also has an enhanced
Read More

Micro-Phone: World’s Thinnest GSM Phone?

As our smartphones are growing stronger and capable of running more and more programs and applications, they are getting larger as well, some of them already being close to the size of an eBook reader.
That makes it rather uncomfortable to use them for their initial purpose as phones, so how about trying  something that goes back to the basics? This Indiegogo project called the Micro-Phone, does just that.
Micro-Phone: World’s Thinnest GSM Phone?
Touted to be the world’s thinnest GSM phone, the Micro-Phone is an elegant, discreet device that can be easily carried around anywhere, being about the size of a credit card.
More specifically, this mini-phone is 3.3 inches long and 2.2 inches wide and only about 0.2 inch thick. It weighs 1.4 oz. An average card is about the same size, although indeed thinner, but that still makes the Micro-Phone incredibly small and thin and easy to fit inside your wallet.

Micro-Phone: World’s Thinnest GSM Phone?

Developed by an Australian start-up, the Micro-Phone is currently available in two models: the basic version and one equipped with a locator. The locator can help you locate your child, best friend or partner anywhere and anytime. The system uses mobile tower triangulation and is able to pinpoint the phone’s exact location, which users will be able to see by logging in to the accompanying “Locate Me” application.
The Micro-Phone will work with any GSM SIM card that supports 850/900/1800/1900 frequency bands. Those who own nano or micro SIM cards will be provided with an adapter. Other features include an LCD screen of 1.8 inches, full-size keypad, functions such as calculator and address book and others. The system is powered by a lithium ion battery that can last about 21 days.
The crowdfunding campaign on Indiegogo is designed to help the developers raise $50,000 in order to start mass production. Backers can receive the basic model for a $39 pledge and a locator model for $69. Shipping is expected to begin in August or September.
Read More

Glass Desktop Case & Star Trek Aspire R7 – Computex 2013

Computex 2013 certainly had something to offer for everyone, whether you’re interested in software, gaming or gadgets, this year’s event had it all.
There were two things which caught my eye and I thought they would be a nice round up to what has been an action packed week in Taiwan.

Glass desktop case by In Win

Watch out for sticky fingerprints on the Tou desktop case!
The first was the new desktop case from In Win. The company, who are based in Taiwan, are well know for their off-the-wall design in desktop cases but they really have broken the mould with the new model named Tou (this means “transparent” in Mandarin Chinese).
The ATX full tower has several 3mm-thick tempered glass panels that are screwed onto the aluminium structure. What really makes it stand out, is that it contains LEDs inside, which when switched on, enable you to see pretty much all of the desktop’s internal working parts. The LEDs can be controlled through the touch panel above the USB 3.0 ports on the front of the case. By turning them off you have the option of the desktop looking like a mirror.
A truly stunning piece of design! Unfortunately there are no release dates at the moment.
The second thing that caught my eye is something for all the Star Trek fans out there! It would appear that Acer have realised how much the Aspire R7 looks like the USS Enterprise. They have created a limited edition version of the touchscreen notebook, with a Star Trek theme. It comes with a Star Trek logo and a sand blast finished case. Also included are wallpapers, videos, a soundtrack and a film poster signed by the cast.

Acer Aspire R7 Star Trek edition

Only 25 of these special-edition models have been created and only one will be up for auction on eBay, with proceeds going to charity. The auction will run from June 14 to 24, so get it in your watched items!
Read More

Native Biometrics in Windows 8.1

Windows as an OS has traditionally supported biometric devices such as fingerprint readers through third party software and drivers. Microsoft has now announced that Windows 8.1 will bring native support for fingerprint readers. It will also allow users to lock individual folders in the system with fingerprints!

Biometric Finger

Native Support For Biometrics
The Build conference looms soon, where it is strongly suggested Microsoft will release a public preview of Windows 8.1. Microsoft is beginning to unveil many of the improvements that it has made in the upcoming Windows 8 update. Last week it detailed many new features such as the return of the Start button.[Thank you!]
Windows 8.1 becomes the first edition of Windows to natively support biometric technology. By touching or swiping their finger on a reader, users will be able to log in to their PCs through their Microsoft Account, open programs and even purchase apps. The company has confirmed that it is working with OEMs to encourage them to add fingerprint readers in to their devices, such as mice, tablets, keyboards and laptops.
The ability to lock/unlock individual files/folders that can only be accessed via fingerprint recognition will be a much appreciated feature as it provides a new level of security, something that everyone needs!
Read More

Fedora 19 Linux Enters Beta Testing

Fedora 19 Linux Enters Beta Testing

Schrödinger’s Cat is out of the bag – Fedora 19 is now undergoing beta testing!
Fedora is always mocked for being late with scheduled releases. However, according to the company, these delays were due to technical overhaul. Moving on from that, Fedora 19 beta has now arrived 6 months after the release of the Fedora 18 beta version. There are several interesting features for developers in this release.

The new Fedora Linux includes the following features for developers and creators:

Most people are not surprised by the enthusiasm with which Fedora 19 has been received, and this is
Read More

Laptop That Can Run Windows 8 & Android

New releases from Asus

New devices have been unveiled ahead of the start of Computex, a tech show that will be running in Taipei, Taiwan from Tuesday to Saturday.
Amongst some of the launches announced was a laptop that can run both Windows 8 and an Android OS. The Transformer Book Trio was Asus’ centrepiece during their news conference. They have marketed the product as a three-in-one device, which can be used as a desktop, laptop or 11.6in tablet. The main feature is that it can run on both the Jelly Bean version of Google’s Android and Windows 8.
Some of the other announcements included an 8.1in tablet capable of running the full Windows 8 OS, and a 5.7in Android handset, which was labelled the “first phablet”- a cross between a phone and a tablet.

Just a week ago researches were suggesting that PC sales were falling faster than previously thought. IDC had predicted that shipments of PCs (including desktops and laptops) would fall by 1.3 percent during 2013. They now predict it could be more like 7.8 percent. However, they think that tablet shipments will grow by 58.7 perccent, possibly overtaking PCs by 2015.
One analyst said that the variety of computers being showcased was proof of innovation but that there was a risk that shoppers would be left perplexed.
Ranjit Atwal, an analyst at the technology consultant Garner said “Many users have already moved away from wanting a fully functional PC to an iPad, Android tablet or smartphone.” He added, “As a result that leaves a smaller audience and now the challenge for PC makers is how to target this group, which is also-by its nature-likely to be more demanding. The problem is that by throwing so many different designs at the wall in an effort to meet the challenge of wooing them, they risk confusing shoppers rather than winning them over.”
As Computex gets underway, watch out for other announcements and releases.
Read More

Glass Nest: Control Your Thermostat With Voice Commands

Are you a fan of Google Glass and Nest thermostats? Then you will definitely want to try this fun application called Glass Nest, which combines the two and allows users to remotely control the Nest using voice commands.
The unofficial app was developed by an Atlanta developer named James Rundquist. After getting the Google Glass last month, he got the idea of developing a special application pairing the device with his apartment’s smart thermostat.

Glass Nest: Control Your Thermostat With Voice Commands

Glass Nest users will be able to control the Nest thermostat by voice commands, even remotely.
Rundquist’s code is open sourced and is up on Github, which means that anyone can help improve the app or contribute to the project in whatever way they can. The app is only available to a select number of Nest users, but the developer is hoping to open registration to anyone who owns both Google Glass and Nest.
The Glass Nest is quite an elegant application that allows you to control your smart thermostat with your voice. The device can be programmed to listen to a variety of voice commands, but so far performs only three functions: setting away mode, exiting away mode and changing temperature.
More specifically, the application will allow Google Glass owners to notify the Nest that they’re coming or leaving home simply by uttering the words. The Nest will then automatically change the house climate accordingly. Users can also fine-tune their home’s temperature, using the same method.
Those interested in giving the app a try can log in the Glass Nest website using their Google login data. After that, they have to enter their Nest credentials, which automatically sends a card to their Glass timeline. The card can be pinned to the timeline. Users can easily send their commands using the “reply” option on the card.
The app is yet dedicated to a small niche, as you have to own both Google Glass and Nest to be able to test it. But Rundquist is hoping that the niche will expand, given that he only received positive feedback so far.
What do you think of the Glass Nest? Would you like to control your thermostat with voice commands?
Read More

Android To Overtake Apple

Ok, so they aren’t completely taking them over! (I thought it would grab your attention though!) They are however predicted to supercede Apple when it comes to tablets. Apple have dominated this market ever since the tablet was launched. However the tech research company ABI Research think this is about to change.


According to ABI Research, Apple exited the first quarter of the year with 50 percent share of all tablet shipments but Android is poised to overtake iOS in tablets. The reason for this shift is China. The country is “passionate about the Apple brand” said ABI, but smaller Android tablets have grown in popularity. It seems a push for low-cost tablets is keeping Android relevant and a constant threat to Apple.
In a statement by Jeff Orr, ABI’s senior practice director, he said “it’s inevitable that Android tablets will overtake iOS-powered slates, though we see no single vendor challenging Apple’s dominance anytime soon”. He continued by saying “With media tablets commercially available for more than four years, momentum is shifting toward value and affordability, putting tablets in more of the population’s reach”.
To add weight to ABI’s predictions, fellow tech research company IDC made similar comments saying that within two quarters, the sub-8-inch tablet category overtook the larger-sized segment in terms of total shipments. They noted the average selling price for tablets should drop 11 percent on 2013 to $381.
Although Apple have led in the way in tablet design since 2010, there is no denying that they are under increased pressure to deliver. Late last year, Apple released the iPad mini but as demand increases it will be interesting to see if they are able to produce a tablet not just with a smaller screen, but with a lower price. Watch this space!
Read More

Intel Haswell Chips Launched With Better Performance, Graphics And Battery Life

Intel is launching its 4th generation Core processor family, code-named “Haswell,” and we should start to see computers based on the new chips at the Computex trade show starting June 4th . 
Intel’s Haswell chips will try to take up where Microsoft’s Windows 8 failed to invigorate the PC and laptop market. The firm announced a slew of quad-core desktop and laptop chips, with the Core i7-4770K heading the desktop line and the Core i7-4930MX topping off the firm’s laptop range, the former of which will require Sandy Bridge and Ivy Bridge owners to undergo a motherboard upgrade, as the chip uses the new LGA-1150 socket.
Intel has also signficantly revised the required spec laptop makers must hit in order to earn the ‘Ultrabook’ moniker. Performance, obviously, is one of the major highlights of the new chip. 
As PCPro reports – Our benchmark results on the first Haswell desktop processor – the Core i7-4440K – show significant performance improvements over the last generation chips, especially when it comes to graphics.
The Core i7-4440K showed an overall improvement of almost 10% in our Real World Benchmarks, scoring 1.16 compared to 1.06 for the last-generation Ivy Bridge i7-3770K.
Haswell also promises to deliver significant advantages for mobile users. Forthcoming Haswell processors aimed at Ultrabooks and tablets promise to extend battery life by combining the chipset into the CPU package, but Intel has yet to release the mobile processors for testing.
Some of these power savings come because Haswell is the first architecture tailored specifically for the 22nm process rather than being designed for a larger process and then shrunk down, as Ivy Bridge was. Others come from improvements that Intel has made it to idle power usage and the amount of power used when switching between those active and idle states.
Improving the performance of its chips’ integrated graphics is another key area where Intel seems to have put in a lot of work. This has, resulted in an integrated graphics solution that delivers double the performance of Ivy Bridge-powered laptops and thrice that of Ivy Bridge-based desktops.
If you’re looking for specific information about U- and Y- series low-voltage chips for Ultrabooks or anything belonging to the Core i3, Pentium, or Celeron families, you’ll have to wait a little while longer. We’ll be sure to pass that information along as we have it.

Read More