OS, Windows

Windows 8 Update is changing course to 180 degrees

Microsoft is preparing a release of an updated version of Windows 8.1 with a change of the “key elements” of the operating system. This was said by the head of marketing and finance of Windows Tami Reller in an interview with Financial Times . She explained that refers to the “key aspects” of how to use an operating system, but…

Continue Reading

Security

Hacked Google office building

Even established companies such as Google are not protected from tampering. Moreover, the trouble can come from where no one is waiting. For example, the Australian division of Google clearly complied with the rules of information security towards computer networks and broke them through the industrial management system of the building , which houses the office. It is an office…

Continue Reading

Linux, OS

Debian 7.0 Wheezy with multiarchitecture and installation in blind mode

After two more years of development, the Debian Project has finally issued the release its next major stable release of the popular operating system Debian 7.0 (code-named “Wheezy”). The new version has some interesting features, such as support multiarchitecture and special tools for deploying private clouds . Multiarchitecture means that users can be installed on the same machine packets from…

Continue Reading

Gadgets, Laptops, Tablets

Transformer Acer Aspire R7

Anyone who is tried of using a laptop with a touch-screen and the “eight” on board, familiar feeling of “breaking the pattern”. In addition to the usual touchpad and keyboard adds another touch screen – but what to do with the last is unclear. Why you need a touchpad, when there is a touch screen? Or why you need a…

Continue Reading

General

Integrated Graphics Core i7 supports a resolution of 4K Ultra HD

Laptops and Tablets with the new Intel processors will be able to work at a resolution of 3840 × 2160, not even slowing in top-level games like Battlefield 3 and BioShock Infinite. At the very least, with this kind of performance, Intel promises for system-on-chip fourth-generation Core (Haswell) with the new graphics subsystem Iris Graphics and built-in memory eDRAM. Iris…

Continue Reading

Security

Super Dimension Fortress: completely anonymous publishing

Today it is difficult to publish information on the Internet without leaving a trace. With social networks, it is clear: they want to become attached to the default user name. But even pick up an anonymous blog on free hosting like WordPress.com or Tumblr, – a non-trivial task. There is always the option with the site on the Tor, but…

Continue Reading

Security

Hacked database of dams in the USA

Unidentified attackers were able to gain access to the National Register of Dams – a database maintained by the U.S. Army Corps of Engineers (United States Army Corps of Engineers). This is a valuable database of 79,000 dams in America, with their weaknesses, evaluating the number of dead in the case of a breakage and other important information. Corps of…

Continue Reading

General

Hacking Wii U console and accessing the file system

Wiikey hacker group said on its website the “complete hack” authentication system disks Wii U, disk encryption, file system, and everything else you need to run arbitrary applications in the embedded version of Linux. The group specializes in long-Wiikey consoles Wii. In particular, they produce and sell hacking mod chips for this console since 2007. Their new product – an…

Continue Reading

General

Phenomenon “! 1” on Google.com

If you specify a non-existent URL in the domain Google.com, then loaded the standard plug with error 404 “Page Not Found”. Since two years, Google has changed the design of this page, so now it looks that way.   All of these two years in the page header are exclamation points and in the phrase “Error 404 (Not Found)!! 1”.…

Continue Reading

Security

Symantec: The number of attacks on small business has tripled

According to the results of 2012 the volume of hacker attacks against the theft of intellectual property, increased by 42%. This attack, typically aimed at small businesses, experts at Symantec said in its latest annual report 2013 Internet Security Threat Report, Volume 18 (ISTR 2013). “From the report ISTR 2013 it is clear that the sophistication of attacks multiplied by…

Continue Reading