Archive for June, 2012

The tablet will operate with the system Windows 8, announced the company during an event in Los Angeles that had been kept secret until the last moment.

The Chief Executive of Microsoft, Steve Ballmer, presented the Tablet, which is a 10.6-inch screen and weighs only 175 grams.

CHARACTERISTICS

676 grams of weight in the ARM version and almost 1 Kg in the Intel.Pantalla of 10.6 inches FullHD (in the Pro version) with 16: 9 aspect ARM processor from nVidia with USB 2.0 and one with Intel Core (x 86), at the moment confirmed version with USB 3.0 and i5. ARM version will come in 32 and 64 Gb priced “similar to other similar tablets ARM”.X 86 (Pro) with 64 and 128 Gb with price comparable to ultrabooks.Magnesium housing VaporMg, which gives very good rigidez.9.3mm (more…)

The security hole in LinkedIn has taught several things. The first is that no company seems to be safe from password thieves.

The second is that better do not always use the same password, because it makes our most vulnerable accounts.

And the last is that the lessons of the security companies fall on deaf ears: despite warnings, passwords stolen and published in LinkedIn accounts show that they are still using the same – and weak – access keys.

Ticbeat explains in the ABC newspaper that the security consultant, Mark Burnett, has made an analysis of the most used access keys. The first list is the already classical and easily deductible password (password in English), according to Business Insider collects. Followed by 123456, 12345678 and 1234.

Number five on the (more…)

Some can not live without your mobile phone. You just have to see how certain individuals are capable of cutting a conversation in person to meet a WhatsApp or those others that they need to constantly update your profile on social networks.

But abusing the mobile can take its toll to your mental health. So says a study by the University of Gothenburg, in Sweden.

Increased risk of problems with sleep, stress and depressive symptoms, this is what you face if you are not able to go to the bathroom without the phone.

“Health authorities should include information on the healthy use of this technology,” warns researcher Sara Thomee, co-author of four different studies about the use of computers and mobile phones how affects the mental health of young people.

After interviewing (more…)

Mark Zuckerberg’s company has the means to protect themselves, but the group of hackers has proved it can go very far. Those who fear that social networking can fall – or those who want to prevent account theft – can download all your data with a couple of ‘clicks’. This is a very visible and accessible option but little known.

To perform data downloading a file, the user must refer to the button ‘Account’ located in the upper right corner of Facebook. It then opens a menu where you must select ‘Account Settings’. The default display shows the menu ‘General’, in which you can edit the user name, password, language and networks and the related accounts and email address.

Under this menu option ‘Download a copy’, directed to another window which explains in detail this role. Facebook says that the file contains any user who has photo and video sharing social network and publications in the Wall, friends list, messages and chat conversations. The photos of friends, status updates and comments the user has posted in other accounts are excluded from the data download.

The window adds a warning message, which encourages the user to protect your private information. “Your Facebook file includes important (more…)

iPad Review

At this moment there are already thousands of iPads sold in the United States. Now there are even companies engaged in importing the popular tablet.

One such company is iPhone Service Point . The company this week the first iPads sent to customers, and we have this week I received the iPad iPhone Service Point: time for an iPad review!

After several days the iPad extensively used to have, we can form an opinion about the device. This we like to share with you through this review of the iPad:

  • First impression of the iPad
  • iPhone homescreen
  • Touchscreen of the iPhone
  • Long text typing with the iPhone
  • Mail, calendar and contacts management on the iPad
  • iBooks on the iPad
  • iPad applications
  • iTunes on the iPhone
  • Other features on the iPhone
  • Assessment and conclusion on the iPhone

First impression of the iPad

The iPad is after the open of the box immediately. It is a well-designed device with a remarkably big screen. The iPad is very smart by Apple, and the back is a big logo. (Picture box, iPad, and other content box)

The table (more…)

Transportable

If you do not really need mobility, that is to say that you do not walk around constantly with your machine, you will not be working in improbable places, there is no need to buy a tiny laptop . Choose a model somewhat larger but with a large screen (17 “or 18”), a separate numeric keypad and a large battery is then a good choice in terms of ease of use.
Portable

Your computer must be able to follow you around but you need a minimum of comfort. A 15.4 “and just is not so bulky. Weight is reasonable and comfortable keyboard.
Mini laptop

The mini laptop computers are very small. Miniaturization, better still, components used to manufacture high performance computers for less (more…)

Packages with mobile Internet

The mobile operators now offer a wide range of mobile packages with Internet and it is not always easy to choose the one suited to its needs.

Mobile plans with unlimited Internet have virtually disappeared. Now, most mobile operators restrict Internet connections to a volume data set. Beyond this volume data, your speed may be lower until the next billing date (web access is so much slower) or your consumption data may be charged in off-plan. In some cases, access the Internet from your cell phone can even be blocked (with the possibility for some mobile operators to buy refills).

The maximum volume data vary from one mobile package to another, generally ranging from 50 MB to 3 GB per month. Each mobile package thus allows different uses, depending on how many MB / GB included, and this volume data is an important criterion when choosing a mobile plan with the Internet but still need to know what these volumes …

What do the MB / GB mobile included in my package?
The megabytes (MB) and (more…)

Preview iOS 6 certainly can not be called a revolution. After the death of Steve Jobs, many thought that Apple would not be the one that used to be. And now, looking at a list of changes in the new version of the operating system for handheld devices, the company inevitably catch yourself thinking, is it not a harbinger of future extinction. One could say, year after year, they say, the Apple lick iOS, adding new basic functions of a teaspoon, but these “year after year” lasts almost as five years. Major changes in the latest version focused primarily visual component, the center of the notification is useful, he will use all the time, but I can not say that this is the height of logic, precision and beauty – in most cases, this only makes the center of the turmoil.

In iOS 6 there is no breakthrough, not only those who use compromised devices have long been able to see some of the features. No matter how it was strange, but for me the biggest plus of the new version – that when you install the application does not close AppStore. If you do not use AppStore, you know, and sometimes present in iOS frank delirium. You have (more…)

The popularity of WordPress plays against him in some respects. The fact that  time more companies using WordPress for their official websites, e-commerce platforms and corporate blogs makes our dear WordPress is target of attack from hackers.

And the most common way that hackers use to control a web site often introduce malware into the code, so that they can get management permissions, and thereby access to all data of the web for their uses, usually fraudulent.

I have already spoken on other occasions of some measures to ensure WordPress, but today I want to make list of basic, a reminder, to protect from malware to WordPress.

Let it…

Change passwords on a regular basis: not just the WordPress but also those of FTP, PHP myAdmin access and even the access to the control (more…)

Google has commemorated the fifth anniversary of his plans to improve online safety for users. The company explained that in that time have improved warning system in different browsers and have managed to fight the infected sites, malware attacks and phishing. Google data confirm that the five years of its initiative to have given much.

In 2007 Google created a team that aimed to develop systems that would allow for safer navigation on the Internet. This team has worked to make major browsers, Chrome, Firefox and Safari, they received warnings of threats. Google has said that in that time have worked “to accommodate the growing challenge them and to build an infrastructure that automatically detects harmful content.”

According to company data, through the efforts of the past five years have failed to protect 600 million users who use Chrome Firefox or Safari. Google explained that every day 9,500 identifies malicious Internet sites, illustrating the growing problem of infected or malicious pages.

The prevention system Google has grown and now, every day, Google warns on between 12 and 14 million searches for the requested page can be dangerous. This is an important part in the Google search system, which gives an idea of commitment to prevention that keeps the company.

In (more…)