Latest Post
Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

How to protect your account from hackers?

Written By Unknown on Sep 7, 2012 | 5:56 PM


protect account from hackers


Your Clever Password Tricks Aren’t Protecting You from Today’s Hackers.

Nowadays the password Security cracks too often, you may probably hear about password hacking and so all the ways you should strengthen your accounts as much as you can. Even you hear though, unfortunately, today's password-cracking tools are more advanced & able to find out your tricky password. Here is what's changed and what you should do about your password.

Background: Passwords Are Easier To Crack Than Ever

 

Our passwords are too less secure than they were just a few years back, thanks to password crackers who use faster hardware and new techniques to catch up password. This website Ars Technica explains that their inexpensive graphics processors enable to track password by using password-cracking programs & can track billions of password combinations in just a second. Few years ago this process would take too many day to crack, but now may take only few days.

The entire common password we used it helps hackers to identify the password patterns when we creating passwords. Most of the hacker can now use rules and algorithms calculation to crack passwords more quickly than they could through simple common password attacks.

Let’s say an example, you can take the password like "Sup3rThinkers"—this password would pass most password strength tests because of its 13-character length and use of mixed of capital & small letter and a number. This web site How Secure Is My Password? estimates that it would take about a million years to crack by using desktop computer, with a 4 billion calculations-per-second basis. But, it would take a hacker just a couple of months now.

Another example, such as "mustacheehcatsum" (that is "mustache" spelled forward and then backward) may give you  strong security, but they're easily cracked by having the same characters of password.

Redman- a security penetration tester who crack "Sup3rThinkers", he employed the rule that directed his software try not to use word like "super" but use these word like "Super", "sup3r", "Sup3r", "super!!!" and similar modifications. It then tried each of those words in combination with different patterns like “thinkers", "Thinkers", "think3rs", and "Think3rs".

In other words, it is to be said that hackers are totally on to us!
Now what can you do? There is no other way except strengthening Your Passwords by Making Them Unique and Completely Unpredictable.
We recommend you from our experience, but in light of the faster and newer cracking ways out, these are worth reviewing.

1.  Always Avoid Easiest Password Formulas 


Here the biggest problem is, we are all filling our passwords the same way (in here some companies limit the password length and ask to require certain types of characters as well). When companies ask to use mix of upper and lower case letters, numbers, and symbols, most of us exactly follow below patterns:
  • We use a name, place, or common word as password, e.g., "zibooz" (Women tend to use their personal names and men tend to use their favorite hobbies)
  • Sometimes we capitalize the first letter: "Zibooz"
  • Sometimes we add a number, most likely 1 or 7, at the end of our password: "zibooz1" or “Zibooz7”.
  • Sometimes we add one of the most common symbols like (~,!, @, #, $, %, &,?) at the end of our password: "ziboz@" or “Zibooz!!”.
Not only these patterns are obvious to professional password, but also you use with substituting vowels for numbers ("Zibooz7!") or adding  another word ("Zib00z1!") wouldn't help you much as you think about your password, since hackers are using the patterns against our preference and adding words from the master crack lists together.
 
Other clever & complicate techniques, such as shifting keys to the right or left  or using other keyboard patterns are also now cracked up by hackers hacking tools. According to a commenter, who wrote in the Ars Technica article that hackers use keyword walk generators to match millions of keyboard patterns.
The solution: Please don't do that, what everyone else is doing. Just avoid the patterns above & remember the basics: don't use a single word from dictionary, names, or dates in your password; you can use a mix of both character types (including spaces or caps locks); and try to make your passwords as long as possible. If you have a suggestion for how you create memorable passwords, it's only secure if no one else is following that suggestion.  You can check out IT security pro Mark Burnett's collection of the top 10,000 most common passwords, which he says represents 99.8% of all user passwords from leaked databases, or this list of 500 most common passwords in one page.

2. Can use Random Passwords


You can use multiple uncommon words for your strong & long password. With using a passphrase is more secure and more memorable than complicated but shorter passwords, as web comic Xkcd pointed last year. Longer but simpler passwords are more complex—but only if the words you use are truly random as well. If you're using a common quote as your password or saying for your passphrase, you're a target, because hackers' have dictionaries which include common quotes, phrases, titles, and lyrics and they can easily imply rules to use just using the first letter of each word or other similar pattern. "To be or not to be" and "2b30rn0t2b3" and "tbontb" might take just seconds to crack by using fast algorithms, so have to make your passphrase truly unique and random. (The Xkcd password generator can pick four random words for you).

You can use a password generator and manager. While the passphrase approach might work well , and your computer login or the few cases you need to remember your password, this is the best option is to generate a truly random, long, and complex password. It is hard to crack password by the hackers because of it patterns and word lists. Here are some website like LastPass, KeePass, or 1Password , who can generate a random password for your preference. You can see this article for better understanding how to build a nearly hack-proof password system with LastPass as well as detailed instructions. Always, remember that the only secure password is the one you can't remember

3. Always try to use a Unique Password for Each Site


Whatever the passwords you choose or create, this is the most important security strategy of all of you guys: Use a different password for each site if possible, if you maintain this you will be secure. Any hacker can’t hack your password. The limit of the character is up to you. If your password is compromised on different passwords for different sites, at least all your accounts are protected.

Does this article helpful for you or Do you add up any formula that you know? You are most welcome to add any idea about this article. Let us know about your comments or recommendation in comment section.

Which is the fastest U.S growing giant company - SKS Technologies

Written By Unknown on Aug 12, 2012 | 8:34 PM


You might be interested to know that the LinkedIn is the first growing tech company over the last six month. Then consequence order where Apple is second, Facebook is third,… And Microsoft is tenth.
The company like Apple may be the most valuable company in the world where Facebook try to continue to add more new users, but unfortunately it fails to grow more user & it continue to fall its position. But which public U.S. tech companies have grown by the largest crop over the last six months?

You might be interested to know that how to use Linked for your business because last year LinkedIn revenue growth up to 94%. As a smaller company, it does have more “room” to expand before revenue evens out — that’s certainly typical. But over the year of growth is an interesting dimension to watch themselves where they will be in near future, especially for investors who are looking at immediate gains.

Through this website Statista we put together this chart to illustrate the comparison among the most growing tech giant companies in 2012.
  • LinkedIn, which up to 94% in revenue growth over last year.
  • Apple, which up to 39% in revenue growth over last year.  
  • Facebook, which up to 39% in revenue growth over last year.  
  • Amazon, which up to 32% in revenue growth over last year. 
  • Google, which up to 30% in revenue growth over last year.  
  • Ebay, which up to 26% in revenue growth over last year.  
  • Zynga, which up to 25% in revenue growth over last year.  
  • Samsung, which up to 22% in revenue growth over last year.  
  • Netflix, which up to 17% in revenue growth over last year.  
  • Microsoft, which up to 94% in revenue growth over last year.
US fastest growing revenue company in last six month of 2012

 


Facebook Introduces New Email Address to Phishing Scam

Written By Unknown on Aug 11, 2012 | 12:52 PM

the social networking giant Facebook gives to users a select e-mail address to send their reports of the illegal practice of phishing scam.
Facebook phishing email scam

In an effort to protect users and control of phishing, the social networking giant Facebook gives to users a select e-mail address to send their reports of the illegal practice of phishing scam. Phishing has been banned by the Facebook for years & today it published that it is making a new attempt to control the practice. It's launching a select e-mail address, phish@fb.com, where users can send notices of phishing they've seen on the Facebook network.
An example: its seem to all, those annoying clickable phishing ads in their news feed or posted on friend's Facebook walls like: "Get free tickets to Jamaica," "Win a free iPad," or "Friend, I need money urgently."

Phishing has been banned by the Facebook for years & today it published that it is making a new attempt to control the practice. It's launching with a selected e-mail address, phish@fb.com, where users can send any notices about phishing related link which they've seen on the Facebook network. 

Facebook wrote in a blog post today that by providing Facebook with reports who can investigate and request for browser blacklisting & site take downs where appropriate to users. Facebook also wrote "We will then work with our eCrime team to ensure we hold bad actors accountable. And in some cases, we'll be able to identify victims and secure their accounts as well."

The social network like Facebook classifies phishing as "any attempt to obtain personal information such as username, password & financial information via impersonation or takeoff". Over the years passed, phishing fear stories have headlined the news as people have been scammed out of thousands of dollars by their "banks" and "friends."

Facebook is a partner with the Anti-Phishing Working Group, which outlined these tips to help users be aware of phishers. These are given below:

  • Be questionable of any email with urgent requests for login or asking financial information, remember unless the email is digitally signed, you can't be sure it wasn't ‘furnace’ or 'spoofed.'
  • It takes efforts to attack phishing activities; Facebook said that the e-mail address for users is meant to compliment its own internal detection system.
  • Please don't use the links in an email, instant message, or chat to get to any web page if you suspect that the message it not authentic to you or you never trust the sender, instead navigate to the website directly.
  • Facebook made an effort over the last few months to directly connect with users to find the way of phishing, when it comes to security. The social network announced in June it would be contacting users believed to have computers infected with the DNS Changer virus to help them figure out how to rid their networks of the malicious malware.
  • The internal systems notify Facebook team, so they can gather information on the attack, so take the phishing sites offline and notify Facebook team. Facebook wrote today's blog post, "Affected users will be asked to change their password & provided education to better protect them in the future."  

Marissa Mayer Is Doing To Make Yahoo More like Google



Marissa Mayer is doing to make yahoo more like google

Mariss Mayer - CEO of Yahoo

Amit Efrati – a reporter of The Wall Street Journal takes a great look at everything about Marissa Mayer who has changed at Yahoo in her first few weeks on the job. Efrati points out several of these changes borrow from the Google playbook.

Amit Efrati – a reporter of The Wall Street Journal takes a great look at everything about Marissa Mayer new CEO of Yahoo who has changed at Yahoo in her first few weeks on the job. Efrati points out several of these changes borrow from the Google playbook.
For example, it has already been reported that several of Yahoo's offices now offer free food for employees and Mayer holds weekly "FYI" meetings for yahoo employees. It turns out these changes are just the tip of the iceberg on the ocean.

Efrati has also uncovered several ways that Mayer is trying to make Yahoo’s working environment more like as Google. We are here to share a few details from the Journal article:


  • Mayer asks to approve all Yahoo engages, which are some tricks that Google's co-founders did for a long time.
  •  She is urging that Yahoo to rely more heavily on analyzing data from users to make its decisions about whether to change or add new services, a common Google business strategy.
  • Mayer has also offered to several current and former Google employees for executive positions at Yahoo.

  • Mayer is now focusing more on Yahoo's existing programmers. She frequently talks with Yahoo's programmers through a special listserv called Dev Random and she is trying to hire more programmers from different giant company.

  •  And of course, most fundamentally & logically, she is forcing Yahoo to focus on products rather than profits, a key to Google philosophy of its business. 

Google Employee Benefits Better Than Others

Written By Unknown on Aug 10, 2012 | 11:03 PM

 google employees benefits better than others when he die
In a rare interview with Chief People Officer Laszlo Bock we know about that there are no surprise that the Google employee benefits are among the best rather than other company who get best facilities like free haircuts, gourmet food, on-site doctors & many more.
In a rare interview with Chief People Officer Laszlo Bock we know about that there are  no surprise that the Google employee benefits are among the best rather than other company — free haircuts, gourmet food, on-site doctors and high-tech “cleansing” toilets . Moreover, Google created that the latest perk for Googlers extends into the afterlife.

Bock told that in a conversation on the ever-evolving benefits at Google employees, “This might sound ridiculous.” But we’ve announced death benefits at Google.” And we were scheduled for a talk on Google’s enlarging age-gap (the oldest Googler is currently 83 year old); I wanted to know how child and healthcare benefits have evolved as the company has scaled,” according to Bock.

Bock, who joined the company in 2006 after a shift with General Electric, which blew me away by releasing a never before made public perk. An U.S. Googler pass away while under the employ of the 14-year old search giant & their surviving spouse or domestic partner will receive a check for 50% of their salary every year for the next decade as well. 

A Google spokesperson confirms that there’s “no occupancy requirement” for this benefit, which means that the most of their 34 thousand Google employee qualify as well & even more surprising about Google’s offering. 

Bock also says, “One of the things we realized recently that one of the most reliable facts of life is that at some point most of us will be confronted with the death of our partners,” And it’s a horrible when it occur, difficult time no matter and every time we went through this as a company we tried to find ways to help the surviving spouse of the Googler who’d passed away.” 

In addition to the 10-year pay package, which surviving spouses all stocks vested immediately & any children will receive a $1,000 monthly payment from the company until they reach the age of 19 or 23 if the child is a full-time student.

Bock concedes that there’s no benefit to Google but it’s important to the company to help the families through this horrific if inevitable incident occur. From day one, Google has been anticipating the major life events of their employees. 

According to Bock, he said, Sergey Brin got the ball rolling when the company had fewer than 100 employees, who was suggesting that the company could provide a caretaker to each working mom or dad on staff. The company does have on-site child care but has raised its monthly fees significantly in recent years.”

According to a company spokesperson that in maternity & paternity leave, Google benefits are at the head of the pack, a new dads enjoy six weeks of paid leave while moms can take 18 weeks after the birth of a child or even better for having insufficient money of new parents: stocks will continue to vest on your leave.

The connection between maternity benefits & retaining employees is clear to all of employees. 

According to a report in 2008 by the Bureau of Labor Statistics of USA, more than 60 percent of men & women in the work force have kids under the age of 6, so solving their needs can mean keeping new parents on board and mostly engaged.

“When we think about [employee] needs at Google, we think less about how old you are & we do about your particular bundle of needs,” Bock says. He also says that for someone who fits with a specific profile, an aging parent to take care of their kids or grandkids to support whatever their clusters of needs are.”

The experts of Google People use three methods to hit into the needs of employees: an annual survey called “Googlegeist” that measures the temperature of employees in every department & analyzes data to identify emerging trends, employee resource groups where like-minded employees share ideas that are connected to HR (Bock says the most active are the “Grayglers,” the self-titled club for over the hill Googlers) and email aliases that run the gamut from financial advice to childcare options to cafรฉ feedback.

Bock says that Google gets a lot of press for its perks  and also says, “People say  that you’re Google’s employee, of course you can offer these crazy things like these, it’s not even about the money. There is, of course that research show employee benefit programs like ours can improve retention & appear to improve performance on some level.

But it turns out the reason we’re doing these things for employees because it’s important to the every business perspective, but simply because it’s the right thing to do so. When it comes down to its better work for a company who cares about you than a company who doesn’t care. And from a company point of view that makes it better to care than not to care.

Social Media's Black Market plays huge impact on user trust!!

Written By Unknown on Aug 9, 2012 | 9:50 PM

Social Media's Black Market plays huge impact on user trust!!


You may want to think twice or even more before accepting friend request or replying to new friend on Twitter or facebook. New research is following to increase some light on the growing black market dealing in buying & selling fake social media followers. And just what impact it will have on social media, we will about this in this article.

The reality is now that it is easy to buy fake followers.  A recent study by Barracuda Labs which has found 20 sellers of fake accounts on only in a website like eBay alone. This research also found that 58 of the top 100 Google search results for "buy Twitter followers" sold fake followers, which is 40 percent of e set up in the past six months. On an average, the cost is surprisingly reasonable that costing around 1,000 followers only for $18.

While this issue is comparatively new, which has been in the news more as of late since Facebook announced that 83 Million Facebook Accounts Are Fake. And Mitt Romney's Twitter account began to see large spikesin the number of followers last week.

Paul Judge, chief research officer at Barracuda Networks said, “Fake users are really a huge concern to both Facebook & Twitter, it is a threat to create user trust, online security and the overall community feeling of the social networks." He also said, "This obviously that the threatens advertising revenue as organizations which begin to question the true visibility & reach of their ad campaigns."

 Buying followers is among the most logical reasons for businesses as well as boosting ad revenue which have to engage in the process since advertising is often sold based on the number of followers a company or profile has.  

There is also an opportunity for people who create and sell these profiles to earn money from selling tweets and re-tweets from these fake accounts. 

According to Jason Ding, research scientist at Barracuda and lead researcher on the study said, "Based on our studies, we noticed that there are 75 % of people who buy followers have a Web address in their Twitter account." He also said "That means they can buy these followers to advertise their website or Web page as well to boost their income."

Ding said that companies can create a lot of revenue by buying these followers.  But, we not sure exactly how much or what percentage it can increase their business. Though, The business is booming tremendously now a days.

If this trend continues, there may have an even greater impact on the future of social media badly.

Ding said that if this trend keeps going, people will lose their trust in the social platform and there will be less and less value for a company to utilize a social platform. If people keep buying & selling fake followers the overall trust on sites like Facebook and Twitter will be gradually decreased at a huge rate. As a result people will no longer trust each other on social media. 

There are a few ways to spot fake accounts. Firstly, a majority of fake profiles are less than three months old with the average age of a fake account being 19 days. 

Secondly, the average abuser who buys followers has 48,885 followers while the average fake account is following 1,799 people still now by a research.

Google introduces new search features!! - Technology News


Anyone is capable to answer the question that Google is the best search engine & anything about any subject in the universe can be found in Google. Google is moving to intensify its rivalry with Apple (AAPL) by offering the latest version of Google's voice-enabled search program as an app for iPhones and iPads. It will compete head-to-head with Apple's voice-enabled personal assistant, Siri.
If the holy desired of Internet search which is something like the fictional computer on TV's "Star Trek." Anyone is capable to answer the question that Google is the best search engine & anything about any subject in the universe can be found in Google; and Amit Singhal- senior vice president for engineering wants Google (GOOG) to be the company that gets there first.

Singhal, the company's senior vice president for engineering, poses some enhancements to Google's search technology Wednesday that he characterized as significant "baby steps" in the right direction. 

Among the most notable: Google is moving to intensify its rivalry with Apple (AAPL) by offering the latest version of Google's voice-enabled search program as an app for iPhones and iPads. It will compete head-to-head with Apple's voice-enabled personal assistant, Siri.

Google inviting 1 million users to test a new feature of its desktop search engine. It can pull information from users' email files and the Internet at the same time. It will provide faster and more useful answers to search queries as well.

The information search is about hiking trails for example, will turn up standard Internet listings as well. It saved emails containing with the recommendations from friends. The users of Gmail can search their emails now, but this process is a separate search from an Internet query.

For example, the new feature is done by when anyone type "my flights" in the search box and then get a real-time status report on a flight. If the user has a reservation forsomething, based on information drawn from the confirmation email sent by an airline, then it displayed all the information about flights
Singhal told to reporters during a session at the company's San Francisco offices, "We want to make the search box universally”. Google wants to deliver search results that combine all the knowledge stored on the World Wide Web with "information that is your information."

That’s why Google plans a massive "field test" of its Gmail search feature where a spokesman said the company has done with other new products. Information about enrolling can be found at g.co/searchtrial

It offered an earlier search enhancement, previously available in the United States, to other English-speaking countries. Google said it on Wednesday.
The feature, dubbed as "Knowledge Graph," recognizes key words in a search inquiry and delivers a compilation of useful information to the standard list of relevant Web links.

As a man of India, Singhal said, he watched "endless reruns" of "Star Trek" on his family's black-and-white TV. Building a computer with involving language, speech recognition and artificial intelligence, added by Singhal, who described the company's work as a continual effort toward that goal as well.

Other tech companies are working on it & have similar challenges. Analysts say Apple's Siri could threaten by Google's dominance of Internet search, which provides the advertising revenue that contributes most of Google's $38 billion annual income as well.

Apple and Google are increasingly competing with others over other mobile services, including online maps and video as well. IDC tech analyst Hadley Reynolds said that is a part of a broader war for the attention of mobile device users. Its number is growing faster than desktop PC users.

Google introduced its new voice-enabled search program earlier this summer but it was initially available only on devices running the latest version of Google's Android operating system. Is Apple approving Google's Voice Search for inclusion in Apple's App Store? Singhal said that Google submitted the app a week ago and "we are working with Apple to bring it to users in the next few days.

Growing Search:

Google said on Wednesday that its Internet search efforts have grown as the World Wide Web has expanded:

The company's search engine has identified more than 30 trillion unique web pages, up from 1 trillion in 2008.

Google's engine scans over 20 billion pages each day.

Google answers more than 100 billion search queries a month.

Source by Google


Australia to ban Facebook!! If 'racist' page not removed!!


Australia is going to ban facebook if some of the racist page not removed from facebook. The page on change.org which attracted nearly 17,000 supporters and it was investigating still now for solution.Facebook should have shut down the site as soon as it was brought to its attention and urged more cooperation from the social network.

Australia is going to ban facebook if some of the racist page not removed from facebook. The page on change.org which attracted nearly 17,000 supporters and it was investigating still now for solution.Facebook should have shut down the site as soon as it was brought to its attention and urged more cooperation from the social network.

Stephen Conroy- Australian Communications Minister has strike out at Facebook over its failure to immediately take down a page that was orthodox Aboriginal people as hopeless petrol-sniffing drunks.

Conroy said that Facebook should have shut down the site as soon as it was brought to its attention and urged more cooperation from the social network. While the content could not be viewed after Monday.

He told to the Australian Broadcasting Corporation late Wednesday of the page "Controversial Humor Aboriginal Memes" that it’s totally inappropriate to all of us.
He also said that we don't live by American laws here in Australia, we live by Australian laws. Australian who is using the fact that Facebook is based in the US to get away from Australian laws.

According to Australian Media & Communications Authority, it said that an online petition against the page on change.org which attracted nearly 17,000 supporters and it was investigating still now for solution.

Conroy was in touch with Facebook & more broadly about inappropriate content. He also said, “We’ve had a lot of debate & discussion with Facebook authorities.” And they've now finally employed an employee here in Australia & we try to solve this issue with conversations with that employee.

Facebook could not be reached on Thursday but in an online statement to The Australian newspaper it said, "We don't have anything to share on this issue but if that changes, we'll let you know."

If Australia had any power to take this site down generated in Australia asked to Conroy & he said that they had tried before and got nowhere.

He also said, “In the past there's been a whole range of specific pages, not just on Facebook but on other sites where people have made complaints." 

Australian communication ministry gone to the courts & the courts has issued notices while the police have gone to enforce them over in the US.

According to Race Discrimination Commissioner Helen Szoke said if people felt offended by the page they could also complain to the Australian Human Rights Commission for this issue.

Szoke told to reporters, “In the last three years we have had an increasing number of complaints which related to cyber racism & I have had a look at the images and I do think they're quite insulting to Aboriginal people.”

Szoke also said, “There’s a tipping point between humor and even controversial humor and material that's just offensive and just insulting."

Apple Suspends Over-the-Phone Apple ID Password Resets - SKS Technologies

Written By Unknown on Aug 8, 2012 | 12:52 PM


Apple has taken the decision to suspend over-the-phone AppleID password changes while it looks at its current security policies. The move comes after Wired writer Matt Honan had his digital life destroyed "in the space of one hour" when hackers gained access to his AppleID account over the weekend.
Apple has taken the decision to suspend over-the-phone AppleID password changes while it looks at its current security policies. The move comes after Wired writer Matt Honan had his digital life destroyed "in the space of one hour" when hackers gained access to his AppleID account over the weekend.
According to Apple employees, Apple ordered its support staff to immediately stop processing Apple ID password changes requested over the phone on Tuesday.

The employee told that the freeze was put to give Apple more time to determine what security policies needed to be changed, if any. An Apple worker with knowledge of the situation share his anonymity & told Wired that the over-the-phone password freeze would last at least 24 hours.

Amazon closed a hole in its customer service systems on Tuesday with the similar security issues like Apple to gain control of a customer’s Amazon account as well. As long as the hacker knew the name, e-mail address & mailing address of the victim.

 Apple source’s information was verified by an Apple customer service representative. He told that Apple was halting all Apple ID password resets by phone. The AppleCare representative shared the detail while Wired was attempting to replicate Honan’s hackers’ exploitation of Apple’s system for the second day. 

The attempt was failed & the company was going through system-wide “maintenance updates” that prevented anyone from resetting any passwords over the phone, representative said.

The representative also said that we should try calling back after 24 hours & directed us to iforgot.apple.com to change Apple ID passwords ourselves on the web instead. Apple representative told to Wired, “Right this moment, our system does not allow us to reset passwords.”


In the first attempt on Tuesday to change an Apple ID password (same password to use for log in to iCloud and iTunes). Passwords could only be changed over the phone if we were able to supply a serial number for a device linked to the Apple ID with an iPhone, iPad or MacBook computer, response by Apple customer service. The representative also suggested that you can change your Apple ID password online at appleid.apple.com or iforgot.apple.com.

It’s clear to all that Apple reacted to the privacy vulnerability that surfaced with the hacking of Honan’s digital identity, but it’s unclear to us what final policy change will emerge soon. Apple officials refused to comment on whether permanent changes to the company’s security measures were planned & when this problem recovered.

We were able to call Apple, reset Apple ID passwords over the phone, gain access to iCloud accounts by supplying AppleCare with a name, e-mail address, mailing address and the last four digits of a credit card number linked to an Apple ID till Monday. But this is the exact same information hackers supplied Apple on Friday. If you need to get a temporary password that gave you access to Honan’s iCloud account, said by hackers.

The hackers cleaned Honan’s iPhone, iPad and MacBook where they also used Honan’s email account, like Google account, his personal Twitter account and Gizmodo’s Twitter account. Honan early worked as a reporter at Gizmodo which became a platform to spout racist and homophobic invective.

E-mail addresses and mailing addresses are easy enough to find on the web by names matching. Credit card numbers can be found on many purchase receipts throuhgly, and everyday millions of Americans give their valuable numbers out over the phone ordering pizzas, among other things as well.

Apple published a statement on yesterday which said that “we found that our own internal policies were not followed completely.” Wired’s internal source at Apple also said that the support representative took the hacker’s call. Tried with issuing a temporary password based on an Apple ID & want to know billing address and the last four digits of a credit card as well.

London Olympics 2012 Social Media Guide

Written By Unknown on Aug 6, 2012 | 1:18 PM


London Olympics 2012 is considered one of the world’s most spectacular event as some are calling as “Socialympics.” The International Olympic Committee (IOC) has improved the structure of  its social media policies, as well as those strict rules also apply to not only Twitter or Facebook, but also any of the broadcasting Company.
Social Media guide on london olympics 2012
This year London Olympics 2012 is considered one of the world’s most spectacular event as some are calling as “Socialympics.” The International Olympic Committee (IOC) has improved the structure of  its social media policies, as well as those strict rules also apply to not only Twitter or Facebook, but also any of the broadcasting Company. You can follow a sort of journalistic approach to sharing content about the Olympics which seems to be the safest way that marketers can still participate in the conversation.
The arrangement of Olympic community isn’t same what it was during the Beijing Olympics, 2008. This year’s summer Olympic is considered one of the greatest event that was not ever happen before & some are calling the first “Socialympics.”

The International Olympic Committee (IOC) has improved the structure of  its social media policies, as well as those strict rules also apply to not only Twitter or Facebook, but also any of the broadcasting Company. If you have a company on online basis or you are a social media manager, you need to know about Social Media Guide on London Olympics 2012 before sharing:
  • Any Brands cannot associate themselves with the Olympics.
  • You must follow the standard of the Olympic Association Right (OAR) and London Olympic Association Right (LOAR)
  • Provide the facts with taking journalistic approach to avoid violating restrictions.
  • Avoid all types of marketing campaigns during the Olympics.
According to Rachel Boothroyd, general counsel of eModeration.com said that with so many restrictions, everyone have to take a journalistic approach to sharing content about the Olympics which seems to be the safest way that marketers can still participate in the conversation. He also said that you can Retweet, post, like, tag etc. the information that news outlets and other users are already shared.

There will be plenty of opportunities to participate with the social channels in use during the Olympic. Here are seven of the most popular social channels you can use to keep the news and join the conversations for your own journalistic efforts.

1. Online Olympic Communities

Several websites are available to keep your eye up-to-date on the Olympic events & activities before, during and after the events. These are the official websites:
With more than 1,000 athletes participating online during Olympic, the Olympic Athletes Hub, is the online community sports enthusiasts really should know about. Always try to connect with athletes in real-time chats & get updates about your favorite names and participate in the Hub community to earn points and badges.

Many of the sites perform a great job of gathering Facebook and Twitter open graph. For example, when you signing up for the Olympic Hub site, you can sign in using Facebook or Twitter.

2. Twitter

While some are considering that the “Socialympics” to be more than a “Facebook Olympics,” you can find there are several official IOC accounts on Twitter. 

We found in Twitter latest news will be twit as you can follow @IOCMedia (Official Olympic News), @Olympics, @USOlympicTeam, and London 2012. You can also check out IOC’s Twitter Lists on Twitter, which including Olympians Twitter list and automated results for all sports at the Olympics.

3. Facebook

There are several pages will be available online to stay in keep with your favorite athletes or see the most updated activities of your favorite event. The Official Olympics page at Facebook, more than 2.9 million strong supporter, NBC Olympics page and Countdown App are regularly updated accounts will found as “like” Pages. Moreover, the official London.uk.com Olympics and Paralympics page is a great subscription.

You can find out for more Olympic-themed fun photo & status of the sponsors “vying for socialympics supremacy” .The Panasonic Flag Tags app , you can use as tag of your face with patriotic flag-themed photo, and the Visa Cheer app helps you to show your support for your favorite athletes & teams.

4. Google+

The Olympics use Google+ which has shown their meaningful engagement and activity. More than 301,000 users have the London 2012 Google+page in their circles, with many posts receiving more than 100 comments and +1s.

5. YouTube

In this Olympic, a representative of USOC (United States Olympic Committee) shared that their choice to use YouTube as a channel will coverage large part of this event as well as get huge reach/Visibility during the entire Olympic session. They plan to upload five to 10 videos per day during the Olympics, in an effort to grow and effectively use the Team USA YouTube channel.

In addition, you can check out the Official Olympic Channel by the IOC & video galleries on the Olympics website, where you can search and view this event.

6. Tumblr/Pinterest/Flickr

There are Photo galleries on the Olympics website which can be available for search as well as share on Facebook, Twitter, even Google+, but the official Tumblr & Pinterest page doesn’t yet exist. The IOC said, with a Flickr account you can follow for updated photos at London 2012 Flickrgroup.

7. Shazaam

A recent partnership between Shazaam and Comcast’s NBCUniversal will allow Shazaam users to access additional content or information when using the app during broadcasts on five NBC networks. The recent activities of Shazaam with the Grammys proved that it could also a platform of this Olympics event.

What is your opinion about this article? Share your opinion in comments.

Apple new iPhone-5 photos leaked!!!

Written By Unknown on Jul 31, 2012 | 2:06 AM



Apple confirmed that they are going to market their new iPhone-5 in the middle of month September. But, somehow new iphone-5 body photos leaked from some of website. It was leaked by 9to5Mac was the first to show photos of purported next-generation iPhone 5 parts. 

Since then, many of the iPhone 5 details information including the smaller dock connector were affirmed by multiple mainstream reports. Surprisingly, as the new iPhone 5 moves into production, more of these parts are leaked out by more repair shops.

Moreover, today, a repair shop iLab has posted its own photos, but these images seemingly showcase a fully assembled body. The new photos give us a clear look at its details information like what a black, fully-assembled next-generation iPhone 5 might look like when it ships to customers this September. The repair shop also has some photos of other individual components like home buttons and volume keys as well.

Macotakara posted another video of purported next-gen iPhoneparts to its YouTube channel. If you want to watch the Video, then click the above video as well.

What is your opinion about upcoming iPhone 5? Will you buy it? Share with us of your think in comments.

apple_new_iphone5 body image








 


 
Footer : Home | Privacy Policy | NewzMania
Copyright © 2012. Social Media SEO Tips, News, Trends, Tech, How To, Services | SKS Technologies - All Rights Reserved
Template Created by SKS Technologies Published by SKS Template
Proudly powered by Blogger