Welcome to News Media Information

All the world news related to various activities such as sports news, football news, music news, computer news, hardware news, software news, brainware news, technology news, cell phones news, celebrities news, networking news, games news, online games news, movie news, article, health news and much more
Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts


A day after Google announced that the attacker hacking of gmail in the area of ​​Jinan, China, the Chinese government immediately denied Instantly firmly involvement in the attack. This statement was conveyed by Foreign Ministry spokesman China Hong Lei. According to what is alleged Google is unreasonable and far-fetched and it could not accept if all the errors only addressed to the Chinese government.

"Any attacks (hackers), they always blame China. Special events this latest incident is not unreasonable especially with ulterior motives," said Lei told WaPost, who launched the TG Daily, Friday (6/3/2011).

"The Chinese government firmly opposes any activities of cyber crimes, including hacking. And ready to cooperate with the international community to combat it," he said.

"China itself has become a victim of hacking attacks, and the government has given great attention to the security of cyberspace," he said. "The statement that says that the Chinese government supports piracy attacks, has ulterior motives."

Previously, the U.S. had warned other countries that it is now assessing the hacker attacks, including 'the challenge of war' so that they can conduct a military strike against the country concerned.

On the other hand, Google reveal the motives of the hackers that want to monitor the contents of electronic mail, with a mode using stolen passwords and then change the settings for the email channel.

One of the world's largest Internet company, said that the latest computer-based invasion attack directed at a variety of Western companies. Guardian of the British news agency reported that "The sophistication of attacks and their highly targeted nature, has a motive eliminating direct financial benefits."

Google says, it is possible hijacking attacks, sponsored a state.

This hijacking attacks surfaced a day after the U.S. government plans to create a law that states hacking attacks is a form of war.

United States Department of Defense announced that the military is prepared to use violence in response to the threat of hackers. The operation of this new virtual world will become active next month.

Parties to the White House clearly does not want to 'concede', so they intend to conduct an investigation on this attack.

"We take this attack seriously, we have started to investigate what happened," said U.S. Secretary of State Hillary Clinton.


Regarding a case of hacking Gmail electronic mail service provider, instant china government strongly denied direct involvement. As known, some gmail account successfully broken by hackers are among the Gmail account of senior U.S. officials, journalists, military personnel and political activist that happened a few days ago. Rebuttal was issued a day after Google announced a possible break-ins by hackers from Jinan, China.

Perhaps this is a disastrous break-ins for users of electronic mail accounts gmail. According to some sources, the attack was carried out by a group of people who came from China. After the tragedy of late 2009, when the hackers from the country of origin stubborn bamboo curtain managed to break into Google's system and steal the codes is important, now Gmail electronic mail service provider to be targeted.

Reported by Reuters on Thursday (02/05/2011), includes the latest attack seems to rely so-called "phishing" scams and other fraudulent behavior is often used hackers to get passwords from people and websites that are not vigilant about protecting information.

The victims, including state and military officials, bureaucrats Asia, Chinese activists and journalists, deluded give their Gmail account password to cyber criminals based in mainland China, according to Google's statement as written in the WSJ. The aim is to spread the attack was the victim of electronic mail to certain addresses.

Google itself has done their security-related measures to detect and disrupt infiltration. All the victims have been notified and their Gmail accounts are guaranteed to be immediately addressed.

Google will not say what part of the U.S. government were targeted or whether there may have contained confidential information in your Gmail account was hacked.

Google search for origin of the attack that led to Jinan, China. A city to house a computer vocational school associated with the attacks more than a year ago on the Google computer system, along with more than 20 other U.S. companies. Jinan, which is located about 400 kilometers south of Beijing, is the headquarters of the bureaus of technical surveillance of the People's Liberation Army, one of the largest armies in the world.

In Washington, the United States, agency investigators FBI (Federal Bureau of Investigation) and the U.S. State Department was shoulder to shoulder investigate this case. "We do not believe there is an official e-mail account owned by U.S. government officials who breached," said Caitlin Hayden of the U.S. National Security Council to the WSJ.

Previously, Mila Parker, a security researcher in Washington, Google would have warned the threat of attack. Mila managed to save examples of emails that he was identified through routine observation and he called the attack "man-in-the-mailbox."

The method used by the sender: electronic mail accounts of victims and their contacts in it seized and used to convince other potential victims.

According to him, as revealed in the pages of New York Times, was "not new or cutting-edge ways," but "spreading invasive."

He then handed me a fake document entitled "Draft US-China Joint Statement" (draft Cooperation Agreement US-China) that is spread through e-mail account in the Department of Foreign Affairs, the Department of Defense, Defense Intelligence Agency and Gmail.

When the user tries to download the document, they will be herded into a fake Gmail homepage that will steal your password.

That incident will certainly further increase the pressure on cyberwar issues. The U.S. government this week will decide that cyber attacks are classified as "war".

Meanwhile, British Defence Secretary, Nick Harvey said, as quoted from the pages of The Guardian, "All activities in the virtual world will slowly form a kind of battlefield of the future."

So it is not excessive if a few weeks ago, the U.S. government through President Barack Obama has asked some key people in the field of Information and Technology to become a telecommunications security adviser, and it turns out that worrying about what happens now, an attack on electronic mail providers gmail.

After many instances of deviant behavior from its users, Facebook is finally using a software PhotoDNA to try to detect child pornography online.

The software was developed two years ago by Dartmouth College and Microsoft, which works based on the database of images of child pornography from the National Center for Missing and Exploited Children (NCMEC), the United States. Automatically upload photos to compare with the database, and any sign that appears to be the same.

"Traditionally, if the image is resized or edited in a way at all, blue print or digital signature of the photos that will be different, and it would be difficult or sometimes even impossible to find an image nearly identical," said Brad Smith, an interpreter Facebook speech, as reported by TG Daily, Wednesday (05/25/2011). But PhotoDNA, said the company, can detect the drawings even when they have been modified in this way.

Facebook is now planning to run the software on each photo was uploaded to their site, and will report the offending images either to NCMEC and the police. Computer science professor Hany Farid says it can scan images in just four milliseconds, which means users will not see a delay.

He said that the test can detect 99.7 per cent in real time, and have a false positive rate between one in two billion and one in ten billion.

"Perpetrators of child pornography problem in the world - and particularly in the United States - has really exploded with the advent of the internet," said Ernie Allen, president and CEO of NCMEC. "Twenty years ago we thought this problem had almost disappeared,"

He said that the beta testing of software in New Zealand have led to arrests. Microsoft also has succeeded in using technology to remove the 1000 image of cloud-based storage service SkyDrive since February.

Image : Twitter for I-Pod
Chief Technology Officer (CTO), Twitter, Greg Pass, leaving the microblogging site to continue his career elsewhere, as the news reported by Tech Crunch, Saturday (05/21/2011).

Prior positions CTO Twitter, Pass is a Vice President of Engineering popular microblogging site. The position was achieved after becoming the CTO and co-founder Summize, a startup that was acquired Twitter, in July 2008 ago, and eventually evolved into Twitter Search.

Although initially reluctant to make comments, Twitter has finally confirmed the news through its co-founder, Biz Stone, by his account, @ biz.

"Twitter Summize acquired three years ago, cofounder @ gregpass continue his career elsewhere. We are fortunate to have him for so long," that is written in Stone Twitter account.

On another occasion, a spokesman for Twitter, Sean Garrett, stating that, at this time the company has its headquarters in San Francisco, is not planning to seek a replacement Pass. Meanwhile, Pass own future can not be ascertained.

Google launched a new tool to find and compare financial products called Google Advisor.

Google Advisor is intended as a financial comparison tool, helping users to measure the number of mortgages, credit cards, savings accounts and others, by providing a list of appropriate financial instruments. Similarly, as quoted from MashableFriday (05/20/2011).

For mortgages, Google provides data such as monthly payment, payment and contact address. For credit card, Google Advisor also provides a data type of card, rewards, annual payments, and others.

Google Advisor itself also is not a search engine, but a comparison engine that has a lot of filters.

Google has long wanted to enter the field of financial sector. For example, in March last, Google bought the site from the UK BeatThatQuote price comparison for USD61, 5 million. Because of that, many say that Google's similar to BeatThatQuote Advisor.

Analysts predict that this service was the beginning of a series of Google tools for the financial sector.

To try out Google services Advisor, click to:
https://www.google.com/advisor/home

Google and Amazon have launched the first cloud-based music service. However, both providers should be alert to the threat that comes from Apple. The reason is, when Google and Amazon are still waiting for an agreement of cooperation with the label, Apple has managed to hold two giant record label EMI and Warner Music Group.

Not only EMI and Warner, Universal Music and Sony was rumored to soon complete a deal with Apple to run their cloud-music service. Similarly, as reported by Cnet, on Friday (05/20/2011).

Officially still uncertain when Apple launched its music service. But many predict, the Cupertino-based company that will utilize the Worldwide Developers Conference event that begins June 6 coming to announce the presence of these music services.

However, some parties believe Apple will release a new service on their iPod event, next September.

Meanwhile, Google and Amazon are still involved tough negotiations with the party label. Both claim the service does not require a license because the music labels are uploaded to the server is the music that has been owned by the user.

Apple launched its licensed service capability allows them to scan the user's hard drive for music files they can be available for streaming. The approach initiated by Lala, a music service that Apple purchased 2009 and, clearly faster than users upload MP3 files manually.

So Beware Google and Amazon.

At this time with more and more links and documents circulating on the internet, it is very difficult to search for a topic or documents that we will find that corresponds to what we want. This can be understood considering the topic or are we looking for these titles will be easily found in almost all search engine providers because of the "same " topic. With so many topics generated from the search engine, of course, will take time, energy and our minds so that the resulting saturation.

In order to overcome these problems, we need to apply several methods that can facilitate and speed up the search in search engines like Google.com by:

    1. Determine the first topic or documents that we are looking for unbiased and takes a lot;
    2. The form of the topic or the document itself must be formatted in accordance with the correct spelling
    3. Information type of file or document topics are we looking for if this is the HTML, Word Processing (Doc, Docx, rtf), MS Xcell (Xls, xlsx), Adobe Portable Document Format (pdf), Ms Powerpoint (ppt), or text form (txt), so it will be more specific in the search later.

After preparing the above steps, the next is browsing to "Uncle" Google.com and start searching. As an example we will look for a topic or a document titled "Management Information System". Then we will file type search is a form of Adobe Portable Document Format (pdf), to accelerate the desired output on the Google search engine we enter the "management information system filetype: pdf" to make it more clear, can be viewed in the picture below :

Share

Share |

Popular Posts

Shopping Info

Sponsor

Best Seller

Product Info

Categories

Stat

Visitor

pagerank

Rapid Site Check button