Windows 8 Newsinfo | Latest news
What are Spambots PDF Print E-mail
Written by Administrator   
Thursday, 27 November 2014 05:18

What are Spambot

Spambots are special programs that crawl the Internet for email addresses posted in social networking sites, discussion boards, comments, contact-us pages and elsewhere. Since the format of email ID is unique, it is easier to write programs to collect anything in that format. It started from spambots looking for “mailto” (HTML expressions that are used for presenting email IDs on the web). One example could be mailto: This e-mail address is being protected from spambots. You need JavaScript enabled to view it us. In this example, the data following “mailto:” is the email ID. This would look Contact Us to the viewers and when clicked, opens your default email client with the email address in the To box. While many people still use the “mailto” tag, others resorted to using words instead of symbols so that spambots do not understand them. For example, abc at xyz dot com. But if spambots can be programmed to harvest all data in the form of This e-mail address is being protected from spambots. You need JavaScript enabled to view it , then they can also be programmed to check for formats such as “abc at xyz dot com” or “abc[at]xyz[dot]com“. In other words, spambots are programs that take into account all types of formats that can be used to display email addresses on the Internet and store it for spamming purposes. The safest form is to use a graphic that contains your email address. Since it is a graphic, the spambots cannot read it. For example, you simply type your email address on MS Paint or Adobe Photoshop and use that graphic on your Contact Us page. However, forums and comment discussions do not always provide graphic usage in signature so not many can make use of this tip. Spambots can be this defined as “automated programs that run (crawl) on the Internet to collect email addresses for a person or organization who can use the collected email addresses to send unsolicited (spam) email”...By visiting windows8newsinfo forum we have was to deal with spam bots too.

 

 
Xbox One Black Friday 2014 Bundle PDF Print E-mail
Written by Wayne   
Wednesday, 26 November 2014 03:16

Xbox One Black Friday 2014 BundleIt is that time of the year again when you can grab big stuff by spending fairly less, and now that the latest PlayStation 4 and Xbox One video game consoles are one year old, they are selling out everywhere on low bucks with a bunch of goodies such as next-gen video game titles and accessories. Microsoft itself has officially cut $50 off the Xbox One bundle and third-party retailers are making the console even more appealing by offering free game titles of your choice. Now is definitely a good time to get in on the action so without further ado, check out the list of all Xbox One Black Friday 2014 bundle and video game deals present in the market right now below. In only a couple of days from now, almost all well-known online as well as brick and mortar retail stores will be flooded with a huge flock of people out looking for great deals, which, most of the well-known retailers have already announced. The latest PlayStation 4 and Xbox One consoles are one year old now, and they are now supported by some very amazing first and third-party video game titles, so if you are planning to jump in on the next-gen action, now is apparently the best time to do so. With cheap value-focused bundles that Microsoft recently announced and standard Xbox One console bundled with one or more game titles, you can save some big bucks on Xbox One Black Friday 2014 Deals...We have the list posted at windows8newsinfo forum.

 
Microsoft Windows Is 29 Years Old Today PDF Print E-mail
Written by Wayne   
Friday, 21 November 2014 06:40

Microsoft Windows Is 29 Years Old Today

Microsoft Windows. The world’s most popular operating platform. Under fire from mobile and open source alternatives, but still keeping it strong after nearly three decades. Windows 1.0 launched exactly 29 years ago — on November 20, 1985. Although based on MS-DOS, this premiere version became the first operating system to come with a graphical user interface for users. Meaning they no longer had to type commands to operate their computers, and instead simply moved a mouse on the screen. This early version also came with many of the elements we now find in the OS, from windows and menus to icons and dialogs. Several of the apps that were part of this first build also survive. Upgraded and enhanced, Notepad, Paint, Calculator and more are still going strong. And the system requirements? Modest. All you needed to run Windows 1.0 was 256KB of storage space, a graphics adaptor card, two double sided floppy disk drives and up to 512KB of space in order to run the applications. Microsoft steadily improved the platform, paving the way for Windows 2.0, 3.0, 3.1 then Windows 95, 98, Windows ME, Windows 2000, Windows XP, Vista, and finally Windows 7. Windows 8, however, brought along dramatic changes. The modern platform received some polish with Windows 8.1, and now we have the release of Windows 10 to look forward to next year. Wild ride? Oh, surely. The journey still continues, and although some versions of Windows experienced better sales results and welcome reception than others, there is no denying that every new build arrived with a remarkable amount of buildup and excitement...Follow the birthday celebration on our forum.

 

 
Microsoft Releases Emergency Security Update PDF Print E-mail
Written by Wayne   
Wednesday, 19 November 2014 06:26

Microsoft Releases Emergency Security Update

Microsoft today deviated from its regular pattern of releasing security updates on the second Tuesday of each month, pushing out an emergency patch to plug a security hole in all supported versions of Windows. The company urged Windows users to install the update as quickly as possible, noting that miscreants already are exploiting the weaknesses to launch targeted attacks. The update (MS14-068) addresses a bug in a Windows component called Microsoft Windows Kerberos KBC, which handles authenticating Windows PCs on a local network. It is somewhat less of a problem for Windows home users (it is only rated critical for server versions of Windows) but it poses a serious threat to organizations. According to security vendor Shavlik, the flaw allows an attacker to elevate domain user account privileges to those of the domain administrator account. “The attacker could forge a Kerberos Ticket and send that to the Kerberos KDC which claims the user is a domain administrator,” writes Chris Goettl, product manager with Shavlik. “From there the attacker can impersonate any domain accounts, add themselves to any group, install programs, view\change\delete date, or create any new accounts they wish.  This could allow the attacker to then compromise any computer in the domain, including domain controllers.  If there is a silver lining in this one it is in the fact that the attacker must have a valid domain user account to exploit the vulnerability, but once they have done so, they have the keys to the kingdom.” The patch is one of two that Microsoft had expected to release on Patch Tuesday earlier this month, but unexpectedly pulled at the last moment.  “This is pretty severe and definitely explains why Microsoft only delayed the release and did not pull it from the November Patch Tuesday release all together,” Goettl said...Check out windows8newsinfo forum for

 

 
When Microsoft merges Windows and Windows Phone with Windows 10 PDF Print E-mail
Written by Wayne   
Sunday, 16 November 2014 05:35

When Microsoft merges Windows and Windows Phone with Windows 10

Windows has modern theme tools which consist of 2 color choices and a background. Windows Phone lets users pick one color and either black or white. Users can also choose to have their tiles be transparent with a picture behind them. The differences become apparent when using different parts of the operating systems. Windows Phone tends to have a lot of black or white with the occasional color accent. Windows has the primary color choice as the major fill and the secondary color choice as the accent. Windows Phone core apps follow a simple black/white background with the accent coloring some text. Windows takes a different approach to app design. Every app in Windows has its own design. For example, the mail app uses blue and white, people uses orange and white/grey, calendar is purple and white. This is very different from the people, email, and calendar apps on Windows Phone which all have a solid black/white background with the accent color scattered throughout the app sparingly. The difference between these two design choices is not only ascetics. How a user chooses to customize their phone or tablet may have an effect on battery life. Since battery life on phones is so crucial, having a solid black background makes sense to save on battery from screen power. Microsoft even warns users who choose a white background that some displays are not made to be power efficient when running the white.What do you prefer? Would you like to see Windows 10 adopt the Windows Phone single color and black or white, or continue with Windows two color and a pattern choice?
When I comes to apps, Windows and Windows Phone differ dramatically. Windows goes for a simple and obvious route of each app is separate, has a specific function, and unique design. Windows Phone has a different approach with their core apps. Email isn't one app by default; instead Microsoft has broken different email account into their own 'separate' but identical apps each with their own email account. Users can combine their inboxes to a single inbox to make checking and managing email easier. Windows 8.1's mail app keeps all the email accounts together but users have to switch between accounts to see different inboxes and folders...For more visit windows8newsinfo forum.

 

 

 
NotCompatible.c Android Virus Discovered PDF Print E-mail
Written by Administrator   
Monday, 24 November 2014 14:41

 NotCompatible.c Android Virus Discovered

A previously discovered threat for Android which was dealt with two years has once again reared its ugly head – the malware, then known as ‘NotCompatible’ has returned under the NotCompatible.c – the main difference between the original and version c is that those employing it are using new tactics that seem to be taking the mobile virus world by storm. NotCompatible.c uses networking features such as peer-to-peer information transfer and a host of other clever software tricks to gain access to big networks, as well as private ones, within companies – using compromised Android devices.  Any network the device connects to is a potential target – the intrusion is unblockable by networking security as well, due to the P2P nature of the virus. Another reason the virus is so advanced for a piece of mobile malware is the level of encryption on traffic between the infected phone and the target network that is sent by the malware – it’s encryption is of a high enough level that the software on the target network can’t differentiate between the normal jumble of traffic it gets and the malware’s. Again, this covers NotCompatible.c’s tracks nicely. The distribution method of NotCompatible.c is decidedly old however, and this is where the virus is weakest – it doesn’t manipulate any security loopholes to get on your phone, it simply requires the user to click a bogus link from their smartphone’s browser – the same old tried and tested ‘phishing’ tactic we’ve seen on PC malware for years. This of course means websites and e-mail companies may eb able to eventually neutralize the virus by identifying the bogus links and their destinations – but, along with recent iOS viruses, NotCompatible.c’s infection method and advanced features are telling of a virus trend that’s starting to take mobile very seriously...We have the link to the complete article posted on our forum.

 

 
Malicious Apps Can Simply Be Copied To Windows Phone PDF Print E-mail
Written by Administrator   
Thursday, 20 November 2014 05:42

 Malicious Apps

A new vulnerability on Windows Phone has just been unearthed that allows malicious apps to run with the same permission as the target. Something Microsoft needs to look at right away. Discovered by a XDA-Developers forum member here, this loophole provides users with a ridiculously easy way to replace a legitimate application on Windows Phone with a rogue one — which, interestingly, inherits the same data access permissions. It involves simply transferring the installation data of the malicious app into the program directory of the target, though it involves a few extra steps. The ability to sideload apps is essential for this trick to work. Microsoft, of course, added this ability to load applications from SD cards in Windows Phone 8.1. Anyway, the first step is to create the same manifest for the rogue app as the legitimate one, and then have them installed on the target device. The files are replaced in the program directory, and the original software is swapped with content from the custom package. The developer tested this hack on a Lumia device, and even created a registry tool that allows writing registry values with the inherited permissions. All things considered, the discovery of this loophole could allow cybercriminals to target Windows Phone users with malicious applications. Hopefully Microsoft gets to this first, and releases an update that tightens up security on its mobile platform...Stay abreast on everything that can affect your Windows Installation at windows8newsinfo forum.

 

 
Game Over For Intel On Android PDF Print E-mail
Written by Administrator   
Wednesday, 19 November 2014 06:07

Game Over For Intel On Android

Undertakings as momentous as this rarely last long. The Intel on Android story may be coming to a halt, with the company reportedly ready to renounce its subsidies for tablet makers. The chip giant, in an effort to popularize its Atom Bay Trail solutions started subsidizing Android tablets for as much as $51 per tablet — which is quite a lot. The idea being helping tablet makers build slates with Intel processors, and the company also offered to pay for extra component costs. Basically, Intel hoped to turn manufacturers away from processors utilizing the ARM architecture, which is used by everyone from Apple and Samsung to Qualcomm and NVIDIA. However, as reported here, overall the chip giant is expected to lose $4 billion on mobile chips this year, and even a company like Intel cannot handle such drastic a burn through its profits. Although Intel has seen steady growth on the Windows tablet front, particularly with Windows 8.1 devices, many of which are now available for under the $100 mark, the company has no choice but to phase out tablet subsidies for Android...Further details can be found on our forum.

 

 

 
US spies on mobile phones from the sky PDF Print E-mail
Written by Wayne   
Saturday, 15 November 2014 06:40

US spies on mobile phones from the sky

Small aircraft deployed by the US Marshals Service from at least five major airports have been taking to the skies with "dirtbox" equipment designed to mimic signals from cell towers, according to The Wall Street Journal. That in turn tricks mobile phones into revealing unique identifying numbers and general locations, according to the report on Thursday. The name "dirtbox" was said to be derived from an acronym of Digital Recovery Technology Inc, the Boeing subsidiary that makes the device. The range of aircraft in the program covers most of the US population, The Wall Street Journal reported, citing unnamed sources familiar with the operation. Details of flights were not given, but they were said to take place regularly, with each outing potentially gathering data from tens of thousands of mobile phones. The WSJ reported that the US Justice Department declined to comment for the story, other than to say that its agencies comply with the law when it comes to surveillance. Mobile phones are programmed to connect with the closest signal tower, but they trust signals from towers or imposters when it comes to making decisions, hackers have demonstrated. Boxes in planes could automatically assure mobile phones that they are the optimal signal tower, then accept identifying information from handsets seeking connections. Fake cell towers could then pass connections on to real signal towers, remaining as a conduit with the ability to tune into or block digital transmissions...For the complete story you need to visit windows8newsinfo forum.

 

 
«StartPrev12345678910NextEnd»

Page 1 of 176
 


News by Day

Recommendations

twitterfb