Windows 8 Newsinfo | Latest news
Samsung unveils Galaxy Note 4 PDF Print E-mail
Written by Wayne   
Thursday, 04 September 2014 02:56

Samsung unveils Galaxy Note 4

Samsung is adding two new models to its line of big-screen, pen-equipped smartphones. The Samsung Galaxy Note 4 is a 5.7 inch phone with an aluminum frame and a fake leather rear panel. The Samsung Galaxy Note Edge is an entirely new type of device which has a curved display that actually wraps over one side of the phone’s case. The Galaxy Note 4 has a 5.7 inch, 2560 x 1440 pixel AMOLEd display, a 2.7 GHz Qualcomm Snapdragon 805 processor, 3GB of RAM, and 32GB to 64GB of storage. It has a 16MP rear camera, and a 3.7MP front-facing camera. It also has a fingerprint sensor and the phone is powered by a 3220mAh battery. In other words, it’s one of the most powerful Android smartphones you’re likely to find this year. In some regions the phone will have a Samsung Exynos 5433 octa-core processor instead of the Snapdragon chip. Samsung says the phone uses 7.5 percent less power and gets longer battery life than the Galaxy S3...Further details are posted at windows8newsinfo forum.


Evolution of Malware PDF Print E-mail
Written by Administrator   
Wednesday, 03 September 2014 08:19

Evolution of Malware

It was the ’50s! Back then, computers were big. Programmers used punching cards. One such programmer – Bob Thomas – experimented with self-replicating programs and created the Creeper. Fortunately, the worm could not self-replicate, but it did affect users of ARPAnet (one of the first computer networks’ community). From there, began a journey into the most dangerous realms of the Internet. The first Internet Worm and a great deal of MS-DOS viruses were harmless to both the user and the computer. They were designed to be annoying and let the world know about their creators existence. But with the passage of times, things changed. Today’s malware writers exploit their creations to use infected machines, and then steal banking credentials, send spam messages, or leverage their revenue by advertisement click fraud. Corporate espionage also brings constant revenue, as malware opens backdoors into the organization’s network...We have a very detailed look at the evolution of malware posted on our forum.


NVIDIA Shield 4G LTE PDF Print E-mail
Written by Administrator   
Saturday, 30 August 2014 08:09


There’s a microSD card slot for additional storage and the 4G LTE model has a micro SIM card slot for connecting to mobile broadband networks. THe US version should support AT&T’s 4G LTE and HSPA+ network.The NVIDIA Shield Tablet is an 8 inch Android tablet with an NVIDIA Tegra K1 processor and an emphasis on gaming. NVIDIA launched a WiFi-only model with 16GB of storage in July for $299. Now a model with 32GB of storage and 4G LTE support is on the way. It’ll cost $399 when it goes on sale, and if a recent FCC listing is anything to go by (it might not be), it could go on sale soon. The Shield Tablet has an 8 inch, 1920 x 1200 pixel display, 2GB of RAM, and NVIDiA’s 2.2 GHz ARM Cortex-A15 quad-core processor with 192-core Kepler graphics. It features 802.11n 2×2 Mimo dual-band WiFi, Bluetooth 4.0, HDMI output, and support for 4K HD video playback. It has stereo front-facing speakers, 5MP front and rear cameras and the tablet comes with NVIDA’s DirectStylus 2 pen for writing or drawing...Further details can be found on our forum.


Rolls-Royce Wraith Took 8 Months to Build PDF Print E-mail
Written by Administrator   
Sunday, 24 August 2014 08:21

Rolls-Royce Wraith Took 8 Months to Build

Turn 10 Studios needed extra time to digitally translate the Rolls-Royce Wraith’s craftsmanship into “Forza Motorsport 5” on the Xbox One. It took around eight months for developers to build the super-luxury fastback coupe -- two months longer than average. The Wraith -- the first Rolls-Royce to appear in a video game -- presented unique design challenges that separated it from any other car on the “Forza” roster, said John Wendl, Turn 10’s content director. For instance, the studio had to create custom animations for the game’s engine to accommodate the Wraith’s retractable hood ornament, which hides when the vehicle is parked so people don’t steal the famed trinket. When checking out the Wraith in the “Forzavista” showcase mode, which lets gamers get close-up views of the cars when they aren’t racing, the ornament behaves as it would in real life. The $287,400 Wraith’s coach doors, two-tone paint job and starlight headliner all required extra precision from Turn 10’s developers...For more turn to our forum.


You Might Want to Care about Windows 9 PDF Print E-mail
Written by Administrator   
Saturday, 23 August 2014 07:04

You Might Want to Care about Windows 9

We know almost absolutely nothing about Windows 9. There's been speculation and reported leaked information from internal 'Softies feverishly working on Windows, but there truly is very little solid evidence of anything. So, you'll see a lot of words like "might" and "rumor" and "could" used throughout the rest of this article. I wish I could write a "spoilers" article, but as we've become too familiar over the past couple years from Microsoft, features can be culled or delayed seemingly overnight. There's plenty of hope and desire that Microsoft will release something capable of pulling the company from the brink after a lukewarm Windows 8 reception. If hope and desire were Bitcoins, we'd all be rich folks. There are those that can't stand it when Microsoft does something right, but even then, I think we all are pulling for Microsoft even in a small way. There's been a lot of reported rumors over what Microsoft might be delivering in its revamped Windows version that might appear at the end of September...Complete details are posted on our forum.


Microsoft makes a stand PDF Print E-mail
Written by Wayne   
Tuesday, 02 September 2014 08:08

Microsoft makes a stand

Despite a federal court order directing Microsoft to turn overseas-held email data to federal authorities, the software giant said Friday it will continue to withhold that information as it waits for the case to wind through the appeals process. The judge has now ordered both Microsoft and federal prosecutors to advise her how to proceed by next Friday, September 5. Let there be no doubt that Microsoft's actions in this controversial case are customer-centric. The firm isn't just standing up to the US government on moral principles. It's now defying a federal court order. "Microsoft will not be turning over the email and plans to appeal," a Microsoft statement notes. "Everyone agrees this case can and will proceed to the appeals court. This is simply about finding the appropriate procedure for that to happen." Judge Loretta Preska, the chief of the US District Court in Manhattan ruled on July 31 that Microsoft was required to hand over email messages stored in an Ireland data center to US prosecutors investigating a criminal case...Venture over to winodws8newsinfo forum for more.


China's own operating system PDF Print E-mail
Written by Wayne   
Monday, 25 August 2014 08:51

China's own operating system

China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said on Sunday. Computer technology became an area of tension between China and the United States after a number of run-ins over cyber security. China is now looking to help its domestic industry catch up with imported systems such as Microsoft's Windows and Google's mobile operating system Android. The operating system would first appear on desktop devices and later extend to smartphone and other mobile devices, Xinhua said, citing Ni Guangnan who heads an official OS development alliance established in March. Ni's comments were originally reported by the People's Post and Telecommunications News, an official trade paper run by the Ministry of Industry and Information Technology...For more you need to touch down at windows8newsinfo forum.


Microsoft Office as a Service PDF Print E-mail
Written by Wayne   
Saturday, 23 August 2014 07:09

Microsoft Office as a Service

Microsoft is providing some of its best products via the cloud. We are not talking about Azure or Office 365 in specific. This is a general article that looks at how Microsoft is implementing Office as a Service,  under SaaS, instead of as standalone software and its benefits for the end users. Though we’ll check out the prices, the article focuses on the free Office as a Service. The name given to Microsoft Office on the cloud is Office 365. There are many editions of it – based on levels and types of usage. There are business editions, household editions, personal edition and one free edition. All other except the free edition, provides you the facility to install a local copy of all components of Microsoft Office. The free edition employs Office Web Apps that provide you with enough features to work and collaborate in real time. If you go for a paid subscription, you get license(s) to install Microsoft Office (Latest version) on your computers locally...For more why not visit windows8newsinfo forum, and you can join while there.



Research team creates undetectable malware PDF Print E-mail
Written by Wayne   
Friday, 22 August 2014 02:50

undetectable malware

Most cyber attacks from your typical home hacker, come by way of techniques used 10 years ago or more like phishing scams, poor password management, and things of that nature. But now it seems as though a research team from Germany has developed an all new strain of malware. The team from Ruhr University in Bochum, Germany has developed a new kind of malware that is able to tuck itself secretly beside legitimate software downloads. The malware isn't in the the trusted software, but rather bound to it, enabling it to bypass many of the security measures in place for this kind of malicious software. Since the original application is not modified in anyway, not only does it allow the malware to sneak through, but it can also be a much larger file than usual, allowing for a much deeper feature set. The researchers explain, "upon starting the infected application the binder is started. It parses its own file for additional embedded executable files, reconstructs and executes them, optionally invisible for the user."  Visit windows8newsinfo forum to learn more.



Page 14 of 181

News by Day