Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Android security



  New member in Samsung family

According to The Verge, Samsung will enhance its product army by unveiling two new tablet devices, they are 8 inch and 10.1 inch Galaxy Tab 3. The configuration details of 8 inch Galaxy Tab 3 are: 1.5 GHz Exynos dual core processor WXGA TFT display screen, resolution is 1280x800 px and 189 PPI The main camera is 8 megapixel, 1.3 megapixel front camera 4450 mAh battery 1.5 GB RAM 16GB/32GB storage space The configuration details of 10.1 inch Galaxy Tab 3 are: 1.6 GHz Intel dual-core processor...

   Samsung Galaxy Tab 3,Tablet     2013-06-03 12:17:04

  How to password protect a Winzip file

Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files. How to add a Password to your Zip Fil...

   DATA SECURITY,WINZIP     2019-08-29 11:42:41

  Samsung S3 defeats iPhone 4S in sales in Q3

The market research firm Strategy Analytics publishes a research report which states global sales of Samsung Galaxy S3 is over iPhone 4S in the third quarter of 2012, it becomes the most popular mobile phone.From the chart below, Galaxy S3 was sold 18 million units in Q3, while iPhone 4S was sold 16.2 million units. Galaxy S3 took market share of 10.7%, and iPhone 4S took 9.7%.Perhaps people are not willing to buy iPhone 4S due to the launch of the iPhone 5, the iPhone 4S sales lost to Gala...

   Samsung S3,sale,iPhone 4S     2012-11-08 11:22:54

  Top 10 Tell Tale Signs Your Computer Has a Virus

The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...

   COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR     2017-03-19 21:05:12

  Hologres vs AWS Redshift

Hologres and Redshift are both data warehousing solutions, but they have some differences in terms of features, architecture, and target use cases. Underlying Infrastructure Hologres: Built on Alibaba Cloud's Apsara distributed computing platform, Hologres leverages the underlying infrastructure for storage, computation, and management. It benefits from Alibaba's expertise in cloud-native architecture and real-time data processing. Redshift: Amazon Redshift is based on a Massively Parallel Pro...

   HOLOGRES,REDSHIFT,ALIBABA,AWS,BIG DATA,REAL-TIME     2024-03-23 01:36:41

  Twitter user database is hacked

According to Sina Tech, One hacker from Islamic Republic of Mauritania claimed today that he had acquired Twitter's entire user database and he shared over 15000 user account information on file sharing website Zippyshare.These information include the name of each account on Twitter, username and access tokens of third-party applications which have access to their Twitter accounts(such as Instagram or HootSuite).Twitter has yet to comment on the matter, but the company sent messages urging ...

   Twitter,Hacker,Access token     2013-08-20 10:49:44

  bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security

Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...

   BCRYPT,SECURITY     2023-11-15 08:14:35

  Google starts to clean up its service again

Google announced on its official blog that they would clean up its service again following the fall of 2011. They will close some features and services to stay focused and make good use of other opportunities.Google Reader and Snapseed are listed in the cleaning list. Google will switch off Google Reader on July 1 this year and end its service which exists in the past eight years, Users can export feeds using Google Takeout. Google said that this product did have loyal customers, but these year...

   Google, Google Reader,Close     2013-03-13 20:30:34

  Peculiarities of cloud infrastructure

MarketsandMarkets claims that the cloud computing market is worth more than $545 bln nowadays. Moreover, by Thales, nearly 60% of worldwide commercial data is stored in the cloud today. Nay, under Exploding Topics, about 90% of large companies across the world use cloud infrastructure. So, the mentioned technology is incredibly popular among business owners worldwide presently. However, not so many company holders, as well as managers, know enough about the specified solutions. That's because mo...

   CLOUD INFRASTRUCTURE,DATA STORAGE     2022-12-30 12:00:44

  How to secure an Ubuntu Apache web server

Securing server software is not a straightforward task. Not all of our operating environments are the same, leading to a variety of potential security vulnerabilities. However, using a few basic configuration and security options, you can stay a little ahead of where you want to be. 1. Fail2ban Fail2ban is a Python-based intrusion prevention software that detects and blocks malicious IP addresses from multiple unsuccessful attempts at software logins. In other words, if someone is attempt...

   Unix server security,Log,.htaccess,Cache     2011-12-27 09:25:32