Recent Post

Showing posts with label news. Show all posts
Showing posts with label news. Show all posts

Saturday, June 9, 2012

LinkedIn Steps To Protect Members Password

Silveira Vincente
After the rumor about password of LinkedIn User that has been stolen and posted in online hacker community in Russia, then LinkedIn ask for apologize and doing action to protect the user. Vicente Silveira, Director at LinkedIn in his blog said that 6,5 million password has been posted in hacker website.

According to Silveira, most of the password is still in encryption condition (hashed). He admitted few of this hashed password has been decrypted and published. Fortunately email login related to the password was not go on public. He said that there is no report about access to user account related to this issue.

Saturday, May 26, 2012

Gigabyte Will Announces The World's Lightest Notebook

gigabyte x11

Gigabyte has invited the media in Taiwan to attend the launch of the Gigabyte X11 notebook that is claimed to be the lightest in the world. Maybe, because they do not want to drown of the clamor that Computex 2012 event it will be held in Taipei, Taiwan, on June 5 to 9, 2012, Gigabyte X11 planned it launching before the event. The launch of the new X11 will be held on May 31, 2012, as stated on his official invitation.

So far, it is not known the detailed specifications offered. With the claim of being the lightest, Gigabyte gave leaked that its weight is only about 2 pounds or 0.9 kg. X11 Naming refers to the diagonal screen size of 11 or 11.6 inches.

Tuesday, May 22, 2012

Google Chrome Being The Most Popular In May

Until the first three weeks during May 2012, Google Chrome become the most widely used browser in the world based on reports from StatCounter website. This is the first time that can be achieved by Google with the browser.
So far, Internet Explorer dominated the internet browser because its existence that is available on every Windows operating system. With some of the advantages it has, Chrome now is able to outperform, especially in period of 14 to 20 May.

Thursday, May 17, 2012

Windows 8 RT Just Can Use IE

For you who await the arrival of the newest Microsoft tablet with its operating system Windows 8, here the following explanation about the product

Microsoft announced that Windows 8 operating system RT (Runtime) which will be reserved for the ARM processor supports only the Internet Explorer browser.

Thursday, January 19, 2012

Protests against the bill SOPA and PIPA Get Bustling

After Wikipedia.org shut down its online services for 24 hours as a form of protest, Now Mozilla.org or Firefox browser will participate as well as a protest to the United Stated Senate it is currently brewing bill SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act).

If you notice, starting on Wednesday (18 / 1), the default view Mozilla Firefox and the site displays a black background with a logo that read "Stop Censorship". The same is also done by Reddit.com and Wordpress.com

Wednesday, January 18, 2012

First Time Bing outperform Yahoo!

Search engine competition is still dominated by Google. However, it is quite interesting if we look at the competition in second and third between Bing and Yahoo!.

In December 2011 study by comScore, Google is at top the list of search engines most widely used by U.S. communities with 65.9% market share.

Now attention is on the runner-up occupied by Bing, which stood at 15.1%. This is the first time Microsoft's search engine is managed to outperform Yahoo! since its launch in mid 2008. Yahoo! itself narrowly defeated with 14.5% achievement.

Thursday, January 12, 2012

I Can Always Update My Facebook Status, Though I'm Dead


Please do not scare when you read this article, this is not a mystics story and I'm not trying to scare you (I'll scare you when have a chance :D), still consistent with computer topic for my blog and completely no ghost. Recently, I found a website review about this facebook apps, this apps called 'If I Die'.

Monday, January 9, 2012

Malware Predictions in 2012

malware
Entering 2012, the development of cyber security and threat will facing a challenge and complex conditions. On the other hand, the awareness growing of these aspects help to suppress malware escalation level  attack.

Here are some predictions that need to be a record in 2012:

Saturday, January 7, 2012

The Most Downloaded Movies Ilegally in 2011

More recently, TorrentFreak announced the list of most downloaded movies illegally using torrent applications. The list is compiled based on data reported from several sources, including thousands of BitTorrent trackers.

In the first sequence is occupied by Fast Five movies that are downloaded as many as 9.2 million times.

Friday, January 6, 2012

Microsoft Ask Royalties 15 Dollars for Every Samsung Android Smartphone Sold

While the legal dispute with Apple has not been completed yet, the Samsung back to accept a new problem because of the demand for payment of royalties by Microsoft related to the use of the Android OS on Samsung's smartphone product line. Microsoft asked Samsung to pay 15 dollars for every Android phones sold to date according to Microsoft that samsung has been using several patents owned by Microsoft.

Thursday, January 5, 2012

10 Famous Hacker in History

The computer world is rich with the history of hackers who contributed to the advancement of computer science and sharpen the form of computing, Internet and network which we enjoy today. Even in some cases they do it alone. And while it is true there is the Black Hat hacker who was behind the internet, steal and cause chaos, there is also a white hat hackers who use their computer for good. There is also a very different types of hackers: the figure of a genius. They all play their respective roles, large and small, in bearing the computer world that exists today. Here are 10 among the largest:

Tuesday, January 3, 2012

8 April 2012, Intel releases Ivy Bridge

Finally, after many rumors circulating about when to release the processor Ivy Bridge, has revealed that Intel plans to launch processors Ivy Bridge on April 8, 2012. It is known from the sources cited DigiTimes.com.

Ivy Bridge is the code name to be used in third-generation processors from Intel Core using 22nm fabrication. Previously, it was reported that the launch will be in the range of March or April, the rumors even mention the month of May is also the target launch.

Monday, January 2, 2012

Google+ Users Reached 62 Million



Google+ seems becoming a serious competitor for Facebook. This has proven with the data reported that the number of Google+ users has reached about 62 million at the end of 2011.

This data was released by Paul Allen, a statistics expert observer of social networking. Allen himself has indeed been following the development of Google+ since it first launched. According to data, in July 2011 the number of register reaches 10 million people. Continues in August reached double that, about 20.5 million users.

Sunday, December 20, 2009

Microsoft Offers Web App Office Trial

Microsoft launches preview of his program for Microsoft office web application, first step of the long way to release the web version of word, excel and PowerPoint.

Tuesday, December 15, 2009

Malware Still The Main Tread for Internet User

Virus world seems not going to be end yet and the variants keeps growing, the establishment of internet even support them make their own spreading system. This why this issue become ghost of internet.
There's no end indeed if we talk about virus, it because there are many people know about computer virus and how this virus works, and know there are many virus try to treading other device like smartphone.

Sunday, September 20, 2009

File [exe] infected by virus, And can this be restored?

For almost all computer user maybe when they found virus on their computer they will delete the infected file directly for safety. If the data is not important this no problem, but how about if the file is our important file so set the antivirus to not delete automatically, we can move to vault or quarantine it first, so we can open this file later. Know the question is, can file that infected by virus being restored? Sometimes it can but sometimes it can't.

Be careful with fake Antivirus

If you are browsing then suddenly some popup message appear and tell us to install certain antivirus or message that our computer has been infected by virus, trojan, spyware and some like that, then we have to pay attention for it.

Thursday, September 10, 2009

What the Computer Virus is?

The Virus Begin

malware
1949, John von Neumans says “theory self altering automata” it result from mathematic scientist research. 1960, Lab BELL (AT & T) trying the theory by make kind of game. They make game it can copy itself, modifying and infect program build by opponent. The program it could still survive and infect the other program will be the winner. This game become a favorite game but the program become more dangerous, so they control this game carefully. 1980, The program now called virus and it spreading out from Lab, and start spreading in public computer.