This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Welcome in TH3 professional security

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Monday, April 30, 2012

As in real life, there you smiling all the time, but in his heart hatred Devin you can do anything to overthrow you, is how well, in the virtual world there are many villains of hacker lurks ready to be broken on the first victim finds him. He can be known very well what if you Sadj or intelligent, strong or weak just by your actions on the social network, or by talking to you out of chat programs, where in this case can Dahr you in the personalities of many, and Bathagana Modern Art will make you believe in him, order to be able to learn more about your personality. But will make sure that even if you hacked, you can not detect or follow-up legally. Thus, as soon as you discover that the victim Shooting easy would not hesitate to pounce on you and all the easy Achteraqk
Do not be an easy victim


 
In real life the best way to Dhour is a strong character that you have to trust yourself first, so make other respects you and deal with you carefully, and as a result become less likely to mess with people. So too in the forums and chat sites or on the OpenVPN when talking with strangers, Display my some powerful features in your personality, so people can get an idea of ​​who you are, you should also think about what she says and information provided by, Stay away from all that is has to do with your life special in your speech , do not provide any specific information about your or your operating system or even programs that are available in your computer no matter how simple or trivial
 
When talking with the stranger on chat sites or on OpenVPN, be the race to ask questions make sure well the identity of the Mkhatpk, Do not put yourself in a situation you who will answer questions from curious without the possibility of responding to your questions, try to make sure each answer in the case was a friend of persistent to talk with you OpenVPN to know very well that he could not penetrate his account one day and can Ahadzq another person is your friend on the OpenVPN always try to talk to him when he reaches the stage to try to access this site or sensitive information be sure of the identity of a telephone call your friend Do not be so easy prey


How to find security gaps and which would be secured in the local network

When your network is available on a single computer monitor or 10 he commanded to protect them is easy, but in the case of availability of your network and that you manage the demands of a 200 computer control is here to protect each computer separately is very difficult, so the company
  Provide you with a wonderful plan to protect your network well and easy, yes, use of software GFI
  Does not need you to be an expert to protect in order to protect your network, GFI Languard
   Therein lies the secret of the success of this program is the power Bmoisat simplicity it enables you to discover security gaps found on your hardware, as well as secured by downloading several Thdatat and apply them to your hardware associated with the network, all this will not require you to just some clicks in order to Thoudy protection Ksoy to download the program


 http://www.gfi.com/downloads/

Retrieved images have been deleted by mistake not impossible, you can just by selecting the right tool for that

Microsoft is working on the automation of homes using the Home OS




Do you want to control climate and security of your home in addition to other household devices using Microsoft software? , This desire may be realized soon, I started Microsoft Research has already tested the system for the automation of homes named in 12 HomeOS house during the past few months.
This system the new Domestic displays all of smart phones, printers and air conditioning as peripheral devices to a home network, and run by a dedicated, this project also includes applications for mobile phones, applications perform the functions of power monitoring and remote surveillance and face recognition, and a list applications of this growing day after day are available on special applications store called HomeStore, these applications will allow the user to expand the capacity of the system who owns, and to learn more on this system see the video team filmed Microsoft Research 


 

Teenager calling a friend on facebook 32,000 for his birthday gala error!

The Benjamin teenager do four in ten-year-old invited 20 of his friends on Facebook for the gala birthday at the home of his grandmother, but the problem is that more than sixty people LBO call, causing the wrath of his parents to the page you are prepared containing the address of the real, so he deleted via Aaپadeh but another page did not know them 'the birth of Benjamin Holiday' prepared by an anonymous got 16,000 is invited! Taaliqhm and across many of them insist Kano and happy to attend the birth of Benjamin! Leaked page on Twitter and become more than 32000 is invited to decide the father angry establish a direct, but this time a lawsuit against this unknown who had caused in the presence of thousands of guests to the house of Jeddah, the teenager and said source of gendarmerie French that this kind of jokes he had caused in brawls and riots, and even cracking and the consequences may not be ominous ...

Goodbye to the site The Pirate Bay in Britain

Today the British companies contact their customers and to prevent the blocking of access to the site of the famous file sharing torrent
The Pirate Bay
The decision comes some of the government that issued a British court today hailed the court forced the companies call the execution of the judgment issued last February that some accused the site of violating intellectual property rights and the dissemination of pirated Moada and causing a loss of millions of dollars to companies, music production and distribution in Britain

Saturday, April 28, 2012

Add a button "I cried," to YouTube for the kind sentiments owners


The "good cry" is a test designed to make the experience of a collective cry, this is the first link in the expanded study to explore the role of crying in the culture of the Web and conducted by each of the Dee Kim and Bistin Chen's.

Users can browser Google Chrome to add a button "I cried" "I Cried 'button" to YouTube through your applications, Chrome, after the completion of the installation button will appear along with the other buttons YouTube.
Click on the button I cried when he shed some tears after watching the clip to move the feelings, the number who will shed tears along with the button, as is the case in the button I liked in Facebook.

Samsung officially announces the GALAXY S3 processor

We still do not know how it will shape the next phone from Samsung is the GALAXY S3, but we now know that a therapist who will occupy this phone is the Samsung Exynos 4 Quad 1.4GHz speeds, which is designed depending on the processor ARM Cortex A9.
This processor has twice the processing power that the processor Previous: Exynos 4 Dual, and that it consumes less power by 20%, the company says that this processor will be able to play games as well as three-dimensional video display and recording accurately 1080p thirty frames per second.
First Deputy Chairman of Samsung Hankil Yoon said: The power of the processor will make the user feel that the performance of the phone is closer to the computer to perform it to the performance of a mobile phone.
It is worth mentioning that this processor has entered actually in the process of production and will be used for the first time in the phone GALAXY S3 which will be unveiled on the third of next month.
I leave you with the video processor induction.

.







http://www.youtube.com/watch?v=0K46TDLd4wM&feature=player_embedded

Nokia and Samsung displace become the largest manufacturer of mobile phones in the world

For the first time in 14 years no longer Nokia's largest manufacturer of mobile phones in the world, because the Samsung and after the US-Nokia became sits on the throne of the largest manufacturer of mobile phones in the world, according to statistics of economic the Samsung sold 93.5 million mobile phones in the first quarter of this year, compared with 82.7 million of Nokia Corporation, the news in addition to issuing the new phone near GALAXY S3 is the greatest joy for Samsung
It is noteworthy that the rise of Samsung to the center of the largest mobile phone manufacturers in the world is not surpise large for Nokia, it has Samsung was the largest supplier of mobile phones in Europe last year, for its part, the Nokia pinning its hopes in the restoration of part of its position in the market on her, which put forward recently and is Lumia 900, which is running Windows and the iPhone, and it is what he considered to be away from Nokia, Nokia today Tkprha and pay the price for its refusal to use the system in the Android mobile phones



Friday, April 27, 2012

Film Society of America warns of return megaupload

In a statement to the Motion Picture Association of America expressed its fears of a return to activity content pirate and pointed to the possibility of the return site to share files famous "Mega Iblod" to work again in the case is not reached on how to get rid of its servers and pointed to the sale or transfer of site servers will increase the seriousness of the matter
And to indicate the U.S. authorities have closed service "mega Iblod" on 9 January this year and called for the Motion Picture Association of America not to harm pirate content stored on the servers for its survival as evidence of Moses Dz site "Kim Dotkom"
And seeks "Carpatia" and now is a host of hardware servers, "Mega Abuld" to pay expenses not paid hosting, which is estimated at $ 9000 for each day



Aktar than 600,000 device MAC infected with the type of Botnet


For the second time within one year and there seems to be infection, malignancy has spread widely and affected users of Macs with the operating system "AWS X" saluting said a company specialized in protection from viruses that there are more than 600 thousand a Mac infected with "flashback" mostly concentrated mostly in the United States and Canada, including a 274 Bkoprtino California
And the percentage of infected machines in the United States gain of 75% and about 20% of the devices in Canada and 5% of infected machines in the rest of the world


put kaspersky virus removal tool for FLASHBACK devices MAC


Having said a company specialized in the protection from viruses that there are more than 600 thousand a Mac with OS "AWS X" infected "flashback" proceeded company "Kaspersky" a new tool to protect them from this "Albotnt" who exploit deceive him exist in the language of "JavaScript" that allows to download viruses from bogus sites dedicated to the lowered
Has established a company "Kaspersky" a new website to enable users to check whether their computers were infected with the virus or not and provide an update of Java to download
You can download and obscenity free from the following location

Bank of Japan raises a new device to protect users of ATM



The Bank of Japan introduced a new device in order to protect customers during the use of ATM, especially after the increasing number of clients who have been victimized by the use of ATM by the "Alskimrz", as well as witnessed by the earthquakes in Japan last year. Where the device depends on the palm of the hands of the customer survey is a confidential number for the introduction, consists of 4 numbers, before allowing the client to withdraw his money from the ATM. The Bank of Japan has launched a pilot of 10 mobile device in order to experience quality of the equipment on the field

Now become paralyzed they can abandon the wheelchair





Joseph Octorkocalo at the age of 28 years, he was 5 years ago to the paralysis of his legs after falling from his horse, thanks to advanced technology managed to Joseph Octorkocalo abandoned wheelchair traditional, and moved to the exercise of his life as normal using this robot, which enable it to rely entirely on himself in his daily life
How great to see this invention, which gives hope to paralyzed from the new, fun Gap

Iranian citizen hacked the three million bank account

The "Khosrow Zarfred" and is an Iranian citizen who specializes in electronic services banking penetrate up to three million bank account belonging to 22 Bank different and did this hack after he ignored Almswolon banks Thdiratth the precedent that might tell them where the existence of a serious loophole in the banking system
As a precaution, several Iranian banks after the piece disable the accounts of its customers and by sending short text messages to their customers and asked them to immediately change the secret codes of their credit cards

Earnings announcements on the Internet reached $ 31 billion


According to a study recently published by the company "EA B" and is a company specialized in the study of the online advertising market, the advertising revenue on the Internet has seen a remarkable increase, reaching $ 31 billion

Has made the field of advertising on mobile phones gain of $ 1.6 billion, up 149% from the previous year while the field of advertising by video, it made a $ 1.8 billion stake in what remains the lion's share of the ads within the search results by $ 11.7 billion
And to indicate the field of Internet advertising comes in second place after the announcement on television Alguenoah

India the first country worldwide spam messages



The laboratory Sifus Lab recently issued its report on the countries most incubated for spammers, and spammers are people working to send e-mails disturbing to a great extent to the many people around the world, usually in order to promote the products business, but that in the world Alskjorta usually talking about spammers that it the person who sends messages Ahitalah for fraud on the users, either theft or fraud accounts for them. Thus came the report of the laboratory Sifus Lab reveals India's largest exporter of fraudulent messages around the world, 9.3 per cent, followed by America, by 8.3% and South Korea by 5.7

The text of the report of the laboratory Sifus Lab, said that most spam messages are sent by computers have been penetrated by a hacker through the Net bots. With that many international companies that provide e-mail service is striving to combat spam (spam), where the company comes in first place Djimaal



We all know that the data can be copied and paste, you can copy the text of the written message, as well as Basord or Yoezer Nim to login to any protected area, but what Atarafh Making copies of sensitive data and re-glued is extremely dangerous if you are from users of the Internet on the face of particular. How so?
We all know that when you copy any file whatever it is Thfaza portfolio in Windows, the latter, you can access them through some programs, can also be access to the space allocated in windows by some of the scripts is very easy to be programmed, for example scripts enabled Gaa which Tstskhaddm at the sites on a large scale, and here Thmthel risk that can be any site running the script access to a folder Aleuendosaltgess all the data that you backed among these data can be captured is that of Balbasord and Alauser Nim, as well as your correspondence confidential or otherwise ... can also be of some sites store this data on a database. for this if you want to work to be very sensitive, please separate your computer from the Internet was when finished restart your computer, and you can also use some of the programs that protect the portfolio Alujndoz of accessed through scripts or some programs such as




Was launched a few hours before the button to listen to music in all the pages of a Category "Music" where users can social network Facebook now click on a word to hear, and near admiration of a button, to hear the music artist or musical group owner of the page. Last Update of Facebook to Aeidahr from all accounts this should wait for some time to Dhour button gradually among Facebook users. While there are some rumors about adding a button seen soon in order to watch some videos and pages of movies


For tired and you become bored of flipping TV channels using the remote control traditional? , If you might want to buy a joystick magic called "camera", this stick does not contain any buttons, and can issue a control signal 13 is different, then waved to the right and the left in order to switch channels and to control the volume level of each you have to do is recycled.
Stick a camera sold wrapped in a piece of Chinese silk in a box from the skin of the serpent, you can order from Amazon for $ 69.95
I leave you with the video.