Wednesday, December 31, 2014

Xbox One: SDK seeps through, could lead to homebrew software – WinFuture

Microsoft, XBox, Xbox One, game console, Microsoft Xbox One

In December 2014 Microsoft has released a new Software Development Kit (SDK) for its console Xbox One published this but is intended for developers and not for the public. A hacker group called H4LT submitted this now but ooze and says that characterized the future “homebrew” applications could be possible. The 2014 is available for Microsoft and not just left the Xbox One optimally to the end: you had (like Sony) for Christmas withstand a DDoS attack on Xbox Live and now it was thicker again: For a hacker group called H4AL ornotHALT gave on Twitter or via the forum Se7ensins of the leak and release of the Xbox One SDK known.
For the “mere mortals” has indeed no effect as for official use to be a developer account at Microsoft and programming skills are required. Software “enthusiasts” could use the but in order to create modifications for the console.
‘) but is still H4LT have indicated that not so wide, which is also the reason for the disclosure. By so-called “reverse engineering” in connection with the SDK Windows 8 will be “cracked”. Reason is that the operating system of the Xbox One is essentially a stripped down Windows 8 is, the hacker, but a new packet format brings that have not yet been “much attention” gotten. This format is for console updates and the storage of applications, including games, responsible and is a modification of Virtual Hard Disks. A real “exploit” for not giving it though so far, but according to the current state of the packaging format could “possibly” cause you could create homebrew software, the hacker.

See also: Xbox One – SDK update provides hig her performance in terms of Esram

In WinFuture- Price comparison:
In WinFuture price comparison

Microsoft, XBox, Xbox One, game console, Microsoft Xbox One

LikeTweet

Xbox One: Hacker leaken Microsoft Software Development Kit – Next-Gamer.de

The December 2014 seems to be a big month for the video game hacker community to be him. Now offers the hacker group “Emergency Stop” on Twitter the SDK documentation, including the Xbox One public download.

Xbox One Hacker SDK Microsoft EMERGENCY With a SDK (Software Development Kit) can be applications for each platform to develop, which means that soon unlicensed programs and games could run on the Xbox One. But at the moment it is still facing the problem that new software runs only in Developers mode, the Xbox One, but it need the online authentication of Microsoft server.

That is why it is indeed possible with the SDK software However, to program for the Xbox One, you can only debug on a Windows machine it so far. With a little reverse engineering but it should be possible under certain conditions will soon be homebrew software to run on Microsoft’s next-gen console, such as emergency stop explained to Se7enSins :

” 18 Once the SDK is available, people could have the necessary knowledge or have already reconstructed data in the Windows 8 operating system here data by reverse-engineering by exposing.

Why? Because the Xbox One practical terms a ‘raw’ Windows 8 device, which has introduced a new package format. This format is used to update the console and the storage of applications [...]

There is no definitive exploit, but from what we’ve learned and tested this simple packet format could lead homebrew application to allow for the Xbox One. “

While some hackers trying on a next-gen console to run third-party software, try the other an old console (on this is already possible breathe) new life: To operate the Mario Kart 8-Hacker , Chadderz and MrBean35000vr, currently working change the function of the local multiplayer Nintendo Wii for online multiplayer

.

LikeTweet

BKA investigation for infected software on thousands of computers – Computer Week

There is evidence of perpetrators in Germany. The investigation by the Attorney General’s Office Frankfurt lasted more, details could not therefore be announced.

Experts had managed to identify the so-called botnet and smash, said the spokesman. This was according to BKA a grouping a plurality of computers infected with malicious software. E-mail attachments or downloads would be used to generally, the spokesman said. The perpetrators could access this path on the computer and commit identity theft.

The computer owner concerned had been notified of your provider about the risks, said the spokesman. For more information on how to deal with such cases and aids for filing reports spend it on the side of the Federal and the Federal Office for Information Security (BSI). (AP / cvi)

Newsletter ‘CP Business Tips’ now

LikeTweet

Monday, December 29, 2014

Spy software on computers in the Chancellor’s Office discovered – COMPUTER BILD

cyber attack on the Federal Chancellery? A virus scanner discovered the spy software Regin on a computer.

D he spyware Regin is a According to media report has been discovered on a computer at the Federal Chancellery. A Head of Unit of the European policy department have taken a document on a USB stick with private home, told the Bild newspaper without giving details of sources. There she continued to work on her personal laptop to the document and brought back the memory device to the Chancellery. When the woman put this in their service laptop, hit the virus scanner for Regin alarm.

Regin since November 2014 known


The existence of Regin was late November through IT -Sicherheitsfirmen made public. The software is particularly difficult to detect. Media reports they brought to the US monitoring service NSA and its British partner GCHQ in combination. The software spreads from infected computers in several steps and is trimmed out long to remain undetected. The hidden acting Trojan program can make according to security researchers, among other recordings from the screen, steal passwords, monitor traffic and recover deleted files for the attacker. ( Using material from dpa )

LikeTweet

Merkel’s confidant drags a virus: Chancellery intercepts spy software – n-tv.de NEWS

policy
 


 Monday, December 29, 2014

 
 
 


 
 The Federal Chancellery of the virus scanner sounds an alarm: On the server computer a Head of Unit dangerous spyware is detected. The Trojan “Regin” should obviously read sensitive data. He came with a USB stick.

 


 

The Federal Chancellery is apparently a victim of espionage attack. Was on the computer a few weeks ago, the Head of Unit spyware “Regin” was discovered, reports “image”, citing safety circuits. Accordingly, the Trojans came via a USB memory stick by the private laptop the Head of Unit of the Department of European policy on their service computer, where he was noticed by a virus scanner.

According to the report which had close associate of Chancellor Angela Merkel worked on a speech manuscript, which she took home after work and further processed there on their own laptop. Then they have the document again stored on your private USB stick and thus returned back to their service laptop. When the virus scanner sounded the alarm, it was found that the USB stick was contaminated, as it was said. A review of all high-security laptops at the chancellery but disclosed no other viruses.

More about
 
 
 

The IT security firm Symantec had the end of November first reported on the highly complex Trojan “Regin”. Thus, they may rely on infected Convert screenshots to control the mouse pointer, steal passwords, monitor traffic and restore deleted files. According to the US news website “The Intercept” is “Regin” used since 2008 in order to steal information from gover nments, companies and research institutes. The development of the malware British intelligence agency GCHQ and the US NSA had been involved.

  Source: n-tv.de
 


 
 

LikeTweet

Discovered NSA spy software “Regin” – T-Online: Spähangriff on the Chancellor’s Office

The spy software “Regin” has been discovered, according to a media report on a computer in the Chancellery. A Head of Unit of the European policy department have taken a document on a USB stick with private home, reported the “image”.

Our main themes

There she continued to work on her personal laptop to the document and brought back the memory device to the Chancellery. When the woman put this in their service laptop, hit the virus scanner, therefore, because of “Regin” alarm.



It’s hard to see

The existence of “Regin” was the end of November by I T security companies have been made public. The software is particularly difficult to detect. Media reports had been associated with the US monitoring service NSA and its British partner GCHQ.



What “Regin” anything can

The software spreads from infected computers in several stages and it is trimmed, long to remain undetected. The hidden acting Trojan program can make according to security researchers, among other recordings from the screen, steal passwords, monitor traffic and recover deleted files for the attackers

‘). IM.GlobalAdTag.register (‘cbr100_pos2′, ‘imToCbr100Pos2′, ‘synchronJs’, ‘onRegister’); / *]] & Gt; * /

LikeTweet

Sunday, December 28, 2014

Renewable Energy in Germany software for a stable power grid – taz.de



Renewable Energy in Germany

We do not need huge energy storage, but smart. We need to respond accurately and stably on a fluctuating network utilization.

FREIBURG Taz | The energy revolution has many myths. A myth revolves around the need for electricity storage: Most the impression of lacking of huge capacity to buffer the stream from the summer sun and winter storms for week long lulls.

Much more important, however small, intelligent storage. Not to save the network with no wind all night, because that can make for years to also flexible gas power plants. It is crucial that they can provide the system services that previously were incumbent fossil large power plants.

These include frequency regulation, voltage stability and the so-called black start capability, which is the chance after a power failure the start pulse to provide for the entire system – what wind power and photovoltaics can not.

All this must warn you, if you want to describe the profession of the Berlin Younicos AG. The fact recently commissioned in Schwerin a plant in operation, which they referred to as “Europe’s first commercial battery power plant”.



batteries as electric cars

The memory is almost ridiculously small when you think in the usual dimensions of the current economy. It has a capacity of 5 megawatts, which corresponds exactly to a single offshore wind turbine. In fact, it used to be only 2.5 megawatt hours, or 2,500 kilowatt hours, be – just the annual consumption of a single economical budget.

What to use such a mini storage? Since knowledge comes from above their own: The project, which operates the Schwerin catering Wemag AG should primarily serve to stabilize the grid frequency. The system therefore sold their ability to flexibly accommodate and feed stream. And there on the market right money.

25600 lithium manganese oxide cells installed in a shed next to the substation Schwerin Lankow Younicos. The cells were supplied by Samsung, typical batteries, such as those used in electric cars. Younicos itself is primarily a software company: Of the 120 employees – 90 in Germany, 30 in the US – is every other programmers.

Your task is to find the batteries to control so that they respond accurately and quickly to varying network conditions – and the system stability as well in view how the optimal marketing of the services concerned. Up to six different operating modes are possible, can know the company, and they are all based on the fact that the battery with the power “speaks” and responds in milliseconds to his needs.



Not for the stock market

Only the traditional revenue model, in which one always thinks of first when saving eligible for the batteries for the time being in question: from low power times buy on the spot market the stock market to more expensive times to sell this again. “Not worth it yet,” says Gunnar Wrede, Head of Energy Management and Policy. For the price differences were much too low. That way, also feel the controversial pumped storage plants that can barely profitable now.

The battery storage in Schwerin, however, will pay for itself in the market, including the Wemag is convinced. However, it is fair to mention that the project has received initial funding of 20 percent from the innovation program of the Federal Ministry for the Environment, the 1.3 million euros.

But because the battery prices have continued to fall ever since, would have been future memory can be operated profitably without subsidies, it says in Younicos. The market grant any remuneration for their enormous flexibility – in the future, perhaps even more than today

Our products enjoyed it.? You can pay for it!

email

password

LikeTweet

Saturday, December 27, 2014

“Precobs” to teach thieves in the Rhineland in 2015 fearing – RP ONLINE

Oberhausen. The computer-based prediction model “Precobs” will be tried in Bavaria. In Switzerland, the hit rate of the predictions was 80 percent. The number of burglaries decreased by 30 percent. 2015 are also tested in NRW. By Jörg Isringhaus

It’s a scenario that burglars probably can doubt their career choice: you’re planning a theft, but proceed to design and run there the police in his arms. And not by chance, but because of a computer system has calculated the probable crime scene. So repeatedly happened in Munich, Basel and Zurich, wherever the software “Precobs” is used. “Precobs” is an abbreviation for “Pre-Crime-surveillance system” and roughly translated means the prognosis of crime, especially burglaries. What sounds like something from a science fiction film is already being tested in everyday life. “The high success rate shows that our system works,” says Michael Schweer, associate of the Institute for pattern-based prediction methods (IfmPt) in Oberhausen, the “Precobs” has developed.

In fact, the numbers hear sound promising. In the cities previously used is the hit rate of the predictions of “Precobs” according Schweer at 80 percent, the number of offenses has decreased in Basel and Zurich by one-third, the arrest rate has doubled. “The preventive policing due to the forecasts have criminal priority areas resolved,” says Schweer. In the two Swiss cities, the police decided to permanently install the “Precobs” system. The authorities in NRW want to test the computer-based predictions. From October 2015 to September 2016, the project is terminated. Will be tested the system in Duisburg and Cologne.

The police union (GdP) had “Precobs” considered rather suspiciously few months ago, but now welcomes the project. “At that time we had assumed that the software on a variety of critical data accesses,” said GdP state chairman Arnold Plickert. “But this has put into perspective.” To take into account “Precobs” no personal data, but uses only data time of the crime, the crime scene, and a prey to approach the burglars. “If you want to put it dramatically perpetrators and victims do not care,” said Schweer

The objective is to Pattern Recognition

It comes from. records that go back up to ten years to generate patterns. Burglars like to return back to the place where they were successful, and where, for example, the detection risk is low. “In this repeat offenders, mostly professionals and traveling bands, we aim,” says Schweer. “Rather, born out of the situation-related crime can, in contrast, does not predict serious.” The patterns make it possible to identify priorities and there to increase the police presence not only, but also specifically for the “Precobs” respect -Vorgaben about foreign flag. For example, a car could be stopped in Munich, in the trunk, the officers found burglary tools.

The German software thus differs fundamentally from similar prediction systems in the United States. “There flowing far more personal data from the crime statistics unfiltered, correspondingly low predictive accuracy,” says Schweer. The strength of “Precobs” lies precisely in the targeted acquisition. Nothing could be automated, trained operators also analyze forecasts and decide on police action. This efficient use of personnel is an important argument for the forecasting software for the GdP state chairman Plickert. “In our human resources we rely on technical support,” says Plickert. Currently, the police were only able to ad hoc measures. This was reflected by some in the detection rate of burglaries – which currently lies at around 15 percent

It is still unclear whether the Oberhausen software or a competitor’s product in NRW is in the testing phase.. Schweer currently do not even know if he wants to participate in the tender. For in NRW and weather data or the use of foreign credit cards will be incorporated with. “But that moves data protection law in a border area and contradicts our fast, targeted forecast,” says Schweer. Before he put the reputation of its software on the line, he renounce NRW. For now subject also several international requests for “Precobs” before – including from Italy, Turkey and Japan

Source:. RP

LikeTweet

My software Highlight 2014: What they said PCGH editors – PC Games Hardware

My Software highlight 2014

My software Highlight 2014

The editors of PC Games Hardware comment on current events or developments from the world of PC hardware, IT industry, games, art or entertainment. Read the personal opinions of the PCGH editors, today’s “My Software highlight of 2014″

The format “Editors private” gives you an insight into the editorial away a webcam or a staple column. Each PCGH editor here his personal comment on a current topic from. We treat not only the world of PC hardware, but also games including current console games, movies, and more generally the technology – which in manifold ways affects our daily lives. Editorial Intern always appears weekly: Every Saturday at 11:45 clock

Today’s topic “My Software highlight 2014″

And what was your software Highlight 2014? Use the comment form! You are welcome to submit us suggestions for topics for “Editors private”

Background Software 2014.
Unlike hardware software 2014 was most likely still occupied with games. Since a is of course a particular autumn offensive in the form of Advanced Warfare Call of Duty Far Cry 4, Assassin’s Creed Unity and The Crew. Prior to the hacker Adventure watchdog was (like Ubisoft written as Watch_Dogs) of course a big issue. On the software side, of course, the idea of ​​Windows 10 Technical Preview to be named in the Macianern the current OS X version Yosemite. But also in mobile devices, there have been some innovations: IOS and Android 8 5 mach (ed) to the smartphones and tablets in the world wide. An additional software my GeDoSa tool falls as a graphics specialist a course, permitting that downsampling on almost all graphics card – Nvidia went with “DSR” (Dynamic Super Resolution) in September after, AMD in December with VSR (Viritual Super Resolution) on the Catalyst Omega after. It was a pity the develop ment setting of Truecrypt – conspiracy theorists give intelligence agencies still blame

.

Return

LikeTweet

Friday, December 26, 2014

Antivirus Software for Windows 8.1 – Computer Week

At regular intervals, the Magdeburg AV-Test Institute conducts certification tests for antivirus programs for Windows. The software maker can apply for a certificate and decide themselves which versions of the program to be tested. The actual test took place 8.1 (64-bit) on Windows, Windows was last 7 (32 bit) in the series.

is tested in three categories: action , system load and usability . The protective effect is about the detection current pests. When the system load is checked how much slows an antivirus program various file operations such as copy and other operations such as program start, web page views and downloads. For the category usability false alarms are counted in a system scan, while visiting harmless Web pages as well when installing and using legitimate programs. In each category, six points are reached. Programs that make a point and in total at least ten points at least in each category will receive a certificate.

As a lower reference point in the Windows 8.1 standard included Windows Defender is running out of competition with. Its small protective effect, however, would not be enough anyway for a certificate – possibly for the title of “better than no protection.” Unlike previous Windows version from Windows 8 Windows Defender corresponds to the free protection program Microsoft Security Essentials. Even worse than Windows Defender cuts in this test from only ThreatTrack Vipre. Although Vipre offers a slightly better protection from malware, but reached a total of 8.5 points not meet the minimum requirements for a certificate.

The tip of the test field form in this test, the protection programs Avira Antivirus Pro and Kaspersky Internet Security, the full 18 points have achieved. Closely followed by Bitdefender that some false alarms has done, as well as Norton Internet Security, it is a little more brakes than the best programs. Several manufacturers, including Trend Micro, Panda Security, Intel / McAfee and G Data, which indeed achieve full six points in the protective effect, afford but slight to moderate weakness in the other two categories.

The best free protection program comes once more from China: Qihoo 360 achieved in all categories depending 5.5 points. Panda Free Antivirus offers a bit more protection from malware (six points), but slows down the system and proposes more frequent false alarms. The popular free programs Avast and AVG end up in the bottom third of the table. This is also where the Norman Security Suite, the new program version 11.0, however, significantly better results in the pest detection supplies than the previous version.

The result table is sorted by the last column. Therein the test results of the three categories are weighted differently than AV test. While the Magdeburg (as in the image above) treat all categories equally, we evaluate the protective effect of 60 percent.



“3” “3” “3” > “3” > “3” “3” > “3” “3” > “3” > “3” “3” > “3” > “3” > “3” readability = “3”

points

Total with Gewichtung

Hersteller/Produkt

Schutz

Belastung

Benutzung

1:1:1

60:20:20

Avira Antivirus Pro 2015

6,0

6,0

6,0

18,0

18,0

Kaspersky Internet Security 2015

6,0

6,0

6,0

18,0

18,0

Bitdefender Internet Security 2015

6,0

6,0

5,5

17,5

17,7

“5”

Symantec Norton Internet Security 2014 & amp; amp; 2015

6,0

5,5

6,0

17,5

17,7

Trend Micro Internet Security 2015

6,0

5,5

5,5

17,0

17,4

Comodo Internet Security Premium 7.0

6,0

5,0

5,0

16,0

16,8

G Data Internet Security 2015

6,0

4,5

5,5

16,0

16,8

BullGuard Internet Security 14.1

5,5

5,5

5,5

16,5

16,5

Intel Internet Security 2015 (McAfee)

5,5

5,0

6,0

16,5

16,5

Qihoo 360 Internet Security 5.0

5,5

5,5

5,5

16,5

16,5

F-Secure Internet Security 2015

6,0

5,0

4,5

15,5

16,5

Panda Free Antivirus 15.0

6,0

4,5

5,0

15,5

16,5

Kingsoft Antivirus 2013

5,0

6,0

6,0

17,0

16,2

AhnLab V3 Internet Security 9.0

6,0

3,5

5,0

14,5

15,9

“5”

ESET Smart Security 7.0 & amp; amp; 8.0

5,5

3,5

5,5

14,5

15,3

MicroWorld eScan Internet Security Suite 14.0

5,5

3,0

5,5

14,0

15,0

Check Point ZoneAlarm Extreme Security 13.3

5,5

2,5

6,0

14,0

15,0

“5”

Avast Free Antivirus 2014 & amp; amp; 2015

5,0

4,0

5,5

14,5

14,7

Tencent PC Manager 8.10

5,0

2,5

6,0

13,5

14,1

Norman Security Suite Pro 11.0

5,0

3,0

5,0

13,0

13,8

AVG Anti-Virus Free Edition 2014 & amp; amp; 2015

3,5

3,5

5,5

12,5

11,7

AVG Internet Security 2014 & amp; amp; 2015

3,5

3,5

5,5

12,5

11,7

“5”

ThreatTrack Vipre Internet Security 2014 & amp; amp; 2015

2,0

2,0

4,5

8,5

7,5

Microsoft Windows Defender 4.4

0,0

4,5

6,0

10,5

6,3

This article is based on a contribution from the PC world. (Mhr)

Newsletter ‘CP Business Tips’ now

LikeTweet

Thursday, December 25, 2014

Base Software: The most important downloads for the new Windows … – Giga.de

If the Christmas party, a new Windows PC has arrived in the household, it is advisable that, on the hardware configuration and operating system installation and the same with the main programs, which are needed for the various applications of the computer to equip.

Meanwhile, since for all kinds of applications of a high-quality PC freeware so free software that exists, it makes sense to stock up simultaneously with the corresponding programs via download. For this reason we have for you a Starter Pack Windows Software compiled covering the best programs of the main applications of a modern Windows PC:

Google Chrome web browser par excellence

A Windows PC without internet is actually unthinkable today. Even more important to have a powerful Internet access program on the computer. With Google Chrome you get a highly modern browser to yet extremely easy to use

Adobe Flash Player. Videos on the net play

Who surfing the Internet, will also look at one or the other video with certainty. As most videos on the network based on Flash, you need the Adobe Flash Player in order to play these can.



Avast! Free Antivirus: protection against PC pests

The dark side of the infinite possibilities of the Internet: There is also every amount of computer pests that want to infect your beautiful new Windows PC. With the free antivirus solution, avast! Free Antivirus are you against these safe

VLC Media Player. The multimedia all-rounder

The VLC media player plays videos and music in all possible formats from, whether from CD, DVD, Blu-ray or on the hard drive stored files. A message “Media file can not be played” or something similar just does not exist in this media player.

If you want to have a separate program prefer to play music, picks best on the classic Winamp back.



Picasa: Image and photo management with editing functions

Google’s Picasa is the perfect program for users on their photos Computer want to store and organize. Foolproof considered and managed her your example with the digital camera captured images and can share them via the Web Album function with your friends on the Internet. Although

Picasa includes basic video and photo editing features, who wants more here, however, interfering better alternatives with greater tools such as Paint.NET back

OpenOffice. The open source office suite

OpenOffice is free alternative to Microsoft Office. Word processing, spreadsheets, presentations and databases: All of this does the freeware as good as the expensive MS program package

Foxit Reader. The better PDF viewer

PDF documents run a daily basis across the screen. In order to open this and read, you will need a PDF reader. Foxit Reader fulfilled this task brilliantly and has over the standard program Adobe Reader to offer several advantages

CDBurnerXP. Free round-burning program

 CDBurnerXP logo

If you want to store data on optical media, a burning program must be found: the freeware CDBurnerXP burning CDs, DVDs, HD DVDs and Blu-ray discs, still you can create and burn ISO files with this tool .

Mozilla Thunderbird: The open source e-mail client

Like surfing the Internet including sending and receiving e-mails to the standard in the computer everyday. Mozilla Thunderbird is a rock-solid solution for this purpose

Skype. The most common Messenger

not

Who Skype;” “pagespeed_url_hash =” 1939622118 “src =”http://www.giga.de/pagespeed_static/1.JiBnMqyl6S.gif”onload =” pagespeed.lazyLoadImages.loadIfVisibleAndMaybeBeacon (this) uses, you hardly been out of this world, at least in terms of communication over the Internet. This messenger program you can with chat with other Skype users, call via voice-over-IP and operate even video calling

PC maintenance. CCleaner

This does not suffocate your new Windows PC in the same garbage, you should definitely also specify the CCleaner. This freeware makes sure that unwanted files that slow down the computer in the long run, be cleaned from the hard drive.

With the above listed programs you have ever had a solid basic set of high-quality software, the covers most important areas of a modern PC. Of course there is much more interesting, useful and above all free programs, of which ranked her a great selection by category applies to GIGA software.

LikeTweet

Manuals and instructions on Apple hardware and software – ifun.de> Apple News since 2001 (blog)

<- uniformly from here ->

3 comments


  • On Google+ Share
  • By email

Whether you’ve got a new iOS device or new accessories or the quiet days and just want to use more indepth knowledge you with the possibilities of the iPhone, iPad or iPod and related software: The following tips will help you write about to get the most from your devices.

Apple original manuals

Objectively, comprehensive and free, therefore called in the first place are the free Apple Manuals for download. All currently available PDF versions are listed here at Apple support who prefer to read an e-book, here in the iBookstore all currently available Apple releases.

Reduced E-Books to iOS and Mac themes

The AMAC-Verlag has lowered the e-book versions of various manuals for hardware and software from Apple on both 99 cents in a Christmas promotion. The of many years in the Mac scene active authors wrote titles offer in addition to pure functional description also many helpful tips and tricks when dealing with the products:

  • OS X Yosemite (iBookstore | Kindle)
  • My iPhone – For iPhone 6 and 6 Plus (iBookstore | Kindle)
  • My iPad – iPad 2 and iPad mini 3 Air (iBookstore)
  • Apple ID & amp; iCloud (iBookstore | Kindle)
  • My 300 best iPad Tips (iBookstore)
  • My 350 best iPhone Tips (iBookstore)
  • Microsoft Office for iPad (iBookstore | Kindle)
  • Keynote for Mac, iPad and iPhone (iBookstore | Kindle)
  • iMovie for Mac, iPad and iPhone (iBookstore)
  • The Mac for input and transfer passengers (iBookstore)

700

Print to iPhone with iOS 8

But even books in the classical Paper output are far from extinct. Husum Publisher Mandl & amp; Black is very fresh with his practice book for iPhone with iOS 8 at the start. The 512-page tome can be ordered directly from the publisher at a price of 28 euros, a reading sample, and the entire contents are available on the website for the book for free. Author Daniel Mandl describes the book as “” important, “but above all an easy-to-understand instructions for iPhone iOS 8.1.”

 book

Author Chris

Tags: Apple Manuals
  • Share on Facebook
  • Twitter
  • Share on Google+
  • By email

Talk 3 comments
. . This conversation is missing your voice



ifun.de is the oldest European online portal all about Apple’s lifestyle products
We inform daily for latest news and information from the world around iPad, iPod, Mac and other things that make us. .
like total we have 14855 published articles in the last 4811 days and it is growing every day

ifun -.. Love it or leave it · Copyright © 2014 Aketo GmbH – All rights reserved · About · Advertise · RSS On this page

LikeTweet

Malware – New blackmailer software VirLock demanded ransom and propagates – inside-handy.de

Eset

Source : Eset

A new family of malware has just been discovered. As the security company ESET announces that new malicious software has been so non-appeared combination of actions performed and a variability in the distribution. Gefärdet are mainly Android devices without virus protection.


 

The malware is thus a new form de malicious software that has not yet appeared in this form. The problem with VirLock, so ESET is not the action taken, on a compromised smartphone operates the software: It locks files and demands a ransom to release to switch back. Endangered files can be, among other documents, images or videos.

The problem is the variability of the virus. This is a polymorphic parasitic virus. It changes with each infected file, or with each action and its shape is to make it difficult to locate

The malware comes in three variants:. VirLock, Virlock.A and VirLock.B. Similar to the Simplocker, which was discovered in the summer, a virus scanner or software Eset to the pest helps VirLock again to get from your smartphone.

Simplocker was discovered in the summer and locked SD card from infected smartphones , He demanded ransom and could also be removed with virus protection software.

reason to panic there has been terrible. The virus has not been propagated according to statistics from ESET and has its triumphant if there will be this, not yet started

Source:. ESET

Flattr this
 

LikeTweet

Wednesday, December 24, 2014

Disaster Report: Gran cell acquires the trademark rights of Irem Software – play3.de

One or the other of you remembers certainly at “SOS Final Escape 4: Summer Memories “, which a few years ago at the” R-Type “. -Make Was Irem Software in Development

Originally,” SOS Final Escape 4: Summer Memories “will be published in March 2011 in Japan and coming exclusively to the PlayStation 3. After the devastating Tohoku earthquake and resulting tsunami, Irem Software decided out of respect for the victims of the natural disaster to the release of “SOS Final Escape 4: Summer Memories is marketed Disaster Report Zettai Zetsumei Toshi “or” “.” Full tilt

As has now announced the series in Japan under the name could be “, but in short or long making a comeback. So bought the studio Gran cell, which employs many former developer of Irem Software, the rights to the “Disaster Report” brand and want to take care of their future.

A tangible Neuankündigung is still out.

LikeTweet