• Windows 8.1 will be at your Hands soon

  • Samsung Galaxy S4 will Now makes the History

  • Google Glass, Future Class

Thursday 19 December 2013

Hey Guys,
Tech Times is an Non - Profit Organisation and we are now facing a problem of Not Have Managers to manage Web page.
If you are Interested to Become one of the Managers please Contact in the following email address

educatechikuttan[at]gmail[dot]com

Minimum requirements are:
  • Basic Typing Skills
  • Skill to review and Post Tech News
  • Basic Designing Skill
  • Basic Data Management Skills
(Note: As it is an Non Profitable Organisation, people who are ready to help cannot be Payed)

We Would Sincerely appreciate your Help

Sincerely

Manager
Malayil Vivekanandan

Saturday 5 October 2013







Adobe has revealed today that they've been hit with a cyber attack, with intruders stealing a range of information from 2.9 million Adobe customers. Adobe IDs and encrypted passwords were accessed, but far more worrying is the news that customer names, encrypted debit and credit card numbers, expiration dates, and order information relating to product orders was stolen.
While this information was taken, Adobe doesn't believe that the intruders accessed any decrypted information, meaning your credit card information should be safe. Any customers that have been affected by the cyber attack will have their account passwords reset, and Adobe will also offer one year of free credit card monitoring to ensure malicious purchases aren't made.
Adobe also reported that source code to a number of products, including Acrobat and ColdFusion, was stolen in a separate, but potentially related attack. The company claims there is no "specific increased risk to customers" due to the source code theft.
The theft of Adobe customer data comes at a bad time, with the company trying to shift customers to subscription services such as Creative Cloud. The entire Creative Suite moved to the Creative Cloud subscription model earlier this year with mixed feedback, and revelations of cyber attacks on the service will instill no confidence in future buyers.

Content Copied from Tech Spot 
 
Despite how much people claim to like change, at the core we are creatures of habit. Just as we saw when Facebook introduced Timeline and as we will see when Twitter makes its next significant change, people are going to get up in arms about it. Apple’s iOS 7 was no different.
Described as the biggest change to iOS since the introduction of the iPhone, iOS 7 has been available to the general public for roughly two weeks at this point. That’s given everyone plenty of time to get accustomed to all of the changes and vent about them, but for us, it’s served as an evaluation period.
Looking beyond the flat UI and the animated background, has that much really changed in Apple’s mobile OS? What did Cupertino get right with the update and what areas or features are still missing? To help answer these questions, I’ve put together a list of the top six things that are still missing in iOS 7 as well as the six things that Apple nailed with the update.

Read More...
 

Saturday 3 August 2013


The Feds are taking advantage of techniques more typically associated with malicious hackers to collect information on suspects, leveraging tools that can bring the traditional wiretap up to speed with the always-connected digital age.
Federal agencies usually do not disclose information about these capabilities, but recent court documents and interviews with program insiders reveal new details about hacking tools commonly used by the Federal Bureau of Investigation to deliver spyware to phones and computers, reports the Wall Street Journal.
When a ‘simple’ wiretap isn’t enough, the FBI will use spyware under court orders to combat individuals who ‘go dark’ through the use of new technology and online chat programs that implement encryption to obfuscate communications, according to people familiar with the FBI programs.
Some of the tools are developed internally at the FBI, while others are contracted and purchased from the private sector. The software allows the Bureau to remotely activate microphones on Android smartphones and laptops, according to one former U.S. official. Both the FBI and Google declined to comment to the WSJ.
The report states that the FBI has been developing hacking tools for more than ten years, and typically uses them in cases involving organized crime, child pornography, and counterterrorism. According to a U.S. official, they are not used when investigating hacking cases for fear of discovery and public disclosure by the hacker.
Amid rampant allegations of government overreach through digital surveillance programs, news of the FBI using such tools is no surprise, but could be considered in a different league of snooping. Mark Eckenwiler, the Justice Department’s former primary authority on federal criminal surveillance law, says that a search warrant is required for every use of these tools, as well as to collect any data from a suspect’s computer or device.
Blackberry has begun rolling out private beta versions of its soon-to-be cross platform BBM app. According to various reports, select users have begun receiving invites to test out the messaging application on iOS and Android. It appears only Beta Zone members and friends and family of employees have been invited at this point. Those who fall into these groups will find the app under Eligible Programs within Blackberry's BetaZone.
“BlackBerry has begun internal testing of BBM on Android and iOS devices. We invited our employees to nominate friends and family to participate in a limited Android beta. Those slots are now full," a Blackberry spokesman told TNW. Screeshots of BBM running on Android didn't take long to surface, as shown below.
The BBM app requires v4.0 Ice Cream Sandwich on Android and iOS 6 or higher on iPhone. Blackberry has previously stated that it would be releasing the cross platform BBM app before the end of the summer, and judging by the the message in the beta invites, the company will indeed be doing so. In a press release, Blackberry did note that there is still an approval process pending from Apple and Google before the final launch.
Although the move will certainly bring Blackberry technology to more devices, it does put what might be the company's best exclusive app out into the wild, which is something that may not bode well for Blackberry 10 hardware sales. It remains to be seen whether this is the right strategy for the troubled company.


Bradley Manning and Edward Snowden are infamous in some circles, famous in others. These two men put much more than their reputations on the line to disclose classified documents to the world, they knowingly imperiled their freedom and their lives.
There is an undefined balance to be struck between transparency versus surveillance and privacy versus security that the United States and the international community are being forced to examine.
We've listened to the conversations cropping up all around us, and particularly here in the related articles' comments; some say these men are guilty of treason, others hail them as heroes.
What say you, readers? Are they traitors, criminals, whistleblowers, or heroes?
Gigabyte Brix Mini PC Review

Taking advantage of Ivy Bridge's efficient operation, Intel accompanied its third-generation Core processors with a new small form factor platform dubbed Next Unit of Computing (NUC), the initial wave of which were powered by Core i3 and i5 Ivy Bridge parts mounted to an ultra-compact 4x4" motherboard -- considerably smaller than even the Mini ITX standard.
Although we welcome SFF machines from industry heavyweights like Intel, the company's NUC products have been grossly overpriced, initially starting around $400 for a complete build based on the Core i3. Even today, a barebones version of the i3 NUC system still costs almost $300, and that's without memory, storage, Wi-Fi and an operating system, which could easily add a couple hundred bucks.
Recognizing this issue, Intel introduced an option based on the 1.1GHz Celeron 847, but that chip is awfully slow and at $180, the barebones box it comes inside still isn't a particularly good value. To date, we think it's safe to say that NUC is a cool idea that has been hamstrung by poor hardware choices and unattractive prices -- a trend that Gigabyte hopes to buck with its new NUC offerings.
Gigabyte's pint-sized "Brix" systems come in four different processor configurations, including the 1.8GHz Celeron 1037U, 1.9GHz Core i3-3227U, 1.8-2.7GHz Core i5-3337U and 2-3.1GHz Core i7-3537U. Those seem much more powerful than Intel's lineup and that's certainly enough to warrant our attention, but it's worth noting that Brix also offers more USB 3.0 ports and Wi-Fi out of the box.
Granted, while the Core i5-3337U-powered Brix system is faster than any of Intel's NUC options, it's also more expensive at $420 -- a sum that will increase well beyond $500 after you purchase memory, storage and an operating system. We're thinking 8GB of 1600MHz SO-DIMM RAM, a 128GB mSATA SSD and a copy of Windows 8 Professional seem like a proper fit, and they add another $330.
With a total build cost in the realm of $750, it's easy to question the value of Gigabyte's new offering. Keep in mind, you could purchase a Core i5-3337U-based laptop from Dell or Asus for under $600, which would provide a similar feature set, just in a mobile package instead of a tiny box. For additional perspective, the core parts of our entry-level gaming desktop cost about $600.
Gigabyte BRIX in Detail
As mentioned, Brix systems come with four different processor options: a Celeron, Core i3, Core i5 and Core i7. We have tested the $420 Core i5 version (XM11-3337), which is $100 less than the i7 model and $100 more than the i3. Externally, there isn't much to talk about, primarily because this computer measures just 4.5 x 4.24 x 1.18" (114.4 x 107.6 x 29.9mm).
There is a USB 3.0 port in the bottom left corner that comprises the front panel connectivity, which is built into an aluminum shell that wraps around both sides and the rear.
The glossy black top cover features Gigabyte's name in the top left corner and in the opposite position, a chrome power button that glows blue when the system is active.
Most of the action is around back, including an HDMI output, Thunderbolt (DisplayPort), USB 3.0, Gigabit Ethernet and a power jack. There is also a Kensington lock slot to secure the system if, for instance, you're in an open office environment.
With support for HDMI and DisplayPort, the Brix can power two displays simultaneously, increasing its viability for productivity purposes. The HDMI port only supports a maximum resolution of 1920x1200 on our Dell 30" display, while DisplayPort runs at the native 2560x1600 resolution.
You'll find small air vents along the back and sides of the case, while four small rubber feet are screwed to the bottom panel, which can be removed to access the storage and memory areas.
Once inside, you'll spot an 802.11n Wi-Fi Mini PCIe module preinstalled. Above that is the mSATA slot and there are also two SO-DIMM DDR3 slots.
The other side of the PCB includes the CPU, chipset (Intel HM77) and battery, though you never need to see this side of the board. With the SSD and RAM in place, we reinstalled the baseplate and begun installing Windows, which requires an external USB optical drive along with a bootable OS disc or (preferably) a bootable USB thumb drive with a copy of Windows on it.

    Blogger news

    This blog was recently the another version Tech Times. This is its new Blog and it Still continues as the Old one. Each Blog has Same Post.

    About

    This Blog is an Idea of Malayil Vivekanandan. He thought about serving People with latest Technology News and Upadtes, so that people will be more updated with their Tech Knowledge.
-