Friday, January 29, 2010

non-apple die hard fans listed 8 suck things about iPad


Photo Taken From Gizmodo

Published from gizmodo blog, probably influenced by Microsoft fans, they've listed 8 suck things about apple iPad. They knew that, iPad will known as Mac Netbook and probably can win in the netbook battle.
Big, Ugly Bezel
Have you seen the bezel on this thing?! It's huge! I know you don't want to accidentally input a command when your thumb is holding it, but come on.

No Multitasking
This is a backbreaker. If this is supposed to be a replacement for netbooks, how can it possibly not have multitasking? Are you saying I can't listen to Pandora while writing a document? I can't have my Twitter app open at the same time as my browser? I can't have AIM open at the same time as my email? Are you kidding me? This alone guarantees that I will not buy this product.

No Cameras
No front facing camera is one thing. But no back facing camera either? Why the hell not? I can't imagine what the downside was for including at least one camera. Could this thing not handle video iChat?

Touch Keyboard
So much for Apple revolutionizing tablet inputs; this is the same big, ugly touchscreen keyboard we've seen on other tablets, and unless you're lying on the couch with your knees propping it up, it'll be awkward to use.

No HDMI Out
Want to watch those nice HD videos you downloaded from iTunes on your TV? Too damned bad! If you were truly loyal, you'd just buy an AppleTV already.

The Name iPad
Get ready for Maxi pad jokes, and lots of 'em!.... pad normally know for women pad.

No Flash
No Flash is annoying but not a dealbreaker on the iPhone and iPod Touch. On something that's supposed to be closer to a netbook or laptop? It will leave huge, gaping holes in websites. I hope you don't care about streaming video! God knows not many casual internet users do. Oh wait, nevermind, they all do.

Adapters, Adapters, Adapters
So much for those smooth lines. If you want to plug anything into this, such as a digital camera, you need all sorts of ugly adapters. You need an adapter for USB for god's sake.

It's Not Widescreen
Widescreen movies look lousy on this thing thanks to its 4:3 screen, according to Blam, who checked out some of Star Trek on one. It's like owning a 4:3 TV all over again!

Doesn't Support T-Mobile 3G
Sure, it's "unlocked." But it won't work on T-Mobile, and it uses microSIMs that literally no one else uses.

A Closed App Ecosystem
The iPad only runs apps from the App Store. The same App Store that is notorious for banning apps for no real reason, such as Google Voice. Sure, netbooks might not have touchscreens, but you can install whatever software you'd like on them. Want to run a different browser on your iPad? Too bad!

Apple iPad Review


Apple - iPad - The best way to experience the web, email, & photos
All of the built-in apps on iPad were designed from the ground up to take advantage of the large Multi-Touch screen. And they work in any orientation. So you can do things with these that apps you can’t do on any other device.
Price ? currently they set USD 499. I don’t know how much it will cost in RM. No price release yet by Low Yatt trader.
Double thumbs up ! i give to this gadget. Now… you can just ignore other brand from Samsung, HTC, LG, Blackberry… all windows mobile based gadget are rubish… symbian based too. Mac OS known as the mother of operating system. The most stable and the most powerful.
What I can conclude.. iPad is something like.. netbook in the pocket. Not a normal netbook… but a Mac Netbook in your pocket.
More info: apple.com

Monday, January 25, 2010

Stop Using Internet Explorer


In a statement issued last 4 days (January 16, 2010), the German Federal Office for Security in Information Technology (known as BSI) recommends that all Internet Explorer users switch to an alternative browser. They may resume using Explorer after a fix is issued by Microsoft for a critical vulnerability that has been implicated in the Chinese cyberattack against Google.
If you missed it, McAffee released on January 15, 2010: a report outlining details of the cyber assault on Google and around 20 other major technology companies. It specifically implicates a critical flaw in all versions of IE that allows hackers to “perform reconnaissance and gain complete control over the compromised system.” Microsoft has responded that it is developing an update to the vulnerability.
According to the statement from BSI, even running Internet Explorer in “protected” mode is not enough to prevent a hacker from exploiting this security flaw.
IE, while the world’s most popular browser, has been steadily losing marketshare over perceptions that it is slower and less secure than rival browsers, especially Firefox. This incident won’t help.
The full statement, translated via Google, is below:

Translated Statement from Germany


“In Internet Explorer, there is a critical yet unknown vulnerability. The vulnerability allows attackers to inject malicious code via a specially crafted Web page into a Windows computer to infiltrate and set up. The last week became known hacker attack on Google and other U.S. companies has probably exploited the vulnerability.Affected are the versions 6, 7 to 8 Internet Explorer on Windows systems XP, Vista and Windows 7 Microsoft has released a security advisory in which it discusses ways of minimizing risk and is already working on a patch to close the security gap. The BSI expects that this vulnerability will be used in a short time for attacks on the Internet.

Running the Internet Explorer in ‘protected mode’ as well as disabling scripting Acitve Although more difficult to attack, but it can not completely prevented. Therefore, the BSI recommends to switch to the existence of a patch from Microsoft to an alternative browser.
Once the vulnerability has been closed, the BSI will provide information on its warning and information about public-CERT. Keep informed about the civic-CERT and the BSI warns citizens and small and medium enterprises from viruses, worms and vulnerabilities in computer applications. The expert analysis of the BSI around the clock, the security situation in the Internet and send alerts when action is needed and safety information via e-mail.”

Source : ERM Blog

Friday, January 15, 2010

The most admired CPU chassis


Its seems like pentagon is trying to sell their product (not enough money to built Noah`s ship fro 2012, I guest). But, it is just an extraordinary CPU chassis with extraordinary attraction for it. Thermaltake wowed us all with theannouncement of the Level 10, a concept case designed in conjunction with BMW DesignWorks. Rather than a standard aluminum box, the Thermaltake Level 10 would incorporate a central pillar, with individual compartments hanging from it for the motherboard, PSU, optical drives, and hard drives.

As you can see, the production Level 10 is nearly identical to the concept shots we’ve seen earlier. Each compartment on the Level 10 has its own ventilation. The large panels on the lower left cover the motherboard mount, PCI-E cards, GPUs, and so forth. The six slots on the right are hot-swap SATA bays, connected to a large vertical heatsink. The bays have mounts for 3.5-inch and 2.5-inch drives. The top right box holds three optical drives, and the upper left box holds the power supply.

Google`s mobile browser ready to smoke Iphone

The new google mobile web browsing engine seems to show their best performance ever in December. Although Android still trails the iPhone in absolute share of the web with just 0.05 percent versus Apple’s 0.44 percent, it grew a much faster 54.8 percent versus just 20.1 percent for Apple’s platform. The BlackBerry too had a better month at 22.2 percent growth while the only major platforms below them are Symbian (19 percent growth) and Java ME (15.6 percent).

In Desktop site also represented a major if symbolic victory for Chrome, which for the first time in the analysis has overtaken Safari for share on the web. The browser jumped exactly 0.7 points to 4.63 percent, or enough to pass Apple; even though it continued to grow, Safari grew only modestly versus November and topped out at 4.46 percent. Firefox saw a rare decline in use to 24.61 percent, while Internet Explorer continued its long descent and reached 62.69 percent.

While the rise of Chrome is explained through both the launch of Chrome for Mac in beta form as well as extensions becoming available for Windows, Android’s efforts are more complex. It was helped both by a wider overall shift to mobile as well as the launch of key phones like the Motorola Droid that have fueled Android market share with runaway sales.

Proof of the downturn for desktop browsing comes through desktop operating system share. Despite sustained availability of Windows 7, Microsoft’s combined OS share dropped to 92.21 percent while the Mac dropped a hundredth of a point to 92.11 percent. Linux was the only desktop platform to see a gain as it edged forward slightly to 1.02 percent. The iPod touch is broken out separately from iPhone share and claims 0.09 percent.

Web bowser share
source : NetApplication study

Monday, January 11, 2010

Mobile phone will move to fashion arena



We may declare that year 2009 is the year of new mobile segmentation, cell phone fashion follow ups. Some months ago we have been introduced with the LG PRADA II. Now we’ve got in our list the prototype of the second Samsung with the Giorgio Armani logo on it (M7500 Night Effect was branded as Emporio Armani).

There is only one thing in common between these two though, the presence of a full QWERTY keyboard. While the LG PRADA II seems to have gained extra weight and managed to ruin the image of its trendy predecessor, the Giorgio Armani is another cup of tea. Our prototype is running on the Windows Mobile 6.1 OS, but the final unit will have WM6.5 on board. Aside from being a capable smart phone, the device seems to pack serious multimedia punch – DivX/Xvid video support, 5-megapixel camera and huge, 3.5-inch AMOLED display.

Seems like the world of fashion in Paris will divert to some where in Finland, Korea or China with new design of new beautiful mobiles. Nokia CK (Celvin Klein), HTC Ecko, Iphone Boss 3GS or even Blackberry Dockers might be the suitable name for the mobile new models.

Ten Powerful Linux Commands


1. PS

The PS command is a powerful command, and its power comes from its utter versatility. The PS command means 'process status', and displays everything to do with processes; think of it as the task manager of geeks. There are many variations of PS that can be used, such as the common PS AUX, which will pull a Terminal list of all running processes, or PS AUX | GREP PID to pull up a specific process. Used in conjunction with the kill command allows users to end processes.



2. RM -RF

This command is, quite possibly, the most powerful command, as it can destroy entire systems in the wrong hands. The rm -rf dir is used to remove (permanently delete) a directory, or multiple directories. For example, rm -rf dir / will delete the home directory. This powerful command is perfect for removing an unneeded directory, but should be used with caution, and only by individuals who understand what they are doing.



3. PSTREE

The pstree command is another variation of the PS command, and is quite useful for those who do frequent work on different machines and servers. If you need to get a quick peek at the different programs that are running, and what processes stem from other processes, PSTREE is more useful and organized than a general PS AUX command.



4. HISTORY

Let's say that a directory randomly disappears from a user's computer, and they insist that they weren't playing in the Terminal and running commands that they shouldn't be. If you want to check up on a specific instance of a command being run, you can issue the command history | grep -i command, replacing command with your search term. If you're just interested in seeing a general history, you can just typehistory and get a list of all the activity that's been going on inside the Terminal.



5. APROPOS

If knowledge is power, then apropos is a very powerful command, as it knows every command you can use for a specific item, such as directories or files. If you're looking for a certain command to run on, say, directories, but you can't quite remember what it's called, then running apropos dir will yield a list of possible commands. The same goes for files, pictures, documents, and more.



6. LS

If you were to ask any Linux admin what command they use on a daily basis, the LS command will likely be the one. This useful, yet simple, command allows users to view the contents of a directory and, in conjunction with a number of other commands, to refine just what info you get. A good example is the LS -LH command; using this command within a directory will display the size of files with easy to read formats versus the long series of numbers usually displayed. For example, 8000 will become 8MB.



7. GREP

If you're an astute reader you'll have noticed that we've shown many command examples that include grep; the frequency of this is a sign of the command's usefulness. The GREP command is a filter of sorts. It is used to search for any instance of a pattern that the user specifies and to output it to a neat list. So, for example, to filter through running processes for specific apps, you can add | grep app to find it. Likewise, if you would like to find a certain phrase within a text file, you could run a command like grep [aA] file.txt, which would return results for both small and capital 'A's'.



8. FIND

The FIND command is incredibly powerful, especially when used as root. This command can be used to find anything on the system, as simple as that sounds, and anything within specific directories that you specify. For example, if you're in need of tweaking a password file for whatever reason, instead of manually hunting down all the files, you can instead run sudo find / -name passwd. This command will be run as root (replace sudo with whatever your distro uses), and find any file named 'passwd'. There are many different commands that can be used in conjunction with find, such as: -print, -perm, -type, etc.



9. CRON

Sadly, this nifty little command is not included in popular lists as often as it should be. This command is powerful in that it can do things on your behalf when you're not around. Let's say that you're planning a weekend trip without a computer, and you need to make sure that your files are backed up every day. Like a smart admin, you'd never let anyone else touch your computer, let alone the Terminal. The solution? Use CRON. To do so, you simply set a time, then the command to be executed.

The pattern for setting time is as follows: minute | hour | day | month | week + command.



For 'minute', specify the minute you would like it to start like so: 15. If you would like a command to run every specific set of minute intervals, add an asterisk after the minute command; to run a command over several different minute periods, add a comma to separate them.

For example: 04, 07, 23, 45 * * * * /usr/bin/something -backup

The same applies for 'hour', 'day', 'month', and 'week'.


10. WGET

Some people scoff at this one. WGET is powerful? Why, yes, yes it is. You see, WGET can be used to download things at any time, even if you're not there. It can be scheduled to run at midnight while you're safely tucked away in your bed, or to download a necessary update while you're out on business. WGET is a command that is used to fetch something from online; think of it as a download tool. There's a massive amount of commands that can be used in conjunction with WGET, all that function to make your life easier. Here's an example:



WGET -M http://www.website.com/ . This command is used to mirror (aka, download) a website.


Source: Tech Lab Review

Thursday, January 7, 2010

2010 mobility for Google, keep Apple and Nokia busy

We can say year 2010 gives a significant milestone for Google mobile internet. Just after few days, Google and HTC brought a new mobile for their latest Andorid 2.1, Nexus One. Google Nexus One is believe to become the greatest competitior of Apple Iphone on varous aspects. Featuring a 1 GHz Snapdragon processor and Android 2.1 operating system, Nexus One has a 3.7″ AMOLED display similar to what you find on the Zune HD. As for the software, it now contains live wallpapers, 5 homescreen panels, new weather and news widgets, an all new 3D framework and voice recognition, using which you can skip typing and just dictate text to any field inthe phone. With the newcomers form Google, it is expected to finally give Apple Inc.’s iPhone a run for its money in the smartphone arena. The Nexus phone is as slim as a pencil, weighs about as much as a cigarette lighter (130 grams) and has a surface area similar to a deck of cards.



Android also offers a large application store — similar to Apple’s App Store — called the Android Market. However, unlike Apple, all of the applications made available for Android are free. Google may be entering the consumer hardware biz, thus competing directly with Apple. In other words, just forget about new micrsoft WM7, or Symbian V7.0. or even Blackberry software.

However, if Nokia really want to get involve in the mobile chaos 2010, they should concentrate more on their new triump card, Maemo-based N900. The quality is much more like super mini PC with the laptop-alike screen resolution, super OS, and superc embedded graphic adapter, and just need to upgrade a little bit on memory capacity and CPU. So, if Android can become a champion of internet smatphone, Iphone for their multitouch and “cool” capability, then Maemo-based could become a super-cool phonetop. I guess so….

Click Here for Technical Specification

Tuesday, January 5, 2010

Beware! your mobile phone might be tapped wirelessly

Call interception through wired line is very common today, but what about wireless line, like GSM or other mobile line? wireless mobile (not WLAN, different frequency) work with encryption. The encryption works by rapidly changing the frequency used by the phone and the base station between 80 different channels. Doing so makes it very difficult for someone to intercept and listen in without very expensive hardware solutions.

Karsten Nohl, a German computer scientist, has now rendered the ability to intercept these calls much easier due to a year of hard work including 24 other people involved in encryption. The end result is the equivalent of the phone book in the form of a large table, but for encryption keys. Rather than very expensive hardware you now just need the table, a high-performance PC, and $3,000 of radio equipment to start listening in to calls. For the more serious user spending $30,000 will get you real-time snooping abilities.

Nohl used the annual hackers meet up called the Chaos Communication Congress held in Berlin to announce the encryption had been hacked. He sees it more as a way of informing users of the vulnerabilities of GSM rather than allowing call monitoring to be easier. The end result he hopes is better encryption for the calls we all make using mobile phone networks.

The GSM Association admits that the cracking of A5/1 is worrying, but also pointed out that a move to the A5/3 algorithm was currently underway and dismissed the crack as, “a long way from being a practical attack on GSM”.

Whenever we deal with technology, security concern should come along as people now are really interested to know what their neighbour is doing. Bu the main point is that, no where is secured, even facebook or YM. So, if you really want to have secured communication, just meet face-to-face, inside the self-built noise proof together with wireless jamming equipment…or just follow Osama style backword compatibility yet still out-of-radar.