Friday, March 11, 2016

Device Makers Planning 'True VR Experiences' on Apple's Iphone This Fall


Virtual Reality Headset for iPhone – Fall of 2016


Piper Jaffray, investment firm held sequences of virtual reality panel recently comprising of 13 companies and one of them, IonVR, showed that they expected to have a VR headset for iPhone launching in the fall of 2016. These devices would be somewhat like the Samsung Gear VR headset that utilises Samsung smartphones as the display.

 IonVR, a privately held company that specializes in third-party VR hardware, hopes to have a headset in the fall which would enable the iPhone to be utilised for VR and according to Munster, would come at a price of $100 and $200. Gene Munster, analyst stated that the IonVR product is estimated to be very much advanced than the prevailing iPhone based VR accessories like Google Cardboard and Mattel View-Master.

He is of the belief that those basic products which tend to use IPhone’s Retina display for stimulating VR do not provide `true VR experiences’. However comments from IonVR at the recent panel, recommended that the iPhone could in fact do appropriate VR, with the help of third party hardware, according to Munster. He hopes that those kinds of iPhone connected accessories would start taking off later in the year.

MotionSync – Proprietary Optics System


The Idaho-based IonVR had developed a proprietary optics system known as `MotionSync’ which it claims would reduce motion sickness greatly when utilised with mobile devices like Apple’s iPhone. Unified hardware in its headset is also considered to offload some of the processing from the phone, enabling it to last longer as well as simplify the software development process.

IonVR products are also considered to be modular which means that parts could be replaced or changed out as technology progresses.Virtual reality is talked about much as a hot new technology with concerns that it could follow the boom and bust of 3D TV. Munster states that VR would not flop like 3D in part, due to the larger level of investment in VR with its augmented reality.

He adds that Facebook which owns Oculus VR is firmly dedicated to its success.He informed that, Apple, Google and Sony are expected to be making substantial investment in VR/AR for the next five years. He believes that these investments would lay the groundwork for VR/AR to be the next computing prototype.

Sony – Best Position to Capitalize on VR


Munster has commented that Sony is in one of the best position to capitalize on VR. It has the content, user base and distribution to enable VR to expand rapidly. He added that they have also been impressed with the demos of Sony on `London Heist’ and `Walk The Wire’ and the company is said to have a slate of around 80 games that would be made available at the time of the launch later this year. Oculus Rift is said to be shipped in 20 countries on March 28 including the U.S. It would also be made available at select retailers in April and would cost $599. It would need a high-end PC with graphic card. Bundles of Oculus Rift headset together with Oculus-ready PC is priced at $1,499. Samsung, in the meanwhile is endorsing its smartphone-based Gear VR that tends to use Oculus technology and the Gear VR will cost $99 which needs a new Samsung Galaxy phone.

Wednesday, March 9, 2016

How to verify checksums when you download an app for your Mac

checksums

Open Source Transmission BitTorrent Infected with Malware


Some of the Mac users seemed to have received a surprise last week when they discovered that a latest version of the open source Transmission BitTorrent client had infected their computer with malware, a condition which had been avoided with suitable securities. Most of the computer savvy are aware of the vigilant about where the download software are from though few of them pause to verify that the files received are the file which they are supposed to receive.

 This could be a grave last step in the prevention of malware infection seen in Transmission. Often, developers tend to post checksums or hashes together with the download links for their projects in order to simplify this type of verification. Generally, a checksum is the outcome of a mathematical calculation that tends to run a certain file, if the file has not been changed. The checksum calculated will tend to match the checksum provided by the developer.

It has not been made known how the infected download made its way on the Transmission’s website, though those who seemed to have received it first in the processhave informed that the checksum of the bad file does not seem to match the checksum given by the Transmission team.

Checksum Validator – Easy to Use Utility – Calculating/Validating Checksum


Checksum Validator is an easy to use utility for calculating and validating checksum – SHA-1 or MDS digests, for files which one downloads or uploads. On comparing a site’s published checksum with one’s calculated checksum one can verify that the download matches with the official copy of the site, which is free from corruption or tampering, unless of course the site’s checksum is also tampered.

All that is essential to calculate checksum is in MAS OS X which is quick and easy and the quicker and easier, the more possibility of actually verifying downloads. If the checksum is verified prior to installing, they would be aware of something being inappropriate. It is worth being aware that this is not a reliable process and if a website is compromised, the attacker can easily change the checksum also.

 Users can learn to verify checksum or SHA-1 which is a software update, provided on Apple software updates for those who intend to verify the authenticity of an update and is optional. Users need to note that for updates that are delivered by Automatic software Update, SHA-1 digest verification is accomplished automatically for you.

SHA-1 Secured Checksum for Data File


In order to verify a manually downloaded software update form Apple Downloads, that seems to comprise of SHA-1 digest, the following steps need to be done:
  • Open Terminal which is located in/Applications/Utilities
  • Type the following at the Terminal prompt
  • About SHA-1
SHA-1 is a secure checksum for a data file which is based on a cryptographic average and for a given file; SHA-1 creates a 160 bit encrypted output which is known as a `message digest’. It is unlikely that a modified data set would create the same message digest. If a file seems to have changed at the time of transit, its message digest also tends to change.

Users can download manually-installable updates from Apple Downloads. Apple tend to use SHA-1 digest on definite Apple Downloads in order that users can verify with great amount of possibility that the software downloaded is the same software one intended to download. When the SHA-1 digest for the file downloaded seems to match the digest for the file displayed on Apple Downloads, one can be assured that the file is reliable. For security purpose, users can utilise the secure https download page for manual updates.

Why You Need Recovery Software


Recovery
Admit it. One time or another in our life we have lost important files on our computers, and if you haven’t already, chances are you most definitely will sometime in the future.

Data loss is a sad reality of technology these days and can happen for any number of reasons, ranging from accidental deletion to virus attacks.

Whatever the reason though, it’s not the end of the world and can easily be recovered by recovery software, ensuring you will never lose important data again.

Like we said earlier, if you haven’t experienced data loss before, you will most definitely encounter it someday, that’s why even if you don’t need recovery software now, it’s always good to know what to do incase of emergency.

Most people reading this though has probably encountered data loss and want to know what to do know…
It might seem like the end of the world, but to recover lost data is not all that hard. All you have to do is download recovery software, scan your device, preview the files and choose which files you wish to recover. That’s it.

It doesn’t matter if your data loss occurred due to accidental deletion, formatting, virus attacks, OS crashes or any other unknown reasons, recovery software will be able to help.

Now for the important part. What recovery software to use. Sure you can use any recovery software that comes up in your Google search, but that does not mean that they will be able to recover all of your lost data. You might even end up with a few unwanted viruses.

The most recommended recovery software by multiple Tech and PC Websites, is from EaseUS, and with reason.

EaseUS has a few different recovery software on offer, from free to $499. (Don’t worry, the paid options are for companies wishing to offer data recovery for their clients).

If it is good enough for the pro’s to use for their clients, it’s certainly good enough for you, and what’s even more, you can recover data from literally any device. Windows, Mac, hard drives or what have you.
And just like the supported devices, you will be able to recover any file format, from images to video, and even emails.

Sure, there are some drawbacks, but they are minuscule, like you can only recover 2gig with the free version. This can easily be remedied by buying an upgrade.

Even if you don’t need recovery software right now, it’s nice to know there are steps you can take to get your data back.

For those who’ve encountered data loss, Download EaseUS recovery software or android recovery as soon as possible, and get your files back as soon as possible.

Saturday, March 5, 2016

Neato adds Apple Watch control to robotic vacuum in new app update

Neato

Neato’s Latest App Release – Botvac Connect


According to Neato’s latest app release, the $699 Botvac Connect is the first robot vacuum which has the capabilities of being remotely controlled by an Apple Watch or Android Wear device. The app that runs on Apple Watch enables users to issue start and stop commands to the vacuum and monitor clean-up progress straight on their wrist. Different from the full-fledged iOS app, the small screen Watch version does not permit users to take full manual control on the movement of the robot.

Last year Botvac Connect as Neato’s first vacuum to sport anon-board Wi-Fi for communication with iOS as well as Android smartphones, providing owners remote setup together with one-touch control directly from a committed app.On-board Wi-Fi support means that Botvac Connect has the capability of receiving commands as long as it tends to be connected to a known network. Moreover the devices also has laser navigation, two cleaning modes as well as LCD screen with associated capacitive buttons intended to select various user settings. From the iOS App Store, the new Neato app version is made available at no cost.

Can be controlled with Smartwatch


Neato’s robotic vacuum now can be controlled with a smartwatch due to an app update announced recently. The update which is automatic enables smartwatch users to receive notifications from Neato’s Botvac Connected vacuum, a Wi-Fi connected Roomba competitors which tend to use laser scanning to map and clean spaces, besides the start and stop commands.

As per Neato, the latest update makes the Botvac Connected, the first robot vacuum to provide smartwatch functionality. The Botvac Connected owners can also monitor the progress of its cleaning on their smartwatches and receive a notification when it is finished. For added analysis of the Botvac Connected and how it tends to stack up against the competition, one could check on the last year’s review. With each passing generation, robot vacuums are getting smarter as well as easier and some of the new models tend to join the Wi-Fi network. Neato has been influencing that feature of its Botvac Connected vacuum in order that one can control and monitor the device with the Android Wear smart watch or Apple Watch.

New Feature Delivered Through Automatic Update


The new feature is said to be delivered through automatic update and would enable Botvac Connected owners to control the various process. While Roomba manufacturer iRobot tends to also offer an app, it does not support smartwatches while other competitors such as Samsung, bObsweep, PowerBot and the Miele Scout do not seem to have apps at all.

Nancy Nunziati, Neato marketing chief had commented in a press release that with the smartwatches, individuals tend to do several things from their wrist like checking for a flight, obtain directions, play music, and answer the phone and added that they are happy to be the first to add this new task of cleaning to the list. Botvac Connected is not an inexpensive way of getting into robotic vacuums, priced at $700. Neato expects that the features like the laser floor plan mapping, a larger brush together with higher capacity dirt storage would win over the customers.

Friday, March 4, 2016

Thousands Of Popular Sites' at Risk of Drown Hack Attacks

Drown_Attack

HTTPS Susceptible to Drown Attacks


Researchers on discovering that a new method tends to disable their encryption protection have cautioned websites that they could be exposed to spies. An expert has stated that a third of all computer servers using the HTTPS protocol tend to be represented often by a padlock in web browsers and were susceptible to the so called Drown attacks.

They have warned that the passwords, credit card numbers, emails as well as sensitive documents can be stolen as a result. The issue would be sought though it would take some time for several of the website administrators to protect their systems. A tool that would identify websites which tends to be susceptible has been released by the researchers. They have said that they had not released the code used to prove their theory since there seems to be several servers still susceptible to the attack.There is no evidence yet, that hackers have worked out how to replicate their technique.

An independent expert had commented that he had no doubt that the problem could be real. Prof Alan Woodward from the University of Surrey has stated that `what is shocking regarding this is that they have found a way to use a very old fault which we have known since 1998 and all this was perfectly avoidable.

Computer Server Prone to Attack Supporting Encryption SSlv2


It is the outcome of having used deliberately weakened encryption that people broke years ago and is now combing back to haunt us. Researchers, cyber-security experts from universities in Israel, Germany and US, together with member of Google’s security team have discovered that a computer server can be prone to attack by just supporting 1990s-era encryption protocol SSLv2 – Secure Sockets Layer version 2, even if it employs a day-to-day more modern encryption standards to scramble communications.

Older email servers, in practice, could be more likely in having this problem than the latest computers naturally used to power websites. However, several of the organisations tend to reuse encryption certificates and keys between the two sets of servers. Researchers have dubbed the flaw Drown, which is an acronym for decrypting the Rivest-Shamir Adleman – RSA process with obsolete together with weakened encryption.

Careless Server Configuration


They wrote that operators of vulnerable servers should take action. There is nothing practical which browsers or end-users can do on their own to protect against this attack. The SSLv2 procedure had been weakened deliberately since at the time of its development, the US government needed to attempt to restrict the availability of tough encryption standards to other countries.Prof Matthew Green from Johns Hopkins University had blogged that the problem is while clients such as web browsers have done away with SSLv2, several servers tend to support the protocol.

 In most of the cases, it is the outcome of careless server configuration. In others, the fault lies with inferior obsolete embedded devices which have not seen an update of software in years and possibly never will. A considerable amount of computational force would be needed to mount a successful attack on a website.

 However, researchers have stated that under normal situations, hackers tend to rent the needed capacity from Amazon’s cloud compute division for a sum of $440. Besides this, since several of the servers seem to be in danger to Drown had also been affected by separate bug, a successful attack could be carried out utilising a home computer.