Latest Post

Nokia Lumia 920 goes through our battery tests, here’s how it did

Written By Unknown on Sunday, 30 December 2012 | 00:30

The Nokia Lumia 920 brings big innovations in mobile tech with its PureMotion HD+ display and optically stabilized Carl Zeiss camera lens, but what about the battery? It’s a 2000mAh unit – more or less on the same level as the Android flagships and the biggest Nokia has put in a smartphone.



But is it enough? How does it compare with the Lumia 820? Armed with a watch, a calculator and patience we set off to find out.

The Nokia Lumia 920 is officially rated at 10 hours of 3G talk time though our tests show it lasts just under 9 hours. This puts it above all other Lumia phones except the 710, which stayed on a few minutes more. It’s also ahead of the iPhone 5 (which has a smaller battery) but behind the Android flagships, some of which managed to last substantially longer.

Talk time

Sort by Label
Sort by Value
Expand
Motorola RAZR MAXX (ICS)21:18
Motorola Atrix HD9:04
HTC Vivid9:02
Nokia Lumia 9208:56
HTC Rhyme8:48
Apple iPhone 58:42
Pantech Burst4:46

All previous Lumia phones we’ve tested hover around the 4 hour mark in our web browsing test (even the new Lumia 820), so the 5 hours and 40 minutes that the Nokia Lumia 920 achieved are the best in that range by quite a margin. Again though, most high-end Androids last longer on marginally bigger batteries and similarly-sized screens.
Web browsing

Sort by Label
Sort by Value
Expand
Apple iPhone 59:56
HTC Desire V5:44
HTC Evo 4G LTE5:41
Nokia Lumia 9205:40
Samsung Wave 3 S86005:34
Sony Xperia T5:33
Samsung Galaxy Nexus3:01

The Lumia 920 has a large, sharp display that’s suitable for watching videos and it will last you around 6 hours and 20 minutes (in Airplane mode). That’s comparable to the Lumia 820′s time and around average compared to other smartphones.
Video playback

Sort by Label
Sort by Value
Expand
Motorola RAZR MAXX (ICS)16:35
LG Optimus Vu6:23
Samsung I9103 Galaxy R6:21
Nokia Lumia 9206:19
HTC Sensation XL6:12
Samsung Galaxy Pocket6:06
Nokia Lumia 7103:27

Standby proved efficient enough and the Nokia Lumia 920′s endurance time came up as 44 hours – that’s the time between charges if you do an hour each of talking, browsing and watching videos per day. It’s 4 hours longer than the Lumia 820 score, so that’s that base covered.



If your phone usage habits are similar to our hypothetical usage, you can get two days out of the Lumia 920′s battery. Keep in mind that web browsing over LTE will eat the battery quicker (we do the tests over Wi-Fi), but with a wireless charging pad (which comes in the box for free in some regions), you can easily top off the battery.

StartW8: Free Start Button for Windows 8

Written By Unknown on Saturday, 29 December 2012 | 03:16

Download StartW8 1.1.34.0
Ever since Microsoft released the new Windows, we’ve seen a few solutions to bring the Start Button back into the lower left hand side corner of the desktop. StartW8 is yet another alternative that could take over the sweet spot in Windows 8.

Like most apps taking over the responsibility of the orb in Windows 7, StartW8 is free of charge and does not attempt to push additional software on your system. Installation went smooth in our case and no restart was required in order to complete the operation.

Although StartW8 looks very much like the original menu, a regular user accustomed to Windows 7 should be able to spot this is a replacement fairly easy.

On the other hand, users are interested in its functionality rather than its looks, and StartW8 is slightly different than what we’ve seen until now.

As soon as installed, StartW8 places its custom button in the lower left corner of the desktop. Clicking on it reveals a familiar view, with search bar, program list, power button and the side menu.

You can switch the list of frequently used programs to show all the applications installed on the system, although the change does not occur automatically just by hovering the mouse over.

Given the position of the button, one would expect it to completely eliminate the original functionality of that corner in Windows 8; but StartW8 preserves its purpose so users can easily switch to the modern UI Start Screen with the mouse instead of keyboard shortcuts, as possible in other programs sharing the same purpose.

The context menu for StartW8 does not resume to giving access to the configuration panel of the application and includes a few useful shortcuts as well (Run, Windows Explorer, Command Prompt (with admin elevation, too) and power options: Hibernate, Sleep, Shutdown, Restart, Sign Out, Switch User and Lock.

Worth mentioning is that not all these power options are present in programs of the same category. In some cases, the hibernate button is missing.

The configuration panel is extremely simple and it comes already set up to suit most users’ needs. It is split into two sections that allow you to define the behavior of the OS after signing in, the default action triggered by the power button and to customize the side menu.

The default action for the power button can be any of the power options available in the Start menu (Hibernate, Sleep, Shutdown, Restart, Sign Out, Switch User and Lock).

Out of the box configuration makes the application switch to the classic desktop environment instead of the modern Start Screen. This can be easily changed under the “Basic Settings” panel. Here’s also the place to enable hotkeys (Win or Ctrl+Esc) for launching StartW8’s menu.

Furthermore, you can disable the bottom left hot corner button. This feature has been freshly added in this version of the program.

In the case of the side menu, the options include links to personal folders (Documents, Music, Images, Music, Videos, etc.) as well as system areas, such as Control Panel, Devices and Printers or the list of default programs.

There is also the possibility to add the Run command to the menu, though advanced users can easily call it through the traditional Win+R hotkey.

StartW8 is pretty far from mimicking the functionality of the original orb in Windows 7 and further proof is the fact that new entries are not highlighted. On the same note, the list of frequently used programs is not dynamic, so it will not change as you launch the same entry over and over again; not even after a computer restart.

Once that space fills up, you can start deleting old entries in order to make room for new ones. The application does not offer the possibility to pin items to the start menu.

During our tests, StartW8 seemed to respond to our commands slower than applications of the same kind.

Also on the downside, there is no automatic update mechanism available or the possibility to receive alerts about a new version being available. As such, users have to check for new updates manually from the “Settings” panel.

The computer requires a restart after installing a fresh update for all the changes to take effect.

The Good

It can boot the system into the familiar desktop environment instead of the modern Start Screen. It offers easy access to power actions such as hibernate and sleep as well as to personal folders (documents, music, videos, images).

The Bad

You cannot add your own shortcuts to the start menu. New applications are not highlighted in the menu. We noticed it moved a bit slow compared to applications in the same category.

The Truth

StartW8 makes for a valid alternative as a start button for Windows 8. It is easy to work with and to configure. However, there are choices on the market that provide a wider range of features.

Download StartW8 1.1.34.0

Hackers Steals 36,000 Individual Details from US Army Database

Earlier this month, unknown hackers managed to gain illegal access to the details of around 36,000 individuals who were somehow connected to the US Army command center formerly located at Fort Monmouth.

According to APP, the details of Communications-Electronics Command (CECOM) and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) personnel were accessed by the hackers.

Nongovernmental personnel and Fort Monmouth visitors are also affected by the breach.

The hack, discovered on December 6, exposed names, dates of birth, social security numbers and salaries, Army representatives said. After the incident, the targeted databases have been taken offline.

CECOM and C4ISR were relocated from Fort Monmouth to Aberdeen Proving Ground back in September 2011.

The affected individuals are being offered one year of free credit monitoring services.

Gamja : Web vulnerability scanner



Gamja will find XSS(Cross site scripting) & SQL Injection weak point also URL parameter validation error. Who knows that which parameter is weak parameter? Gamja will be helpful for finding vulnerability[ XSS , Validation Error , SQL Injection].

Supported platform:
Windows ,Linux,Mac 

download:

http://sourceforge.net/projects/gamja/
credit: DeCrew

CK Hash Cracker



CK_HASH_CRACKER VERSION 3.0 Download Link: Click Here

__Change Log__
Hash Identifier Modified
Online Database Checker Bug Fixed And Works Faster
Offline Database Search Engine Modified
Rainbow Table Algorithm Added

How To Add Additional Database Release?After Installation with the Default Settings, A Folder Named CK_Hash_Cracker Verion 3.0 will be Created in Root Directory/Program Files, which is mostly C: Drive, So that path will Be C:\Program Files\CK_Hash_Cracker-Version 3.0; under This Folder There Are Two Folders Named "Brute" And "DatabaseConnector"

Files Under "Brute" Folder Is Used For BruteForcing, Make Sure If You Place Additional WordList, You Do Not Have Duplicate Words, Otherwise It will just increase the Time. You Can Place Files With Any Name Under This Folder, It Will Work Fine, until the Files Are in Readable Format

Files Under "DatabaseConnector" Are The Offline Database, So For Any Database Releases, After Downloading Databases, Put The Files Under "DatabaseConnector" Folder And Thats It, The Tool Will Automatically Upgrade The Database.

Its Has A Self-Installer, So To Install, Just Run The Setup file. To Uninstall, You Can Remove It From Control Panel Or From The Self Uninstaller.

If You Get Error At Run-Time, Probably You Do Not Have The Microsoft Visual C++ 2008 Installed, The Application doesn't need Python To Run, But It Needs The Run-Time Components. You Get The Download Packages From Here:

For Windows 32 bit: Click Here

For Windows 64 bit: Click Here

And Then Try Running The Application.CK_Hash_Cracker (Version 3.0) Download Link: Click Here


credit: binhduong-ug

Perencanaan SEO

Written By Unknown on Friday, 28 December 2012 | 13:10


Bismillahirrohmanirrokhim

Yupz, kita gak boleh main – main ama yang satu ini ( karena agak galak hhehhee :P )

Yaitu tentang perencanaan dalam menggunakan tehnik / jurus SEO atau Search Engine Optimization .

Berikut rencana yang harus benar – benar diperhatikan :
* persiapan pada Blog ( internal )*
- nama Blog / web sangat direkomendasikan sekali adalah memakai nama sebuah kata yang berkaitan dengan keyword yang akan kita bidik.
Contohnya : Optimasikan.blogSpot.Com
Karena memang Blog ini akan digunakan untuk membahas tentang SEO atau Search Engine Optimization.

- title / judul 
saya rekomendasikan kepada ad agar anda memakai judul yang benar dan singkat dan jelas jangan bertele – tele. And bisa memasukan judul denga sebuah kalimat yang akan yang berkaitan dengan tema Blog anda serta nama Blog anda ( optimasikan.blogspot.com ).

Contoh : Trik Optimasi Blog.

Tips : banyak webmaster yang menyarankan klo title Blog ata web yang baik adalah title yang yang mempunyai 10 – 60 karakter ( huruf ).

- deskripsi 
deskripsi yaitu sebuah sedikit pengambaran atau penjabaran ayng agak luas dari sebuah title atau judul atau bisa juga diartikan sebagai rangkuman atau inti sari dari sebuah Blog atau web yang akan dibahas atau dijadikan tema . Tentunya dalam pembuatan deskripsi kita juga harus menaruh kata – kata dengan singkat padat jelas serta menggoda :)~ .

Contohnya : Blog ini akan menyajikan Trik – trik tentang SEO untuk Blog, serta Membimbing Anda bagaimana Pelaksanaanya.

Tips : banyak webmaster yang menyarankan klo title Blog ata web yang baik adalah title yang yang mempunyai kurang dari 200 atau 150 an karakter ( huruf ).

- Keywords
Keywords adalah sebuah kata kunci yang anda pilih agar Blog anda bisa muncul pada SE ( Search Engine ).

Contohnya : kita ketikan pada Google denga kata “Search Engine Optimization untuk blog “ maka yang kita harapkan adalah Blog kita bisa nampil terdepan pada SERP ( Search Engine Result Page ) Hasil pencarian mesin pencari.

Tips : lakukan riset dulu apa keyword yang anda bidik atau ambil ini adalah keyword yang banyak dicari orang ato gak ??, jangan ampe salah deh.. terus usahakan juga kita cari keyword yang banyak dicari orang namun saingan pada SE ( Searc Engine ) masih sedikit, jadi peluang kita jadi lebih mudah dalam mencapai harapan :P.

ket : saya copas dari google tanpa merubah satu hurufpun
Sumber : Google [Bila ada yg tau sumbernya tolong di tulis di kolom komentar]

semoga artikel ini membawa manfaat untuk kita semua
dan semoga Rahmat serta Hidayah-NYA selalu tercurah untuk kita semua .. amin ..

Android Trojan Capable of Launching DDOS Attacks from your Smartphone

Security researchers from Russian firm Doctor Web have come across a new Android Trojan they call Android.DDoS.1.origin. The piece of malware can be used for various malicious tasks, including to launch distributed denial-of-service (DDOS) attacks and to send SMS messages.

For the time being, it’s uncertain how the Trojan is distributed, but experts believe the cybercriminals might be disguising it as a legitimate Android application.

Once it’s installed on a smartphone, the malware creates a fake Google Play icon on the desktop. When executed, this shortcut opens the real Google Play in order to avoid raising any suspicion.

After being executed, the Trojan connects to a remote server, sends it the victim’s phone number, and waits for further SMS commands.

The masterminds of Android.DDoS.1.origin can send various SMS commands. One of them orders the infected device to start sending out packets to a certain server, basically launching a DDOS attack against it.

While this only affects the phone’s performance, there are other activities that can be done by this threat. For instance, the cybercriminals can order the device to start sending out SMS messages to certain numbers.

These SMSs can be used to sign up the victim for premium mobile services or they can be utilized to send out spam.

Messages can also be sent to premium rate numbers, inflating the victim’s phone bill and implicitly filling the fraudsters’ pockets.

“Activities of the Trojan can lower performance of the infected handset and affect the well-being of its owner, as access to the Internet and SMS are chargeable services. Should the device send messages to premium numbers, malicious activities will cost the user even more,” experts noted.

Doctor Web has updated its products to ensure that its customers are protected against this threat.

XSS and Cookie Handling Vulnerabilities Identified on HTC Website, Allows Attacker to Hijack Account

16-year-old security researcher Thamatam Deepak has identified a number of three cross-site scripting (XSS) vulnerabilities and a cookie handling flaw on the website of world-renowned smartphone manufacturer HTC.

The expert said the vulnerabilities – which affected pages such as product security, account information, and smartphone presentation – have been addressed by HTC after he notified them, according to The Hacker News

If unfixed, the XSS vulnerabilities could have been leveraged by a remote attacker to inject arbitrary content, while the cookie handling flaw might have been exploited to hijack user accounts.

This isn’t the first time when security experts find XSS bugs on HTC’s website. Back in April, researcher Shadab Siddiqui identified similar flaws and reported them to the company.

However, at the time, they failed to respond to his notifications and the vulnerabilities remained unfixed for months.

Google begins scanning of Chrome Extensions & Stops Auto-Install

Google has taken two steps to prevent its Chrome browser becoming an attack vector for malware that runs as extensions to the browser.

Like many other browsers, Chrome allows users to install “extensions”, apps that add functionality. Google even runs the “Chrome Web Store” to promote extensions.

Security outfit Webroot recently pointed out that some of the extensions in the store are illegitimate, data-sucking privacy invaders that trick users with offers to do things like change the colour of Facebook and then suck out all their data.

Google has responded in two ways, one of which is a new service “To help keep you safe on the web” that will see the company “analyzing every extension that is uploaded to the Web Store and take down those we recognize to be malicious.”

Changes are also coming in the forthcoming version 25 of the browser, which will no longer allow extensions to install without users’ knowledge. That’s currently possible because Chrome, when running on Windows, can is designed to allow unseen installs “to allow users to opt-in to adding a useful extension to Chrome as a part of the installation of another application.”

“Unfortunately,” Google now says in a blog post, “this feature has been widely abused by third parties to silently install extensions into Chrome without proper acknowledgement from users.”

Chrome 25 will therefore remove the auto-install feature, replacing it with a new system that presents the Windows Vista-esque screen below when extensions try to ingratiate themselves with the browser.


As ever, Google’s blog posts and support notice on the changes position them as responsible enhancements that show, yet again, Google is doing the world a favour.

A more critical analysis could consider the announcements in light of malware found in Google Play and take Google’s decision to more aggressively curate the Chrome Web Store as an admission it needs to devote more attention to this stuff, lest Chrome and other Google products become malware-ridden quagmires that users don’t trust.

Default Configuration Flaw in W3 Total Cache Exposes Tens of Thousands of Sites

wordpress
W3 Total Cache, which boasts high-traffic sites like Mashable and Lockergnome among its users, has serious vulnerabilities, according to this post on the Full Disclosure list.

The default setup – that is, when users simply choose “add plugin” from the WordPress catalogue – left cache directory listings enabled, according to poster Jason Donenfield.

This, he said, allows database cache keys to be downloaded on vulnerable installations – and that could expose password hashes. “A simple google search of "inurl:wp-content/plugins/w3tc/dbcache" and maybe some other magic reveals this wasn't just an issue for me”, he writes.

Donenfield later amended the search term to “inurl:wp-content/w3tc”.

“Even with directory listings off,” he continues, “cache files are by default publicly downloadable, and the key values / file name of the database cache items are easily predictable.”

Donenfield says the developer of the plug-in intends to release a fix “soon”. In the meantime, he notes that “deny from all” should be set in the .htaccess file.

CARA MEMBUAT PENCARIAN DENGAN PHP


Posting kali ini saya akan berbagi ilmu lagi khusus untuk yang belajar pemrograman php .
salah satu pertanyaan bagi seorang pemula yang sudah berhasil membuat report tentunya tidak akan lengkap kalau tidak ada form pencarian .
(cara membuat form pencarian dengan php)
Tanpa basi basi lagi langsung Praktek SOB bloger.
ini dia codingnya.
langkah pertama bikin form index.php

Selanjutnya bikin form cari.php

Untuk tablenya saya rasa lebih baik bikin sendiri ini hanya untuk queryna saja.
namanya juga belajar harus ada tantangannya.











Linux Mint 14 “Nadia” KDE released!

Written By Unknown on Thursday, 27 December 2012 | 10:38


Linux Mint 14 KDE released on 23Dec2012
KDE is a vibrant, innovative, advanced, modern looking and full-featured desktop environment. This edition features all the improvements from the latest Linux Mint release on top of KDE 4.9.
New features:
For a complete overview and to see screenshots of the new features, visit: “What’s new in Linux Mint 14 KDE“.
Important info:
Make sure to read the “Release Notes” to be aware of important info or known issues related to this release:
  • PAE required for 32-bit ISO
  • AMD Radeon HD2xxx-4xxx series card
  • Additional drivers
  • Mouse integration in Virtualbox
  • Moonlight
  • mint4win
  • CD images
  • GnomePPP and local repository
System requirements:
  • x86 processor (Linux Mint 64-bit requires a 64-bit processor. Linux Mint 32-bit works on both 32-bit and 64-bit processors).
  • 512 MB RAM (1GB recommended for a comfortable usage).
  • 5 GB of disk space
  • Graphics card capable of 800×600 resolution
  • CD/DVD drive or USB port
Upgrade instructions:
  • To upgrade from a previous version of Linux Mint follow these instructions.
  • To upgrade from the RC release, simply apply any level 1 and 2 updates (if any) available in the Update Manager.
Download:

Md5 sum:
  • 32-bit: b3e5442a8283f60d1a68417655c0f4aa
  • 64-bit: c98650e0ee446d0570c104dd6e8c5b41
Torrents:
HTTP Mirrors for the 32-bit DVD ISO:
HTTP Mirrors for the 64-bit DVD ISO:
Source-

AjaXplorer - Open source alternative to Dropbox and Box for the enterprise

AjaXplorer - Open source alternative to Dropbox and Box for the enterprise

Why building your own box?

You need to access your documents across multiple devices, and regularly share documents (weblinks) and folders with your contacts and teams. Still, using a consumer SaaS box or drive service is neither practical nor safe. And enterprise SaaS box or drive services are expensive and come with Disk Storage that you already have on your servers or private cloud.

How to build your own box with ajaXplorer?

Easily install AjaXplorer on your servers or cloud of choice,
Simply share documents and folders with your teams,
Administrate your box with an Entreprise grade console (rights, groups, plug ins),
Access documents with a Web Gui, Smartphones and tablet apps (iOS, Android),
Sync folders on your computer (public beta, PC, Mac, Linux,Web,Tablets).


Features
  • Standard file system actions, plus metadata
  • Drag'n'drop, right-click for contextual menus, modal windows
  • Users / Roles Management
  • Plugin architecture : interface with other CMS
  • FileSystem, FTP, SQL, LDAP, WebDAV, SMB, and more!
  • HTML5 Upload, PDF preview & Online image edition.
  • Google Analytics integration
  • Dynamic FTP authentication
  • Built-in WebDAV access to the repositories
  • iOS and Android applications available
  • Synchronization client currently available in public beta, for mac & windows.


Source-

Screenshot -

WebInject - Web (HTTP) testing and monitoring tool

WebInject is a free tool for automated testing of web applications and web services. 

It can be used to test individual system components that have HTTP interfaces (JSP, ASP, CGI, PHP, AJAX, Servlets, HTML Forms, XML/SOAP Web Services, REST, etc), and can be used as a test harness to create a suite of [HTTP level] automated functional, acceptance, and regression tests. 

A test harness allows you to run many test cases and collect/report your results.

WebInject offers real-time results display and may also be used for monitoring system response times. WebInject can be used as a complete test framework that is controlled by the Web Inject User Interface (GUI). Optionally, it can be used as a standalone test runner (text/console application) which can be integrated and called from other test frameworks or applications.

Downloads:-
webinject-1.41.win32.zip - MS Windows Executable + Source Code
webinject-1.41.src.tar.gz - Source Code (with UNIX style line endings)

PortableApps platform 11.2 - Portable Software/USB

PortableApps.com makes your software portable
PortableApps.com is the world's most popular portable software solution allowing you to take your favorite software with you. A fully open source and free platform, it works on any portable storage device (USB flash drive, iPod, memory card, portable hard drive, etc). With millions of users all over the world and a full collection of open source software (as well as freeware and commercial software), PortableApps.com is the most complete solution for life on the go.

Features

  • Carry your favorite software on a USB flash drive
  • Easily install, upgrade and uninstall your apps
  • Be safe from data loss with the built-in backup utility
  • The industry standard portable software format
  • Full set of utilities available for all developers
Portable App Directory


Download The PortableApps.com Platform 11.2

your computer, without the computer™

The PortableApps.com Platform™ is a full-featured portable software menu, backup utility, app store, automatic updater and application management system that ties all your portable apps together and lets you build your own custom portable app suite. Add new apps with the portable app store, organize them by category or folder, choose the look and color you want and automatically update everything, all with one easy-to-use system. Just drop it on your portable device and you're ready to go. Learn more about all the features or see what's new in the platform changelog.

Download PortableApps.com Platform
Version 11.2 for Windows, Multilingual (55 Locales)
3MB download / 6MB installed (Details)
Source-
 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Turorial Grapich Design and Blog Design - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger