Achat Lenovo batterie ordinateur portable - fr-batterie-portable.com http://www.fr-batterie-portable.com/lenovo.html

TAG: Batterie

Samsung r728 Battery www.all-laptopbattery.com

The other great thing about the various IDEs is that there are loads of tutorials and “getting started” guides. Going from a bare-essentials installation of the IDE to running your first program will take you 15 minutes or less. In fact in most cases you can run “Hello, world!” or similar by creating a new app from a template without writing any code yourself. That really is impressive.All great so far, then. So what's the catch? Well, writing decent applications is not a simple task. There is more to it than drawing a few GUI objects in a pretty design window on your PC or Mac.There is a pile of documentation for each of the offerings detailing how to use the IDE, describing the various libraries and system calls and so on. The documentation doesn't teach you how to write efficient code, or how to write properly in the various available languages. You will have to learn that separately.Which brings us to the development language you use. For iOS you have a choice of good old Objective-C, or the newer Swift which is kind of a derivative. They are both C-like but also sufficiently different that it takes a little while to get used to them. Of the three platforms it is probably the least like what the average developer is used to.In the Windows world you have the standard .NET choice of C# and Visual Basic. If you are used to full-fat Windows development you will probably find yourself thinking the mobile version feels cut down, though Microsoft will point out that it still acts as a common language which can still reach up from the handset to the back office.

On Android, Java is the way to go. Because the developer kit is Eclipse-based the IDE should feel familiar to any of the bazillion users who have used this for bigger Java development tasks.We have established that all of the platforms are pretty simple to get up and running, and that (quelle surprise) to do effective software development you will need people with software development skills. You will need a few other things as well, though.First is the ability to read the vendors' GUI guidelines. There is a reason why all good iPhone or Windows Phone or Android applications look similar and hence have transferable usability properties. They have been written by people who have read the vendors' guidelines on how to present things, what to put in the standard menus and so on.Read and digest the design guides and make your Windows Phone aplication, say, look like a Windows Phone application. Think of the desktop apps you have come across over the years and recall the ones that you hated most: they are the ones whose developers thought their way of presenting the GUI was better than the vendor's.Secondly, as you would for desktop applications, build yourself libraries of common code and re-use them wherever you can. Never code the same functionality twice, and let version control underpin your development cycle so that you can always roll back to the previous version if you screw something up royally.

Thirdly, you need design talent. I can write, say, an effective Windows application if it relies on windows, menus, dialog boxes, radio buttons and the like. The design guidelines tell me how to do it and the IDE's cool design features make it idiot-proof to align things correctly.But I am graphically challenged. Ask me to design an icon or a logo or to make a phone-based app that has the look and feel of my company's funky web site and I'm stuffed.Fourth, you must have a test regime. If you are building a corporate app there are two possible audiences: your staff, who will berate you hideously if the app is difficult to use or is as flaky as a flaky thing; or your customers, who will moan about you on social media if the app doesn't do what they want. Lack of testing equals shonky apps.The fifth but by no means least thing you will need is a policy dictating which platform(s) you develop for. If you are writing for internal users then you have some level of control over the range of devices you have to support. If you adopt a single platform as the corporate standard then you have only a single device to develop against.If you are developing something for customers to use then in an ideal world you would support all three platforms, but since there is no single language that works on all three you find yourself having to employ either multi-skilled developers (a scarce resource) or more bodies, each of which has more focused skills.You might well decide that priorities should follow market share. Whatever you decide, it is better to do fewer platforms well than to do all of them shoddily.

If you want your customers or staff to use applications on the move, give really strong consideration to writing apps for their mobile devices.Leaving aside the fact that any kind of software development requires skills in software engineering, modern IDEs are gobsmackingly easy to get to grips these days.It is genuinely realistic to consider writing your own applications and you will be able to achieve a remarkable amount in a relatively short time.Choose your platform(s) carefully, make sure you underpin development with version control and proper design and code control, and go for it. You will be surprised at how doable it is. If you're letting users connect from their own devices you have no domain-style control over them and can't enforce VPN settings and the like, it's essential to use a two-factor authentication mechanism. They're dead cheap, and although in the old days you'd end up carrying around a pocketful of six-digit-LCD-readout tokens for your various services that's no longer necessary. The Symantec one I use, along with many others, now has a virtual token that runs as an iPhone or Android app. Oh, and if you're wondering what the aforementioned “domain-style control” means, check out Microsoft's Direct Access: it's an utter git to set up, but is an insanely good and transparent way of making your Windows client devices connect securely into the corporate network.

Oh, and, if you're thinking: “What about the Cloud?”: fair point, but actually all of the above applies just as much if you host applications in the Cloud as it does when you host them in-house. Just because your apps are sitting in an Internet hosting centre somewhere doesn't mean you don't want to secure them properly against access by people not in your organisation. So you'll still want to wrap two-factor authentication and proper firewalling around the Cloud-based applications just like you would if they were in your office.The thing is, though, that although I've just said you can present (say) your email via ActiveSync through the firewall, you probably don't want to. Even if you could do something funky two-factor-securityish on it. The reason you don't want to be doing this is again security – but perhaps not in the sense you'd immediately imagine. Yes, it's probably a general security concern if you permit any old device on the Internet to make an inbound ActiveSync connection to your Exchange world, but as long as you're using sensible precautions such as strong passwords the risk is often acceptable. The actual security problem is that your users can point any old device at the corporate systems, authenticate perfectly correctly with their credentials, and suck out all their data. And if they leave the company, they simply stroll off with that data.

Mobile Device Management, or “MDM” as everyone knows is, is the Current Big Thing. A couple of years ago it was the Next Big Thing; now, though, mobile data speeds are up to scratch and so the desire to compute on the move is finally supported by a service that is no longer infuriatingly slow to use. MDM is, in short, a mechanism that allows the organisation to take control of all or part of a client device and do useful things like forcing the user to have a passcode on the device, in case it's nicked, or erase corporate data in the event the user leaves the company. Total control is great for corporately-owned devices, partial control for when you want to let users run some apps and read their mail on their own device.There are more MDM packages on the market than you can shake a stick at, and each has its own particular selling points. So you have the likes of JAMF Software, which aims firmly at the Apple market. You didn't know that iOS has built-in client software that lets you push profiles from a server and erases the settings and data when you tell it to? Shame on you. Then you have Good Software, whose Good For Enterprise product provides stuff like an email, contact and calendar sandbox that's ultra-secure and can even be told to lock if the device hasn't talked to the server for a few hours/days. Or there's BlackBerry Enterprise Server 10, in which RIM realised that the world doesn't really like BlackBerry any more but wants to make its Android gadgets and iPhones work like the BlackBerry handsets they just dumped because they didn't work any more. And then you have the likes of IBM, specifically its FiberLink subsidiary, that has a really cool MDM offering that's Cloud-based and requires a minimal in-house software footprint. Actually, that’s only if you need particular features – for the basic MDM service it's 100 per cent in the Cloud. The point of all of the above, though, is that if the user leaves the company the proprietary data on their devices is either secured or completely erased, which is a whole lot better than opening up general access to the corporate network, two-factor-authenticated or otherwise.

發表時間:14小時前 | 評論 (0) | 全文

Asus a55dr Battery www.all-laptopbattery.com

The rare option is to stuff a SIM in your laptop; yes, there really are laptops with SIM slots just like they used to have modems back in the Dark Ages. Think Lenovo T420, for example. Next is the option of a 3G USB stick, which is one of the most popular approaches and which is actually pretty usable these days. When they first came out, particularly before Windows Vista, compatibility between dongle and operating system was a nightmare. My favourite is a “MiFi” portable access point – it connects to the 3G data network and presents the connection to your laptop via a mini WiFi hotspot. Mine cost me 30 quid, it charges quickly via a USB port, and if we're in an out-of-office meeting several of us can share it between our various laptops and non-3G-equipped tablets.You'll have noticed that I keep talking about 3G, and you're probably wondering: “What about 4G”?The answer: it's just the same. 3G was the first mobile technology that was actually fast enough to use for real computing on the move. Although 4G is a different technology, that difference is hidden from you and all you see is a much faster link. You just pick “4G” or “LTE” instead of “3G” in the settings and the device does the rest. And I really mean “much faster” - I saw a lab test run a 4G download at over 140Mbit/sec recently, for instance.

One word of warning: if you're paying by the megabyte, be careful when you go for fast technologies: a fatter “pipe” means that you can download more data than before, and hence rack up a bigger bill than before, in a given time period.So, we've talked about getting the devices connected to the world so you can access stuff with them, but how do we make that “stuff” accessible? With regards to what we mean by “stuff”, it starts with the basic email and calendar functions that we all have on our phones and then works up through browser-based applications (which again can be accessed natively from pretty much any device, as everything has a browser on it these days) and ends with applications that can only run on a particular platform and which can't be accessed natively on a portable device.The most common examples of the latter are Windows-based apps. No matter how hard you try you're not, for example, going to be able to dip into your database stats with SQL Server Management Studio on your iPhone because there isn't an iPhone version. The answer is to run them on a corporate server and to provide a “window” into that server, which means you'll have an application such as a simple Windows Remote Desktop client or perhaps a more proprietary equivalent like the VMware Horizon Client or Citrix Receiver.

In its basic form, access to email, calendars and browser-based applications is pretty noddy: for email you present an ActiveSync service as an Internet-facing service on your firewall, and you reverse-proxy your applications in a similar way to present them securely via your Internet connection, preferably using two-factor authentication, please. The users point their devices at the appropriate host, and Bob's their collective uncle. Presenting platform-specific apps will require some more thought, of course, because if you're going to give the user a VMware, Terminal Services or Citrix presentation on their client device you'll need to implement the corresponding VMware, Terminal Services or Citrix services at the server end too. Basic Terminal Services is pretty straightforward; the others are more performant and robust but more complex.Increasingly, we're told, IT types who understand their organisation's business can help their business and get ahead. But what does “understanding” the business actually mean? Why does it matter and how does an ambitious IT professional get the mix of skills needed to attain that understanding and also hit the fast track?

The IT recruitment market is flying, having picked up to a post-recession high. As IT recruiters battle to fill vacancies, competition for the best people has led to a frenzied market, with the right candidates being offered jobs at interview stage and the most sought-after skills commanding salaries up 10 per cent on this time last year.Despite the buoyancy of the market, companies still complain of skills shortages as the quest for a new breed of business-focused IT pros steps up a pace. And while the temptation may be for technical roles to wow prospective bosses with jargon and lists of technical certifications, many roles today encourage you to park the geek-speak.From programmer to project manager, regardless of the technical intricacies of your role “employers increasingly favour well-rounded IT workers with a mix of soft skills, business savvy and technical knowledge, over one-dimensional techies,” Tom Reilly, vice president at CompTIA Learning, told The Reg. Such is the need for people who can straddle both business and IT that companies are resorting to moving technically minded business people into IT in their desperation to achieve that blend.

The IT department is increasingly being seen as a profit rather than a cost centre with IT budgets commonly split between keeping the lights on and spend on innovation and revenue-generating projects. “Historically IT was about keeping the infrastructure running and there was no real understanding outside of that, but the days of IT being locked in a basement are gradually changing,” managing director of recruiter Spring Technology Richard Protherough said.The evolution shouldn’t come as a surprise: the IT department is increasingly being seen as a profit rather than a cost centre with IT budgets commonly split between keeping the lights on and spend on innovation and revenue-generating projects. We’re also seeing far more CIOs on the board rather than reporting into the CFO or director of resources.Rob White, a specialist technology and project recruitment consultant at Venn Group, has noticed growing demand for roles that can straddle business and IT competencies. Project managers have long been in demand but now the role of product manager is one increasingly in demand among tech start-ups in particular, White says. “They don’t need to write the code but they need to understand technology to deliver the project as quickly as possible,” he adds.

You're not as daft as you're cabbage looking: Train up and you can beat the MBAs at their own game And yet a recent report by the Prince’s Trust revealed that more than 40 per cent of companies are experiencing skills gaps within their firms, prompting the Royal Academy of Engineering earlier this year to launch a new programme through its Enterprise Hub to help growing businesses overcome their skills gaps.Pathways to Growth invites SMEs to apply for up to £20,000 to provide training and support in any area that will help them grow their business. “From the first round of applications, we’ve seen that these organisations have especially been looking for support to develop staff skills in sales, marketing, networking and design,” says Arnoud Jullens, head of enterprise at the Royal Academy of Engineering.For those corporates racking their brains as to the best way to achieve that mix of skills, Protherough says companies have to accept that they will have to take on a lot of the responsibility for training staff. “You’ll have to grow your own. It’s about cross-training, engaging the business into IT and getting departments to collaborate on projects.

For ambitious individuals, it’s more important than ever that they can show themselves, whether through their CVs, social media presence or during the interview process, as being in possession of the skills needed to interact with the multiple business departments in an engaging and approachable way.Rather than rely on your boss to send you on a training course, employees with a career game plan need to take responsibility for their own development and nurture the business skills so sought after by industry. Fundamentally it’s about being interested, according to Protherough.Breaking Fad What was your first streaming device? Over recent months, there has been a glut of them, but the first to find a space on my network was a Roku SoundBridge (or, more accurately, Pinnacle SoundBridge HomeMusic, as it was known in the UK).It's pretty basic by modern standards, with a decidedly clunky interface and a two line LCD display, but it can be controlled by smartphone apps, and as well as playing music stored on my Synology, it can also pick up internet radio streams.

Next up was a rather more chunky Neodigits Helios X5000, which was built like a tank, with audiophile grade components, the ability to play a wide range of HD video formats and also FLAC audio. It can't be used for audio without a TV, didn't support H.264 and turned out to have a decidedly dodgy approach to electrical insulation. So, while the SoundBridge soldiers on in the bedroom, the X5000 hasn't even been plugged in for years and just takes up space.That's something that certainly can't be said of the latest wave of streaming gadgets. There seems to have been something of a deluge of these coming my way lately, and since they're also the sort of thing that may find their way into a gadget-lover's Xmas shopping list, I thought I'd take a look at some of the things worth bearing in mind when you're shopping – though given the space, this won't be a full scale review of any of them.The QED uPlay streamer supports FLAC and AppleLossless, though the app is a little clunky The QED uPlay streamer supports FLAC and AppleLossless, though the app is a little clunky The QED uPlay streamer supports FLAC and AppleLossless, though the app is a little clunky

發表時間:2日前 | 評論 (0) | 全文

HP Compaq 8200 Battery www.all-laptopbattery.com

You will see a key ID of the last eight (sometimes 16) digits of a key's fingerprint used to identify it; that is only suitable to use for convenience, it's very possible to forge a key and make the final eight digits of the fingerprint match up with an existing target key. Always validate the entire fingerprint if you're verifying or signing someone's key.The key-signing side of OpenPGP is pretty un-fun and I haven't managed to find a nice "cuddly" tutorial to suggest at this point. Over to you, commentards?Don't even think about using Skype for anything sensitive. There is no meaningful encryption or security provided any more. It is completely open to interception by the agencies. This sporty heart monitoring device from satnav maker TomTom would be well-suited to cyclists and runners, as the average gym rat will take advantage of the heart rate sensors from the many machines Fitness First and the like offer these days. Being a TomTom, it’s no surprise that it’s GPS-enabled and the heart monitoring displays how hard you are running or cycling. Like the Adidas MiCoach Smartrun it’s a serious looking fitness watch. It’s as comfortable as any typical watch, but the clasp can be fiddly to hook to the securing holes, but fashionable it ain’t.

Setting up is done by downloading the TomTom MySport manager to a PC or Mac and connecting the watch via the docking cradle to sync and register. Standard stuff but took longer than others on test. The display isn’t a touchscreen, instead a 4-way navpad is used to access the various functions. It might seem like old and vaguely familiar display navigation tech but I’d recommend reading the online manual to get your head around its idiosyncrasies.The TomTom Multi-Sport Cardio is waterproof, so safe for a dip and although it tracks swimming activity, it doesn't monitor heart rate when you're in for a splash. The battery power is limited to 8 hours. The dedicated GPS sensor uses TomTom’s QuickGPS technology to help establish a GPS signal but as I live in London in a built up area this often took longer than a minute. However the selling point to this gadget is heart rate tracking, which shows how hard you are running measured in beats per minute (BPM). Easy, is 75-113BPM, up to Sprint level at 169-187BPM to really test you. For runners and cyclists, not wanting to splash out on a gym membership, it’s a good choice.If you want something affordable this chest strap on constantly monitors heart rate when paired with companion app for iOS and Android users. The free app also offers an eight-week training program by Wahoo to burn fat faster and improve running form as what’s the point of running if the kilos aren’t easily dropping off?

Data from the Tickr Run is transmitted through ANT and Bluetooth 4.0 to either a mobile or an ANT enabled watch or bike computer – the coin cell battery lasts about a year. While it doesn’t have the typical pedometer style activity monitoring, it can measure running smoothness, stride rate and treadmill mode works out speed and distance.It's secured around the chest and, when out for a run, you don’t notice it. Definitely aimed at those who are serious about training whether hitting the pavements, sweating it out in the gym or heading for the hills on a bike. If you need fewer features there's the standard Tickr (£50) and at the other end of the spectrum the top of the range motion analysing Tickr X (£90).Don’t fancy sweaty fingers on a screen? Then Android Wear app can take care of things when pairing a phone to a smart strap on from LG, Samsung or Motorola, oh and Asus has just stepped into the ring with the ZenWatch available in the UK from next week. With any of these, just say, for example, "Hello Google, show me my steps" to the smartwatch and you’re all set. For iOS users wanting the similar tricks with Siri, they will have to wait for the Apple Watch launch in early 2015.

These wearables certainly look like they’ll be charged alongside the smartphone each night as they are battery hungry. The Motorola Moto 360 lasts a day, with the Apple Watch expected to be the same, with up to two days for the LG and Samsung. With typical specs along the lines of 4GB internal storage and 512MB RAM and water resistant, so not for swimming, the smart strap on is glitzy but pricey. And if you don’t like the look of it, then you can change it – or design your own – as there are many watch faces to choose from proving suitable even for the likes of Joey Essex.This latest LG G smartie links to a mobile for notifications and works with any Android 4.3 or later device. Equipped with an OLED display 1.2GHz processor, accelerometer, compass, activity and heart rate monitor, this is all good stuff for an all-in-one that looks like a stylish watch. Included is the leather strap that softens up with wear but if not to your taste it can be swapped for standard watch strap of your choice.

The always-on screen means there’s no waiting to wake the watch face and you simply tap for speaking mode. Being able to read a message streamed on your wrist is useful, as is the ability to reply with a stock message such as "Yes", or "I'm running late" – or speak your response. The step counter shows a quick glance at your daily progress, but it lacks the ability to show performance over weeks and months.At £100 cheaper than the Samsung Gear S, the LG G Watch R may appear more smartwatch than fitness helper. That said, Endomondo now supports Android Wear and the LG G Watch R works with it. Just bear in mind the heart rate monitor isn’t continuous, you just take a snapshot when suits.Looking less like a lump of tech and more like a watch, the Moto 360 was a firm favourite before the launch of the LG R, thanks to its traditional round face and comfortable leather strap. Yup, crazy stuff, it just resembles a typical watch.

Still, it works with all Android 4.3 (or later) phones with the Android Wear app but best paired with a Motorola phone to make the most of it. For fitness folk’ it constantly shows how many steps have been taken in a day and features an optical heart rate monitor, however, like the LG, the heart monitoring isn’t continuous.It’s certainly more elegant on the wrist than most and the soft leather strap made this smartwatch the most comfortable on test to wear.No wearable review can be done without including a Pebble. Despite the fact that you can’t talk to it, this brand is one of the best at producing smartwatches that work with iOS or Android. The Pebble Steel look is retro with a touch of sophistication, with a leather strap for comfort or metal strap if preferred.The smart stuff includes instant notifications for incoming calls, SMS, emails, calendar alerts, with silent vibrating alarm and timer (very discreet if in a meeting). The Steel lacks a touchscreen but the monochrome LCD screen, and low spec – 80MHz ARM A3 CPU, 512kB of RAM, and a mere 8MB of storage – help deliver a seven-day battery life.Apps from the Pebble appstore include fitness tracking, running, cycling and controlling music. It’s waterproof too and swim.com has an app designed for use with Pebble watches. If you want a traditional watch that’s also on the smart side, all Pebble watches get a continuous thumbs up.

This is essentially a mini phone on your wrist with a dual-core 1GHz processor, AMOLED display and a nano SIM slot to make and receive calls without using a phone – although you need one for the initial SIM set-up.In comparison to the LG G Watch R and Motorola 360, Samsung has packed everything into this rather chunky bracelet that works exclusively with Samsung mobile devices running Android 4.3 and later. Large it may be, but it’s actually light and comfortable to wear, as the curved body helps it fit more naturally around the wrist. The watch strap is made from black plastic and faux leather giving it a futuristic look.Activated from one button, you then swipe through the various menus. It has built in GPS, accelerometer, gyroscope, compass, heart rate monitor, UV and barometer. As you begin to learn its ways, you’ll soon be searching for the screen timeout settings or it switches off after just 15 seconds. Energy saving, yes, but annoying at first, although it can be set to stay on for up to five minutes.

Set up was quick from downloading the Samsung Gear manager app to a mobile then click on search for devices. With Bluetooth you then click to pair to bring in information and contacts from your phone.The Gear S can continuously monitor your heart rate and depending on how recent your Samsung phone is, data can be shared with the S-Health app. In tests, the heart monitor worked on every attempt for cardio training. Another nice touch is it doesn’t need to be connected to a phone if out running or at the gym. Still, it’s expensive and you’re tied to Samsung mobile products to get the most out of it.Don’t get me wrong: Chromebooks have their place in terms of functionality and also price point, but to a lot of users, selling them one is doing them a disservice.Chromebooks are primarily content consumption devices, not creation devices. It could be argued people hold unrealistic expectations. A £200 Chromebook is not going to be as fully featured as a £800 MacBook Air, or any proper notebook in general.The same can be said for off-brand tablets that many people will find under their Christmas tree and expect to work just as well as a Samsung or an iPad. These devices are cheap for a reason. Sub-par devices that PC World pumps out for £199, and that last six months, will sell very well for irrational factors such as the shell’s colour.

發表時間:5日前 | 評論 (0) | 全文

Dell Inspiron 9400 Battery www.all-laptopbattery.com

I'm not too keen on wrecking my main mode of transport, Healy said.The pair were philosophical about the risk to life and limb, however.You could realistically use this as a means to target someone, but you could also just hit them with a car, Ryan said. Malware has emerged from war-torn Syria targeting those protesting the rule of ISIS (ISIL, Islamic State, whatever the murderous humanity-hating fanatics are calling themselves these days.)The trivial Windows spyware, analyzed by University of Toronto internet watchdog Citizen Lab, was sent out in a small number of emails aimed squarely at members of the group Raqqah is being Slaughtered Silently (RSS) – which is holed up deep in ISIS-controlled territory and campaigning against the medieval terror bastards.The booby-trapped emails purport to come from a Canadian expat group that wants to help the fight against ISIS. The messages ask the recipients to check over a report about the actions of the religious fanatics. Clicking on the URL leads to a file-sharing account with TempSend, and downloads an archive called slideshow.zip.While the zipped folder does contain a few maps, it also holds some simple but dangerous spyware called AdobeR1.exe: when run, it emails the infected system's public IP address to its masters. There's no backdoor or other sort of remote access – the computer simply emails out its network address whenever it boots up.

Just getting the IP address may not sound like much, but it could be useful information in the hands of a determined killer, and may narrow down the location of a target, if not pinpoint it using geolocation.Syria's internet access is so fractured and scarce that mapping IP addresses to particular locations isn't impossible: imagine a person regularly using a cafe for web access; if ISIS can map the cafe's network address to its physical location, it will know exactly where that person is when he or she switches on their laptop.(This is assuming the target hasn't heard of Tor or VPNs. Of course, if the IP address leads to the wrong place, kicking down a door and slaughtering everyone inside is just a Monday morning jolly for ISIS, anyway.)In areas of the bloodstained country still run by the Assad regime, internet access is provided by the state telco, which of course has its own IP address block. So a machine running the spyware with a network address in that range could well be within those Assad-held sectors.In the north of the country, largely controlled by the Free Syrian Army and Kurdish forces, internet access is almost exclusively provided via commercial satellite internet, which again has its own IP range.

And someone with the right skills could use the leaked public IP addresses to prod a victim's machine for software vulnerabilities to exploit, leading to a full system compromise and, ultimately, death.This malware is pretty basic and buggy, we're told. Citizen Lab senior security analyst Seth Hardy told The Register that the code only sends out the initial IP discovered, and doesn't update itself, which the analysis team think is down to bad coding. The emails it sends out also don’t use any encryption.On the balance of probabilities, Citizen Lab thinks it's highly likely the malware involved has been developed by ISIS. The Syrian government has its own spyware that installs a backdoor and opens link back to government agents so they can remotely control the infected PC.The other possibility is that the code has been purchased from one of many unscrupulous outfits that sell malware to the highest bidder, often quite legally. But the new sample doesn't look like it came from one of these cyber-merchants.It's not even close to commercial samples, Hardy said. It definitely looks like it has been developed internally.

The spyware has now been fingerprinted and the signatures published for antivirus products to use, so hopefully security software companies will be able to block further infections. But Hardy said it would be trivial to tweak the code to evade detection again.It's possible the code is the work of British hacker Junaid Hussain, who was sentenced to a six-month stretch behind bars in 2012 for infiltrating the email account of an aide to Tony Blair, and flooding the UK's national anti-terrorism hotline with spoof calls.Hussain has since skipped bail and fled Blighty. According to various tweets he is now operating in ISIS-controlled territory and may be using his computer skills to create malware, as he did in his earlier hacking attacks.We can't say for certain where this malware came from, but based on what we're seeing in the Lab the entry costs and expertise needed for these kinds of attacks is falling drastically John Scott-Railton, coauthor of the Citizen Lab study, told The Register.

Malware like this is becoming the digital equivalent of the AK-47; it's cheap, easy to use, and can be very dangerous when it's used by militant groups looking to find their enemies. Product roundup Under the tree this Christmas, wearables beyond woolly socks, gloves and tasteless jumpers will be in abundance. Wristbands and smartwatches that track our activity now cover a diverse range of prices and functions. Most offer ‘lifelogging’, the latest buzzword used to describe monitoring everything you do from exercise to sleep.You’ll be hard pressed to find a strap on that doesn’t have an accompanying app that shows the bigger picture of activity. This information can even be used to trade off your exercise burn against the calories consumed from your daily diet and keep track of any activity goals.To make your slob shopping easier, in this round-up of 20 wearables, we’ve grouped similar types of devices together. You’ll find designs offering different advantages from simple to sophisticated; long battery life down to daily charges and basic activity tracking to devices specialising in cardio workouts.

So is getting a fitness wearable going to be an awkward gift, much like getting fragrant toiletries? Instead of wondering if it’s a hint that you smell, will a health monitoring band insinuate you’re a slob? No doubt there will be some teasing around that, but for those with the gift of fitness in mind, you'll find there are devices aplenty to suit all comers.With this selection, out-of-box-set up is straightforward with Bluetooth pairing to a companion app on iOS, Android and some like Fitbit support Windows phones too. These wearables show limited information on goal progress, with workouts and other details viewable from the app. They all offer a ‘social motivation’ aspect, that some folk may get excited about – connect and compete against others, if that’s what it takes to get you going.For overall lifelogging, FitBit and Jawbone are among the leading lights, which makes the Flex a safe choice. It’s unisex too, with two sizes of wristband supplied, available in 10 colours. It's very light and the silicone band is extremely comfortable – most of the time you don’t notice your wearing it. Set-up is quoted as 10 minutes, which was spot-on and and its rechargeable battery lasts about a week. You also get a wireless dongle to hook it up to the desktop version of the app to make getting into details easier.

The Flex has a few winning reasons to consider it, as it’s water resistant to 10 metres – so it's wearable in the pool – logs vigorous exercise not just steps walked and has quick syncing to mobile GPS (iPhone only for now) to map runs and walks. It also syncs with Fitbit Aria Wi-Fi scales to calculate body mass index (BMI). However, the sleep monitor needs to be activated just before you drop off, which is typical of all fitness bands, albeit a tad impractical.The Fitbit Flex is one of the cheapest ways to join the holistic gang for monitoring everything in daily life, with one of the best UI apps that opens and syncs instantly. Coming soon is the Fitbit Surge, which includes smartwatch features, along with fitness tracking, but no UK release date yet.With this new budget device, Jawbone puts an affordable activity tracker with an informative companion app in the hands fitness fans. The Jawbone Up Move works as a clip on device to wear on clothing, although a wrist strap is also available, but it does look a bit cheap. It does the usual calorie counting, activity and sleep tracking (as getting a good night’s kip is as vital as exercise) with tips on how to improve your daily routine. The battery life is a boon too, with Jawbone claiming it should last six months.The Up Move is more functional than fashionable – especially if worn as a wristband – but compared to others on test, it is incredibly easy to set up. Simply pop in the coin battery, download the Up app and then pair – all done in a couple of minutes.On its face, information is shown on 12 white LED’s for an at-a-glance view of fitness goals and the current time, with coloured symbols – orange (for activities) and blue (for sleep) – indicating the active mode. Although the Up Move lacks the finesse of other Jawbone trackers, when clipped on clothing it goes unnoticed and like Fitbit devices, it offers a great app.

Stob Laud Satya Nadella stood at the leaded casement of his garret, contemplating the ominous, brooding sky to the south. The flag over the Maeiouster's Hub Complex barely stirred in the still air, so that he could not only see the sigil of his once-proud house - gules and vert oblongs accroupis sur a respectant brace, azure dexter and jaune sinister, of quatrocons, conjoined to the Mark of Registered Trade - but also make out the motto VENIT FENESTRAE (which, as everybody knows, is Old Visbasian for Windows is coming) proudly emblazoned in the finest, most delicate Comic Sans that the T-shirt weavers of Old Redmond could fashion.Behind him, on his desk, his laptop was making a curious skirling, like an unconvincing communicator prop from a defunct 1980s sci-fi franchise. Nadella sighed, left the window and touched the machine's screen, and, in just that 15 mysterious seconds it sometimes takes Explorer to relinquish enough processor time for anything else to get a look-in, he was skyping with his castellan, who was sat in the room next door.A small, balding man entered the room, smiling thinly and nervously. He said: Sit you securely on some sumptuously saddled sorrel stallion, sire?Nadella groaned inwardly. Before the change in regime, Maeistor Allyne-the-Alliterator had spent some time - or many mad months as he would have put it - working on a top secret Touch-Word for Surface 3 extension intended to introduce the potent productive power of poetry (Allyne again) to all your everyday business communications. The project, like so many, had perished with the old regime, but too late, Nadella suspected, to save the maeistor's reason.

發表時間:6日前 | 評論 (0) | 全文

Acer Aspire 4755 Battery www.all-laptopbattery.com

The wizards and watchers of Silicon Valley outdid themselves in trying to justify WhatsApp, calling it a smart play for traffic and users. Facebook has looked for growth in new members internationally and in mobile, and WhatsApp - with 450 million users and 70 per cent of these active on any given day - arguably delivers Facebook both.But the deal was stock and shares - $4bn of the former. Facebook simply called WhatsApp “incredibly valuable.” That was it. That’s all it takes.In the shadow of WhatsApp, Oculus Rift was an rounding error. According to Facebook’s CEO Mark Zuckerberg, he is focusing on what platforms are next for entertainment and personal use. The boy wonder should take care: Oculus Rift was hitting seriously cool status among geeks and nerds, and the primary concern is that Zuckerberg’s Big Co kills what they saw as a promising technology and company.In so doing, Facebook loses the very users that have been giving it underground cool status and helping drive the excitement around it.Microsoft paid a relatively meager $2.5bn on Mojang, maker of pre-teen hit Minecraft - the most popular game in history with 100m downloads. But like Facebook, Microsoft was decidedly terse on the whys of the deal.

What does Microsoft get? The game itself and the development studios and people in Stockholm, Sweden, who built it but not the company's founder who's cashing out. What else? Microsoft wasn’t saying at the time and hasn’t said since, preferring like Facebook on Oculus Rift to avoid talking about it like it never happened or we dreamed the whole event.Microsoft chief Satya Nadella was reading from the Zuckerberg M&A script when he said simply that Minecraft is an “open-world platform driven by a vibrant community” that’s “rich with new opportunities.” The PR-friendly answer: “opportunity. The business answer: “wait and see. “Opportunity” is the buzz-phrase Nadella’s predecessor employed to justify Skype and Aquantive, neither of which worked out.Crypto toolbox, Part II In the first article in this two-parter on building your own crypto toolbox I covered older tools that have been around for a relatively long time now: Truecrypt and OpenPGP. Here, I will go in a different direction and look at ways of protecting instant messaging, general web-browsing, and how to trust the operating system where we run these tools.

If you need secure voice or video chat, the commercial Silent Phone service (from Phil Zimmermann's Silent Circle) is generally regarded as robust and trustworthy, as it builds on top of the security model of the old PGPfone. It is available for Windows, Android and iOS – but OS X seems to be notably absent at present.From a practical standpoint the VOIP experience on Silent Phone is not as polished as you may be used to from Skype – for example, there's no-to-poor echo cancellation – so I strongly recommend using a proper headset rather than speakers and the crummy mic built in to your webcam or laptop. For the sake of completeness it must also be noted that this is a proprietary closed-source service; it's up to you to decide if that's a deal-breaker for you. Like it or not, this is what's used and trusted in certain circles.For the instant-message generation, a plugin called OTR (Off The Record) offers end-to-end protection for communications on compatible IM services and applications.The combination used by NSA whistleblower Edward Snowden and his supporters is to use the open XMPP IM protocol, often on the Pidgin client, with this OTR plugin to provide the security. Youíd then transmit over Tor for general anonymity, using the TAILS OS for local security, which I'll come to shortly.

OTR uses some of the same Public-Key crypto concepts as OpenPGP, but with a focus on protecting live chat sessions. Once you have established a secured OTR session, you can be sure that nobody is snooping on your conversation – but after the fact, what you said can't be held against you. The person you're chatting with would be completely able to forge the digital signatures, meaning third parties can't prove that you yourself said something.This is in stark contrast to PGP, where a signature is a very strong proof of the authorship of a message.As with OpenPGP, you are responsible for checking the key fingerprint of the person you're communicating with. Unlike PGP, however, there is no concept of signing someone else's key to be able to transfer trust – you will definitely need to check manually. As with PGP, a Skype video call is suitable - I recommend doing a full Fingerprint check rather than using any question and answer alternatives, as that's what makes me most comfortable in terms of robustness of security.

There are a wide range of public servers using Jabber that is based on XMPP. Because Jabber is federated, users on one server can communicate freely with users elsewhere – provided that both ends offer server-to-server TLS encryption. The general Jabber server-admin community has recently moved towards absolutely requiring server-to-server encryption, which has had the effect of cutting off Google Talk users from pretty much everyone else.One Jabber server offered by the German Chaos Computer Club is used quite heavily and is available as a Tor Hidden Service, although they don't offer much in the way of guidance or hand-holding.American tech-collective Riseup offer email accounts with matching Jabber service, have very nice tutorials for a variety of chat clients (including Adium for OS X users), and their server can also be reached as a Tor Hidden Service, although you will need to request an invite to sign up for their services.The OTR plugin's website has links for some tutorials on its use. I found this one to be very thorough and covered everything for Windows. A little bit of digging elsewhere revealed a similar guide for Adium users in OS-X-land.

While you can use GPG to secure the contents of your email, a state-level adversary with extensive taps on the big intercontinental submarine cables will still be able to see that you are emailing this other person. If someone from a government or military IP address range started sending encrypted mail to known investigative journalists (or other potential enemies of the state), there's a very strong risk there – even if the security forces can't read the contents of the messages.Also visible for your ISP to see – and therefore also freely visible to the state via their ability to twist your ISP's arm in secret – is your web browsing, instant messaging, and anything else you're doing.The most robust way to anonymise your internet use is to use Tor (The Onion Router), which does a very robust job of evading that sort of surveillance.We know it works well because we've got the NSA's slides where they describe how much they hate it. They describe it as a CNE [Computer Network Exploitation] headache, which is a superb seal of approval.

It is worth noting that Tor provides anonymity. That's it. It does not automatically provide security or privacy. If the exit node you are using (the point where your traffic exits the Tor process and emerges on to the normal internet) is unscrupulous, evil, or just hacked, (or, run by GCHQ) it has the ability to intercept the contents of your communications. It won't automatically know who you are (e.g. your real IP address), because that is hidden by Tor – but it can see what you're sending and receiving.We love our gadgets and phones and suchlike. Gadgets can also make great gifts, so long as you get the right one.Some this Christmas season - like me - will no doubt have thought what a great idea it would have been to buy their partners (or some other significant loved one in the family) a new laptop, device, or tablet as a present. It is surely a quick win, and we know what we are buying, right?Not so fast. The problem in my case - and quite a few other people who work in IT - is that that person you are buying for isn’t as technical. Fair enough. Not everyone is, and nor should they be.The big mistake I made was taking my intended gift recipient (in my case my wife) to see a range of laptops so I could get a steer on what caught her interest.

“Anything within reason” was the financial limit.There was “umming”, there was “ahing. Some - I'm looking at you, Hewlett-Packard - were just butt ugly so were quickly ruled out, Beats Audio or no Beats Audio. There was also the obligatory pushy salesman who was given the cold shoulder.Then she saw it - the sunset-orange colour Chromebook. This was “the one”. I was worried. I knew straight away this was trouble - Chromebooks have their place but they are not laptops.When pressed as to why it HAD to be this device in particular all I got was: “I like the colour and it looks cute.” Arguments about iTunes, Word and not being able to store many files locally failed to dissuade her from the fact that this was it. The Celeron logo was what worried me more than anything. We left without making a purchase.Days later and alone in John Lewis, and in all good conscience I plumped for a Lenovo Yoga 11.2. OK, so it was roughly three times the price, but it did what her current laptop did and came with a touchscreen and a nice Hello Kitty/handbag friendly colour.

發表時間:7日前 | 評論 (0) | 全文

Sony VGP-BPS13B/Q Battery www.all-laptopbattery.com

If you haven’t seen the 2014 Cameron Diaz and Jason Segal “comedy” first of all, lucky you, but secondly, let me tell you what happens. A jaded married couple video a three-hour sex session on their iPad. Presumably a new 128GB model without much else on it yet. Said video syncs to iCloud overnight, and then squirts itself down onto the iPads of numerous friends, relations, and passing tradesmen that the jaded couple have generously given iPads to. Yeah, with the jaded couple’s iCloud account still set up on it.This precipitates a madcap series of mini-heists as the still jaded couple try to retrieve the actual iPads in question. Rather than, say, deleting the file and re-syncing. Or overwriting the file with an innocuous (hopefully shorter) dummy video. Or a zillion other things. Reader, I walked out of this one.With Windows 8 proving unpopular with power users and OS X Yosemite eliciting pointed criticisms and even talk of Apple losing some of its just works magic, the Linux desktop may well be the refuge power users and developers are looking for.

Melamut points out that while Ubuntu for phones gets all the press, Canonical has also been ramping up its cloud options as well, targeting dev ops, cloud developers and the like with OpenStack environments and other tools that make developer's life easier. If you're using it in the server room, why not your desktop as well?That's the user the openSUSE project plans to target, chasing what openSUSE senior consultant Douglas DeMaio calls power users and making openSUSE, in DeMaio's words: The MIT of Linux distros.The focus on power users isn't new for openSUSE, which has long offered the very sysadmin-friendly YaST as one of its big selling points. Over the past couple of years, openSUSE has completely re-written YaST in the more developer friendly Ruby language (previously YaST was written in a homegrown language) in an effort to draw more power users and sysadmins to YaST and the openSUSE platform.DeMaio told The Reg openSUSE plans to continue making improvement to YaST and focus on other power user features and tools like the recent move to Btrfs as the default file system. For openSUSE, the name of the game is evolution, not revolution. The innovation is in the process, said DeMaio, it's in the tools.

The Fedora Project has taken a similar approach, but in a more radical way. Fedora has long been a massive, sprawling project with dozens of different spins, speciality deployments and niche packages. On one hand this is part of what allows Fedora to bubble up some very interesting projects, like the DevAssistant tool for developers or its robotics package setup. The problem with this nebulous approach is that the lack of cohesiveness has made it hard at times to figure out where the project is actually headed. It often seems like it's headed everywhere and nowhere at the same time.That changed this year with Fedora.next, which essentially envisions Fedora as an onion with several different but connected layers. There's a couple of core components, a bare OS and then a base system - Fedora minimal if you will - then comes something new, what Fedora calls environments or, or if you prefer the marketing term, flavors.These are the different setups that arrived when Fedora 21 was released. Right now there are flavours for cloud, server and workstation environments (the latter is basically a desktop environment geared at software developers).

Fedora Project lead Matthew Miller likens the new structure to Lego. The idea is: we can take some of our bricks, and we can ship those as sets, he told us, and maybe even, unlike Lego, we will ship them pre-assembled for you, but we’re not gluing them together, and we’re not getting rid of the basic supply of bricks.The modular approach also sets the stage for other directions in the future. Right now the flavours are cloud, server and workstation because those are the places the distro is focused. Down the road, if Linux-friendly hardware emerges in the mobile device world then perhaps we'll see a new mobile flavour from Fedora.Fedora's approach mirrors what's long been the guiding principle of good GNU/Linux software: small parts loosely joined. This will no doubt cue comments about the evils of systemd, but at the structural level at least the modular approach seems alive and well in Fedora.While most of the Linux world may be ignoring the mobile future for now, or perhaps waiting to see how Canonical fares, there's a second, slightly less glamorous possibility for the future of the desktop PCs where Linux fares quite well - the return of the desktop/laptop.

When Apple’s iPad arrived, pundits proclaimed the end of the PC and so forth, but what we learned from dabbling in mobile is just how valuable our laptops really are. And when we get back, desktop Linux will be there waiting with open arms. I picked on this one because it’s fresher in many peoples’ minds but I could have picked on almost any Bond flick of the post-internet era. Skyfall’s an example of the cinematic crime of gloriously pretty data visualisation. Real code is (occasionally hilarious bracketed comments aside) profoundly dull to gaze upon.In one pivotal scene in Skyfall Ben Whishaw (as Q) scrolls through a very cinegenic jumble of code on villain Silva’s captured laptop. Bond (Daniel Craig), who is generally presented in the films as a sort of anti-nerd luddite, spots a word in plain text in the middle of this whirligig of Unix jibber-jabber and uses that as a key to decrypt the whole thing.That and Silva’s “server farm” that is apparently operating on Japan’s Hashima Island without any kind of cooling or visible cabling. Oh, and the repeated intrusions into M’s laptop that never stimulate a shocked sysop to spirit it away for testing, disinfection, and/or destruction.

This most recent entry in Marvel’s all-conquering suite of superhero flicks reprises two popular IT-related conceits. There’s the “personality uploaded into a computer” trope, with a pleasing retro twist. And there’s the Magic USB stick.The Magic USB stick is a perennially popular meme in modern cinema. The Magic USB stick has all the functionality of an Intel Compute Stick plus some extra tricks from War Games and Lord Of The Rings. Captain America’s one features the ever-popular GUI-powered traceroute function that we know and love from every hacker and phone tapping scene in movie history.It also works in reverse, phoning home when it’s being accessed. Nothing impossible there, just needlessly pretty. Plus you can’t help thinking that editing the computer’s hosts file to loop the cry for help back might have shaved 20 minutes or so off film's 136 minute run time.If you’ve ever seen a film where a computer nerd has about nine monitors all hooked up to one workstation. If you’ve ever seen a film where the screen flashes the words “ACCESS DENIED” and then the nerd types the words “OVERRIDE PASSWORD” as fast and hard as he can for abut 22 seconds, before announcing “We’re in”. If you’ve ever seen a film where hacking involves having as many vaguely videogame-looking windows open as possible and shouting randomly-combined words from Windows 95 For Dummies, then you probably don’t need to see 1995 piffle-festival Hackers.

Named, as far as I can tell, after the password in a Marx Brothers movie, the 2001 IT fantasy Swordfish is notable for casting Hugh Jackman as some sort of computer expert. Six foot, handsome as all get out, socially functional Hugh Jackman. That’s more improbable than all the really fast typing. Stats from self-pleasuring site Pornhub (link vaguely NSFW - no pics but still contains the word Pornhub) show that mobile viewing has overtaken desktop, and Android is the OS of choice for viewers of its select content.The, ahem, growth is in part down to the site removing its limit on the number of videos a day that can be viewed on a mobile. Phone-only just edged ahead of desktop at 45 per cent, with tablets taking a surprisingly low 11 per cent.The trend to mobile is strongest in US, with 56 per cent of the smut site's users looking at it with a mobile device, 32 per cent with desktop and 12 per cent with a tablet.The UK has the highest proportion of tablet users at 18 per cent, with 47 per cent mobile, and 35 per cent at the desktop (or laptop).However, the shift to mobile isn’t dictated by the level of technology adoption in a country. According to Ericsson research, Stockholm is the best connected city in the world ... and yet in Sweden desktop connection is still strong at 49 per cent, while mobile is at 38 per cent and tablet at 13 per cent.

Looking at the year-on-year figures, the growth in tablet usage is surprisingly slow. The rate of switching to mobile, however, does reflect the rapid adoption of smartphones in many parts of the world.Pornhub helpfully breaks down the mobile OS usage, and this is broadly in line with mobile OS installed base, with Android having the biggest share of Pornhub watchers at 49.9 per cent, iOS at 40.2 per cent and Windows at 2.6 per cent.Windows does walk away with one accolade, namely the growth over 2013 being 52.3 per cent, while iOS dropped 4.8 per cent, and BlackBerry 47.6 per cent. One for the Lumia product people to think about perhaps.Maybe we’ll see phones sold on the basis that displays have been optimised for skin tones, and spun to make it seem a selfie friendly move.The ranking for the most popular porn star shows that Lisa Ann is the most lusted after, followed by Madison Ivy, Asa Akira, Christy Mack and Brandi Love.And the stat which will have any IT manager's eyes bulging (probably more than the act of looking at Pornhub itself) is an average bandwidth of 50GB a second with 1.5 exabytes served over the year, or 11 videos viewed for every person on the planet.

發表時間:8日前 | 評論 (0) | 全文