<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6064380323050151356</id><updated>2024-11-05T18:46:00.907-08:00</updated><category term="smartphone"/><category term="GOOGLE"/><category term="Questions answers"/><category term="SECURITY"/><category term="android"/><category term="CYBERSECURITY"/><category term="Internet"/><category term="ARTIFICIAL INTELLIGENCE"/><category term="Apple"/><category term="CYBER SECURITY"/><category term="MALWARE"/><category term="Video Games"/><category term="iPhone"/><category term="microsoft"/><category term="social media"/><category term="Augmented Reality"/><category term="ELECTRIC CAR"/><category term="IBM"/><category term="SOCIAL NETWORK"/><category term="computer"/><category term="messaging"/><category term="social networks"/><category term="technology"/><category term="3D PRINTER"/><category term="CONNECTED OBJECT"/><category term="Facebook"/><category term="Motorola"/><category term="SMS"/><category term="VR"/><category term="Virtual Reality"/><category term="cpu"/><category term="3D PRINTING"/><category term="ADDITIVE 3D PRINTING"/><category term="AIRPOD"/><category term="AIRPODS"/><category term="ARTIFICIAL NEURONE"/><category term="AUTONOMOUS SHUTTLE"/><category term="BLOCKCHAIN"/><category term="BOAT"/><category term="BOAT PRINTED IN 3D"/><category term="Billy Goat"/><category term="CONNECTED OBJECTS"/><category term="CONNECTED RING"/><category term="CRYPTOMONIA"/><category term="Covid-19"/><category term="DRONE"/><category term="DRONE DELIVERY"/><category term="DRONE DELIVERY AMAZON"/><category term="EARTHQUAKE"/><category term="EARTHQUAKE ALERT"/><category term="EFFECTS OF LIGHTNING"/><category term="ELECTRIC SUV"/><category term="ELECTRIC VEHICLE"/><category term="ELECTRONICS"/><category term="FOLDABLE SCREEN"/><category term="FOLDING SCREEN PROTOTYPE"/><category term="FUNNY OF TECH"/><category term="GEOLOCATION"/><category term="GO TO TOILET"/><category term="GOOGLE CHROME"/><category term="GOOGLE MAPS"/><category term="HTC EXODUS"/><category term="HUMAN SKIN"/><category term="INTERNATIONAL BUSINESS MACHINE CORPORATION"/><category term="IPOD"/><category term="LEARNING MACHINE"/><category term="LITHIUM-ION BATTERY"/><category term="MINING BITCOIN"/><category term="MOBILE APPLICATION"/><category term="MOBILE OPERATING SYSTEM"/><category term="NANOFIBRES OF CELLULOSE"/><category term="NEUROMORPHIC CHIP"/><category term="Network"/><category term="OLYMPIC GAMES TOKYO 2020"/><category term="OPERATION OF THE CATARACT"/><category term="PASSWORD"/><category term="PC"/><category term="PHOTO SENSOR"/><category term="POKÉMON GO"/><category term="POLICE"/><category term="PRIVACY PROTECTION"/><category term="PRIVATE DATA"/><category term="PROCESSOR"/><category term="PROSTHESIS"/><category term="PUREVPN"/><category term="RANSOMWARE"/><category term="ROBOTIC"/><category term="SAMSUNG"/><category term="SAMSUNG GALAXY FOLD"/><category term="SEARCH ENGINE"/><category term="SEO"/><category term="SMARTPHONE WITH FOLDING SCREEN"/><category term="STORAGE SPACE"/><category term="STORAGE TIME"/><category term="STRONG PASSWORD"/><category term="SUPERCAR"/><category term="SUPERCAR ELECTRIC"/><category term="SURGICAL ROBOT"/><category term="SUV"/><category term="TOILET GLASSES"/><category term="TWITTER"/><category term="Touchscreen"/><category term="VPN"/><category term="XIAOMI"/><category term="adware"/><category term="battery"/><category term="connection"/><category term="mms"/><category term="supercomputer"/><category term="tablet"/><title type='text'>News Technology</title><subtitle type='html'>This blog talks about All the news of IT and technologies</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default?start-index=26&amp;max-results=25'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>84</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-5008856417405978590</id><published>2021-07-05T04:33:00.003-07:00</published><updated>2021-07-05T04:33:22.123-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CYBERSECURITY"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Network"/><title type='text'>What is a VPN? And above all, who is it for?</title><content type='html'>&lt;h1 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;What is a VPN? And above all, who is it for?&lt;/h1&gt;&lt;div&gt;&lt;b&gt;We often hear about it in sponsored videos or the tips of the &quot;French days&quot;, VPNs are popular. These private networks offer many useful features for those who want to use the Internet safely and without border restrictions.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;But concretely, what is a VPN? Let&#39;s go back to the fundamentals of these private networks: their usefulness, strengths and cost to explain the raison d&#39;être of these remote servers intended to protect Internet users ...&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Who are these private networks for?&lt;/h2&gt;&lt;div&gt;To all those who wish to increase the security of their activities via the internet! Many individuals opt for a VPN to protect their personal information or to bypass geographic censorship. But professionals can also benefit from this technology, which guarantees the integrity of their corporate network as well as the protection of all sensitive data relating to the development of their activity.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEZnaozLRuwqSe_TMuc7CJ51Tz43C_ZbEuBTYwQdJotiZaemHX7Id8OcSYDVhaz7seaTxscG1N8kPuTfEEph9wv-IXiabF8ztl6NqtZQ1kb6cbMPOMGrXmtfUmyIBbw_fMqne_H5qZLC9F/s1920/vpn-4255479_1920.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEZnaozLRuwqSe_TMuc7CJ51Tz43C_ZbEuBTYwQdJotiZaemHX7Id8OcSYDVhaz7seaTxscG1N8kPuTfEEph9wv-IXiabF8ztl6NqtZQ1kb6cbMPOMGrXmtfUmyIBbw_fMqne_H5qZLC9F/w640-h426/vpn-4255479_1920.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;The VPN abolishes borders and allows you to have access to Netflix, Disney +, HBO catalogs ... which become accessible ©&amp;nbsp;&lt;span face=&quot;&amp;quot;Open Sans&amp;quot;, Arial, sans-serif&quot; style=&quot;background-color: white; color: #191b26; white-space: nowrap;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://pixabay.com/?utm_source=link-attribution&amp;amp;utm_medium=referral&amp;amp;utm_campaign=image&amp;amp;utm_content=4255479&quot; style=&quot;color: #191b26; cursor: pointer; margin: 0px; outline: 0px;&quot;&gt;Pixabay&lt;/a&gt;&lt;span face=&quot;&amp;quot;Open Sans&amp;quot;, Arial, sans-serif&quot; style=&quot;background-color: white; color: #191b26; white-space: nowrap;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Can a VPN improve the security of your computer?&lt;/h2&gt;&lt;div&gt;Yes ! Finally ... to be more precise, the VPN makes it possible to obtain an encrypted connection which offers a high level of confidentiality. Internet use then becomes untraceable, which reduces the risk of cybercrime as well as the theft of personal data (health information, bank details, etc.). By opting for a private network, your computer connects to a remote server which makes your online activities as well as your browsing history completely anonymous. This is a great way to guard against cyber attacks that do not abate.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;a_bid=7f3fa004&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot; target=&quot;_top&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;250&quot; src=&quot;https://affiliates.purevpn.com/accounts/default1/6hb82wqa2l/7f3fa004.png&quot; title=&quot;&quot; width=&quot;250&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Is it possible to watch series that are only accessible from USA?&lt;/h2&gt;&lt;div&gt;This is one of the other advantages of the VPN: the abolition of borders to navigate on sites inaccessible from France. And of course, this also concerns streaming services which make it possible to discover new audio-visual content that cannot be found in French catalogs, for example. Netflix, Disney +, HBO ... So many services that are becoming accessible. In this case, all you have to do is choose the virtual location of the desired country when you connect with the VPN.&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Is it paying? If so, is it expensive?&lt;/h2&gt;&lt;div&gt;There are free VPNs, but for these entry-level offers, the level of security or functionality remains moderate. However, purchasing a paid VPN is not overly expensive considering all the peace of mind and privacy that comes with using it. The loading speed as well as the number of available servers are also strengths of paid VPNs!&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;a_bid=7f3fa004&quot; rel=&quot;nofollow&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;151&quot; data-original-width=&quot;644&quot; height=&quot;47&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJbtknapC5uuZHXJmPOxTf1Q2zNtjvhWwgfECnqxpFMwGoiaTvAGdd2D_n4iM5Hr_3lz8I4ucQ5SvmjhZKdlJaT3AUA6QpiR3xqJXnfhf-7mk9GclPDYW_xaaAvypqIodc6rl0UWikXOgH/w200-h47/get+PureVPN.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;For less than $ 12 per month, you can ensure a reliable and secure connection that will avoid many unpleasant surprises.&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Is it complicated to install?&lt;/h2&gt;&lt;div&gt;You would think that, given its technical features, setting up the VPN would be complex, but no. Step 1 consists of subscribing to the offer that suits you: prices, options, number of simultaneous connections. Then simply install or download the software to be able to use it on your computer, tablet or smartphone and follow the configuration steps step by step.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;a_bid=7f3fa004&quot; rel=&quot;nofollow&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;127&quot; data-original-width=&quot;931&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIb070QxNZY6UX7pneF5EX_2hVfcevxMqioB2JSk1vCocCfiD4EZRilzQ-oZ2DHqxh5ZvCeMNpbf4w6cVD7kgy7XgD9cdBKJngo0coTMN7ToH878WYs8mPQv9cIP6FhIeVDTV9g1yKuc20/s320/I+want+to+get+PureVPN.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;For the launch, you will have to select the connection country according to your needs and that&#39;s it! From then on, all your activities will go through the VPN connection and will therefore be 100% anonymous.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/5008856417405978590/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/07/what-is-vpn-and-above-all-who-is-it-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/5008856417405978590'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/5008856417405978590'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/07/what-is-vpn-and-above-all-who-is-it-for.html' title='What is a VPN? And above all, who is it for?'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEZnaozLRuwqSe_TMuc7CJ51Tz43C_ZbEuBTYwQdJotiZaemHX7Id8OcSYDVhaz7seaTxscG1N8kPuTfEEph9wv-IXiabF8ztl6NqtZQ1kb6cbMPOMGrXmtfUmyIBbw_fMqne_H5qZLC9F/s72-w640-h426-c/vpn-4255479_1920.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-5920548013577086910</id><published>2021-07-02T02:21:00.007-07:00</published><updated>2021-07-02T04:31:10.124-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="connection"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="SECURITY"/><title type='text'>Summer vacation: how about getting a VPN?</title><content type='html'>&lt;h1 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Summer vacation: how about getting a VPN?&lt;/h1&gt;&lt;div&gt;&lt;b&gt;With the approach of going on vacation, many wonder about the usefulness of taking a VPN to secure their Internet activities when they use a wifi other than the private network at home.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;To connect to public wifi, to be able to travel serenely or to watch new audiovisual content anywhere, VPNs have all the arguments to be in your luggage (or at least on your smartphone or your computer!)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUDlYdbRebhMwN8MqjTQ9KX21FDiwYsSHcifltSfM92oij6ADl9xMIDRyF47aosDfsXUxIEG2G-JERj7gSjDgcY7gfElp2v4NMdO3y6bJE7e14369KTfgQIsUAmbVLTN8IXLKqeCeZBz1f/s1024/Summer+vacation+how+about+getting+a+VPN.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img alt=&quot;Summer vacation: how about getting a VPN?&quot; border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;1024&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUDlYdbRebhMwN8MqjTQ9KX21FDiwYsSHcifltSfM92oij6ADl9xMIDRyF47aosDfsXUxIEG2G-JERj7gSjDgcY7gfElp2v4NMdO3y6bJE7e14369KTfgQIsUAmbVLTN8IXLKqeCeZBz1f/w640-h320/Summer+vacation+how+about+getting+a+VPN.png&quot; title=&quot;Summer vacation: how about getting a VPN?&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/h2&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Why is a VPN particularly useful for connecting to public wifi?&lt;/h2&gt;&lt;div&gt;Did you know that it is also possible to use VPNs on mobile? This is all the more important if you regularly connect to public wifi! For example, with a VPN like PureVPN on your phone, you can be well protected, no matter where you are. In fact, it is very easy to log into your PureVPN&amp;nbsp;account and thus enjoy a fast connection to the nearest server.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;

&lt;div&gt;Unlike private wifi accessible in private homes and protected by a password, public wifi is open to all users. Stations, airports, cafes and restaurants, shopping centers ..., wifi hotspots offer mobile users the possibility of surfing and using online services without digging into the data of their mobile plan.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;a_bid=7f3fa004&quot; rel=&quot;nofollow&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;151&quot; data-original-width=&quot;644&quot; height=&quot;47&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJbtknapC5uuZHXJmPOxTf1Q2zNtjvhWwgfECnqxpFMwGoiaTvAGdd2D_n4iM5Hr_3lz8I4ucQ5SvmjhZKdlJaT3AUA6QpiR3xqJXnfhf-7mk9GclPDYW_xaaAvypqIodc6rl0UWikXOgH/w200-h47/get+PureVPN.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;But wifi connections in public places are real Eldorado for hackers. Hacking attempts can intercept essential information (important emails, banking data, information about your health ...) or even spread malware on your devices. The use of an open network must therefore be done with caution but the most reasonable is to equip yourself with a VPN to fully secure your connection ...&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;What are other uses for a VPN when traveling?&lt;/h2&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Whether used on a smartphone or a computer, the VPN guarantees your anonymity on the Internet. The connection to the network becomes encrypted and it is then impossible to track your online activities.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Depending on the country you are traveling to, you will be able to bypass censorship to find media and sites that are usually inaccessible. VPNs are also useful for unblocking prohibited services. This is particularly the case for Instagram, Facebook and WhapsApp in China for example.&lt;/li&gt;&lt;li&gt;In some cases, using a VPN can also save some money! To buy your plane tickets or to pay your nights at the cheaper hotel, you can lure the sites by choosing another location, for example a country where the incomes are more modest. By modifying the IP address, you appear as a new customer each time you search, which prevents excessive price increases.&lt;/li&gt;&lt;li&gt;Another advantage is the possibility of circumventing geographical restrictions to discover cultural content that is not always available.&lt;/li&gt;&lt;/ul&gt;
  
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;a_bid=7f3fa004&quot; target=&quot;_top&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;250&quot; src=&quot;//affiliates.purevpn.com/accounts/default1/6hb82wqa2l/7f3fa004.png&quot; title=&quot;&quot; width=&quot;250&quot; /&gt;&lt;/a&gt; &lt;/div&gt;
 
 &lt;h2 style=&quot;text-align: left;&quot;&gt;What about streaming services?&lt;/h2&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;In addition to online security, acquiring a VPN&amp;nbsp; also allows you to watch a multitude of multimedia content without being subject to local restrictions. Thus, Netflix, Disney + or even Amazon Prime catalogs from all over the world can be viewed. Good news for those who like to continue a season in progress, discover new series during the holidays or watch content in English in case of homesickness!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;a_bid=7f3fa004&quot; rel=&quot;nofollow&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;127&quot; data-original-width=&quot;931&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIb070QxNZY6UX7pneF5EX_2hVfcevxMqioB2JSk1vCocCfiD4EZRilzQ-oZ2DHqxh5ZvCeMNpbf4w6cVD7kgy7XgD9cdBKJngo0coTMN7ToH878WYs8mPQv9cIP6FhIeVDTV9g1yKuc20/s320/I+want+to+get+PureVPN.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Inexpensive and very easy to use, VPNs are becoming essential for protecting your data and ensuring the security of your connection wherever you are and during your best trips.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt; &lt;a href=&quot;https://www.purevpn.com/stream-sports/watch-football-online?aff=42054&amp;amp;a_bid=07b3f0b0&quot; target=&quot;_top&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;90&quot; src=&quot;//affiliates.purevpn.com/accounts/default1/6hb82wqa2l/07b3f0b0.png&quot; title=&quot;&quot; width=&quot;728&quot; /&gt;&lt;/a&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/5920548013577086910/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/07/summer-vacation-how-about-getting-vpn.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/5920548013577086910'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/5920548013577086910'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/07/summer-vacation-how-about-getting-vpn.html' title='Summer vacation: how about getting a VPN?'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUDlYdbRebhMwN8MqjTQ9KX21FDiwYsSHcifltSfM92oij6ADl9xMIDRyF47aosDfsXUxIEG2G-JERj7gSjDgcY7gfElp2v4NMdO3y6bJE7e14369KTfgQIsUAmbVLTN8IXLKqeCeZBz1f/s72-w640-h320-c/Summer+vacation+how+about+getting+a+VPN.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-9113421941938011783</id><published>2021-06-29T16:45:00.004-07:00</published><updated>2021-07-02T10:26:08.583-07:00</updated><title type='text'>The preliminary steps for hosting a website</title><content type='html'>&lt;h1 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;The preliminary steps for hosting a website&lt;/h1&gt;&lt;div&gt;&lt;b&gt;Choosing web hosting is not something to be taken lightly. Indispensable for putting a website online, a plethora of offers are available and choosing the one that meets our expectations is not child&#39;s play.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;You will first have to choose the hosting offer that corresponds to the Web project. And then determine the actual host. To do this, it is important to take into account several technical and commercial criteria to make the right choice.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Finally, it is important then to choose a domain name which will be the address that will be typed in a Web browser to access the hosted site.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaXkwNu7e50CJ34P2rLxAJRRXku0NHctw2wbgjS5o5CHOeHSv_wNYzxcF91g93rNuLxYX9ysSYu5DgdOmsFuGRC4o5ALyr_qggXyai9LALUU_omk3QsrzW9c-EsnBQAlMMD_cePWL_Kwls/s1000/The+preliminary+steps+for+hosting+a+website.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;662&quot; data-original-width=&quot;1000&quot; height=&quot;265&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaXkwNu7e50CJ34P2rLxAJRRXku0NHctw2wbgjS5o5CHOeHSv_wNYzxcF91g93rNuLxYX9ysSYu5DgdOmsFuGRC4o5ALyr_qggXyai9LALUU_omk3QsrzW9c-EsnBQAlMMD_cePWL_Kwls/w400-h265/The+preliminary+steps+for+hosting+a+website.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span style=&quot;font-size: x-small;&quot;&gt;First step, study the web hosting offers and find the one that best suits your website project.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;How to choose the right hosting offer?&lt;/h2&gt;&lt;div&gt;&lt;div&gt;There are two types of web hosting.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The first is the dedicated server. It allows you to have control over all the hosting parameters but has the disadvantage of being very complex to set up and maintain when you are new to the field. Having a dedicated server therefore requires a large budget for setting up and maintaining it. It is reserved for websites which require a substantial infrastructure and bandwidth.&lt;/li&gt;&lt;li&gt;The second is shared hosting. Much more affordable in terms of price, shared offers are those most commonly used to host small to medium-sized Web projects. They have the advantage of being directly usable and already configured. There are many offers on the market, as is the case for example for this web hosting Canada. The choice of a shared one is also relevant for a project which requires many simultaneous connections.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;
 &lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;https://www.bluehost.com/track/najibad/&quot; target=&quot;_blank&quot;&gt; &lt;img border=&quot;0&quot; src=&quot;https://bluehost-cdn.com/media/partner/images/najibad/430x288/430x288BW.png&quot; /&gt; &lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;
  
 &lt;div&gt;&lt;div&gt;Once the offer has been chosen, all you have to do is set up the website by uploading the files via FTP access. This makes it possible to make the site accessible to Internet users. If the site concerned uses a database, it will also have to be created directly at the host so that Internet users can access and interact with its data.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As you will have understood, choosing a web host requires several stages of thought. You have to compare the offers to offer your future visitors a pleasant experience. Several criteria must be taken into account: price, bandwidth, number of databases or the possibility of being able to create your own email address.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/9113421941938011783/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/06/the-preliminary-steps-for-hosting.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/9113421941938011783'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/9113421941938011783'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/06/the-preliminary-steps-for-hosting.html' title='The preliminary steps for hosting a website'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaXkwNu7e50CJ34P2rLxAJRRXku0NHctw2wbgjS5o5CHOeHSv_wNYzxcF91g93rNuLxYX9ysSYu5DgdOmsFuGRC4o5ALyr_qggXyai9LALUU_omk3QsrzW9c-EsnBQAlMMD_cePWL_Kwls/s72-w400-h265-c/The+preliminary+steps+for+hosting+a+website.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-6308877425022286941</id><published>2021-06-06T14:53:00.002-07:00</published><updated>2021-06-06T14:59:34.560-07:00</updated><title type='text'>Android 12 intends to better protect your personal data</title><content type='html'>&lt;h1 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Android 12 intends to better protect your personal data&lt;/h1&gt;&lt;div&gt;&lt;b&gt;Like Apple with iOS, Google is making Android more virtuous with respect to the protection of personal data. To do this, when it is released at the end of the year, Android 12 will have a switch to block all the data collected and the user&#39;s advertising identifier.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;In the wake of Google&#39;s I / O developer conference, the internet giant has just launched a support page showing users how to turn off personal data tracking by third-party sites and apps. This is one of the first signs of the Internet giant&#39;s efforts on the subject. With Android 12, Google intends to go further and Futura had already mentioned the presence of a button dedicated to disabling the sharing of the unique advertising identifier. It is the latter that allows advertising agencies to monitor your daily activities and identify you in order to adapt the advertisements to your centers of interest at the time. It is already possible to limit this collection or reset it, but with Android 12, the user will be able to simply disable it completely. Instead of the advertising identifier, advertisers will get a string of zeros.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;However, we should not believe that Google is throwing in the towel on the collection of navigation data. The firm&#39;s resources come in large part from its immense advertising network. To ensure data confidentiality but continue to target advertisements, Google has developed its FloC solution. Rather than individualizing data collection, the process consists of grouping users into cohorts based on their areas of interest.&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;FloC to collect without identifying&lt;/h2&gt;&lt;div&gt;Instead of the famous cookies, to continue to allow advertisers to target their ads, Google, via Chrome, intends to create a profile of each user and will communicate to websites only the predefined group to which it can be classified according to its centers of interest. A process that Google is currently testing and which is currently causing the wrath of other web players. This is particularly the case of the Electronic Frontier Foundation (EFF) which totally rejects this principle, or Brave or Vivaldi browsers which intend to block this system, for example.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Unlike iOS, for the moment Google is not announcing whether this blocking function will be activated by default on Android 12, nor whether it will be necessary to delve into the various sub-sections of the settings to disable data collection and the advertising identifier. . We will have to wait until the end of 2021 to find out with the deployment of version 12 of the mobile OS.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy7V0jsCC32cidYK9UZ-WvMiCnEF7cgisXc8iwkm5e1Kr6OIWIEtFySHDSjrKZuNGhKJDvcJjT1EwqqD7RwrHFnuBvUw915XQVtwxay2hxtjr-1kccCll3SdDIYCQ0IXwkZdBfC6ClMW72/s205/ANDROID12.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Android 12 intends to better protect your personal data&quot; border=&quot;0&quot; data-original-height=&quot;154&quot; data-original-width=&quot;205&quot; height=&quot;154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy7V0jsCC32cidYK9UZ-WvMiCnEF7cgisXc8iwkm5e1Kr6OIWIEtFySHDSjrKZuNGhKJDvcJjT1EwqqD7RwrHFnuBvUw915XQVtwxay2hxtjr-1kccCll3SdDIYCQ0IXwkZdBfC6ClMW72/w342-h154/ANDROID12.jpg&quot; title=&quot;Android 12 intends to better protect your personal data&quot; width=&quot;342&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/6308877425022286941/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/06/android-12-intends-to-better-protect.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6308877425022286941'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6308877425022286941'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/06/android-12-intends-to-better-protect.html' title='Android 12 intends to better protect your personal data'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy7V0jsCC32cidYK9UZ-WvMiCnEF7cgisXc8iwkm5e1Kr6OIWIEtFySHDSjrKZuNGhKJDvcJjT1EwqqD7RwrHFnuBvUw915XQVtwxay2hxtjr-1kccCll3SdDIYCQ0IXwkZdBfC6ClMW72/s72-w342-h154-c/ANDROID12.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-4116375794782294490</id><published>2021-05-17T01:43:00.004-07:00</published><updated>2021-05-17T01:47:52.344-07:00</updated><title type='text'></title><content type='html'>&lt;h1 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Twelve Wi-Fi breaches threaten every device in the world&lt;/h1&gt;&lt;div&gt;&lt;b&gt;A researcher has discovered 12 vulnerabilities in the Wi-Fi protocol. Called FragAttacks, the threats resulting from these vulnerabilities make it possible to steal data or take control of devices, including connected objects. Some of these breaches have been present since the 1990s and concern all devices.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The ubiquitous Wi-Fi is far from perfect when it comes to security. A researcher from the Catholic University of Leuven in Belgium (KU Leuven) has just detected no less than 12 faults affecting devices equipped with a Wi-Fi module. The attack methods relating to these faults have been grouped under the heading FragAttacks. With them, a nearby attacker can exploit these vulnerabilities to steal data or take control of these devices. Through a Wi-Fi network, the researcher has thus managed to take control of a connected switch, as well as of a computer powered by Windows 7. In the latter case, the attacker can then launch an attack. from that PC with outdated system.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;It turns out that three of these flaws date from the beginnings of Wi-Fi and its security in the 1990s. This is particularly the case for WEP keys of the time, as well as for the latest protocols, such as WPA3. These are therefore design flaws and therefore affect virtually all devices.&lt;/div&gt;

&lt;div align=&quot;center&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--ad unit 1--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6510145662334812&quot; data-ad-format=&quot;auto&quot; data-ad-slot=&quot;9617147090&quot; data-full-width-responsive=&quot;true&quot; style=&quot;display: block;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
     (adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;

&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;321&quot; src=&quot;https://www.youtube.com/embed/88YZ4061tYw&quot; width=&quot;550&quot; youtube-src-id=&quot;88YZ4061tYw&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span&gt;In this video, the Belgian researcher shows three methods of attacks via vulnerabilities discovered in Wi-Fi. © Mathy Vanhoef&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Three flaws corrected by Microsoft&lt;/h2&gt;&lt;div&gt;One of the flaws allows you to send code in clear text in a protected Wi-Fi network. Most devices accept plain texts without flinching because they look like messages to establish a link. From that point on, the hacker can intercept network traffic and trick their target into using a malicious DNS server to retrieve their credentials.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The discovery dates back nine months. Since then, the Wi-Fi Alliance, which is the consortium responsible for certifying the standard, has been working with manufacturers of Wi-Fi modules to find a way to close the gaps. For its part, Microsoft corrected three of the vulnerabilities by distributing a patch from March 9. A patch related to the Linux kernel is also expected. The companies Cisco, Sierra Wireless, Samsung, Eero, and even Netgear have started to develop patches to remedy the vulnerabilities. In the meantime, it is better to check that the mention &quot;Https&quot; is present when connecting to a website, because it is from malicious sites that the attacker seeks to collect the identifiers. It is also necessary that it is within range of the network ...&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/4116375794782294490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/05/wi-fi-breaches-threaten-every-device-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/4116375794782294490'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/4116375794782294490'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/05/wi-fi-breaches-threaten-every-device-in.html' title=''/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/88YZ4061tYw/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-4635702215408817280</id><published>2021-05-07T15:53:00.006-07:00</published><updated>2021-05-07T16:51:49.549-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ELECTRONICS"/><category scheme="http://www.blogger.com/atom/ns#" term="IBM"/><category scheme="http://www.blogger.com/atom/ns#" term="PROCESSOR"/><title type='text'>IBM unveils the first chips engraved in 2 nm</title><content type='html'>&lt;h1 style=&quot;text-align: left;&quot;&gt;IBM unveils the first chips engraved in 2 nm&lt;/h1&gt;&lt;div&gt;&lt;b&gt;IBM has just unveiled its new process for etching electronic chips in 2 nm, a world first. The firm promises almost doubled performance compared to current processors, or devices with a fourfold autonomy.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;IBM has just pushed back the limits of electronics by announcing an engraving process of unequaled finesse. Its new chips, engraved in just 2 nm, will be able to contain more transistors, which improves performance.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This breakthrough is based on IBM&#39;s nanosheet technology, already used in its 5 nm process, as well as a GAA (Gate All Around) arrangement which places the gate all around the transistors. This allows it to reach a density of 333 million transistors per mm² (MTr / mm²), compared to 91 and 95 MTr / mm² for the 7 nm processors at TSMC and Samsung respectively, or 292 MTr / mm² for the all new 3 nm process at TSMC. Note that the next generation of Intel chips engraved at 7 nm should still reach 237 MTr / mm², which shows that it is not only the fineness of the engraving that determines the density of the transistors.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;317&quot; src=&quot;https://www.youtube.com/embed/HD5KbeR5mtc&quot; width=&quot;627&quot; youtube-src-id=&quot;HD5KbeR5mtc&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Electricity consumption divided by four&lt;/h2&gt;&lt;div&gt;These new chips would present considerable gains compared to those currently on the market, mainly engraved in 7 nm. For intensive tasks, they would allow 45% more performance. Conversely, for devices whose priority is autonomy, they allow electricity consumption to be reduced by 75% for the same performance.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;

&lt;div align=&quot;center&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--ad unit 1--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6510145662334812&quot; data-ad-format=&quot;auto&quot; data-ad-slot=&quot;9617147090&quot; data-full-width-responsive=&quot;true&quot; style=&quot;display: block;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
     (adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;

&lt;div&gt;Note, however, that this is a simple prototype. IBM does not have its own factories and will therefore have to convince partners, such as Samsung, which currently produces IBM&#39;s Power10 processors. We should not expect to see them on the market before 2024 or 2025. These chips could quadruple the autonomy of smartphones, according to IBM, reduce the power consumption of data centers, and improve the performance of laptops and self-driving cars. . The firm is also targeting artificial intelligence, space exploration, 5G and even 6G.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/4635702215408817280/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/05/ibm-unveils-first-chips-engraved-in-2-nm.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/4635702215408817280'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/4635702215408817280'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/05/ibm-unveils-first-chips-engraved-in-2-nm.html' title='IBM unveils the first chips engraved in 2 nm'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/HD5KbeR5mtc/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-2178359844193507776</id><published>2021-05-07T02:04:00.003-07:00</published><updated>2021-05-07T02:09:27.015-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Questions answers"/><title type='text'>How to fight phishing ?</title><content type='html'>&lt;h1 style=&quot;text-align: center;&quot;&gt;How to fight phishing ?&lt;/h1&gt;&lt;div&gt;&lt;b&gt;Phishing is a daily plague for internet users. This Anglicism means &quot;phishing&quot; and is characterized by the use of the image of a real company and its name. The phishing emails contain visuals that look like the company&#39;s official website and play on an emergency effect in order to extract personal information from us such as a password or worse, a number. bank card. Fortunately, there are tips and solutions to tackle phishing effectively and sustainably. We will develop several of them in this article.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The majority of phishing attacks use the image of banks but not only, they can also target your personal information by pretending to be Ebay, Facebook or even Twitter.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;A common indicator of phishing attempts is spelling. When you sift through hundreds of emails like this, you quickly notice one thing in common: the spelling is terrible.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;What to do on a daily basis ?&lt;/h2&gt;&lt;div&gt;&lt;div&gt;The best way to prevent phishing is to systematically ignore all emails that ask you for confidential information. If you have any doubts, contact the company in question directly to find out.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;It is common for these emails to contain an attachment. Above all, do not open it! Especially if it is a PDF, an Excel file or even a Word.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Check the security of the sites. From the moment you are asked for confidential information and more particularly banking information, you must absolutely verify that the site address is secure. This is identified by the beginning of the site address which must begin with &quot;https&quot; and be preceded by a closed green padlock. You can click this padlock to get more information and find out if the connection is risky or not.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBw94EksboN3floG9O24hMqQbPcV2RSAxkVOPx79Hwhadcl5hkNrqd5OZ0ra7sywP2foimaQVVowOY31xC2Ao8cW66zE2fIwv4WRA27AYfCQgeANtyd9_VU8v8PmHQ6ukpFyLdpL5tojbY/s1024/phishing.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;How to fight phishing ?&quot; border=&quot;0&quot; data-original-height=&quot;683&quot; data-original-width=&quot;1024&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBw94EksboN3floG9O24hMqQbPcV2RSAxkVOPx79Hwhadcl5hkNrqd5OZ0ra7sywP2foimaQVVowOY31xC2Ao8cW66zE2fIwv4WRA27AYfCQgeANtyd9_VU8v8PmHQ6ukpFyLdpL5tojbY/w400-h266/phishing.jpg&quot; title=&quot;How to fight phishing ?&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Phishing is a form of Internet scam. Solutions exist to guard against this. © magann, Adobe Stoc&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Use an anti-phishing solution&lt;/h2&gt;&lt;div&gt;&lt;div&gt;There are software solutions like Altospam that get to the root of the problem by scanning your emails before you even receive them. Thanks to state-of-the-art techniques (DNS registration, automatic whitelist or even Bayesian method) fraudulent emails are detected upstream. This exclusive technique brings several beneficial effects: it alleviates the use of bandwidth, it de-clutters mailboxes and above all it eliminates the vast majority of spam.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;These solutions are generally easily and transparently integrated. No installation is required, you just need to simply configure the DNS entries to allow the solution to scan and sort your emails.&lt;/div&gt;&lt;/div&gt;

&lt;div align=&quot;center&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--ad unit 1--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6510145662334812&quot; data-ad-format=&quot;auto&quot; data-ad-slot=&quot;9617147090&quot; data-full-width-responsive=&quot;true&quot; style=&quot;display: block;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
     (adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;

&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Take care of your email address&lt;/h2&gt;&lt;div&gt;&lt;div&gt;Spammers build mailing lists using basic combinations of names, words and numbers. It is therefore useful to have a private email address that is difficult to guess. Your private address shouldn&#39;t be just your first and last name.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Never publish your private address in a resource that can be accessed directly online.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If you are forced to show it on a web page, try to hide it to be able to prevent spammers from picking it up automatically. For example, if your email is jean.dupont@gmail.com, write jean-point-dupont-arobaz-gmail-point-com instead.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If your private email address is still found by spammers, don&#39;t hesitate to change it. Even if it is quite restrictive, you must do it to avoid falling victim to a phishing attempt by email.&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/2178359844193507776/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/05/how-to-fight-phishing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2178359844193507776'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2178359844193507776'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/05/how-to-fight-phishing.html' title='How to fight phishing ?'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBw94EksboN3floG9O24hMqQbPcV2RSAxkVOPx79Hwhadcl5hkNrqd5OZ0ra7sywP2foimaQVVowOY31xC2Ao8cW66zE2fIwv4WRA27AYfCQgeANtyd9_VU8v8PmHQ6ukpFyLdpL5tojbY/s72-w400-h266-c/phishing.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-8884706961756033920</id><published>2021-03-13T16:48:00.004-08:00</published><updated>2021-05-05T17:03:47.182-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PASSWORD"/><category scheme="http://www.blogger.com/atom/ns#" term="SECURITY"/><category scheme="http://www.blogger.com/atom/ns#" term="STRONG PASSWORD"/><title type='text'></title><content type='html'>&lt;h1 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Too many passwords easy to hack in business!&lt;/h1&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;People are usually laughed at for using very simple passwords. But it&#39;s hardlybetter in business, as this study by Nordpass shows.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Hackers really don&#39;t have to rack their brains to break into a company&#39;s server. As proof, the enormous wave of cyberattacks of December 2020 against SolarWinds which would have been caused by the use of a &quot;solarwinds123&quot; password. Orion editor is not the only one to use weak passwords, as the study of Nordpass demonstrates.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Based on more than 15 million breaches that have affected Fortune Global 500 companies, this survey clearly shows that mistakes are as glaring in the business world as anyone&#39;s. We thus discover that the most used passwords are &quot;password&quot;, &quot;123456&quot;, &quot;Hello123&quot; or &quot;sunshine&quot;. These are short, non-complex passwords that are common to dozens of companies.&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-GyAKaP2Jha8_Er5S1Hy1ljk8nNMTl7gaz_JoIkoX6qX5YHTwEuZptMMP1QEa23OWkApCwdLQRvIlCpQoDJtLe5jbotWWrnmwFch6sKJ4CB47iIxprAaonaWAI7M2uvzH22p6mgFB0loz/s599/pwd.PNG&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Too many passwords easy to hack in business&quot; border=&quot;0&quot; data-original-height=&quot;389&quot; data-original-width=&quot;599&quot; height=&quot;260&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-GyAKaP2Jha8_Er5S1Hy1ljk8nNMTl7gaz_JoIkoX6qX5YHTwEuZptMMP1QEa23OWkApCwdLQRvIlCpQoDJtLe5jbotWWrnmwFch6sKJ4CB47iIxprAaonaWAI7M2uvzH22p6mgFB0loz/w400-h260/pwd.PNG&quot; title=&quot;Too many passwords easy to hack in business&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Too many passwords easy to hack in business&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Company name as password ...&lt;/h2&gt;&lt;p style=&quot;text-align: left;&quot;&gt;For this study, the researchers then divided the companies by sector of activity, and we thus discovered that one of the most used passwords in the health sector is “vacation”. In the hotel industry, the name of the establishment is most often used, and it is obviously very easy to find for a hacker. Nordpass notes that 20% of passwords include the name of the company.&lt;/p&gt;

&lt;div align=&quot;center&quot;&gt;
&lt;script async src=&quot;https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!-- ad unit 1 --&gt;
&lt;ins class=&quot;adsbygoogle&quot;
     style=&quot;display:block&quot;
     data-ad-client=&quot;ca-pub-6510145662334812&quot;
     data-ad-slot=&quot;9617147090&quot;
     data-ad-format=&quot;auto&quot;
     data-full-width-responsive=&quot;true&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
     (adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;

&lt;p style=&quot;text-align: left;&quot;&gt;Another major concern is the use of a single password for the entire company. For example, in the human resources industry, over 30% of companies use a single password for everyone. On average, this figure is 26% in the professional world, and it is all the more problematic that this password can be used for several different services.&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/8884706961756033920/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2021/03/many-passwords-easy-to-hack-in-business.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/8884706961756033920'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/8884706961756033920'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2021/03/many-passwords-easy-to-hack-in-business.html' title=''/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-GyAKaP2Jha8_Er5S1Hy1ljk8nNMTl7gaz_JoIkoX6qX5YHTwEuZptMMP1QEa23OWkApCwdLQRvIlCpQoDJtLe5jbotWWrnmwFch6sKJ4CB47iIxprAaonaWAI7M2uvzH22p6mgFB0loz/s72-w400-h260-c/pwd.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-6521559417404866156</id><published>2020-10-26T18:06:00.005-07:00</published><updated>2020-10-26T18:08:06.500-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Covid-19"/><category scheme="http://www.blogger.com/atom/ns#" term="supercomputer"/><category scheme="http://www.blogger.com/atom/ns#" term="technology"/><title type='text'>How to sit down at the table in times of pandemic?</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;How to sit down at the table in times of pandemic?&lt;/h2&gt;&lt;div&gt;&lt;b&gt;Researchers used the Fugaku supercomputer in Japan to model the behavior of droplets emitted by individuals sitting around the same table. According to these results, the guest next to the speaker receives twenty times more droplets than the one placed diagonally.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;A recent study published by the Centers for Disease Control and Prevention (CDC) in the United States suggests an increased risk of transmission in restaurants. The results showed that people who tested positive for Covid-19 were twice as likely to have dined out in the two weeks before their test compared to those who tested negative.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;A new simulation performed by the Fugaku supercomputer in Japan explored this risk of transmission in more detail. After modeling the spread of the virus in offices or trains, researchers from the Riken Institute, Toyohashi Technical University and Kobe University looked at the transmission between guests sitting at the same table and chatting without mask.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;341&quot; src=&quot;https://www.youtube.com/embed/GAvO_QdO9eM&quot; width=&quot;491&quot; youtube-src-id=&quot;GAvO_QdO9eM&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Supercomputer simulates how coronavirus droplets spread&amp;nbsp;&amp;nbsp;&lt;/span&gt;© Nippon TV News 24 Japon&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;A different risk depending on the place occupied&lt;/h3&gt;&lt;div&gt;Under typical restaurant conditions, the guest opposite receives approximately 5% of the droplets emitted. This number is divided by four for the individual placed diagonally. However, the guest sitting directly next to them receives five times as many droplets when the person turns their head to speak to them.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The supercomputer also simulated the projection of droplets according to the humidity of the air. With a humidity level of 30%, about 6% of the droplets produced by coughing reach a person sitting in front about two meters away. This figure is divided by three with a humidity level of 90%. Researchers therefore advise the use of humidifiers to reduce the transmission of Covid-19 when aeration is not possible.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/6521559417404866156/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2020/10/how-to-sit-down-at-table-in-times-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6521559417404866156'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6521559417404866156'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2020/10/how-to-sit-down-at-table-in-times-of.html' title='How to sit down at the table in times of pandemic?'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/GAvO_QdO9eM/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-7598513028887090141</id><published>2020-10-26T17:00:00.001-07:00</published><updated>2020-10-26T18:04:09.596-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CYBER SECURITY"/><category scheme="http://www.blogger.com/atom/ns#" term="SECURITY"/><category scheme="http://www.blogger.com/atom/ns#" term="social media"/><category scheme="http://www.blogger.com/atom/ns#" term="SOCIAL NETWORK"/><title type='text'>What did the password to @realDonaldTrump discovered by an expert mean?</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span&gt;&amp;nbsp;What did the password to @realDonaldTrump discovered by an expert mean?&lt;/span&gt;&lt;/h2&gt;&lt;div&gt;&lt;span&gt;&lt;b&gt;On the fifth attempt, a Dutch security expert managed to take control of the President of the United States&#39; Twitter account. The password was simple and two-factor authentication was not enabled.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;With 87 million subscribers as of October 23, 2020, Donald Trump is one of the ten most followed Twitter accounts in the world, and the President of the United States is a real tweet bulimic since he posts about thirty a day! It is quite simply its first means of communication, and contrary to what one might think, it is not very secure.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;Thus, a Dutch security expert managed to log into Trump&#39;s Twitter account without much effort. He had already done this in 2016, and he wanted to verify that Trump had better secured his account. Except that the password used was &quot;weak&quot;, and Trump had not activated two-factor authentication protection. The President of the United States did not receive an alert when Victor Gevers connected with his account.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEtQ94sZwktZYr7GetG5d6LsINi5KKcZQvWC2A14e5uU8Lr0kMT__8_6Avl3H3W0et8nz4xXHvIgTOmyrCnOveEIpNEUeNOUfEsWk__aiyHUb6zu-JOQZL0-N5zGMzgNTotdJIWBOcCSx5/s640/This+cybersecurity+expert+could+edit+the+profile+of+Trump%2527s+Twitter+account.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;This cybersecurity expert could edit the profile of Trump&#39;s Twitter account. © Vrij Nederland&quot; border=&quot;0&quot; data-original-height=&quot;560&quot; data-original-width=&quot;640&quot; height=&quot;560&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEtQ94sZwktZYr7GetG5d6LsINi5KKcZQvWC2A14e5uU8Lr0kMT__8_6Avl3H3W0et8nz4xXHvIgTOmyrCnOveEIpNEUeNOUfEsWk__aiyHUb6zu-JOQZL0-N5zGMzgNTotdJIWBOcCSx5/w640-h560/This+cybersecurity+expert+could+edit+the+profile+of+Trump%2527s+Twitter+account.jpg&quot; title=&quot;This cybersecurity expert could edit the profile of Trump&#39;s Twitter account. © Vrij Nederland&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;This cybersecurity expert could edit the profile of Trump&#39;s Twitter account. © Vrij Nederland&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span&gt;No blocking after four unsuccessful attempts&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span&gt;Screenshots at the key, the latter thus proved that he had had access to the private messages of the president, that he could modify his profile and posted messages. In the magazine Vrij Nederland, the expert says that he managed to &quot;crack&quot; the password on the 5th attempt. He tries “maga2020! (Short for Make America Great Again, Trump&#39;s slogan) and it works!&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;“I expected to be blocked after four failed attempts,” he says, but Twitter didn&#39;t ask for any additional information, like a back-up phone number or email address.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;Immediately, Gevers alerted Trump and US government services to his discovery and this big security hole. It was the American secret services in the Netherlands who answered him. Trump&#39;s account has since been more secure and his password has been changed. Fortunately this expert was not a Russian or Chinese hacker because it could have had much more serious consequences.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/7598513028887090141/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2020/10/what-did-password-to-realdonaldtrump.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7598513028887090141'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7598513028887090141'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2020/10/what-did-password-to-realdonaldtrump.html' title='What did the password to @realDonaldTrump discovered by an expert mean?'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEtQ94sZwktZYr7GetG5d6LsINi5KKcZQvWC2A14e5uU8Lr0kMT__8_6Avl3H3W0et8nz4xXHvIgTOmyrCnOveEIpNEUeNOUfEsWk__aiyHUb6zu-JOQZL0-N5zGMzgNTotdJIWBOcCSx5/s72-w640-h560-c/This+cybersecurity+expert+could+edit+the+profile+of+Trump%2527s+Twitter+account.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-7910220522809306907</id><published>2019-12-31T14:35:00.000-08:00</published><updated>2019-12-31T14:46:25.367-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CYBERSECURITY"/><category scheme="http://www.blogger.com/atom/ns#" term="PUREVPN"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Good Plan: PureVPN offers a 88% discount for Christmas!</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Good Plan: PureVPN offers a 88% discount for Christmas!&lt;/h2&gt;
&lt;div&gt;
To connect everywhere with peace of mind during these end of year celebrations, it is better to opt for a VPN. One of the most renowned historical specialists, PureVPN, is taking advantage of Christmas to break the price of its five-year subscription with 88% discount!&lt;br /&gt;
&lt;br /&gt;
At the level of the general public, on mobile or computer, VPNs have become essential in a short time. By strengthening security and confidentiality, they are building a bulwark against intrusions and indiscretions, especially when using their device outside the home. And precisely, this is the case during this holiday season conducive to travel. This is all the more the case, with strikes which often lead to the use of public Wi-Fi hotspots which are often unsecured.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: blue; color: white;&quot;&gt;GOOD DEAL&lt;/span&gt; &lt;span style=&quot;background-color: #d0e0e3;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;amp;a_bid=bbd0f893&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Take advantage of a 88% discount on the PureVPN subscription&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If 2019 is the year of VPNs with a plethora of choices, in 2020 it should remain only the best. This is the case of PureVPN, one of the seniors in the field. And precisely, on Christmas, it&#39;s time to take advantage of a huge discount to shield the connection of your devices with this VPN. The app is available for Windows, MacOS, iOS, Android and is also compatible with Linux and even the Amazon Fire TV and the Fire TV Stick. In all, with the license, it is possible to use the service on five devices simultaneously. In terms of infrastructure, PureVPN relies on a network of more than 2,000 servers spread across 140 countries. The service has a bank of 300,000 IP addresses.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw9u2Bbsa7Ag-HU7A4AYjBA27IFV71PHn2yHHA9aR2ZiErLFG-Ek0ZaNipWrkaImOFnJ59LGsmyzD8IElNV2BWzP8oaS-jvAjxFEJRy-LjqZdRIsKa8LSiILHQ8XGZSYNQhVTfJ_8RbcAi/s1600/xmas-profile-picture.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Good Plan: PureVPN offers a 88% discount for Christmas!&quot; border=&quot;0&quot; data-original-height=&quot;960&quot; data-original-width=&quot;960&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw9u2Bbsa7Ag-HU7A4AYjBA27IFV71PHn2yHHA9aR2ZiErLFG-Ek0ZaNipWrkaImOFnJ59LGsmyzD8IElNV2BWzP8oaS-jvAjxFEJRy-LjqZdRIsKa8LSiILHQ8XGZSYNQhVTfJ_8RbcAi/s400/xmas-profile-picture.jpg&quot; title=&quot;Good Plan: PureVPN offers a 88% discount for Christmas!&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;To connect with peace of mind during these end of year celebrations, it is better to opt for a VPN!&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;h3&gt;
Packed with security options&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
As with most paid VPNs, it is possible to manually choose the fastest server from the list of available countries. PureVPN is also loaded with customization options. So you can choose the type of data that will only pass through the VPN. The application gives access to adjustment modes according to use: strengthening security, or shielding confidentiality. In addition to its VPN functions, PureVPN blocks adware, malware and checks application URLs and connections.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Another asset that will greatly interest fans of streaming. Online VOD services, like Netflix, block some of the content by country. The only way to get around this block is to use a VPN. Unfortunately, it doesn&#39;t work every time, but with PureVPN, it works.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Unlike many VPN providers, PureVPN does not offer a free solution, but three formulas whose price per month decreases sharply depending on the duration of subscription. No free, then, but this Christmas period is getting closer, since the discount offered by PureVPN reaches 88%!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: blue; color: white;&quot;&gt;GOOD DEAL&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;background-color: #d0e0e3;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;a href=&quot;https://www.purevpn.com/order-now.php?aff=42054&amp;amp;amp;a_bid=bbd0f893&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Take advantage of a 88% discount on the PureVPN subscription&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: #d0e0e3;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: #d0e0e3;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/7910220522809306907/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/good-plan-purevpn-offers-88-discount.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7910220522809306907'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7910220522809306907'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/good-plan-purevpn-offers-88-discount.html' title='Good Plan: PureVPN offers a 88% discount for Christmas!'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw9u2Bbsa7Ag-HU7A4AYjBA27IFV71PHn2yHHA9aR2ZiErLFG-Ek0ZaNipWrkaImOFnJ59LGsmyzD8IElNV2BWzP8oaS-jvAjxFEJRy-LjqZdRIsKa8LSiILHQ8XGZSYNQhVTfJ_8RbcAi/s72-c/xmas-profile-picture.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-3109455884375456406</id><published>2019-12-28T16:01:00.001-08:00</published><updated>2019-12-28T16:01:18.824-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone"/><title type='text'>Apple wants to connect iPhone by satellite</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Apple wants to connect iPhone by satellite&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Apple is giving itself five years to do without wireless networks, and allow iPhone owners to access the Internet and satellite telephony.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Not content to invade the world with its iPhone, iPad, Mac and other devices, Apple may have decided to put its equipment into orbit. This is what information gathered by Bloomberg suggests, who was able to speak directly with people working on the project but who wanted to remain anonymous.&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk94r7zOhrovHxcuSRjdAkb5zgds89Q_gBcF_GiG4mES-ronfdqvh47sR8IDbyOl9cZ7pDbYbBB2WITXJmBUqtGISOJTv0NgYVbYQmx-8roSoBYzQs2A4JA8Y0-Lqq0hOucuySh4I3gi2T/s1600/satellite.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Apple wants to connect iPhone by satellite&quot; border=&quot;0&quot; data-original-height=&quot;481&quot; data-original-width=&quot;916&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk94r7zOhrovHxcuSRjdAkb5zgds89Q_gBcF_GiG4mES-ronfdqvh47sR8IDbyOl9cZ7pDbYbBB2WITXJmBUqtGISOJTv0NgYVbYQmx-8roSoBYzQs2A4JA8Y0-Lqq0hOucuySh4I3gi2T/s400/satellite.PNG&quot; title=&quot;Apple wants to connect iPhone by satellite&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image by Alexas_Fotos from Pixabay&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The firm would have hired a dozen engineers specializing in aerospace, satellites and antennas in order to complete the project in the space of five years. As is often the case with large companies, many projects can be undertaken to lead to innovations, but many will not lead to anything concrete. This is still in its infancy and will not necessarily lead to a final product.&lt;/div&gt;
&lt;h3&gt;
A still unknown purpose&lt;/h3&gt;
&lt;div&gt;
The team is led by Michael Trela ​​and John Fenwick, two former aerospace engineers who were part of the satellite imaging company Skybox Imaging, acquired by Google in 2014. They then worked on aerospace projects at Google until &#39;in 2017 when they joined Apple. The firm also hired Matt Ettus, a wireless communications engineer, Ashley Moore Williams, who worked on communications satellites, and Daniel Ellis, who worked at Netflix and who brings knowledge of content delivery networks.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In five years at best, the project could result in a technology capable of sending content to devices directly from a satellite network, thus avoiding mobile operators and Wi-Fi networks. The firm could create its own constellation of satellites, or use those already in place. Another possibility would be a more precise geolocation system to improve the maps and propose new functions.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/3109455884375456406/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/apple-wants-to-connect-iphone-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/3109455884375456406'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/3109455884375456406'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/apple-wants-to-connect-iphone-by.html' title='Apple wants to connect iPhone by satellite'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk94r7zOhrovHxcuSRjdAkb5zgds89Q_gBcF_GiG4mES-ronfdqvh47sR8IDbyOl9cZ7pDbYbBB2WITXJmBUqtGISOJTv0NgYVbYQmx-8roSoBYzQs2A4JA8Y0-Lqq0hOucuySh4I3gi2T/s72-c/satellite.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-7572033558129553464</id><published>2019-12-27T03:48:00.001-08:00</published><updated>2019-12-27T03:49:04.190-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android"/><category scheme="http://www.blogger.com/atom/ns#" term="MALWARE"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone"/><title type='text'>Android: Soraka virus infects millions of smartphones</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Android: Soraka virus infects millions of smartphones&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;A hundred applications on the Play Store are infected with new malware called Soraka. Its particularity: it displays advertisements on the phone screen even when the latter is in standby or locked.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Not a week, or almost, without a security expert discovering new malware on the Play Store, the Android application store. This time, this concerns exactly 104 applications, and they are infected with malware called &quot;Soraka&quot;. Spotted at the end of last week, it is hidden in the applications code, and once installed on a smartphone, its mission is to display advertising banners. Clearly, this is called adware.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjvnKXgchls0QOVeuuaShvEBbVIDJgZ_HvOnfhRcLOoBWJo4pXjbcDSXpSIHHCn1lYQkZ-uSsNmc994VIfyX8YAf8Ek5z9nxDPAPtNaj-sSrZTH2tIFb3_7Ryr-l-3PPqV4drNjYZP8GJt/s1600/VIRUS_ANDROID.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Android: Soraka virus infects millions of smartphones&quot; border=&quot;0&quot; data-original-height=&quot;190&quot; data-original-width=&quot;285&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjvnKXgchls0QOVeuuaShvEBbVIDJgZ_HvOnfhRcLOoBWJo4pXjbcDSXpSIHHCn1lYQkZ-uSsNmc994VIfyX8YAf8Ek5z9nxDPAPtNaj-sSrZTH2tIFb3_7Ryr-l-3PPqV4drNjYZP8GJt/s400/VIRUS_ANDROID.PNG&quot; title=&quot;Android: Soraka virus infects millions of smartphones&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: 12.8px;&quot;&gt;Photo by&amp;nbsp;&lt;/span&gt;shutterstock&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Even when the screen is locked or in standby, the ads appear without the knowledge of the user, who obviously does not know that it is linked to one of the applications he has downloaded. It is not super dangerous since it does not access personal data, and it does not steal it, but for hackers, it can generate millions of euros or dollars in revenue.&lt;/div&gt;
&lt;h3&gt;
Malware that can also be discreet&lt;/h3&gt;
&lt;div&gt;
Why? Because White Ops Threat Intelligence reports that this malware is present on 4.6 million smartphones! And why is this kind of malware still trapping Google and the Play Store detection systems? Because it is malware that takes time to activate, it seems. It does not strike right away and waits for some time before polluting the smartphone with advertisements.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Furthermore, it would be able to detect an antivirus so as not to appear. These strategies have enabled it to trap a hundred applications and millions of devices. One thing is certain, Google is informed and the 104 applications will disappear from the Play Store. And it is obviously advisable to uninstall them.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/7572033558129553464/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/android-soraka-virus-infects-millions.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7572033558129553464'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7572033558129553464'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/android-soraka-virus-infects-millions.html' title='Android: Soraka virus infects millions of smartphones'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjvnKXgchls0QOVeuuaShvEBbVIDJgZ_HvOnfhRcLOoBWJo4pXjbcDSXpSIHHCn1lYQkZ-uSsNmc994VIfyX8YAf8Ek5z9nxDPAPtNaj-sSrZTH2tIFb3_7Ryr-l-3PPqV4drNjYZP8GJt/s72-c/VIRUS_ANDROID.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-6325003804445161268</id><published>2019-12-27T01:37:00.002-08:00</published><updated>2019-12-27T01:37:26.248-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social media"/><category scheme="http://www.blogger.com/atom/ns#" term="SOCIAL NETWORK"/><category scheme="http://www.blogger.com/atom/ns#" term="TWITTER"/><title type='text'>17 million Twitter users threatened by security breach</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
17 million Twitter users threatened by security breach&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;The Android version of Twitter suffers from a serious security breach since a security expert managed to discover the phone numbers of millions of subscribers to this social network.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
A security researcher discovered a bug in the Android Twitter application that allowed him to discover the phone numbers associated with 17 million accounts. Interviewed by TechCrunch, Ibrahim Balic explained how he managed to abuse the contact&#39;s download system of the application to reveal numerous accounts from phone numbers.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtcyw1dO7uL6PYFtYrk9soFhUO_-hPvU7TYOlbyEu1FYAEL0ivIibnQZU9wcidla_WgpqUYvC1SrMSiz1gFatkSlECMz-4BkBE0s6sT7GTOUP4mOTBHRLYnKliE3qFQkIG6oTFidTY_PgU/s1600/social+media.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;17 million Twitter users threatened by security breach&quot; border=&quot;0&quot; data-original-height=&quot;274&quot; data-original-width=&quot;415&quot; height=&quot;263&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtcyw1dO7uL6PYFtYrk9soFhUO_-hPvU7TYOlbyEu1FYAEL0ivIibnQZU9wcidla_WgpqUYvC1SrMSiz1gFatkSlECMz-4BkBE0s6sT7GTOUP4mOTBHRLYnKliE3qFQkIG6oTFidTY_PgU/s400/social+media.PNG&quot; title=&quot;17 million Twitter users threatened by security breach&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Photo by Saulo Mohana on Unsplash&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;He started from a simple observation: “If you send your phone number, it collects user data in return. So he generated a list of two billion phone numbers, in random order to thwart the system. He then gradually downloaded them into the Android application over a period of two months, and was thus able to identify accounts in Israel, Turkey, Iran, Greece, Armenia, France and Germany.&lt;/div&gt;
&lt;h3&gt;
Two faults in one week&lt;/h3&gt;
&lt;div&gt;
The researcher shared his discovery on WhatsApp in an attempt to warn the users directly concerned, some of whom are political figures. Twitter blocked accounts exploiting the flaw on December 20 and says it is working on a solution so that this cannot happen again.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
It is the second flaw in a week, the social network having already published details on another security problem in the Android application. This second flaw could have allowed the insertion of malicious code to allow to take control of an account. Twitter advises users to update the application.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/6325003804445161268/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/17-million-twitter-users-threatened-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6325003804445161268'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6325003804445161268'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/17-million-twitter-users-threatened-by.html' title='17 million Twitter users threatened by security breach'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtcyw1dO7uL6PYFtYrk9soFhUO_-hPvU7TYOlbyEu1FYAEL0ivIibnQZU9wcidla_WgpqUYvC1SrMSiz1gFatkSlECMz-4BkBE0s6sT7GTOUP4mOTBHRLYnKliE3qFQkIG6oTFidTY_PgU/s72-c/social+media.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-6341838294344180636</id><published>2019-12-16T05:47:00.000-08:00</published><updated>2019-12-16T05:47:57.493-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CYBERSECURITY"/><category scheme="http://www.blogger.com/atom/ns#" term="MALWARE"/><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><title type='text'>Microsoft warns of new phishing techniques in 2019</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Microsoft warns of new phishing techniques in 2019&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;The computer giant Microsoft has just published a report analyzing the main vectors of cyber attacks of the moment. For this year, the trend is towards phishing with formidable and sophisticated methods.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
With the end of the year, comes the assessment of trends in cyber threats. Among the major players in cybersecurity, Microsoft has just published a vast report on the main vectors used in attacks. For the past two years, phishing has experienced the greatest increase. While the number of ransomware and crypto-mining saw their number decrease, that of phishing by email went from 0.2% in January 2018, to 0.6% last October. A figure that seems ridiculous at first glance, but which actually represents the percentage of phishing emails detected on the huge total volume of emails analyzed by Microsoft.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaK5nQShwr03KbunAi9RGfti0ghYkrVJ_Opgb_yiAijV5kjjxIJNo_f48V6RQIAUkSKKmu01ESMxzjmbuhpOIUmoZtcktHcjffQET3pD7wsG6I_J94UT3HmJx53yzN9jhwNKEeiFg0JAY6/s1600/phishing.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Microsoft warns of new phishing techniques in 2019&quot; border=&quot;0&quot; data-original-height=&quot;350&quot; data-original-width=&quot;450&quot; height=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaK5nQShwr03KbunAi9RGfti0ghYkrVJ_Opgb_yiAijV5kjjxIJNo_f48V6RQIAUkSKKmu01ESMxzjmbuhpOIUmoZtcktHcjffQET3pD7wsG6I_J94UT3HmJx53yzN9jhwNKEeiFg0JAY6/s400/phishing.png&quot; title=&quot;Microsoft warns of new phishing techniques in 2019&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;High-level overview of typical O365 phishing&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
It is above all the phishing methods used that stand out for their level of sophistication. One of the most impressive was influencing Google&#39;s search results by channeling traffic from legitimate sites to the sites of cybercriminals. Targeted websites go up in Google results for some very specific terms. It is from this moment that cyberattackers carry out their email campaign. The post associates links with Google&#39;s search results for the term they are working on SEO. When the victim clicks on the link and the first result of Google, it is the website controlled by the hacker, then the phishing page which is displayed.&lt;/div&gt;
&lt;h3&gt;
False 404 Error Pages&lt;/h3&gt;
&lt;div&gt;
Another paid method is the creation of untraceable pages displaying the 404 error. This process allows cybercriminals to bypass phishing detection systems. However, as soon as the user clicks on the link, it is automatically redirected to the trap. Finally, the third threat remains more classic, but formidable in effectiveness. Instead of copying the credible elements which constitute a real site, the attackers have developed a system which comes directly to recover all the real elements of the site and displays them on the trapped page. For the victim, there is no difference between the real site and that of the scammers. Only the site URL lets you know that it is a trap.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/6341838294344180636/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/microsoft-warns-of-new-phishing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6341838294344180636'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6341838294344180636'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/microsoft-warns-of-new-phishing.html' title='Microsoft warns of new phishing techniques in 2019'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaK5nQShwr03KbunAi9RGfti0ghYkrVJ_Opgb_yiAijV5kjjxIJNo_f48V6RQIAUkSKKmu01ESMxzjmbuhpOIUmoZtcktHcjffQET3pD7wsG6I_J94UT3HmJx53yzN9jhwNKEeiFg0JAY6/s72-c/phishing.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-2186534157966727167</id><published>2019-12-15T05:59:00.002-08:00</published><updated>2019-12-15T05:59:54.179-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EARTHQUAKE"/><category scheme="http://www.blogger.com/atom/ns#" term="EARTHQUAKE ALERT"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone"/><title type='text'>Detect earthquakes with your smartphone, it&#39;s possible!</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Detect earthquakes with your smartphone, it&#39;s possible!&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;MyShake. This is the name of this application for Android and iOS which uses the accelerometer present in smartphones to detect movements of the earth.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Natural disasters not only cause significant damage, but they still result in the loss of many human lives today. Often the number of victims is greatly reduced if the population is warned in time. This is the case with earthquakes, and some countries, such as South Korea, Mexico, Japan and Taiwan, have already set up seismograph networks and an alert system that warns the population before the start of the earthquake. However, current systems are limited and expensive to set up.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A group of researchers from the University of California at Berkeley came up with an idea to create a system at a lower cost. Rather than deploying expensive equipment, they decided to take advantage of a technology that already covers the whole territory: &lt;a href=&quot;https://newstechnotechno.blogspot.com/2019/10/smartphone.html&quot;&gt;smartphones&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/y1p0pFFbH8M/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/y1p0pFFbH8M?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Free, the application works in the background and records earth shakes day and night. © UC Berkeley&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;clear: both; text-align: left;&quot;&gt;
Soon to be integrated directly into iOS or Android?&lt;/h3&gt;
&lt;div&gt;
Researchers have released an app called MyShake, which works on iOS and &lt;a href=&quot;https://newstechnotechno.blogspot.com/2019/10/android.html&quot;&gt;Android &lt;/a&gt;and uses the accelerometer on mobile devices to detect earthquakes. Thanks to a study on 100 volunteers, they learned to differentiate the movements due to normal use of the tremors of an earthquake. The application can detect an earthquake of magnitude 4.5 or more, in which case it sends an alert.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Of course, an alert from a single device does not allow an earthquake to be concluded. However, in 2016 an earthquake of magnitude 5.2 was detected by more than 200 smartphones. To date, more than 320,000 people have installed the app worldwide. Researchers imagine integrating technology into a popular application or directly into the mobile operating system to quickly create a global network capable of detecting earthquakes and sending an alert wherever humans are present.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/2186534157966727167/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/detect-earthquakes-with-your-smartphone.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2186534157966727167'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2186534157966727167'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/detect-earthquakes-with-your-smartphone.html' title='Detect earthquakes with your smartphone, it&#39;s possible!'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/y1p0pFFbH8M/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-7191161633007939099</id><published>2019-12-15T05:28:00.001-08:00</published><updated>2019-12-15T05:31:35.317-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android"/><category scheme="http://www.blogger.com/atom/ns#" term="GOOGLE"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone"/><title type='text'>Android adds two protection functions for SMS</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Android adds two protection functions for SMS&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;After cleaning our emails from spam and other advertising messages, Google attacks SMS with two functions integrated into its Messages application&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Just as there are spam filters for email, &lt;a href=&quot;https://www.blogger.com/&quot;&gt;&lt;span id=&quot;goog_672131174&quot;&gt;&lt;/span&gt;Android&lt;span id=&quot;goog_672131175&quot;&gt;&lt;/span&gt;&lt;/a&gt; has decided to better protect your SMS messaging. On its blog, &lt;a href=&quot;https://newstechnotechno.blogspot.com/2019/10/google.html&quot;&gt;Google&lt;/a&gt; details two functions dedicated to its Messages application. If you use another application for your SMS and MMS, you will not be able to benefit from it.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFW10cPhB-Y9r0_4IM1UUHe3zpKyPdk1XtR4UBmkTLDxUU2Noh8HxNcLf3xEuUUe1Kapd6zcdFfqAgxjt7T4WVN13y7rWAaM0yZ1EVJ261t9M97kri1qtCPrgF_rAhWzF2HHJgOVlkS1AW/s1600/SMS.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Android adds two protection functions for SMS&quot; border=&quot;0&quot; data-original-height=&quot;231&quot; data-original-width=&quot;218&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFW10cPhB-Y9r0_4IM1UUHe3zpKyPdk1XtR4UBmkTLDxUU2Noh8HxNcLf3xEuUUe1Kapd6zcdFfqAgxjt7T4WVN13y7rWAaM0yZ1EVJ261t9M97kri1qtCPrgF_rAhWzF2HHJgOVlkS1AW/s400/SMS.png&quot; title=&quot;Android adds two protection functions for SMS&quot; width=&quot;376&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
First, and it&#39;s a very good idea, Android adds an authentication system for the sender of an SMS. Just like on Twitter, the organization or company that sends you a message will have a &quot;badge&quot; synonymous with an authenticated sender. There will be its logo, and it is especially very reassuring when it comes to validating a bank transaction, confirming an appointment or activating a service. This option, called Verified SMS, implies that the company or service concerned subscribes to this device. The good news is that France is one of the nine countries that will benefit from this innovation.&lt;/div&gt;
&lt;h3&gt;
No data stored online&lt;/h3&gt;
&lt;div&gt;
Then there is protection against spam, and we must recognize that there are more and more of them. Without us knowing how they got our contact details, we start to receive unsolicited SMS, and Android has decided to add a filter that must be activated. By default, Google treats your contact list as a &quot;white list&quot; and scans messages from an unknown sender.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
As in Gmail, a message warns you when an SMS seems questionable. If so, you validate it. Otherwise, you indicate that it is a safe number. And if the filter lets spam pass, the user can report it and the number in question will enter Google&#39;s &quot;black list&quot;, then all future messages will be blocked.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Google specifies that the data present in the messages is temporarily stored, and that it does not keep traces of the exchanges.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/7191161633007939099/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/android-adds-two-protection-functions.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7191161633007939099'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/7191161633007939099'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/android-adds-two-protection-functions.html' title='Android adds two protection functions for SMS'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFW10cPhB-Y9r0_4IM1UUHe3zpKyPdk1XtR4UBmkTLDxUU2Noh8HxNcLf3xEuUUe1Kapd6zcdFfqAgxjt7T4WVN13y7rWAaM0yZ1EVJ261t9M97kri1qtCPrgF_rAhWzF2HHJgOVlkS1AW/s72-c/SMS.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-4988079340099832519</id><published>2019-12-10T00:30:00.000-08:00</published><updated>2019-12-10T00:30:00.282-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FUNNY OF TECH"/><category scheme="http://www.blogger.com/atom/ns#" term="IPOD"/><category scheme="http://www.blogger.com/atom/ns#" term="POLICE"/><title type='text'>Funny tech: the return of the wheel at Apple, an Escobar smartphone and a rolling Kalash</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Funny tech: the return of the wheel at Apple, an Escobar smartphone and a rolling Kalash&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Escobar and Kalashnikov are infamous names, but they can also invite themselves in the unusual news. This week, Pablo&#39;s brother launched his foldable screen smartphone, while the Russian manufacturer unveiled an electric motorcycle. In the United States, Los Angeles police have a new weapon: the lasso of the future. Much more futile in this end of the decade, the return of the legendary Apple wheel through an application. It&#39;s bluffing.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Our weekly meeting offers you an offbeat look at the news of new technologies. The bias is to entertain you, to surprise you and make you dream ... or sigh.&lt;/div&gt;
&lt;h3&gt;
The company Kalashnikov also makes motorcycles&lt;/h3&gt;
&lt;div&gt;
You may not know it but the Russian company Kalashnikov, obviously known for its weapons, has been working for some years on the development of electric vehicles. The latest model is a racer-style motorcycle, a style popular in the 1960s with its sporty retro design and low handlebars. We are far from the weapon of war with a peak speed of 62 mph and 62 miles of autonomy.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/V9vUHg7S5G0/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/V9vUHg7S5G0?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;With 62 miles of range, this electric bike has no plans to take you far. © Redline5036&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
The return of the friend wheel&lt;/h3&gt;
&lt;div&gt;
This video will inevitably smile those who have owned and cherished their iPod in the 2000s: Elvin Hu, a student in New York design school, has developed an application to find the iconic tactile roulette of the player of Apple, and even the rattling sound that goes with it. A project validated by the father of the iPod in person Tony Fadell, and which he would like to use to get a job.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span id=&quot;goog_1332509466&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://www.blogger.com/&quot;&gt;&lt;/a&gt;&lt;span id=&quot;goog_1332509467&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/zYXPSPoYNOU/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/zYXPSPoYNOU?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Designer-developer Turned iPhone into an iPod Classic with Click Wheel and Cover Flow with #SwiftUI&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;clear: both; text-align: left;&quot;&gt;
Pablo Escobar&#39;s brother unveils a foldable phone&lt;/h3&gt;
&lt;div&gt;
Roberto Escobar, brother of Pablo, is an off-road entrepreneur: after developing a model flamethrower but also, more simply, derivatives in his name, the Colombian 72 years decided to market a foldable phone. The advantage of the Escobar Fold 1? Its paltry price of 349 dollars, five to six times less than the headliners that are the Galaxy Fold and the Mate X. This leaves little doubt about the quality of this product which he advertises with great support. pistols and naked women ...&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A step in the tech to teach a lesson to the &quot;crooks&quot; of Apple, firm that does not produce a foldable phone but it will sue, he says at Digital Trends, because he considers that she scams her customers with expensive phones. He says he spent $ 1 million on a &quot;class action&quot; and asked for $ 30 million to return to the consumer&#39;s pocket. A communication that is not unlike that of his brother.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/MwFinjEuBc8/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/MwFinjEuBc8?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;At 70 years old, the brother of the former narco-trafficker made talk about him with a foldable screen smartphone.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;© Escobar Inc&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3&gt;
Californian police officers equip themselves with a device worthy of a superhero&lt;/h3&gt;
&lt;div&gt;
To limit the use of firearms or tasers, a Las Vegas-based company has developed a system worthy of Batman, or rather Spiderman, capable of apprehending a suspect at a distance of up to eight meters thanks to Kevlar ropes, supposed to hang around the torso and legs of the person in order to immobilize him. Called BolaWrap 100, this lasso of the future is already used by a few brigades in California, with 200 LAPD (Los Angeles Police Department) officers even training before being equipped with them in January. And for good reason: an attempted arrest failed in October in Fresno, the spokesman of the local police explaining to the Los Angeles Times that the sound of gunfire emitted by the machine had still distracted the suspect, the time to ... the taser.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/k5Mgc84iLvU/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/k5Mgc84iLvU?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;This lasso of modern times can neutralize a person without gunshot or bloodshed. © Bola Wrap&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;clear: both; text-align: left;&quot;&gt;
A condom for a USB key&lt;/h3&gt;
&lt;div&gt;
Caution prevents you from charging your phone in a public area? Use this &quot;USB condom&quot; or &quot;data blocker&quot; that will prevent anyone from stealing a single bit. Placed between the cable and the device, it blocks any data transfer and thus allows only to charge his &lt;a href=&quot;https://newstechnotechno.blogspot.com/2019/10/smartphone.html&quot;&gt;smartphone&lt;/a&gt; or tablet.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQChLris2wP-xGj1Usd3QuN59EnkhYL2oTTnSv0LrKC2ITEhFOr70-n1JDE4uBezODmpbHylWPNhPQylUFAM-5b3ngRX58QDwnT0D4nCmp78YMxPDFhrjJw6q9JBSI5uAueHyqWJyc09C3/s1600/portapow.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;1000&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQChLris2wP-xGj1Usd3QuN59EnkhYL2oTTnSv0LrKC2ITEhFOr70-n1JDE4uBezODmpbHylWPNhPQylUFAM-5b3ngRX58QDwnT0D4nCmp78YMxPDFhrjJw6q9JBSI5uAueHyqWJyc09C3/s400/portapow.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Placed between a socket and a cable, this connector blocks any data transfer. © PortaPow&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/4988079340099832519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/funny-tech-return-of-wheel-at-apple.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/4988079340099832519'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/4988079340099832519'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/12/funny-tech-return-of-wheel-at-apple.html' title='Funny tech: the return of the wheel at Apple, an Escobar smartphone and a rolling Kalash'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/V9vUHg7S5G0/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-6289441674493006695</id><published>2019-11-28T11:22:00.000-08:00</published><updated>2019-11-28T11:40:02.060-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Motorola"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone"/><category scheme="http://www.blogger.com/atom/ns#" term="SMARTPHONE WITH FOLDING SCREEN"/><title type='text'>Motorola: discover the Razr of the future</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Motorola: discover the Razr of the future&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Star of the 2000s, the Razr returns in force in January 2020 with a model equipped with a folding screen. The design remains the same as his big brother, but his price could scare away: 1,500 dollars.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Even if in Europe, the brand is not very widespread, in the United States, Motorola remains a brand that matters. Especially when she decides to combine a legendary model with a highly anticipated technology, the folding screen. Announced for Christmas, the new Razr will finally arrive in January. After several weeks, Motorola has finally formalized the arrival and we discover the design and configuration.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Clearly, the US manufacturer has taken the same design as its flagship model, except that the keyboard leaves room for the second part of the screen. Unlike Huawei with the Mate X and Samsung with its Fold, Motorola is not trying to create an XXL poster surface but to play on the compactness of his phone. Exactly as in the 90s and 2000s with these clamshell models. Folded, it is only 11 mm thick and about 2.7&quot; wide and 3.5&quot;long. It will not deform the pockets. Moreover, when unfolded, it is as big as a current phone with&amp;nbsp;6.7&quot; in height.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7I_bjKJqgK0WlmJb6HaPHiQOg0CknW2ZWfsmRYs8t78lfqx1rZn9-Pm6thDBnC-n9Uebr-M0vK_kn8fwghqXkJq2VeM463iwB06g_nJ4K5iLjwNqrd_abGxoQ4efDjjOD2_FV99Iw290/s1600/motorola-razr-combo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;642&quot; data-original-width=&quot;1024&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7I_bjKJqgK0WlmJb6HaPHiQOg0CknW2ZWfsmRYs8t78lfqx1rZn9-Pm6thDBnC-n9Uebr-M0vK_kn8fwghqXkJq2VeM463iwB06g_nJ4K5iLjwNqrd_abGxoQ4efDjjOD2_FV99Iw290/s640/motorola-razr-combo.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;The highlight of the smartphone, its design and finish. © Motorola&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Mid-range equipment&lt;/h3&gt;
&lt;div&gt;
And if you do not want to open it, Motorola has thought of adding a small screen on the hull. This allows to display information like SMS and email notifications, time and weather. For the rest, we see that it will run on Android 9, and that the base version will be equipped with a midrange processor Qualcomm Snapdragon 710, 6 GB of RAM and 128 GB of storage. This is not exceptional but it should be enough to enjoy the device.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Side photo, a single sensor of 16 megapixels on the hull, and another for selfies of 5 megapixels. We will wait to test it for confirmation, but it may discourage some while the competition focuses mainly on the photo. It will also be necessary to see if the device is simple to trigger with the closed telephone, or if this aspect is binding. Clearly, the ergonomics will be taken into account when testing.&lt;/div&gt;
&lt;h3&gt;
The availability of Razr will be limited&lt;/h3&gt;
&lt;div&gt;
For the rest, there is a fingerprint reader, a 15 W fast charger, Bluetooth and NFC chips for contactless payment and connection with connected objects, or an eSIM card, a sort of virtual SIM card, directly soldered into the phone. Which means that in France, its operation will be limited to Orange, the only compatible operator ...&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Another downside, the price since we are talking about 1,500 dollars! This is the price for a foldable screen smartphone and it will be a serious drag on the purchase. Especially if the competition, Samsung in particular, plans to launch a flapper model with a richer equipment at a cheaper price. But the Razr remains a myth and Motorola is also relying on the past of his phone.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/6289441674493006695/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/motorola-discover-razr-of-future.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6289441674493006695'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6289441674493006695'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/motorola-discover-razr-of-future.html' title='Motorola: discover the Razr of the future'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7I_bjKJqgK0WlmJb6HaPHiQOg0CknW2ZWfsmRYs8t78lfqx1rZn9-Pm6thDBnC-n9Uebr-M0vK_kn8fwghqXkJq2VeM463iwB06g_nJ4K5iLjwNqrd_abGxoQ4efDjjOD2_FV99Iw290/s72-c/motorola-razr-combo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-2383488095202299854</id><published>2019-11-28T00:24:00.000-08:00</published><updated>2019-11-28T01:47:34.706-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GOOGLE"/><category scheme="http://www.blogger.com/atom/ns#" term="GOOGLE CHROME"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><title type='text'>Google Chrome makes war on sites too slow</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Google Chrome makes war on sites too slow&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Who has never complained in front of an Internet page that takes several seconds to display? The fault does not necessarily come from your connection or browser, but simply the website, poorly coded, and whose loading speed is too long. Google has decided to identify them and point them out.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Whose fault is it when a site is too slow to display? Is the website having a problem? Is the software, in this case the browser, having problems? Is it a &lt;a href=&quot;https://newstechnotechno.blogspot.com/2019/10/malware.html&quot;&gt;malware&lt;/a&gt; that makes its own? Or is it just a connection problem?&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
At &lt;a href=&quot;https://newstechnotechno.blogspot.com/2019/10/google.html&quot;&gt;Google&lt;/a&gt;, we decided to tackle the problems of slowness of display, and we will soon know if the concern comes from the website that we visit or its connection. This will require using Chrome, and Google refers to an ongoing experiment to warn the user of the slow loading of a page. For this, a gauge may appear while the page is loading. If it&#39;s &quot;green&quot;, everything is normal and loading is in progress. If it&#39;s &quot;blue&quot;, it will be more problematic, and that&#39;s because the problem comes from the site itself.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvxi7W4YES5GmDcTAbzWDNxb84pzhfdySo1Au9r944ItWjczX6fSqx44EZU9V5xdxXFDhGjRQmn0QoQpQb7Rx5fVvEoystzUxzY2Y83_XohySmnGVqj9LBjfvpcCWbIk62P5UiNHhSzQgy/s1600/google-chrome-slow-badging-labels.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;837&quot; data-original-width=&quot;1024&quot; height=&quot;326&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvxi7W4YES5GmDcTAbzWDNxb84pzhfdySo1Au9r944ItWjczX6fSqx44EZU9V5xdxXFDhGjRQmn0QoQpQb7Rx5fVvEoystzUxzY2Y83_XohySmnGVqj9LBjfvpcCWbIk62P5UiNHhSzQgy/s400/google-chrome-slow-badging-labels.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Google is thinking about indicators to allow the user to easily identify a site that is too slow. © Google Blog&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
If everyone goes there, the Internet will be faster&lt;/h3&gt;
&lt;div&gt;
How will Google go about finding out if the site is slow? In fact, webmasters know, Google records the loading time of a website&#39;s pages, and this latency is important to be well indexed by Google. The longer a site is displayed, the less Google will highlight it in these results. It&#39;s based on the history of these latencies that Chrome will rely, and on his blog, Google gives some tips to site designers to improve the loading speed.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Two tools are made available: PageSpeed ​​Insights, an online tool that analyzes the content of a web page, then generates suggestions to increase the speed of the page; Lighthouse, a tool currently under development that provides personalized advice on how to improve your website&#39;s performance.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/2383488095202299854/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/google-chrome-makes-war-on-sites-too.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2383488095202299854'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2383488095202299854'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/google-chrome-makes-war-on-sites-too.html' title='Google Chrome makes war on sites too slow'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvxi7W4YES5GmDcTAbzWDNxb84pzhfdySo1Au9r944ItWjczX6fSqx44EZU9V5xdxXFDhGjRQmn0QoQpQb7Rx5fVvEoystzUxzY2Y83_XohySmnGVqj9LBjfvpcCWbIk62P5UiNHhSzQgy/s72-c/google-chrome-slow-badging-labels.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-9048659649775139506</id><published>2019-11-24T13:53:00.000-08:00</published><updated>2019-11-24T13:54:06.752-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ARTIFICIAL INTELLIGENCE"/><category scheme="http://www.blogger.com/atom/ns#" term="EFFECTS OF LIGHTNING"/><category scheme="http://www.blogger.com/atom/ns#" term="LEARNING MACHINE"/><title type='text'>An AI can predict where lightning will fall</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
An AI can predict where lightning will fall&lt;/h2&gt;
&lt;b&gt;By combining ten-year meteorological data and machine learning, engineers from the Swiss Federal Institute of Technology in Lausanne have succeeded in developing an artificial intelligence capable of predicting the impact of lightning within a radius of&amp;nbsp;eighteen miles&amp;nbsp;to 10 or 30 minutes near. Relative precision that will better warn people, but also improve the current Laser Lightning Rod project which consists of deflecting impacts.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
Even though common sense tips help to avoid being struck by lightning, experts have not figured out how to predict exactly where it will hit. At the Faculty of Engineering Sciences and Techniques at EPFL (Lausanne), researchers from the Electromagnetic Compatibility Laboratory, led by Farhad Rachidi, have developed a system capable of predicting the moment when the lightning within 10 or 30 minutes, within a radius of&amp;nbsp;eighteen miles.&lt;br /&gt;
&lt;br /&gt;
This is not yet the exact precision but we get closer and for that, they rely on an artificial intelligence nourished data collected during ten years in 12 Swiss weather stations, located as well in urban areas as in regions mountainous. Four parameters were taken into account: atmospheric pressure, air temperature, relative humidity and wind speed. These parameters were then correlated with records from lightning detection and localization systems.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5xP1131ijEd_kKPdV4-HTLd4_ePztLPLClO9hSoKaCE1ujfLh0KVRUNcJztuUuw4DIck_FsBW1Pb_J2LcOc65Vaf01GPyY5rRFyOsa0jS3BdYohCeoNDxB7R6NcN69IkV77ueqfrDuW4q/s1600/storm.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;311&quot; data-original-width=&quot;536&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5xP1131ijEd_kKPdV4-HTLd4_ePztLPLClO9hSoKaCE1ujfLh0KVRUNcJztuUuw4DIck_FsBW1Pb_J2LcOc65Vaf01GPyY5rRFyOsa0jS3BdYohCeoNDxB7R6NcN69IkV77ueqfrDuW4q/s640/storm.PNG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: 12.8px;&quot;&gt;©&amp;nbsp;&lt;/span&gt;shutterstock.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;h3&gt;
A success rate of 80%&lt;/h3&gt;
&lt;div&gt;
Thus, the algorithm was able to learn to identify the conditions favorable to lightning and it is the machine learning which then allows to adapt the algorithm to the data in real time. Based on past data and impact points, the AI ​​recognizes the conditions leading to the creation of lightning.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Once trained, the system made predictions that proved to be correct in nearly 80% of cases. According to the researchers, this system has the advantage of being simple to set up and inexpensive. Another advantage is that data can be provided easily in real time, and predictions can be made very quickly even before a storm is formed.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/9048659649775139506/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/an-ai-can-predict-where-lightning-will.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/9048659649775139506'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/9048659649775139506'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/an-ai-can-predict-where-lightning-will.html' title='An AI can predict where lightning will fall'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5xP1131ijEd_kKPdV4-HTLd4_ePztLPLClO9hSoKaCE1ujfLh0KVRUNcJztuUuw4DIck_FsBW1Pb_J2LcOc65Vaf01GPyY5rRFyOsa0jS3BdYohCeoNDxB7R6NcN69IkV77ueqfrDuW4q/s72-c/storm.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-2487195456927945195</id><published>2019-11-22T12:09:00.000-08:00</published><updated>2019-11-22T12:19:57.320-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CRYPTOMONIA"/><category scheme="http://www.blogger.com/atom/ns#" term="CYBER SECURITY"/><category scheme="http://www.blogger.com/atom/ns#" term="PC"/><title type='text'>Windows: the BlueKeep flaw exploited by hackers</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Windows: the BlueKeep flaw exploited by hackers&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;More fear than harm as it is not a worm, but the Bluekeep Fault has allowed hackers to infect thousands of PCs and use them to undermine cryptocurrencies. Month after month, the number of vulnerable computers decreases.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Last May, Microsoft released a major patch for its older systems, Windows XP to Windows 7, and Windows Server 2003 and 2008, a very rare event especially for Windows XP that no longer receives updates. The patch was intended to fix a flaw called BlueKeep, which researchers said exposed millions of devices to a potential computer worm, a virus capable of spreading automatically from one vulnerable machine to another.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs7L-_jUMav-FI_hyyb5RSmraSWyJes5dqCtpUgXRQy2SvirDFvoqM6rbxJDWgy4F5PYcSPIDqoDtzYf5uxaiT-YCovZKcNqdX84SeWBmgLFeh1wA6BpH9OZE_I1XAgA21esPeVGhkrKUa/s1600/BlueKeep.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Windows: the BlueKeep flaw exploited by hackers&quot; border=&quot;0&quot; data-original-height=&quot;152&quot; data-original-width=&quot;331&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs7L-_jUMav-FI_hyyb5RSmraSWyJes5dqCtpUgXRQy2SvirDFvoqM6rbxJDWgy4F5PYcSPIDqoDtzYf5uxaiT-YCovZKcNqdX84SeWBmgLFeh1wA6BpH9OZE_I1XAgA21esPeVGhkrKUa/s400/BlueKeep.jpg&quot; title=&quot;Windows: the BlueKeep flaw exploited by hackers&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ALERT :BlueKeep Vulnerability&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Researchers were assessing the danger of such a virus at the same level as WannaCry, which had infected more than 200,000 machines, and urging the concerned administrators to update their systems or risk a disaster. Several demonstrations have shown that it takes only 22 seconds to take control of a computer without a fix.&lt;/div&gt;
&lt;h3&gt;
BlueKeep operated for cryptominage&lt;/h3&gt;
&lt;div&gt;
Nearly six months later, the first malware mass exploiting the flaw surfaced, without triggering the announced apocalypse. This is not a worm as feared by researchers, but a banal cryptojacking, a virus that uses the power of the computer victim to undermine cryptocurrencies. Unlike a worm, which spreads automatically from one infected machine to another, the attack is launched directly by the hacker who scanned the Internet to identify vulnerable machines.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The absence of worms at this stage indicates that its development is probably not considered profitable by hacker groups. The number of vulnerable machines has decreased, although there are still some 735,000 connected to the Internet. Every passing month sees a drop in the number of computers without the fix, and the risk of a mass infection is getting further and further away.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/2487195456927945195/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/windows-bluekeep-flaw-exploited-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2487195456927945195'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/2487195456927945195'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/windows-bluekeep-flaw-exploited-by.html' title='Windows: the BlueKeep flaw exploited by hackers'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs7L-_jUMav-FI_hyyb5RSmraSWyJes5dqCtpUgXRQy2SvirDFvoqM6rbxJDWgy4F5PYcSPIDqoDtzYf5uxaiT-YCovZKcNqdX84SeWBmgLFeh1wA6BpH9OZE_I1XAgA21esPeVGhkrKUa/s72-c/BlueKeep.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-8587374977169940139</id><published>2019-11-22T12:06:00.000-08:00</published><updated>2019-11-22T12:19:50.997-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PHOTO SENSOR"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone"/><category scheme="http://www.blogger.com/atom/ns#" term="XIAOMI"/><title type='text'>The Mi Note 10, the first smartphone with a 108 megapixel sensor</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
The Mi Note 10, the first smartphone with a 108 megapixel sensor&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Xiaomi was holding its fall show in Madrid, and the Chinese manufacturer hit hard with, first, the first &lt;a href=&quot;https://newstechnotechno.blogspot.com/2019/10/smartphone.html&quot;&gt;smartphone&lt;/a&gt; equipped with a 108-megapixel photo lens, but also with the launch of a quality report model unbeatable price, the Redmi Note 8T.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
This Wednesday, November 6, the Chinese manufacturer Xiaomi held a conference in Madrid to launch its new products in Europe. He took the opportunity to unveil his new smartphones Mi Note 10 and Mi Note 10 Pro, two devices offered at a rather high-end price with a five-fold photo module. This is the European version of the Mi CC9 Pro launched in China the day before.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Both devices feature a 6.47-inch Super Amoled FHD + display (2.340 x 1.080 pixels), as well as 6GB of RAM and 128GB of storage for the Mi Note 10 versus 8GB of RAM and 256GB of storage for the Mi Note 10 Pro. The biggest surprise is probably the choice of processor: instead of choosing the high-end SoC Snapdragon 855, Xiaomi opted for the Snapdragon 730G, a version of Snapdragon 730 slightly optimized for games. Both devices also have a 3.5mm mini jack, a dual nano SIM (but no microSD), and a battery of 5.260 mAh with 30W fast charge.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmgF8ORDBTRAZa2dIXTm5ZBxI14AmP3nCaZhg2f56OpmMZY5Q6eNs3PL5bl9zsCGlS17qOdgdK3QwmvChj9qjAe29d8Kmu-Od8l2ZN1TNpYTksl46sa3GhpL_B_J6cClwUBx-_x2o-2Qu2/s1600/xiaomi-redmi-note-8t-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;The Mi Note 10, the first smartphone with a 108 megapixel sensor&quot; border=&quot;0&quot; data-original-height=&quot;525&quot; data-original-width=&quot;840&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmgF8ORDBTRAZa2dIXTm5ZBxI14AmP3nCaZhg2f56OpmMZY5Q6eNs3PL5bl9zsCGlS17qOdgdK3QwmvChj9qjAe29d8Kmu-Od8l2ZN1TNpYTksl46sa3GhpL_B_J6cClwUBx-_x2o-2Qu2/s400/xiaomi-redmi-note-8t-2.jpg&quot; title=&quot;The Mi Note 10, the first smartphone with a 108 megapixel sensor&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;In front, hidden in the drop of water, a device of 13 million pixels. © Xiaomi&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
A fivefold photo module&lt;/h3&gt;
&lt;div&gt;
Both devices built into a 32-megapixel selfie camera, placed in a water drop view. Beyond the fusion of different sensors, from the migration of the main sensor to 108 pixels for default snapshots to 27 million thanks to the pixel pixel technique. It comes with a 20-megapixel ultra-wide angle module, a 12-megapixel 2x module, a 5-megapixel 5x module and a macro module for nearly 2 megapixel shots.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
Xiaomi boasts a zoom that can range from 0.6x to 5x optical and 50x hybrid. In addition to the difference in the amount of memory, the Mi Note 10 Pro stands out with an 8P lens (against a 7P lens on the Mi Note 10) and the ability to record RAW snapshots. They will be available for purchase from November 18, at a rate of 549 euros for the Xiaomi Mi Note 10 and 649 euros for the Xiaomi Mi Note 10 Pro&lt;br /&gt;
&lt;h3&gt;
Redmi Note 8T: a powerful smartphone to less than 221 $&lt;/h3&gt;
&lt;div&gt;
Xiaomi also launched the new smartphone from its Redmi subsidiary, the Redmi Note 8T. This one, designed to be rather mid-range, sports a 6.3-inch IPS LCD Full HD + screen (2.340 x 1.080 pixels) with a drop-shaped notch that houses a 13-megapixel selfie camera . It ships a SoC Snapdragon 665, supported by 4 GB of RAM and 64 GB of storage, expandable through a microSD slot. It has a battery of 4000 mAh with a fast charge of 18W, as well as a mini-jack 3.5mm.&lt;br /&gt;
&lt;br /&gt;
At the back is a quadruple photo module. First a 48-megapixel main module, which works by default in pixel binning mode, for 12-megapixel shots. It comes with an ultra-wide 8 megapixel module, a 2 megapixel depth sensor and a 2 megapixel macro module. The Redmi Note 8T is certainly on a range below the Xiaomi Mi Note 10 on the power, but the price / quality ratio is even more advantageous.&lt;br /&gt;
&lt;h3&gt;
WHAT YOU MUST REMEMBER&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
The war is raging among Chinese manufacturers of smartphones in photography.&lt;/div&gt;
&lt;div&gt;
Faced with One Plus and Huawei, Xiaomi draws the first sensor of 108 million pixels.&lt;/div&gt;
&lt;div&gt;
Despite high-end equipment, the price remains lower than that of the competition.&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/8587374977169940139/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/the-mi-note-10-first-smartphone-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/8587374977169940139'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/8587374977169940139'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/the-mi-note-10-first-smartphone-with.html' title='The Mi Note 10, the first smartphone with a 108 megapixel sensor'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmgF8ORDBTRAZa2dIXTm5ZBxI14AmP3nCaZhg2f56OpmMZY5Q6eNs3PL5bl9zsCGlS17qOdgdK3QwmvChj9qjAe29d8Kmu-Od8l2ZN1TNpYTksl46sa3GhpL_B_J6cClwUBx-_x2o-2Qu2/s72-c/xiaomi-redmi-note-8t-2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-6791256209143713986</id><published>2019-11-22T00:42:00.000-08:00</published><updated>2019-11-22T00:45:11.197-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="STORAGE SPACE"/><category scheme="http://www.blogger.com/atom/ns#" term="STORAGE TIME"/><title type='text'>Project Silica: storing data on glass according to Microsoft</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Project Silica: storing data on glass according to Microsoft&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Boiling water, microwaves, stripping ... Microsoft engineers have done the most extensive testing to damage this new storage medium, but this glass plate could be the ultimate solution for storing data for centuries.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Microsoft has taken another step in its Project Silica, recording the 1978 film Superman on a glass plate. The announcement might seem anecdotal: it took a glass plate the size of a coaster for a single film, while a microSD card has a much higher capacity, while being about 30 times smaller. However, the Microsoft project is not trying to solve a problem of capacity, but of sustainability.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Almost all of today&#39;s media are struggling to withstand time and elements, whether older media, such as photos or books , or newer ones such as optical discs, magnetic hard drives or flash memories. The problem is that to ensure longer-term storage, the film industry converts digital works to analog format and then divides the image into the three primary colors that are then used to create three black and white filmstrips. more durable than color films whose pigments degrade too quickly.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_s0vQkLJb7oPYQHcvcMO1BilS9dKKJLKmqrQZf43IjUwqNnETKBpiVMoCoZuSDpnksRBn4U_ye8qsUuMPYfgHJBse2B1LTuf20lQd3JOY7OdfxVaBk2gvqpMFcwjDqnMYtGnMFKRuA5zH/s1600/ignite-project-silica-superman-james-clegg.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Project Silica: storing data on glass according to Microsoft&quot; border=&quot;0&quot; data-original-height=&quot;683&quot; data-original-width=&quot;1024&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_s0vQkLJb7oPYQHcvcMO1BilS9dKKJLKmqrQZf43IjUwqNnETKBpiVMoCoZuSDpnksRBn4U_ye8qsUuMPYfgHJBse2B1LTuf20lQd3JOY7OdfxVaBk2gvqpMFcwjDqnMYtGnMFKRuA5zH/s400/ignite-project-silica-superman-james-clegg.jpg&quot; title=&quot;Project Silica: storing data on glass according to Microsoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;A Microsoft optical scientist is loading a piece of glass into a system using optics and artificial intelligence to extract and read data stored on glass. © Jonathan Banks, Microsoft.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;h3&gt;
Current storage technologies too ephemeral&lt;/h3&gt;
&lt;div&gt;
Microsoft predicts that the mass of data stored online will reach 100 zettabytes, or 100 billion terabytes, in 2023. Current storage media offer only limited storage time, and today&#39;s industry is managing this massive amount of data. regularly renewing the media used. Hard drives can fail in three to five years, while magnetic tapes used for computer archives offer only five to seven years of durability. Warner Bros., who owns the Superman movie rights, creates copies of his archives every three years to avoid problems.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Microsoft has decided to change the technique. Rather than working on current technologies in an attempt to make them more sustainable, the firm chose to start from a promising material and develop a new storage technology. With Project Silica, the firm opted for a quartz glass support. The project has just reached a new milestone by recording a complete film, 75.6 GB of data, on a glass plate 75 mm wide and 2 mm thick.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTNgt0Cc8GGm_8Iql0na3XclDbERnC6wh0wcr2DT4oDR8AKvdB6Mc37gLxttwCUjtELEBlbW57k4n0zFdMBOoNIuftA6WbHAtmO730iYU7C-8pRNPDowTtAyZdpkpOicZ3q_-shGJJyXIk/s1600/project-silica.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Project Silica: storing data on glass according to Microsoft&quot; border=&quot;0&quot; data-original-height=&quot;683&quot; data-original-width=&quot;1024&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTNgt0Cc8GGm_8Iql0na3XclDbERnC6wh0wcr2DT4oDR8AKvdB6Mc37gLxttwCUjtELEBlbW57k4n0zFdMBOoNIuftA6WbHAtmO730iYU7C-8pRNPDowTtAyZdpkpOicZ3q_-shGJJyXIk/s400/project-silica.jpg&quot; title=&quot;Project Silica: storing data on glass according to Microsoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Cooked, boiled, washed, demagnetized, brushed with glass wool ... enough to demonstrate the strength and durability of Project Silica. © Jonathan Banks, Microsoft.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
A technology to archive data for centuries&lt;/h3&gt;
&lt;div&gt;
This technology works with three-dimensional pixels, called voxels. Each voxel is encoded by laser pulsations that physically deform the glass. It is therefore an archiving technology only, read-only. The researchers managed to create 100 layers of voxels in a 2mm thick glass plate. The reading of the plate, however, is a little more complex and relies on artificial intelligence, able to recognize the patterns created by the polarized light that passes through the glass. The reading however remains very fast.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
These quartz glass plates are extremely durable. The research team put them to the test, baking them in the boiling water and in the microwave. They demagnetized and even scoured them with glass wool and found no data loss. They do not require any special storage conditions, temperature or humidity, and could hold data for centuries&lt;/div&gt;
&lt;h3&gt;
WHAT YOU MUST REMEMBER&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;
Creating the most resilient storage medium possible is Microsoft&#39;s challenge.&lt;/div&gt;
&lt;div&gt;
The firm opted for glass with a three-dimensional engraving.&lt;/div&gt;
&lt;div&gt;
It is indeed an archival medium since only reading is then possible.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/6791256209143713986/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/project-silica-storing-data-on-glass.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6791256209143713986'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/6791256209143713986'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/project-silica-storing-data-on-glass.html' title='Project Silica: storing data on glass according to Microsoft'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_s0vQkLJb7oPYQHcvcMO1BilS9dKKJLKmqrQZf43IjUwqNnETKBpiVMoCoZuSDpnksRBn4U_ye8qsUuMPYfgHJBse2B1LTuf20lQd3JOY7OdfxVaBk2gvqpMFcwjDqnMYtGnMFKRuA5zH/s72-c/ignite-project-silica-superman-james-clegg.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6064380323050151356.post-3259027018244995291</id><published>2019-11-21T00:30:00.000-08:00</published><updated>2019-11-21T02:08:11.254-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ELECTRIC CAR"/><category scheme="http://www.blogger.com/atom/ns#" term="SUPERCAR"/><category scheme="http://www.blogger.com/atom/ns#" term="SUPERCAR ELECTRIC"/><title type='text'>The Audi electric supercar AI: Race is unveiled in video</title><content type='html'>&lt;h3 style=&quot;text-align: center;&quot;&gt;
The Audi electric supercar AI: Race is unveiled in video&lt;/h3&gt;
&lt;div&gt;
&lt;b&gt;The ring firm is preparing an exceptional electric sports car that will be produced in 50 copies. Here it is for the very first time in action.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Being able to discover a supercar still under development is already very rare, but taking a ride at its wheel is downright exceptional. This is the privilege of Alex Hirschi, aka &quot;Supercar Blondie&quot;. This Australian youtubeuse who travels the world to try exceptional cars had access to a prototype of the Audi AI: Race, the future electric supercar of the German brand. A jewel of technology and design that will be manufactured only 50 copies.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Let&#39;s start with the technical sheet that already sets the scene. The Audi AI: Race is equipped with three electric motors, one on the front axle, two at the rear, which deliver 500 kW for a torque of 830 Nm. The manufacturer promises an acceleration from 0 to 100 mph in one little more than 2 seconds. Peak speed level, we are told a &quot;small&quot; 185 mph. The 95 kWh solid state battery can provide up to 310 miles of battery life (WLTP cycle) and fully recharge in 15 minutes on an 800-volt station, like the Taycan Porsche.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/0irtVnabSJA/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/0irtVnabSJA?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
A guided tour of the Audi. AI: Race. © Supercar Blondie&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
A motorized monohull in the cockpit&lt;/h3&gt;
&lt;div&gt;
Audi has thought AI: Race for dual use on road or on track. With 4,530 mm long, 2,000 mm wide, only 1,150 mm high and a wheelbase of 2,700 mm, it is a stubby beast thought to tease the rope stitches. Its rear diffuser can be adjusted to increase the support, as its spoiler that deploys in height and width.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQUesIgg9YYFhxMuphao9QZydEFRQQbcngB2NDbJ_bH7s8amqcUTqRAf06A3WDE-Q_6SIflv-BpyQE72dAoBYrg-mhMpZu3XzVvnc-NbJUHq4gI39p_jow-p5SpoPiMxr1jWVHg_6asg8G/s1600/audi-ai-race-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;The Audi electric supercar AI: Race is unveiled in video&quot; border=&quot;0&quot; data-original-height=&quot;579&quot; data-original-width=&quot;1024&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQUesIgg9YYFhxMuphao9QZydEFRQQbcngB2NDbJ_bH7s8amqcUTqRAf06A3WDE-Q_6SIflv-BpyQE72dAoBYrg-mhMpZu3XzVvnc-NbJUHq4gI39p_jow-p5SpoPiMxr1jWVHg_6asg8G/s400/audi-ai-race-2.jpg&quot; title=&quot;The Audi electric supercar AI: Race is unveiled in video&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;The Audi AI: Race seen from the back. Impressive? © Audi&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But it is the cockpit that is undoubtedly the most impressive. When the door opens, we discover a monocoque in central position that integrates the bucket seat, the steering wheel and the dashboard. Mounted on a motorized rail, the assembly moves laterally to meet the driver. Once it is installed, the monohull slides towards the center of the cockpit. If necessary, the configuration can evolve in left-hand drive to leave space for a passenger. Installed in a very low position, the pilot can see the road through the windshield that plunges under the front hood which is itself perforated. A transparent Oled screen positioned in the axis of vision will display in real time the ideal trajectory to follow when one is on circuit. In short, a beautiful techno toy for a few privileged portfolio well stocked. The date of marketing of the Audi AI: Race is not yet known.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://newstechnotechno.blogspot.com/feeds/3259027018244995291/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/the-audi-electric-supercar-ai-race-is.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/3259027018244995291'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6064380323050151356/posts/default/3259027018244995291'/><link rel='alternate' type='text/html' href='https://newstechnotechno.blogspot.com/2019/11/the-audi-electric-supercar-ai-race-is.html' title='The Audi electric supercar AI: Race is unveiled in video'/><author><name>News Technology</name><uri>http://www.blogger.com/profile/04299695085312678983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirJCXn4MMo63P1N8a5lQUBQONfuZrkfkwLa1D4Ptwp_T2W_RMmcCIp6cyTQTgCJRGfa9up9kv34LeK7yheO-jwcdmjhNPYjcSNRkWxeeKbsThg7f-2-r2pSQG-jdpms7s/s113/newstechnotechno.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/0irtVnabSJA/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>