Monday, 13 April 2015

Google Releases Android 5.1 Update

The official release of the Android operating system updates are included in the 5.1 version of Android known as Lollipop, has been presented by Google with the system Over-the Air (OTA). This product will be launched for its development alone some of the family Nexus series and other brands.

However, not only for its newest products are getting updates to the system, such as the Nexus 9. Some older product development Google partnered with several device manufacturers will also be presented.

As reported from Androidpolice, Friday (10/04/2015), some of the products Google Nexus series family, especially the older series have been getting updates Android system. In addition to display a fresh OS, this update also claimed to bring some new features.

Update incoming and expressed jump from version should have claimed to have returned the feature 'silent' or silence that had gone on Android updates to version 5.0 Lollipop, so this release of Android 5.1 to version fixes and adding new features.

Be some series of products that can update the 5.1 version of Android Lollipop is a product that has also been released in 2012 and 2013. In addition of course, the latest product this year also get the updates.

Nexus product that gets the renewal is

- Nexus 9 WiFi

- Nexus LTE 9

- Nexus 6

- Nexus 5

- Nexus 4

- Nexus 7 WiFi (2013)

- Nexus 7 LTE (2013)

- Nexus 7 3G (2012)

- Nexus 10

- Nexus Play

- Sony Z Ultra Google Play Edition

- LG G Pad 8.3 Google Play Edition

- HTC One M8 Google Play Edition

- Sprint Nexud S 4G

Former Employee Opens Disadvantages Apple

Working at Apple is a dream of many people, but it turns out to be a nightmare for the former employees of the company from Cupertino. Once out of work, Apple employees have also revealed his frustrating experience while working there.

Reported by BGR page, Friday (04/10/2015), a former Apple employee named Ben Farrell has recently decided to stop working at the Apple company and he share bad experiences during the work. Though Farrell has worked for two years and served a strategic position in Apple.

Ferrel who work in managing the division's customer service immediately issued a complaint for work at Apple. First, he considers the work culture at Apple are very demanding and everyone is trying to be successful by way of trying to make others fail.

"Sixteen hours a day filled with meetings and after the meeting will be followed by another meeting again," he wrote. Farrell went on every agenda is done intentionally designed to make people in top positions in the company making the most ordinary employees look stupid.

Farrell also wrote the absence of teamwork in the company Apple is, besides a lot of time wasted is used to set the agenda of the meeting. Though times used the meeting calculated, maybe they've been able to finish some work.

In a post on his blog late, Farrell also revealed some disgrace Apple employees are assessed create long-lasting no longer worked there. First, Apple is not serious in making strategic decisions related to the company, even unconsciously Apple executives discuss strategic decisions drunk after drinking.

Secondly, family problems, and personal affairs can not be taken seriously by the management of Apple. And lastly, the management claimed Ferrell inconsistent, moody, and overly aggressive towards employees. Although it is a subjective assessment of a former employee, these shortcomings may be corrected for Apple to be better in the future.

Tips to Get Gems for free Clash of Clans

Game Clash of Clans (CoC) Popular played millions of gamers worldwide. In the game there are gems or green colored gemstone that can be used to accelerate the development of defense, attack, or exchange it for a number of elixir or gold (gold) instantly.

There are a number of methods that can be done to get the gems through purchases through credit card, redeem, and carrier billing (cut pulses). In the game, players can also complete the achievements to get some gems.

Rather than spend additional money to purchase in-app content purchases (IAP), there is an application that helps gamers CoC to get gems. The application is called Free My Apps. In a video uploaded to YouTube, explained how step by step gamers to get gems in the CoC.

First, gamers can download the application Free My Apps in Google Play. In such applications, gamers can download a particular application in exchange for a certain amount of points as well.

Later, players can collect points from any application installed. If sufficient, the points can be exchanged with Google Play Gift Card with a value of $ 25.

After exchanging a number of these points with Google Play Gift Card, gamers will get a 20-digit code. The 20-digit code can then be copied to 'redeem your code' in the Google Play Store.

Once the process is complete redeem, gamers will get a notification that a nominal $ 25 has been stored in your Google Play account belongs to gamers. Now, gamers can get into the game CoC, make purchases through the Treasure to obtain gems.

Noteworthy, it takes patience to earn points by point of downloading the application via Free My Apps.

Apple Closes Jailbreak on iOS 8.3 Update

The development team called The Tag Team Jailbreak from China, assuring that iOS 8.3 has close security loopholes to jailbreak. So it does not allow the application developers to modify Apple's mobile software.


As quoted from page Redmonpie, Tuesday (14/04/2015), Apple has made it clear that all the exploits for iOS 8.1.3, 8.2, and 8.3 have been closed. And it is described by Apple through an official letter issued by the company.

Taig developer Team revealed, that as long as iOS jailbreak version 8 or iOS 7 is the best. And for users who are still using one of the two versions of the operating system, it is recommended to stick with it and do not perform updates to the highest version.

According to the developers, Apple also had stopped to provide the firmware on iOS 8.1.2 version so that those who have done the jailbreak, will not be back again downgrade the original system or return to the version below (iOS 8 or 7).

The developers also hope that the future will find a solution to the problems that can not be done the jailbreak on the latest update of the system. And it is recommended that the user to wait until the problem is solved, to be able to do a re-jailbreak.

Here it is the threat of computers and the Internet in 2015

Computer has now become a common thing. Every day, you may be dealing with this matter. Computers and the Internet have helped your work. Ease of finding information, perform various financial transactions, store or process data into something that is not overly burdensome. However, behind its simplicity, there are many threats that can damage your data or your computer either a PC or laptop.

When you find your computer is not working as it should, for example, a slow computer, hangs, look for the missing data, display annoying when you're working, you may conclude your computer is infected with a virus. Actually there are a variety of threats that target when you are working with computers and the internet. This threat can corrupt data, computers, and even steal important data.


Threatening the security of not only the virus. Maybe there are some terms you've heard, but still do not know what he meant. Here's an explanation of things that can threaten your computer or take your critical data.


Adware 

This is a program that will display ads on the computer. Will interfere because adware usually will use the resources of the computer, consequently slow running computer. There is also a type of adware that appears in a pop-up which can be annoying when you're working.

Brute Force

 An activity to break passwords by combining numbers and letters in sequence. Very dangerous if with this technique, people who are not entitled to succeed to know your password and then misused. To overcome this problem, it is better to use a password that is not only made up of numbers and letters but also consist of symbols such as $, #, &, and others.

DDoS 

Stands for Distributed Denial of Service, where a server or computer is attacked by bombarded submission of data in a very large measure by many computers simultaneously. As a result, the computer is inaccessible or damaged hardware not being able to accommodate very large data submissions.

Exploit 

That is an application that is trying to find and attack the weaknesses of the system to gain access to or with the intention of infecting the system or computer.

Fake Antivirus 

It works by making the computer as if exposed to the virus and suggest to buy antivirus to overcome the virus.

Hoax 

That is the usual hoax propagated via email or website. The effect is a panic or many readers were fooled. Another result is burdensome because the Internet network chain messages of the false news delivered to another person.

Keylogger 

Is one that is quite dangerous threat. Keylogger will record the input is entered via the keyboard to be stored or sent to someone who is usually used for malicious purposes. This is in particular to watch out for when you enter the password in public places such as cafes. Password entered via the keyboard can be known and may be used for malicious purposes.

One way to avoid the keylogger is by using the On Screen Keyboard when the need to input a password. On Screen Keyboard can be run from a Windows program that is at Programs | Accessories | accessbility or by typing "OSK" from the Start | Run on Windows Operating System.


Malware 

Usually found on the bootsector on the hard drive, then change the program is first run. Systems that are usually affected first is the Operating System. Infection in Operating Systems This allows the malware to spread itself or spread a virus on a storage medium such as a CD ROM or Flash Disk. 

Phishing 
Is a form of fraud on the Internet by making someone willing to provide important information that is not entitled to know. For example, to create a website that is similar to a bank's website. A victim does not realize she has been tricked setealh then enter a password that is known by the manufacturer can be used to drain the victim savings.

Rootkit
 A program that aims to hide other programs running. Usually used to spread malware, virus, or keylogger.

Spam 
Refers to unsolicited email. Usually an email advertisement or become inducement for someone to visit a specific website is actually a phishing or to spread malware. Messages can be sent in large quantities so spend the time to remove it. 

Spyware 
Is a program that serves to spy on the user in order to get important information like credit card numbers, PINs or passwords that can harm the victim because of leaking the information. 

Trojan 
Acting as if he is a good program that can be used to help the user work. But, in fact in which there is a function that endanger the overall system or to steal confidential information. Trojan easily spread to other computers.
 

Worm
Is malware that can copy itself and then sends the results of doubling him over the network without having to have certain activities performed by users. The worm can be dangerous because it can be the entry point for viruses, malware or other harmful programs.