Pages

Search This Blog

Tuesday, September 27, 2011

Now, stream uninterrupted videos on your cellphone

kartical Picture  Mobile users with basic phones can now view videos without buffering hiccups thanks to an innovative streaming platform, Jigsee, which enables an uninterrupted viewing experience even on slow wireless internet connections.

With an estimated 90 per cent of Indian mobile subscribers using feature phones, this translates into a potential audience of over 500 million in the Indian sub-continent alone," said Ray Newal, chief executive of Jigsee Inc.

"These mobile subscribers have so far been unable to access video streaming services such as YouTube, which traditionally caters primarily to users of advanced smartphones with access to high speed broadband connections," Newal told IANS on phone from Canada.

The technology start-up's unique platform can be downloaded from the website m.jigsee.com orapp stores such as Getjar, Ovi and Tata Docomo for free.

"Typically most mobile online video content is offered in the form of very short clips and the segment of the market we are targeting don't have alternatives. They don't have broadband but they are much more interested in watching longer form content," said Newal.

The Jigsee platform offers features like auto-bookmarking. If one is cut off mid-stream while watching a video due to a drop in network signal or if the battery dies, Jigsee automatically remembers where the stream stopped and provides a simple option to resume watching the next time the application is opened.

Another feature is the magic queue which allows every video to continue into subsequent videos that Jigsee plays. Jigsee has tied up with content providers like UTV, Spice Digital, Mukta Artsand currently has a library of over 200,000 minutes of videos.

So how does Jigsee enable smooth streaming even when the wireless internet on offer is slow?

Explains Newal: "The average GPRS landscape in India, the average data rate is about 60 kb per second. In some places it could be as high as 130 kb per second, while in some cases it can drop to a sluggish 5-10 kb per second."

"It is difficult for anyone to play a video under a certain bandwidth. Our minimum threshold is about 40 kb per second and at that speed we can get a stream playing continuously. The platform on the phone tells our servers gives feedback on the kind of data rate and accordingly we keep adjusting the quality of the video in real-time."

But that trade-off is not so bad, when one considers the small screen of basic phones.

5 Hidden dangers of Facebook


Over the last few years, Facebook's growth has been phenomenal. The world's no. 1 social networking site also sometime back beat Google to become the most visited Web site in the US for an entire week at a stretch. However, the site has also lately being receiving lot of flak for its privacy policies.
An expert in online privacy drew attention to the five dangers of sharing information on social networking site Facebook. Joan Goodchild, senior editor of CSO (Chief Security Officer) Online, said that marketing efforts by the company often results in a compromise on account holders' privacy. 
Goodchild noted five risks of using Facebook.
artical Picture
They are:
1. According to Facebook policy last updated on April 2010, "When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends' names, profile pictures, gender, user IDs, connections, and any content shared using the Everyone privacy setting. ... The default privacy setting for certain types of information you post on Facebook is set to "everyone." ... Because it takes two to connect, your privacy settings only control who can see the connection on your profile page. If you are uncomfortable with the connection being publicly available, you should consider removing (or not making) the connection."

2. In March, private e-mail according to a Gawker report, private email addresses that many Facebook users wanted to keep hidden were revealed publicly on a multitude of Facebook profiles. The glitch was later resolved by Facebook.

3. Recently, a Facebook event invitation was reportedly sent to some over 2,300 friends of Jim Breyer, Accel Partners venture capitalist who sits on Facebook's board of directors, asking "Would you like a Facebook phone number?" However, the message was actually a scam and the users who entered their passwords in response to the message in turn sent the whole thing to their friends lists too.
"This was a phishing scam and Jim's account appears to have been compromised," read a statement from Facebook as provided to venture industry news site PEHub.

4. On May 6th, the popular social network patched a major security bug that allowed users to snoop on their friends' private chats, and view their pending friend requests. The exploit forced Facebook to temporarily disable chat.

5. Earlier this week, 15 privacy and consumer protection organizations filed a complaint with the Federal Trade Commission, alleging that the site manipulates privacy settings to make users' personal information available for commercial use. 

How to automatically backup USB drives



USB flash drives are not indestructible - they may be sturdier than hard drives, but they're still susceptible to physical damage and breakage from falls, electrostatic discharge and data corruption if a device is removed while data is still being copied. 
artical Picture

It's good practice to keep multiple backups of your important data, so try USB Flash Copy - a free utility for Windows PCs that automatically takes backups of your flash drive every time you connect it.

No installation is needed and it's only a 300kb download - get it from www.usbflashcopy.com and run it to set a particular folder on your computer's hard drive for backups (by default, it makes a backup folder in 'My Documents' ).

The first time you connect a USB drive, it will take a complete backup of all contents. Thereafter, it only makes small changes to the backup folder - copying only the files that have been changed or added. If you like, you can alter the settings to keep older versions of files too.

And if multiple people use the same PC or if you have multiple flash drives, you can create profiles for each device (with different settings).

Saturday, September 24, 2011

Internet Download Manager

Internet Download Manager  (IDM) is a Downloader tool to increase download speeds on internet. IDM v5.19 Bulid 3 has been released on May 26, 2010. My Opinion, Internet Download Manager 5.19 Bulid 3 has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and Internet Download Managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. This Software reuses available connections without additional connect and login stages to achieve better acceleration performance.
This Software also supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, Opera, Mozilla Firefox,Mozilla Firebird, Avant Browser, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it’s done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
IDM is really user friendly and easy to use according my opinion. Okey, I will share to you IDM 5.19 Build 3 Full version. You can download Internet Download Manager v5.19 Bulid 3 Full Version + Crack via the link below.

Download link
Version 5.19 tagged with, IDM, Crack IDM, Patch IDM, Full Version,
Downloader Tools

Thursday, September 22, 2011

WHAT IS NETWORK SECURITY?

The networks are computer networks, both public and private, that are used every day to conduct transactions and communications among businesses, government agencies and individuals. The networks are comprised of "nodes", which are "client" terminals (individual user PCs) and one or more "servers" and/or "host" computers. They are linked by communication systems, some of which might be private, such as within a company, and others which might be open to public access. The obvious example of a network system that is open to public access is the Internet, but many private networks also utilize publicly-accessible communications. Today, most companies' host computers can be accessed by their employees whether in their offices over a private communications network, or from their homes or hotel rooms while on the road through normal telephone lines.
Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.
Threats to network security include:
Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games
Vandals : Software applications or applets that cause destruction
Attacks : Including reconnaissance attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); and denial-of-service attacks (which prevent access to part or all of a computer system)
Data interception : Involves eavesdropping on communications or altering data packets being transmitted
Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords
Network security tools include:
Antivirus software packages : These packages counter most virus threats if regularly updated and correctly maintained.
Secure network infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management.
Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.
Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data.
Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.
Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.
Security management : This is the glue that holds together the other building blocks of a strong security solution.
None of these approaches alone will be sufficient to protect a network, but when they are layered together, they can be highly effective in keeping a network safe from attacks and other threats to security. In addition, well-thought-out corporate policies are critical to determine and control access to various parts of the network.