Thursday, May 23, 2013

Install pirated iOS apps without jailbreaking your device

If you wanted to install pirated apps on your iPad, iPhone or iPod touch up to this point, you’d first need to jailbreak your device – a process that many users simply didn’t want to fool with for a number of reasons. But that’s all changed now as there are at least two apps that allow users to install pirated apps without having to root the operating system.
The new services are gaining momentum after another popular pirate installer, Installous, met its demise late last year. This new breed of services, led by Zeusmos and Kuaiyong, make it easier than ever to install apps as they facilitate one-tap installs that can be done on non-jailbroken devices.
Zeusmos is available free of charge on jailbroken devices although, interestingly enough, there is a fee associated with using it on non-jailbroken units. It seems kind of counterproductive to charge to install pirated apps but in an interview with TWN, the 15-year-old creator said it was a way to try before you buy.
Kuaiyong, on the other hand, is a web-based installer that is free for all to use. Users can install apps directly from their iOS devices or use a desktop app to install them using a data cable. Using the app will disable iTunes synching but as the publication notes, that likely won’t be much of a deterrent for those interested in downloading the latest and greatest apps without paying for them.
It goes without saying that those interested in either product should proceed at their own risk as Apple is sure to shut these services down in due time.

WindowsAndroid lets you run Android natively within Windows

It’s already possible to run Android apps on Windows PCs thanks to a clever little app called BlueStacks. But now a group of Chinese developers are looking to take it a step further by actually allowing you to run the entire Android 4.0.3 “Ice Cream Sandwich” operating system, complete with Google Play support, as a native application on your on Windows Vista, Windows 7, or Windows 8 machine.
For now the project is still very much in development and as such it still requires a lot of tweaking to get things working properly. For instance, the Google Play Store needs to be side-loaded separately, and once you get that running most apps will still show up as incompatible since they don’t recognize your computer as a valid Android device. A thread on Reddit offers some guidance on how to get around this problem.
WindowsAndroid provides users with a stock Android user interface and leverages the Dalvik virtual machine to run Android apps. Since there’s no need for emulation apps can reportedly take advantage of your system’s hardware and graphics card for hardware acceleration. The program will support most screen resolutions and those that don’t have a touch screen can use their mouse and keyboard to navigate the interface.
Running Android on a desktop will have little to no practical use for most people, but the project itself seems interesting nonetheless and it’s worth a look if you haven’t had a chance to play with the platform yet. To try it out you’ll need to fill out a form on the developer’s site to get a download link on your inbox.

Microsoft yields: boot to desktop, Start menu options in Windows 8.1

microsoft, windows, metro, windows 8, start menu, blue, windows blue, windows 8Microsoft may be ready to address two of the most common complaints about Windows 8 with its upcoming “Blue” update. Specifically, The Verge cites sources familiar with the company’s plans who claim builds of Windows 8.1 are being tested with an option to skip the “Metro” start screen and boot directly to the traditional desktop. A separate report from ZDNet seconds this and also suggests that the Start menu might make a comeback.
Signs of a boot-to-desktop option were spotted a few days ago in a leaked build of Windows Blue. Apparently the option is disabled by default and there’s currently no toggle to enable it in the operating system’s settings panel. But the code is there. It’s possible Microsoft still hasn't decided on whether to implement this in the final Blue release, though ZDNet’s Mary Jo Foley says her sources have confirmed “this is now looking like the plan.”
Whether Microsoft will bring back the Start button is even more uncertain. The Verge says the “hot corners” that bring up the modern-style Start menu and the Charms bar will remain intact if the boot to desktop option is enabled, but Foley says Microsoft is also considering bringing back the Start button as an option.
It’s worth noting that you can accomplish both behaviors -- boot to desktop and bringing back the start menu -- through some fairly simple workarounds or using third party software. But having the options baked into the Windows 8 UI through the system settings screen would make things much simpler for all users.
Microsoft has so far been reluctant of letting users skip the modern-style interface so easily, and defended its stance by saying users find the new interface easy to learn once they give it a chance.
While it's understandable that the company is trying to push a consistent user experience that spans across multiple Windows devices, those against ‘Metro’ claim the interface doesn’t really make sense for non-touch-screen machines. If the new options indeed make it to Windows 8.1 it will give everyone the option to make a gradual shift or just maintain the classic Windows feel... at least for a while longer.

Viber launches messaging app for PC and Mac as competitors stick to mobile

Third-party messaging applications are big business on mobile, with many users looking to break away from the expensive text messaging plans offered by carriers. WhatsApp is likely the most used of these apps, but Viber is looking to take the throne away with the launch of its messaging client on PC and Mac (with Linux coming soon). WhatsApp, and most of Viber's competitors, are 100-percent focused on mobile, which just might give Viber an edge in the market, since its users will be able to use the app on all of their devices.

Viber already has over 200 million users, so it's not exactly a newcomer trying to take on the big boys. But while the service has that many users signed up, the company did not specify how many of them are active users.
The Mac and PC versions of Viber should feel comfortable to anyone who has used Skype, Messages for Mac, or any other popular desktop-based messaging service. It can be used for texting, voice calls, and video chats. The video chat feature only works from desktop-to-desktop for the time being.
To go along with the desktop releases, Viber is also updating its mobile applications with some slick new features such as video messages, new stickers, last online status and more. As you'd expect, the desktop version syncs with the mobile apps, and users can even push their calls from desktop to mobile with a single tap, allowing them to continue a conversation if they have to leave the house for one reason or another.
Will this move put Viber ahead of WhatsApp and its other competitors? Time will tell, but it most certainly seems like a smart decision, what with so many users spending a large part of their day in front of computer screens.

Technology from Africa Ensures the Cloud Works When Your Connection Doesn’t

The “cloud” is great for places that enjoy uninterrupted power and Internet connections. But for large swathes of the world, where blackouts are common and connections unreliable, accessing files stored remotely on the Internet is a massive hassle. Forget about downloading Adobe Creative Suite. Simply working on a Google doc can be aggravating.


That’s why the people behind Ushahidi, open disaster-mapping software, built BRCK (pronounced “brick.”) BRCK is a wi-fi router and mobile modem in one, with eight hours of battery life to keep it going when the power runs out. It can sit in an office connected by ethernet and switch seamlessly to a 3G or 4G connection if the line goes down. It can also support up to 20 wireless connections and has 16 gigabytes of storage so it can work as a back-up network drive. Connect it to some processing power, such as a Raspberry Pi cheap computer, and you have yourself a mini-server.
Erik Herzman, an Ushahidi co-founder, dreamed up BRCK more than a year ago as a solution to connectivity problems at the iHub, Nairobi’s best-known space for hackers to congregate. The result is a working prototype and a Kickstarter crowdfunding campaign that’s raised more than a third of the $125,000 target in less than five days. What makes BRCK stand out from Kickstarter’s clutter is that it solves a very real need: the iHub, for instance, currently has four Internet providers to ensure connectivity, and a BRCK could lessen the need for so much redundancy.
Read the full story on Quartz.

Choosing and Protecting Passwords

Why do you need a passwordPasswords are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or "crack" passwords, but by choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.

Think about the number of personal identification numbers (PINs), passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or email, signing in to an online bank account or shopping cart...the list seems to just keep getting longer. Keeping track of all of the number, letter, and word combinations may be frustrating at times, and maybe you've wondered if all of the fuss is worth it. After all, what attacker cares about your personal email account, right? Or why would someone bother with your practically empty bank account when there are others with much more money? Often, an attack is not specifically about your account but about using the access to your information to launch a larger attack. And while having someone gain access to your personal email might not seem like much more than an inconvenience and threat to your privacy, think of the implications of an attacker gaining access to your social security number or your medical records.
One of the best ways to protect information or physical property is to ensure that only authorized people have access to it. Verifying that someone is the person they claim to be is the next step, and this authentication process is even more important, and more difficult, in the cyber world. Passwords are the most common means of authentication, but if you don't choose good passwords or keep them confidential, they're almost as ineffective as not having any password at all. Many systems and services have been successfully broken into due to the use of insecure and inadequate passwords, and some viruses and worms have exploited systems by guessing weak passwords.

How do you choose a good password?

Most people use passwords that are based on personal information and are easy to remember. However, that also makes it easier for an attacker to guess or "crack" them. Consider a four-digit PIN number. Is yours a combination of the month, day, or year of your birthday? Or the last four digits of your social security number? Or your address or phone number? Think about how easily it is to find this information out about somebody. What about your email password—is it a word that can be found in the dictionary? If so, it may be susceptible to "dictionary" attacks, which attempt to guess passwords based on words in the dictionary.
Although intentionally misspelling a word ("daytt" instead of "date") may offer some protection against dictionary attacks, an even better method is to rely on a series of words and use memory techniques, or mnemonics, to help you remember how to decode it. For example, instead of the password "hoops," use "IlTpbb" for "[I] [l]ike [T]o [p]lay [b]asket[b]all." Using both lowercase and capital letters adds another layer of obscurity. Your best defense, though, is to use a combination of numbers, special characters, and both lowercase and capital letters. Change the same example we used above to "Il!2pBb." and see how much more complicated it has become just by adding numbers and special characters.
Longer passwords are more secure than shorter ones because there are more characters to guess, so consider using passphrases when you can. For example, "This passwd is 4 my email!" would be a strong password because it has many characters and includes lowercase and capital letters, numbers, and special characters. You may need to try different variations of a passphrase—many applications limit the length of passwords, and some do not accept spaces. Avoid common phrases, famous quotations, and song lyrics.
Don't assume that now that you've developed a strong password you should use it for every system or program you log into. If an attacker does guess it, he would have access to all of your accounts. You should use these techniques to develop unique passwords for each of your accounts.
Here is a review of tactics to use when choosing a password:
  • Don't use passwords that are based on personal information that can be easily accessed or guessed.
  • Don't use words that can be found in any dictionary of any language.
  • Develop a mnemonic for remembering complex passwords.
  • Use both lowercase and capital letters.
  • Use a combination of letters, numbers, and special characters.
  • Use passphrases when you can.
  • Use different passwords on different systems.

How can you protect your password?

Now that you've chosen a password that's difficult to guess, you have to make sure not to leave it someplace for people to find. Writing it down and leaving it in your desk, next to your computer, or, worse, taped to your computer, is just making it easy for someone who has physical access to your office. Don't tell anyone your passwords, and watch for attackers trying to trick you through phone calls or email messages requesting that you reveal your passwords (see Avoiding Social Engineering and Phishing Attacks for more information).
If your internet service provider (ISP) offers choices of authentication systems, look for ones that use Kerberos, challenge/response, or public key encryption rather than simple passwords (see Understanding ISPs and Supplementing Passwords for more information). Consider challenging service providers that only use passwords to adopt more secure methods.
Also, many programs offer the option of "remembering" your password, but these programs have varying degrees of security protecting that information. Some programs, such as email clients, store the information in clear text in a file on your computer. This means that anyone with access to your computer can discover all of your passwords and can gain access to your information. For this reason, always remember to log out when you are using a public computer (at the library, an internet cafe, or even a shared computer at your office). Other programs, such as Apple's Keychain and Palm's Secure Desktop, use strong encryption to protect the information. These types of programs may be viable options for managing your passwords if you find you have too many to remember.
There's no guarantee that these techniques will prevent an attacker from learning your password, but they will make it more difficult.

Transfer files easily between desktop and mobile devices.

Transfer files easily between desktop and mobile devices.

Like underwear, changing your browser every once in awhile can give you a fresh feeling. If you're at that point where you're ready to try something different, Maxthon's Cloud Browser is an option worth investigating. We bring it up because Maxthon let us know it just added a LAN transfer feature that allows users to transfer files of any size from their browser directly to any device on their network.
"The addition of LAN transfer will make sizable improvements in users’ everyday web experience," said Karl Mattson, VP of  International for Maxthon. "Customers with the newest and fastest home Internet services can now move a 1 GB file from one device to another more than five times faster than the alternative ‘up-over-and-down’ cloud services."
It's a pretty neat feature made more useful by the fact that Maxthon's Cloud Browser is available on multiple platforms, including Windows and Android (iOS and Mac coming soon).
If you want to kick the brower's tires, you can download it from Maxthon's website.
Custom Search
Powered By Blogger