Oct 24, 2013

SARDU – Windows Multiboot USB Creator

SARDU is another nice Windows based Multiboot USB Creator that can also be used to create Multiboot CD/DVD's. Created by Davide Costa, SARDU enables you to create a Multiboot UFD containing your basic essential Utilities, Antivirus, and Windows XP/7 Installers. On top of that, SARDU offers the built in ability to Defragment your USB Drive, and burn an ISO to CD/DVD.

WARNING! I've been informed that SARDU is now potentially packaged with Adware. As a result, I recommend avoiding this tool. Back in Jan 2011, when this post was originally written, SARDU was a good clean tool!

If you choose to use this program, first check it for viruses/trojans/malware using an online multiple scan utility such as Virus Total!

SARDU – Another Multiboot USB Creator for Windows

Authors Website: http://www.sarducd.it

Simple usage example to create a Multiboot USB:

Download Unzip and Run latest version of SARDU
(1) Click the ISO Icon to select the folder containing your ISO's
(2) Select your USB Drive (3) Click the USB Icon to Create the Multiboot USB


(3) Restart your PC, setting your BIOS or Boot Menu to boot from the Flash Drive. Proceed to boot from the USB and enjoy.

How to Access The Computer and motherboard BIOS

Computer and motherboard manufacturers and BIOS suppliers may use varying keyboard keys or key combinations that can be pressed during system post to access your system BIOS. Unfortunately there is no standard method to universally access or enter a motherboard BIOS. The following is a list of some popular BIOS suppliers, Computer Vendors and the keyboard key combinations that have been known to work with them.


If you know of a combination that is not listed, please feel free to contact us with the information and we will have it added.

Keyboard Key Commands used to Access a System BIOS

The following BIOS Suppliers chart lists the keys used to enter BIOS.

Bios Suppliers Keyboard Commands used to access BIOS
ALR Advanced Logic Research, Inc. ® PC / PCI F2
ALR PC non / PCI CTRL+ALT+ESC
AMD® (Advanced Micro Devices, Inc.) BIOS F1
AMI (American Megatrends, Inc.) BIOS DEL
Award™ BIOS CTRL+ALT+ESC
Award BIOS DEL
DTK® (Datatech Enterprises Co.) BIOS ESC
Phoenix™ BIOS CTRL+ALT+ESC
Phoenix BIOS CTRL+ALT+S
Phoenix BIOS CTRL+ALT+INS

Computer Manufacturers and the keys used to enter system BIOS.

Computer Vendor/Manufacturer

Keyboard Commands used to access BIOS
Acer® F1, F2, CTRL+ALT+ESC
ARI® CTRL+ALT+ESC, CTRL+ALT+DEL
AST® CTRL+ALT+ESC, CTRL+ALT+DEL
Compaq® 8700 F10
CompUSA® DEL
Cybermax® ESC
Dell BIOS web site search links For models not listed below.
Dell® 400 F3, F1
Dell 4400 F12
Dell Dimension® F2 or DEL
Dell Inspiron® F2
Dell Latitude Fn+F1 (while booted)
Dell Latitude F2 (on boot)
Dell Optiplex DEL
Dell Optiplex F2
Dell Precision™ F2
eMachine® DEL , F 2
Fujutsu Manuals & BIOS Manuals & BIOS Download
Gateway® 2000 1440 F1
Gateway 2000 Solo™ F2
HP® (Hewlett-Packard) F1, F2 (Laptop, ESC)
IBM® F1
E-pro Laptop F2
IBM PS/2® CTRL+ALT+INS after CTRL+ALT+DEL
IBM Thinkpad® (newer) Windows: Programs-Thinkpad CFG.
Intel® Tangent DEL
Lenovo(formerly IBM) Lenovo BIOS Access page
Micron® F1, F2, or DEL
Packard Bell® F1, F2, Del
Seanix DEL
Sony® VAIO F2
Sony VAIO F3
Tiger DEL
Toshiba® 335 CDS ESC
Toshiba Protege ESC
Toshiba Satellite 205 CDS F1
Toshiba Tecra ESC then F1 or F2
Toshiba Notebook [Newer models] 1. Turn on computer by Holding down power button while pressing the ESC key.

The machine will beep, then display:

Check System, then press [F1] key.

2. Release ESC key

3. Press F1 key

Oct 23, 2013

The Next Global Smartphone Revolution: Made in Taiwan

There are almost 7 billion people on the planet, only 1 billion or so of whom have a smartphone. That means 6 billion people do not have one. The biggest tech company you’ve never heard of wants to flip that statistic, and in so doing make 2013 the year it brings the world online.


MediaTek is the largest mobile chipmaker in Taiwan. Its chips power devices from the likes of Lenovo, Sharp and Acer, as well as Chinese giants like ZTE and Huawei. It generated about $3 billion in revenue last year selling chipsets for some 500 million phones, easily eclipsing Samsung, HTC and Apple in total volume. Yet few know who MediaTek is.

“We are,” says Finbarr Moynihan, who runs new business for MediaTek, “one of those best-kept secrets.”

That will soon change, because MediaTek wants to fundamentally remake the global phone business.

The company doesn’t sell phones under its own name. Instead, it supplies what it calls “reference designs” — which include the chip and the operating system, camera, display and more — that need little more than polish and personalization from the manufacturers branding and selling them. MediaTek intends to take that formula, which has worked exceptionally in the feature-phone market, and apply it to smartphones.

In 2013, for the first time ever, global smartphone sales will exceed feature-phone sales — an area MediaTek has thoroughly dominated in China and South Asia. Most of those sales will be in the developing world, where unsubsidized smartphone prices are expected to fall to $50. But MediaTek is going after both ends of the market, with a plan to sell high-end phones as well. It is rolling out fast chipsets and gorgeous displays so handset manufacturers can target the emerging global middle class. If MediaTek can pull this off, it’s going to flip the smartphone-to-feature-phone global equation, boost Android handset sales by an order of magnitude, and bring hundreds of millions of people online, many for the very first time.


Perhaps the one thing more impressive than MediaTek’s vast size is the speed with which it grew. The company was founded in 1997, spun off from the R&D arm of giant Taiwanese chipmaker UMC. It initially made chips for optical drives in computers and home stereos, and remains the world’s largest chipmaker in that segment. It expanded its operations into Wi-Fi, televisions and, most notably, mobile phones.

MediaTek quietly entered the mobile phone business in 2004, making chipsets that powered mobiles in China. Then it moved into the emerging markets of Indonesia, India, Brazil, Russia and more. Today, it is a feature-phone colossus.

Cheap handsets that offer only the most rudimentary features and run only the most basic apps comprised about 70 percent of global mobile sales in 2012. But MediaTek is betting that end users are ready to make the leap to smartphones, based on both hardware costs coming down and the rollout of 3G networks. Within four years, MediaTek estimates, the market for unsubsidized smartphones that cost $200 or less will be in the neighborhood of 730 million units.

And the subsidization issue is key. In China, and much of the rest of the world, phones are sold in retail shops you find in strip malls and markets, not the Chinese equivalent of an AT&T store run by a telco. These phones aren’t subsidized by carriers, so price is a prime concern. The phone and SIM often are purchased separately.

Go to a mall anywhere in China or the developing world and you’ll see a staggering array of form factors from manufacturers you’ve never heard of. To some extent, this is a reflection of necessity. Networks and needs vary from place to place — for example, customers may want a phone with multiple SIM cards for different carriers — so phones are built to suit local needs. MediaTek pioneered this approach in China, where it fueled the market in off-brand mobile phones. As it expanded internationally, that model turned out to be well-suited for a global scale.

“A lot of this stuff is consumer use case developed because of the retail aspects of those countries,” explains Moynihan.

One of MediaTek’s biggest selling points has been flexibility. Operating at enormous scale, MediaTek can pack lots of features into its phones at lower cost than manufacturers operating on a market-by-market basis. It can deliver cheap phones with rich multimedia experiences, while letting local brands to do the hard work of establishing identity and consumer recognition.

For example, because it isn’t beholden to carriers, its phones have long supported multi-SIM and dual band. This is essential in markets where consumers might use different SIMs to call different people, or different countries, or at different times. In some markets, like Brazil, MediaTek phones might have as many as four SIM slots.

The company plans to take the cooperative model that made it China’s biggest supplier of mobile phone chips and apply it to smartphones. The company sells hundreds of millions of feature phone handsets each year. Now it wants to flood the world with affordable Android smartphones, localized to suit particular markets. It developed a powerful quad-core chipset for use in phones that will compete with high-end models from the likes of Samsung and LG, yet sell for as little as $200. Don’t have that kind of cash? No problem. MediaTek has single and dual core chips too, so it can hit lower price points.

“MediaTek has created a barbell market for the global smartphone market,” explains Gartner analyst Mark Hung. “There is growth on the high-end, and significant growth on the low-end.”

The low end is no less important than the high end. Apple operates at the high end. Although it doubled iPhone sales in China during the last quarter of the year, it is in sixth place there overall, according to IDC. It trails Samsung, China Wireless Technologies, ZTE, and Huawei — the last two of which use MediaTek designs.

MediaTek likely to launch first 8-core CPU

MediaTek is expected to officially launch its first 8-core processor, the MT6592, in the second half of November, according to industry sources familiar with MediaTek's roadmap.


The availability of the MT6592 prior to the end of 2013 will enable smartphone vendors, particularly those in China, to launch new models for early 2014, the sources noted.

The release of the MT6592 will also help MediaTek ramp up its penetration in the high-end smartphone segment and serve as a growth driver in the first half of 2014, added the sources.

Goophone 5s knockoff returns in gold

Not to be outdone by its slightly more successful rival, Goophone returns to the market once again with the gold Goophone i5S, a shameless, Android-powered iPhone 5s knockoff complete with a new home button that looks startlingly similar to Apple’s fingerprint scanner… but that definitely isn’t. According to GizChina, Goophone has finally started shipping i5S models in some capacity, which already appear to be out of stock on Goophone’s website. No word yet on whether the gold Goophone sold out as quickly as the gold iPhone 5s, but the Goophone i5C is still available for smartphone buyers that need a Goophone right away.


The Goophone i5S features a 4-inch, 960 x 540 pixel display, 1.2GHz dual-core processor, 5-megapixel rear camera, 1GB of RAM and 16GB of internal storage. The knockoff costs just $199.99 off-contract, but there is no word yet on when Goophone will be able to replenish its stock. While you wait, watch GizChina‘s hands-on with the gold Goophone i5S below.

Home Best Quiet Vacuum Cleaners

For women who engage themselves in household work, couldn't have imagined life without home appliances. They are not only efficient in doing their respective jobs, but they also help to reduce our workload, require lesser commands from us and deliver more. One amongst these useful household appliances is the vacuum cleaner. It can be probably one of the most important appliances for ensuring the cleanliness in our houses. Most women may not like the disturbing sound of these vacuum cleaners, hence there has always been a need felt for quiet vacuum cleaners. And it has been a priority while choosing a vacuum cleaner now.


The world we live in today is getting better than ever. We have had so many advancements in the fields of medicine, agriculture, finance, IT, etc. One thing which is common in all of these is the technological advancements we have had. With more and more sophisticated machines in the making, it has made our life much simpler than what it was before. Just look around and we see all the latest technological advancements. The computer where I am writing into and from where you are reading, the cell phone, GPS, automobiles, etc. Talking about home appliances we've got dish washers, electric heaters, air-conditioners, dehumidifier, induction cookers, and what not. Now about quiet vacuum cleaners, let's find out about a few of them.

Best Quiet Vacuum Cleaners

Electrolux EL6984A Ultra Silencer
One of the leading manufacturers of home appliances Electrolux, can be a reliable name when it comes to vacuum cleaners. Probably the best in its class. This particular model of vacuum cleaner from Electrolux is said to be one of the world's most quietest vacuum cleaner. It has exceptional quality suctioning ability, comes with a reliable and efficient motor. It also comes with features such as bag-full indicator, electronic display, hepa filters, etc. The best part about this product is the noise which can be barely heard. You can also check the quiet vacuum cleaners reviews online and you will surely find this product impressive.

Hoover S3765-040 Wind Tunnel
Another reliable quite vacuum cleaner from Hoover. What makes this product special is the technology used in it. They use the 'wind tunnel' technology, which is patented by them. It helps in exceptional quality cleaning. It has a bagless canister vacuum since it uses the wind tunnel technology. It has hepa filters which can be easily removed and cleaned too.

Shop-Vac Quiet Ultra Pro SR Vac
This beast from the Shop-Vac family is perfect for places where cleaning is tough. It has the ability to clean places like garages, workshops, and the likes. It is big and extremely strong. It comes with a 6.25 horsepower motor with relatively bigger canister. This particular model comes with advanced noise reduction features making it one of the most eligible quiet vacuum cleaners.

Miele S4210 Antares Galaxy Canister
If you are looking for a light and quiet vacuum cleaner then this must be the most appropriate choice. It comes from Miele's stable, which has a reputation of producing decent vacuum cleaners. This particular model has a dial power control system, efficient suction power and easy to carry since it is light in weight.

Miele S163 Universal Upright Stick
I quite liked the design of this particular model. It is sleek and looks like a broad stick. It is said that the S163 has a notable suction power, because of its Super Air Clean Filter it has ability to collect microns as small as 0.5 microns. It is said that this product can be used efficiently for at least for 20 years! It is quiet, easy to maneuver, light weight and well efficient.

Eureka Sanitaire Quiet Clean
Eureka is another renowned name in home appliances. The Sanitaire Quiet Clean vacuum cleaner is a conventional upright vacuum cleaner. It comes with a durable 7 amp motor, a powerful cleaning system with low noise levels.

Sebo Air Belt C3.1
This model from Sebo will ensure quality and durability. It comes with a 1250 watts motor, full-sized canister vacuum, a 12" broad power head to ensure proper cleaning on all types of carpets. Also the product is well-known for low noise emission.

Hope this list of quiet vacuum cleaners was of help. Now you know about few of these products and I think you can figure it out which one would be the best for yourself. If your use of a vacuum cleaner is not massive, then you may go with a lesser capacity motor, and if it is more concrete, then you may want to get the one with a larger motor. When you go out for shopping, please ask for a demo from the salesperson to get more knowledge of the product you are actually buying.

Ceramic Cookware Pros and Cons

Ceramic cookware with its glazed finish can add to the décor of any kitchen. The brightly colored and beautifully decorated ceramic pots and pans look absolutely stunning. But the point is, can you safely cook in ceramic cookware? Although, it is often touted as eco friendly and microwave safe, there are certainly some safety hazards associated with them. However, before you rubbish them as useless, let me tell you that there are some areas where it scores over metal cookware.


Pros and Cons

Ceramic cookware basically comes in two forms, clay based and enamel based. Clay based is light weight and easy to use. Hence, it is preferred by many chefs and homemakers. However, this type of ceramic ware is prone to chipping and breakage. Thus, if you wish to have durable cookware sets, you may go for enamel based cookware. This type of ceramic cookware is manufactured by coating an enamel on a metal body, usually cast iron. The enamel used is mostly porcelain, which is actually molten glass powder. The ceramic cookware is finished with a porcelain glaze. This type of cookware is very durable and resistant to high temperatures, chipping and breaking. Due to the metal body inside, this type of cookware is often bulky than its clay based counterpart.

The safety issue regarding the ceramic cookware, originates from the porcelain glaze. It often contains small amounts of lead. During the process of glazing, lead is sealed in the first firing itself. This is a safe practice as the sealed lead has little potential to induce harmful health problems. However, if the process is not completed correctly, the lead does not get sealed. As a result, the lead leaches out of the glaze and gets mixed with your food during cooking. This accounts for slow lead poisoning which can be tremendously harmful to your health in the long run. Often chipping or cracking of the ceramic cookware exposes your food to lead by coming in direct contact with the contents of the glaze.

However, one advantage of ceramic cookware over metal pots and pans is that food can be safely stored in it. The surface of the metal cookware often reacts with the acids in the food. Thus, if you store food in it, you are left with a metallic taste in mouth. Iron, copper and stainless steel are the metals that are unsafe for storing food. Even the most popular stainless steel cookware has a coating of tin, which can interfere with the food and bring about certain undesirable chemical reactions. On the other hand, the non porous structure of ceramic cookware offers little scope for the contents of the cookware to combine with the food. Thus, its dangers are minimized if you use them only to store cooked food. Additionally, it can be safely cleaned in a dishwasher, which is not the case with metal cookware like stainless steel, which requires you to clean it with hands using hot soap solution.

How to Buy Ceramic Cookware

Ceramic cookware should be always bought from reputed manufacturers. Look out for 'lead free' label on the cookware and always opt for one. Ceramic cookware from foreign manufacturers is best avoided. If you must, only buy it to adorn the crockery cabinet of your kitchen. Also, buy the right sized pots and pans for your kitchen. The bottom of the cookware should fit the size of your burner. A margin of 1 inch is acceptable. Always check the cookware for chips or signs of withering. Compare the various reviews, and select the one which offers maximum safety.

Thus, ceramic cookware has more aesthetic value than utility. However, if you go for the safer options, you can avail utility along with aesthetic value. This might be an expensive option, but then nothing is worth more than your health.

Oct 19, 2013

Wireless Charger

Inductive charging (also known as "wireless charging") uses an electromagnetic field to transfer energy between two objects. This is usually done with a charging station. Energy is sent through an inductive coupling to an electrical device, which can then use that energy to charge batteries or run the device.


Induction chargers typically use an induction coil to create an alternating electromagnetic field from within a charging base station, and a second induction coil in the portable device takes power from the electromagnetic field and converts it back into electrical current to charge the battery. The two induction coils in proximity combine to form an electrical transformer.

Greater distances between sender and receiver coils can be achieved when the inductive charging system uses resonant inductive coupling.

Advantages
  • Protected connections - no corrosion when the electronics are all enclosed, away from water or oxygen in the atmosphere.
  • Safer for medical implants - for embedded medical devices, allows recharging/powering through the skin rather than having wires penetrate the skin, which would increase the risk of infection.
  • Convenience - rather than having to connect a power cable, the device can be placed on or close to a charge plate or stand.
  • Easier than plugging into a power cable (important for disabled people).
  • Durability - Without the need to constantly plug and unplug the device, there is significantly less wear and tear on the socket of the device and the attaching cable.
Disadvantages
  • Lower efficiency, waste heat - The main disadvantages of inductive charging are its lower efficiency and increased resistive heating in comparison to direct contact. Implementations using lower frequencies or older drive technologies charge more slowly and generate heat within most portable electronics.
  • More costly - Inductive charging also requires drive electronics and coils in both device and charger, increasing the complexity and cost of manufacturing.
  • Slower charging - due to the lower efficiency, devices can take longer to charge when supplied power is equal.
  • Inconvenience - When a mobile device is connected to a cable, it can be freely moved around and operated while charging. In current implementations of inductive charging (such as the Qi standard), the mobile device must be left on a pad, and thus can't be moved around or easily operated while charging.
  • Incompatibility - Unlike (for example) a standardized MicroUSB charging connector, there are no de facto standards, potentially leaving a consumer, organization or manufacturer with redundant equipment when a standard emerges.(Note: Qi has become a standard adopted by many companies such as Google and Nokia.)
Newer approaches reduce transfer losses through the use of ultra thin coils, higher frequencies, and optimized drive electronics. This results in more efficient and compact chargers and receivers, facilitating their integration into mobile devices or batteries with minimal changes required. These technologies provide charging times comparable to wired approaches, and they are rapidly finding their way into mobile devices.

Lenovo A10 Debuts its first Android convertible laptop

Android has made its share of appearances on laptops before, but today Lenovo announced that it's taking a crack at the idea with the A10, a 10.1-inch notebook with a fold-back touchscreen display. The 2.2-pound convertible, which you can use in laptop or tablet mode, comes with a 1.6GHz quad-core Rockchip RK3188 Cortex-A9 processor, a 1,366 x 768 display, Android 4.2, 2GB of RAM, 32GB internal storage with microSD expansion, VGA webcam, two USB 2.0 ports and one HDMI port. The whole package is 0.69 inch thick, and Lenovo claims it offers nine hours of battery life with continuous video playback. We haven't heard details on pricing or availability -- Lenovo tells us that it'll vary by region -- but earlier rumors pegged it at about $340.


Lenovo A10 Debuts as First Lenovo Laptop Powered by Android

RESEARCH TRIANGLE PARK, NC– October 18, 2013: Multimode computing leader Lenovo (HKSE: 992) (ADR: LNVGY) today announced the Lenovo A10, an affordable, ultra-portable, dual-mode laptop and the company's first to run on Android 4.2 OS. Weighing less than 1kg and measuring just 17.3mm at its thickest point, the Lenovo A10 is an ideal companion for users on the go, providing easy access to a wide range of apps on a unique, dual-mode platform, which enhances the user experience for entertainment and Web browsing as well as productivity.

"In laptop mode," users can take advantage of the A10's unique, Lenovo-customized user interface, which provides an app launcher, task bar and status bar for quick, intuitive access to the app library and desktop, as well as convenient multitasking and app switching. File manager software, also included with the Lenovo customized OS, makes it easy to locate and manage a library of documents, videos and music. In laptop mode, the device offers a full-size ergonomic, AccuType keyboard for safe, comfortable use.

With the A10's 10.1-inch HD (1366 x 768) resolution screen flipped around 300 degrees in "stand mode," the Lenovo A10 shines as a device optimized for touch-enabled apps and entertainment. The stable hinge and "fold-back" design keeps the device steady and prevents shaking and bouncing while using the 10-point multi-touch screen. Stereo speakers and an integrated 0.3M webcam help users stay connected with family and friends while enjoying an immersive "sight and sound" experience with multimedia apps, games and video.

The Lenovo A10 is powered by an RK3188, quad-core Cortex-A9 processor, running at a maximum frequency of 1.6GHz, the highest frequency for all quad-core ARM-based CPUs currently available. The Cortex-A9 processor delivers solid performance for gaming and entertainment purposes, as well as enhances users' ability to multitask and be productive. In addition, the A10's battery supports up to nine hours of continuous video playback, ensuring that it is ready to perform, both on the road and at the desk.

"With the recent explosive growth in Android-based, smart connected devices, customers are relying more on Android apps for both work and play. Why should they be required to switch and duplicate to use their laptop? Lenovo's A10 brings ultra-portability and dual-mode benefits to Android users at a reasonable price," said Bai Peng, vice president and general manager, notebook business unit, Lenovo Business Group. "Thin and light, with multiple modes and user-inspired innovations for an outstanding user experience ... the A10 is uniquely Lenovo."

iPhone user need not to upgrade to iOS 7

Brighter colors and flat icons just aren’t for everybody. That said, it seems that iPhone user Mark Menacher hates them much more than anyone else. CNET reports that Menacher has actually filed a suit against Apple in small claims court and is asking the company to let him remove the iOS 7 install file from his iOS devices. Menacher is particularly irked that the upgrade to iOS 7 happened automatically and that he has no way of going back to iOS 6.


“Apple’s disregard for customer preferences in relation to iOS7 is corporate thuggery,” he explained. “Steve Jobs was reportedly rough on company employees in pursuit of happy customers, but Tim Cook apparently cultivates a culture of contempt for customer satisfaction in pursuit of corporate profits. It is a policy that will eventually fail.”



It’s true that iOS 7 can be rather jarring for some longtime iPhone and iPad users when they first install it although many have gotten used to it after using it for a few weeks. For Menacher and those like him, however, it seems that nothing short of a return to the skeuomorphism of old will do.

Is Car Hacking Will Be The Next Global Cybercrime?

As modern cars evolve towards becoming fully autonomous, security experts are warning of a new form of cybercrime: Car hacking.

Car hacking- --where criminals can either remotely directly or take control of your car from their laptops - has become a bigger and bigger headache for car manufacturers and law enforcement bodies as in-car technology becomes more sophisticated.

There are already thousands of semi-autonomous cars already on the market that contain in-car computer systems, or electronic control units (ECU), responsible for safety functions such as detecting skids, predicting crashes and performing anti-lock braking.

By 2020, car makers predict that cars could become fully autonomous and manufacturers such as BMW have already created self-driving cars.

However, along with other computer systems , in-car technology is not hacker-proof, as tests by academics and "white hat" hackers - those that break into computer systems to highlight security issues -- have shown.

Demonstrating their Pentagon-funded work at the global "DefCon" hackers conference in Las Vegas in August, Charlie Miller and Chris Valasek showed global security experts in attendance how they could take control of a 2010 Toyota Prius and Ford Escape model using just a laptop.

They were able to remotely take control of the cars' electronic smart steering, braking, displays, acceleration, engines, horns and lights. They could even make the fuel tanks show a full tank of gas when there wasn't. To top it all, they did all this using an old Nintendo handset.

"Automobiles are no longer just mechanical devices. Today's automobiles contain a number of different electronic components networked together that as a whole are responsible for monitoring and controlling the state of the vehicle," Miller and Valasek stated in their research -- "Adventures in Automative Networks and Control Units".

"Drivers and passengers are strictly at the mercy of the code running in their automobiles and, unlike when their web browser crashes or is compromised, the threat to their physical well-being is real," the authors stated.

"You cannot have safety without security."

In 2011, researchers at the University of Washington and the University of California-San Diego were able to wirelessly hack into cars, though they withheld details of which cars they were able to "own" for fear of their knowledge being used by criminals.

The potential danger of car hacking and its use by criminals has not been lost on law enforcement bodies in both Europe and the U.S., where the National Highway Traffic Safety Administration (NHTSA) has launched an auto cybersecurity research program investigating car hacking.

The director of the Europe's Cybercrime Centre, a body within the European Union's law enforcement agency Europol, told CNBC that the potential for in-car technology to be hacked and used for organised crime, revenge, profit and competitive advantage was great.

"We are very concerned about the direction of car hacking," Troels Oerting told CNBC on Thursday. "Everyone [in the car industry] wants to make cars more helpful -- for them to help with steering, parking, breaking and even driving -- but if you do this the downside is that someone will try to use this to their advantage and for criminals, this would generally be for profit or revenge ."

"Wireless technology is integrated into practically everything nowadays and if there's wireless access to anything there's a possibility to remotely control it," Oerting warned.

"We have already seen electronic devices being used to get into cars to steal them but the next step we could see is someone able to manipulate the car, steer and brake while you're in the car and without your knowledge," he said.

If a car could be remotely accessed, then, what was to stop organized crime groups "eliminating" their enemies by literally driving their car remotely off a bridge or cliff, Oerting said. In countries where carjacking was common, such as South Africa, remotely accessing the in-car technology could allow criminals to stop and open car doors very easily.

Oerting said that car manufacturers were aware of the issues and that ultimately they were liable for the security - or lack thereof -- of their vehicles.

Following the "hacks" by white hat hackers Miller and Valasek in Las Vegas this summer on the Ford (NYSE:F) and Toyota (Tokyo Stock Exchange: 7203.T-JP) cars, the automotive industry has been keen to respond and reassure consumers that they are tackling the security issues in their vehicles.

A spokesman for Ford Motors, Craig Daitch, told CNBC that "while an attack by a hacker who obtains physical access to a vehicle for a prolonged period of time is difficult to completely diminish, Ford has made strides in limiting the ways a hacker can fully take control of a vehicle."

Toyota's public affairs manager, Cindy Knight, said meanwhile that "cyber-security is an important issue for the entire automotive industry, from automakers to suppliers to the agencies that oversee motor vehicle safety," she told CNBC.

"At Toyota, we take seriously any form of tampering with our electronic control systems. We strive to ensure that our electronic control systems are robust and secure and we will continue to rigorously test and improve them," she said.

Despite their reassurances, however, there is no guarantee that a computer system is hack proof. "You will never know when criminals' knowledge keeps up with the improvements to the technology," Europol's Oerting said.

"It's important that consumer and carmakers are aware of the downside to technological developments. You need people to be able to drive using this technology without fearing every five seconds that your car will be taken over."

- By CNBC's Holly Ellyatt, folow her on Twitter @HollyEllyatt

Oct 18, 2013

Nikon's D5300 First Wi-Fi DSLR Camera

Nikon is introducing its first DSLR with built-in Wi-Fi and GPS, the D5300. The new camera is an update to the D5200, and will take its place as Nikon's top-of-the-line camera for the beginner DSLR market. Though Nikon says that the D5300's overall improvements are iterative, they should add up to something quite meaningful: it also includes a larger, 3.2-inch articulating display; a new image-processing engine; and no low-pass filter on the camera's DX-format sensor, which should result in sharper images.


"Built-in Wi-Fi and GPS are a first for Nikon DSLRs"

In particular, the addition of Wi-Fi and GPS should be a major one for beginner photographers. Though Sony has offered Wi-Fi in its cameras at this level for almost a year now, Nikon has ignored the option, while Canon has only recently brought the feature down from higher end cameras. The D5300 will be able to pair with Nikon's existing Android and iOS app, allowing them to view and share photos. It's not the most robust tool for remotely controlling a camera, but it's something that's easy to see as a handy option.

Aside from connectivity, the D5300's other big improvement over its predecessor should be in image sharpness. Nikon says that the sheer density of pixels on its sensor means that a low-pass filter — which is employed by most cameras in order to avoid a noisy strobing effect known as moiré — isn't necessary. Nikon also says that its new Expeed 4 image-processing engine is designed specifically to account for that filter's absence, which should help to cut down on instances where noise might appear. The camera is also Nikon's first capable of shooting 1080p video at 60p, an important improvement for anyone looking to record quick movements.

The D5300's body will also be ever so slightly smaller than its predecessor's, but not much else will have noticeably changed. The camera's standard ISO range goes slightly higher — now running from 100 to 12,800 — but it retains the 5 FPS top shooting speed and 39-point autofocus system in the D5200. The D5300 will be available later this month for $799.95 for the body only or $1399.95 with a Nikkor 18-140mm f/3.5-5.6 VR kit lens. And as with the D5200, you'll be able to get it in three different colors: an ostentatious "candy apple" red, a bluish-gray tone, and — of course — the standard camera black.

Oct 10, 2013

CIDG arrested 3 Wimax modem modifiers in Bacolod

Wednesday, October 10 ’13 – Criminal Investigation and Detection Group (CIDG) has conducted an entrapment operation in Bacolod City named as ““Oplan Salikup” where three men were arrested.

CIDG led by Chief Insp. Fernando Salvatierra identified the suspects as according to PhilippinesToday, Martian Sibuja, 18; Charles Andrew Chang, 23; and Reynal Bisuena, 23, all living in the City.

The entrapment operation followed after Jojo Viray, head of Security Operations of Globe Telecom-Visayas filed complaints against the suspects.

According to Viray, the suspects were selling Globe Wi-max modems online without the authority of the telecom company.

Viray further said the suspects are guilty of “hacking and cloning,” selling the units at P5,000 each.

Seized from the Wimax modem hackers were four internet modems, three pieces LAN (local area network cable), and three pieces adaptors.

Oct 8, 2013

Understanding The Differents of Induction cookware

Induction cookware is actually the vessels which are used for induction cooking, and they are all specially designed to transfer heat to cook the food and still stay cool. The explanation behind this type of cooking is that the vessels are reactive to the magnetic field created by the induction burners, and the heat thus produced is attracted by the lower flat surfaces of cookware. It is because of this heat, that the food is cooked, and the rest of the surface of the vessels is not heated. The temperature of the burners can be controlled and they save more energy than gas or electric burners. The cookware is therefore, a very useful option for cooking to save energy and at a lesser price. This cookware also adjusts the temperature of the room, as the heat in the room is also attracted towards its base contributing in the cooking of the food. From the coming up reviews, find out which are the best brands, for you. Take a look.

Different Products to Choose From

With the various advantages of induction cooking, I am sure you are looking for some of the best brands which sell this cookware. As a consumer, you would probably look at various features in the cookware, such as durability, quality, ability to cook and cool faster, and the price ranges. When you have an induction burner installed in your kitchen, it is very important to use exclusive cookware. This is because the ordinary cookware, doesn't have the ability to attract heat, cook while the vessels are cold and save the energy around. Therefore, we have put together reviews which will help you find the appropriate vessels for your burner, read on...

Berndes Cucinare 16 Piece Induction Cookware Set

This is a set produced by the Berndes manufactures, consists of 16 cooking vessels at the price $209.99. Constructed from stainless steel, this set is mirror polished and the bottoms are encapsulated for even heat distribution. Other product features are that these 16 pieces are very easy to clean, can be used for cooking any type of food and they have tempered glass lids through which the air can pass through. The set consists of 2 covered sauce pans, open frying pan, a covered saute, tuner, slotted spoon, spoon, fork, ladle, tongs and a stock pot.

Circulon Steel 10 Piece Stainless Steel Nonstick Cookware Set

This $139.99 10 piece set includes 2 covered saucepan, 2 skillet, 1 covered stockpot, 1 covered saute pan and other utensils. The Circulon stainless steel cookware, has an encapsulated aluminum base with nonstick interiors. They also have phenolic handles, which are strong and stay cool while cooking. The cookware is oven (350 degrees F) and dishwasher safe and can be used to cook any food.

Farberware Superior 12 Piece Cookware Set

Other brands which are very popularly used in kitchens with induction burners is the Farberware. This set of cookware is also one of the cheapest with a price of $79.99 for 12 pieces. These include covered sauce pans, covered Dutch oven, deep skillets, kitchen tools, spoons, forks, etc. They are dishwasher safe, and have nonstick interiors with a black exterior finish. The products have class lids with air vents, and comfortable handles for easier cooking.

Cuisinart MCP-12 Multi Clad Pro Stainless Steel 12 Piece Cookware Set

The cookware from Cuisinart comes at a price of $229.90, and has a complete stainless steel finish. If you are looking for elegant and contemporary deluxe cookware, this is what you need. The 12 pieces of this set, have mirror polished interiors, aluminum core in base, for better heating, solid stainless steel handles and lids, as well as drip free rims. The set includes saucepans, skillets, saute pans, and a stockpot which is oven safe (500 degree F), dishwasher safe, and is the best option for restaurant chefs.

With a few of these brands and their useful products, hope this information has been helpful. Thus, make your choice and use this energy saving cooking style for preparing delicious food.

Oct 6, 2013

Asus WL-330NUL N150: Create Your Own Hotspot Using the Room’s Ethernet Connection

From the creepiest $20 per night skid-row flophouse to the presidential suite at Hong Kong’s InterContinental, Wi-Fi is now as standard as a toilet in the hotels and motels around the world. If only that connection to the internet worked as well as your trusty porcelain throne.

Instead of dealing with spotty connections and speeds that resemble early ’90s dialup, use the hotel’s ethernet connection. Regardless of which room you spring for, there’s a good chance yours will have ethernet. With this wired connection you can create your own wireless network that actually gets you online. You basically have two options: Use your computer or a travel Wi-Fi router.

The Asus WL-330NUL N150 is a tiny wireless access point that can also can be used as USB ethernet adapter for ultrabooks and Macbook Airs without ethernet ports. Just plug it into that unused networking cable, create a Wi-Fi network with a password, and enjoy speedy wireless internet that’s not being shared with the entire hotel.

If you don’t travel enough to justify buying a pocket router, you can turn your own computer into a wireless access point. All you need is a live ethernet cable, a visit to the the System Preferences panel (for OS X), or a quick third-party app download (for Windows).

OS X: Launch System Preferences and click on Share. Select Internet Sharing from the list on the left. Set the “Share your connection from” ethernet or in the case of a MacBook Air, USB ethernet. Set the type of shared networking to wireless under “To computers using” by checking Wi-Fi. Click on the Wi-Fi Options button and a window will appear to set your network’s name and password. Once those are set, hit ok.

Now turn on Internet Sharing and you’ll be able to log into your newly created Wi-Fi network from all your tablets, smartphones, and media streamers.

Windows: Download and install the $13 Thinix WiFi Hotspot app. Launch it and click on the Configure tab. Set the name of your wireless hotspot in the SSID field. Add a password in the Wireless Key field and hit save. Hit the large Start Hotspot button at the top of the app’s window and get ready to share your internet connection.

Of course if your hotel has removed the ethernet cable, you’re stuck with the shoddy Wi-Fi connection. At that point you’re probably better off at the local coffee shop. If you travel regularly, you might want to invest in a Mi-Fi hotspot or add hotspot support to your smartphone. If your travel is work related, your employer will probably pay for it. Especially when you tell them you can’t upload an important report because you’re trapped in a wireless black hole.

Kaspersky: Android Mobile Most Infected By New Malware

Moscow-based Kaspersky Lab on Monday released its annual security bulletin, a report that reveals statistics on malware and cyber-threats detected by its Kaspersky Security Network (KSN) throughout the year.


Kaspersky’s 2012 summary proved to be another report validating the explosive growth in malware targeting mobile devices running on Google’s Android platform, and the increase in threats targeting Mac OS users.

Kaspersky Security Bulletin 2012Windows-based Malware Still Dominates

While the threat of malware targeting Mac OS-based systems has risen in recent years, it still represents a tiny fraction of the number of new threats that are discovered each day that target Windows PCs. With that said, Kaspersky Lab said its antivirus experts added 30 percent more signatures to detect various Mac Trojans in 2012 compared to 2011. But 30 percent of a small number is still a small number. However, Mac OS users are not invincible and should take precautions.

While most security experts I speak with still do not use an anti-malware product on their OS X-based systems, there are measures that many take to help protect against threats targeting Mac OS, the most important being to disable Java support in Web browsers, or removing it completely from a system if its not absolutely needed. Another popular measure is to reduce exposure to script-related attacks by using a Web Browser plug-in such as noscript which helps protect against things such as Java, XSS, and Clickjacking attacks. (Noscript is available for both Macs and PCs for popular Web browsers)

The biggest Mac OS threat during the year was Flashback, the botnet of 700,000 infected computers running Mac OS X. There was also a handful of incidents where Mac OS X computers were victims of targeted attacks, including ones against Uyghur activists in June, and a web site associated with the Dalai Lama earlier this month.

“The main reason for this is that Apple products are popular with many influential politicians and prominent businessmen, and the information stored in the devices owned by these people is of interest to a certain category of cybercriminals,” Kaspersky Lab explained in a statement.

There were several other minor incidents over the year related to Mac OS specific threats, but still these numbers are not even close to the number of threats that targeting Windows-based systems on a daily basis.

200,000 Served Up Daily

Kaspersky Lab said that it currently detects approximately 200,000 new malicious programs each day, most of which target Windows-based computers. That figure represents a spike from the first half of 2012 when the firm was finding about 125,000 new malware programs daily.

All totaled, Kaspersky said that it detected and blocked more than 1.5 billion web-based attacks and more than 3 billion infected files through its various installed software products during 2012. In total, 2.7 million "unique modifications of malware and potentially unwanted programs" attempting to launch on users’ computers were detected during these incidents, the company said.

Mobile Malware: Android Has Near Monopoly

Headlines about malware targeting Android are nothing new, but the percentage of mobile malware that was found targeting Android vs. other mobile platforms was astounding. According to Kaspersky’s numbers, in 2012, 99% of all mobile malware detected was designed for the Android platform.

In total, Kaspersky Lab said it found more than 35,000 malicious Android programs in 2012—about six times more than they saw in 2011. In October 2012, security vendor Trend Micro also issued a report noting that Android was “under siege”.

Earlier this year, Kevin McNamee, security architect and director at Kindsight Security Labs explained to SecurityWeek how easy it was to build Android malware with readily available tools.

Despite attempts by Google to introduce its own anti-malware technology, malicious applications continue to appear in the official Google Play store, Kaspersky Lab sad.

In fact, just this week, a security researcher at North Carolina University shared his discovery that the app verification service used by Google to determine whether a particular Android application is malicious is "fragile and can be easily bypassed."


In July, a sneaky iOS app called “find and Call” was discovered in Apple's App Store that collected used address book data and sent spam. Most iOS related concerns seem to be over privacy issues vs. being outright malicious programs.

“Just like traditional PCs, mobile devices are now targeted with high-profile cybercriminal operations, including targeted attacks and creating mobile botnets,” Kaspersky researchers noted.

Other key statistics pulled from Kaspersky’s Security Bulletin 2012 include:
  • Java was the most popular vulnerable software targeted by cybercriminals in 2012. Java accounted for 50% of all detected exploit-based attacks targeting vulnerabilities. Adobe Reader ranked second and accounted for 28% of all incidents.
  • Top 5 malware hosting countries: United States, Russia, The Netherlands, Germany and the United Kingdom
  • Top 5 countries with the highest frequency of web attacks: Russia, Tajikistan, Azerbaijan, Armenia, Kazakhstan
  • Top 5 countries where infected files are most frequently discovered: Bangladesh, Sudan, Malawi, Tanzania, Rwanda
  • Top 5 countries with lowest infection rates: Denmark, Japan, Finland, Sweden, Czech Republic
“What 2012 has shown is the strong inclination of cybercriminals to steal data from all devices used by consumers and businesses, be it a PC, Mac, smartphone or tablet,” commented Costin Raiu, Director of Global Research & Analysis Team 
Kaspersky Lab
 in a statement. “We are also observing a strong increase in the overall number of threats, affecting all popular software environments,” Raiu said. - source

Kaspersky Lab now detects 200,000 new malware

According to the cloud-based Kaspersky Security Network, about 200,000 new malware samples emerge every day, compared to 125,000 just a year ago. Cybercriminals make millions of dollars by using malware, including sophisticated Trojans and phishing scams that hijack online bank accounts and social networking profiles.

Kaspersky data show at least 7.5 million of its customers worldwide were targeted by phishing attacks between April 2012 and May 2013. But since the company only tracks its customers, the total number of Internet users worldwide who were targeted by phishing attacks could easily swell to hundreds of millions.

These scams, commonly sent through carefully crafted email designed to appear legitimate, attempted to steal online banking credentials and other critical financial details.

“The online threats to our customers’ financial data and personal information are real, they’re here and they continue to evolve really fast,” says Jimmy Fong, Kaspersky Lab Southeast Asia Channel Sales Director.

A consumer survey conducted by B2B International in July this year showed 62 percent of Internet users experienced at least one attack related to online banking, shopping or payment services during the last 12 months.

While there were instances where fraud was discovered after the fact, 41 percent of these victims still failed to recover their money. Various industry sources estimate the number of people worldwide that regularly use online banking at approximately 700 million.

In the case of the Philippines, there is a growing inclination of Filipinos to do online transactions over the traditional payment system. The country currently has 7-million-strong active credit card user base.

“I see that making online transactions for banking and shopping is encouraged here. Users do it even through mobile devices now, albeit slowly,” says Bryan Sat, Kaspersky Lab Business Development Manager.

Sat says that while the trend offers a lot of convenience and flexibility, it risks users to be victims of online fraud.

“Their social networking profile might be prone to hijacking. There may not be a grand incident of a phishing scam or online fraud case yet in the Philippines, but there is no reason to let our guards down,” warned Sat.

In the fight against modern cybercrime, security solutions face a clearly-defined challenge: how to prevent these financial losses.

The new versions of Kaspersky Anti-Virus 2014 and Kaspersky Internet Security 2014 were specially developed with that requirement in mind, according to the Kaspersky team, “bringing a host of new features that ensure the highest levels of security for users’ PCs and their digital valuables.”

Both solutions feature the ZETA Shield antivirus technology, which performs an in-depth scan of files and applications running on the computer to identify malware that may hide deep within individual components of each program.

Other features also include the (i) automatic exploit prevention technology, which scans programs for behavior typically found in exploits; (ii) the anti-blocker, which removes familiar threats like Trojan ransomware; and (iii) parental control capabilities, which allows parents to determine when and how long children can use the computer, which applications can or cannot be launched, and what information – such as credit card numbers and home addresses – should be blocked from being shared on social networks.

Kaspersky Lab’s Safe Money technology – first introduced in the previous version of Kaspersky Internet Security – also provides additional layer of reliable protection for online financial operations. For more info, visit www.kaspersky.com.

Freedom of the Net Declining

Freedom House says Internet freedom has declined worldwide in the past year, sparked by broad surveillance, new laws controlling web content, and increasing arrests of social-media users.


However, the U.S.-based watchdog group says activists are becoming more effective in raising awareness of threats.

The findings were released on October 3 in the new edition of the "Freedom of the Net" report that covers developments in 60 countries between May 2012 and April 2013.

The report says Iran, Cuba, and China remain among the most restrictive countries in terms of access to the Internet and censorship.

Adrian Shahbaz, a researcher with Freedom House, told RFE/RL that the death in custody of a blogger in Iran was one of the main reasons why the Islamic republic ended up at the bottom of the list of countries that violate Internet freedom.

"There was actually an instance of an online user being killed in Iran -- that was Sattar Beheshti -- and that was an instance of somebody being brought to jail for something that they had written online, allegedly criticizing the government, and then killed while in police custody," he said.

"So that's something that really affected their score negatively."

Post-Soviet Restrictions

Belarus, Pakistan, and Uzbekistan are also among countries with the least Internet freedom, while Azerbaijan, Kazakhstan, Kyrgyzstan, and Russia were found to be partially free.

According to Laura Reed from Freedom House, a number of countries in the former U.S.S.R. have been involved in measures to restrict the Internet.

"In the former Soviet Union over the past year, we've seen additional steps by the governments to block content through a range of legislative and extra-legal measures," she says.

"We've also seen an increase in prosecutions of online users in about half the countries that we cover in the region. Russia, for example, really captures these trends in the past year. So, for example, the number of users that are currently prosecuted for online activities in Russia rose from 31 in 2011 to 103 in 2012."

Russia is singled out in the report as an "important incubator of surveillance technologies and legal practices" that are emulated by other former Soviet republics.

Three former Soviet countries -- Armenia, Georgia, and Ukraine -- have been ranked as free.

The report evaluates each country based on obstacles to access, limits on content, and violations of user rights.

Of the 60 countries surveyed by Freedom House, 34 have experienced drops in their ratings.

Freedom House says that, over the past year, the global number of censored websites has increased, while Internet users in various countries have been arrested, tortured, and killed over their online postings.

The group says Internet freedom also suffered setbacks in several democratic countries, in some cases as governments sought to balance freedom of expression with security.

As an example, Freedom House points to the United States. According to the report, freedom online significantly declined amid revelations of the National Security Agency's extensive surveillance programs.

The report lists the most commonly used methods by governments to control the Internet, including blocking and filtering, cyberattacks against government critics, surveillance, arrests, physical attacks, and murder.

Freedom House says this is the third year in a row that Internet freedom has been in decline globally. Despite the setbacks and negative trends, the report says a perceived increase in civic activism worldwide offers hope for future positive developments.

Electric Stove vs Induction Cooker What Is The Differences?

Various types of cooking appliances are available today. Apart from gas cook tops and electrical cook tops, the induction cooker is another variety of cooking appliance which is used in most of the kitchens today. The induction cooker has a wide number of advantages compared to the electrical stove. Moreover induction cookers are safe and efficient in comparison to the other cooking appliances used these days.

Basic Differences of Electric Stove and Induction Cooker

Induction cookers are quite popular and widely used as it has many advantages unlike the gas cook tops and electrical stoves. Some of the major differences of the induction cooker and electric stove are discussed in the following sections.


Light and portable: The induction cookers are basically light and portable. It can be carried around easily unlike the electrical stove which is quite heavy. Moreover, it is quite easy to install the induction cookers on kitchen counter tops.

Energy efficient: Compared to the electrical stoves, the induction cookers are quite energy efficient. In induction cookers, heat is seldom wasted while cooking food. Electric stoves require more energy compared to the induction cookers.

Safe and user friendly: Unlike the other cooking appliances, which involve gas and more electric power, the induction cooker is safe to use as it seldom heats up or causes any type of health hazard.

Uniform heat: Induction cookers heat and cook the food in a uniform heat. It works when the induction coils present in the cooker heats up and creates a magnetic field. Therefore the pots placed on the induction cooker should be stainless steel based or induction based pots. Only compactable pots can be used on induction cookers to cook food.

Heat adjustability: Unlike the electric stove, the induction cookers have adjustable heating facilities. Different heat can be adjusted for boiling, frying, cooking and stewing. It also takes minimal time to cool.

Improved functions: The induction cooker is in-built with a number of functions. Today a variety of induction cookers with advanced features are available in many of the online stores.

Compared to the electrical stoves, the induction cookers are safe with automatic shut-down features in case of any possible hazards. Today majority of the kitchens include induction cookers as it is both safe and efficient.

Huawei BM622m Best NAND Flasher Programmer

As we all know the new BM622m is the replacement of the legacy Huawei Echolife BM622 and BM622i 4G WiMAX wireless broadband modem router. This new device have more advantages than those two old model wireless residential gateway. Taking a look on the hardware of the BM622m it is equip with a NAND flash memory HYNIX HY27US08561A  using TSOP48 package unlike BM622 built with NOR flash memory such as Spansion S29GL064 or STMicro M29W640 likewise same 48pins. 


The hardest part of BM622m is the reverse engineering, if you wanted to dump the flash memory into a raw file of this CPE its not as easy as that of BM622 and BM622i unit were MiniPro TL866CS programmer won't support for dumping it.


One of the best NAND programmer I have found on the net is the Flash Doctor, in contrast to MiniPro TL866CS  programmer that support more than 11 thousand of Chips except for NAND flash memory.


Flash Doctor supports all NAND-based flash storage devices (SD, SM, MMC, XD, USB Pendrive, MemoryStick, CompactFlash etc.), with damaged controller or any other front ends (PCB, etc.) since Flash Data Recovery Doctor needs to work on the flash memory only when users carry out Flash Data Recovery.

Hopefully this article will help my avid reader and commenter who has been longing for their BM622m to dump the firmware to be able for them to downgrade their WiMAX CPE.

Induction Cooktop Review

Induction Cooktop Overview

Induction cooktops use an electromagnetic field to heat up a pan while leaving the cooking surface cool to the touch and without heating the air around the cooktop. It's much safer and more energy efficient than either gas or electric cooking.

Because the pan is heated by a magnetic field instead of by heating the bottom of the pan with a flame or electric heating element, an induction cooktop is more energy efficient because less energy is wasted by heating up the air around the pot. With a gas stove, only 40 percent of the generated heat ends up cooking the food. The other 60 percent is wasted — all it does is make the kitchen hotter.

Traditional electric ranges are about 50 percent efficient. Induction cooktops, however, are about 90 percent efficient — meaning 90 percent of the energy generated ends up in the pot, with only 10 percent wasted.

Induction Cooktop Safety

Because the surface of an induction stove or cooktop doesn't get hot, you can actually touch it with your finger without burning yourself. This also means that if you splatter sauce onto the cooking surface, it won't burn. That makes cleanup easier.

Induction Cooktop Speed:

Induction cooktops heat more quickly than gas or electric, saving energy as well as time. A 12,000-BTU gas burner takes 36 minutes to boil 5 gallons of water, but an 1,800-watt induction hob will boil the same 5 gallons in only 22 minutes. If you're wondering, a watt is equal to 3.4 BTUs, so even in absolute terms, induction is still faster. Plus, induction cookers respond instantly to temperature adjustments, so when you lower the heat, you'll see the results right away — just like with a gas range!

Induction Cooktop Requirements

Induction cooktops can only be used with cookware that is made of ferrous metals like steel or cast iron. Aluminum cookware won't work, nor will glass or ceramic. Here's a simple test to see if your cookware is induction-compatible: If a magnet sticks to it, it'll work with an induction stove.

Induction Cooking Equipment

Induction cookers are available in countertop models, which are free-standing devices with one or two "burners" or hobs. Most units feature safety functions so that they'll shut off if a pan isn't present or if the pan is empty. Drop-in units are also available, which means that it's possible to outfit a home kitchen with an induction range cooktop.

Recuva Recovery Tool

Undelete files and folders Recuva is a file recovery tool that enables you to scan your hard drive(s) or media cards for files that have been deleted or formatted. It presents you with a list of files that were found, along with an assessment of their recovery potential, a preview option and a hex viewer to inspect the content. You can limit your search to files of a certain type (e.g images, audio etc.) and choose between a fast and a deep scan approach.


The program also includes a secure deletion option that allows you to permanently delete files that were found during the scan, in order to prevent any future recoveries.

Recuva (pronounced "recover")-- which is exactly what this snappy little program does, and in a highly automated way. The free version of Recuva is full-featured but doesn't include any type of support. Piriform sells support to home users for $24.95, and it offers a business-support license for $34.95.

There is a freeware Windows utility to restore files that have been accidentally deleted from your computer. This includes files emptied from the Recycle bin as well as images and other files that have been deleted by user error from digital camera memory cards or MP3 players. It will even bring back files that have been deleted from your iPod, or by bugs, crashes and viruses!
  • Simple to use interface - just click 'Scan' and choose the files you want to recover
  • Easy to use filter for results based on file name/type
  • Simple Windows like interface with List and Tree view
  • Can be run from a USB thumb drive
  • Restores all types of files, office documents, images, video, music, email, anything.
  • Supports FAT12, FAT16, FAT32, exFAT, NTFS, NTFS5 , NTFS + EFS file systems
  • Restores files from removable media (SmartMedia, Secure Digital, MemoryStick, Digital cameras, Floppy disks, Jaz Disks, Sony Memory Sticks, Compact Flash cards, Smart Media Cards, Secure Digital Cards, etc.)
  • Restores files from external ZIP drives , Firewire and USB Hard drives
  • It's fast, tiny and takes seconds to run!
When first launched, Recuva starts in wizard mode, which prompts you with basic questions about what you're trying to restore -- a specific type of file, a specific drive, or even a specific type of drive -- and then gets to work. It took about 10 minutes to scan my 8GB card and I was able to run the scan unobtrusively in the background.

After the scan, Recuva presents you with a very detailed breakdown of what files were found. Click on any file and you'll be given detailed information about it -- how healthy the file was (i.e., whether or not it was partly overwritten), a hex dump of its header information, and even a preview for certain supported file types such as JPGs. Files to be recovered can also be browsed as thumbnails, which is handy if you're looking for one image among many. Note that file names are generally not recovered; the resulting files are given arbitrary names and have to be renamed manually.

Advanced options allow you to recover files that haven't been deleted -- e.g., from damaged drives -- or to try to restore the original folder structure of the source media. Recuva can also securely erase files found during a recovery operation, a handy way to make sure a given file has been properly destroyed if you're concerned about security.

All the test files I looked for were recovered, although Recuva interpreted my CR2 files as TIF images. It still recovered them properly, though, and they were fine once renamed.

Bottom line

The wizard-guided interface for Recuva makes the recovery process a snap. The quality of the program's file recovery and the price (free) make it a solid choice for the average Windows user.

CardRecovery Snap Review

CardRecovery is the most focused of the applications reviewed here: It exists mainly to recover files from memory cards used in cameras. The only file types it works with are JPG and RAW-format image files, and video and audio files (e.g., AVI, MPG, MOV, MP3, WAV). It will not search for documents, archive formats, some image formats (such as Photoshop or PNG) and other day-to-day file types.


On the plus side, CardRecovery offered the best detection of CR2 files I found. In addition, its wizard interface made the recovery process quite easy. To begin a scan, just enter a drive letter, a camera brand (optional) and/or a file type (also optional), and a destination folder in which to save the recovered files.

The results of the scan are shown incrementally, although there's no preview mode during the scan, which makes it harder to tell if a given file is in fact what you're looking for without stopping the scan. A full scan of each of my 8GB devices took just under 10 minutes.

Once the scan's complete, you can preview JPGs (but only JPGs) and the program window can't be resized, so you can't ever see more than six thumbnails on the screen at once. This makes it a little harder to deal with RAW-format files, especially since file names aren't recovered: It might be easier to just recover everything and sort it out later.

Because CardRecovery can only work with devices that have a drive letter, it may not be of much use if you're dealing with a card whose partition information is damaged and therefore can't be assigned a drive letter. (PhotoRec, in contrast, can work with any device even if there's no partition data.)

CardRecovery offers a free trial version that will scan media and find lost files, but you must buy the full version to recover them.

Bottom line

If quickly recovering data from cameras is a priority, CardRecovery might be well worth the $40. Since the trial version allows you to preview recovered files, you can try that first to see if it suits your needs.

Undelete 360 Recovery Tool

Undelete 360 is one of the best programs to use for restoring accidentally or unintentionally deleted files from your computer, regardless of storage medium.

Built on a very fast and efficient algorithm, the program will browse, search, and recover files that have been deleted as a result of an accident, a virus, or software and computer failures.

Undelete 360 can recover files deleted from computer hard drives, USB/thumb drives and memory sticks, the memory cards used in cameras, smart phones, and other devices, pen drives, and more. The program supports both file recovery and folder recovery.

There's little question Undelete 360 is easy on the eyes: It's got a snappy-looking interface reminiscent of an Office 2007 application. But despite the splashy looks, it's not as self-guiding as Recuva -- and it does a far weaker job of recovering data than the competition.

When launched, Undelete 360 scans the available drives in the system and lets you choose one or more to inspect for deleted files. If it finds anything, it produces a list that can be filtered by file types and properties. Some file types can be previewed (provided the program judges them to be in recoverable condition), and a hex view tab lets experts peek at the file's raw data if they're curious.

I suspect Undelete 360 only scans directory structures and does not perform the kind of intense block-by-block scan used by other products here. To begin with, it returned a list of potentially recoverable files a great deal faster than the competition -- which seemed like a good thing on the face of it, but also implied a superficial search. The program also didn't do as good a job of recovering the files -- half the time, files were reported as "overwritten," even when the very same files were restored by other apps reviewed here.


Worse, Undelete 360 seemed to be just about useless when confronted with a quick-formatted drive. When I performed a quick format on my media and let Undelete 360 scan it, it turned up nothing -- and again, turned up nothing a little too fast for my own comfort. No options appear to exist to force the program to do a deep search for files from the beginning.

There are a few handy features, like the data-wiping tool reminiscent of the one in Recuva and the ability to recover alternate NTFS data streams. But those fall flat in the face of Undelete 360's much larger weaknesses.

Bottom line

A good interface and a nice preview system do not compensate for the program's inability to deal with anything more than recently deleted files.

Conclusions

Undelete 360 worked best when dealing with recently deleted files, but anything more ambitious than that (e.g., quick-formatted media) was beyond it. CardRecovery's biggest limitation was the limited range of file types it handles: It's designed mainly to recover files created by cameras and almost nothing else.

Oct 5, 2013

USB Port 24CXX 25XX EEPROM BIOS Programmer TTL For XP WIN7 MX25L12805 W25Q128


These two (2) USB port 24CXX and 25XX Eeprom BIOS Programmer is identical in nature because they used the same Chips based on CH341 series but not on its physical appearance. These two flasher/programmer support the same type of Chips/IC likewise it provides pin header to be used as TLL and UART fro debricking residential gateway such as modems, routers and wireless access point (WAP). Support list of Chips/IC with different vendors/manufacturer this link.


These flasher/programmer also support MS Windows OS such as XP, Vista and 7. You can download the respective driver here, software SPI Tools here and for the tools here. This product can be found on eBay in case you wanted to see for additional details.