Monday, 31 December 2012

Internet Worms: What They Did?

An internet worm is a program or algorithm that replicates itself over a computer network and

invariably performs malicious actions such as shutting a machine down or using up its resources. No

network of computers is impenetrable or immune to attacks of this kind, as is shown in the cases

below.


The Morris worm


Created by US university student Robert Morris, this entered the history books as one of the world's

first internet worms. Affecting approximately 10% of the world's estimated 60,000 internet-connected

computers in November 1988, it was written with the harmless aim of gauging the size of the internet.

However Morris, aged 23, made the program too aggressive, and it swamped the nascent network. He was

convicted of violating the 1986 Computer Fraud and Abuse Act; the economic damage caused was

estimated by a Harvard spokesman to be between $100,000 and $10,000,000.


The ILOVEYOU worm


This malicious internet worm, written by a student in the Philippines, hit tens of millions of

Windows computer users in May 2000. It arrived as an attachment to an email headed simply ILOVEYOU

which came from a contact of the recipient. Once opened, the worm automatically sent itself on to

everyone in the user's electronic address book, and altered settings on the machine. Parliament shut

down its email to prevent damage from the propositional worm; it left approximately £4bn worth of

damage in its wake worldwide.


The Code Red worm


Credited with being the first worm aimed directly at government computers running Windows, Code Red

threatened to bring down US state websites in July 2001. The FBI was prompted to issue a rare warning

about the computer threat over fears it could bring the internet to a grinding halt. That never

materialised, but the threat posed by the worm was keenly felt, largely because its attacks were

time-dependent, launching different actions throughout the month.


The Conficker worm

In March 2009 the House of Commons and the French Navy were among the owners of an estimated 10m

Windows computers worldwide infected by a worm known as "Conficker". For a time, experts predicted it

could deliver a devastating attack on the internet, timed to coincide with April Fool's Day, and

Microsoft offered a bounty of $250,000 (£176,000) for the identification of its creator. The threat

of Conficker has not entirely subsided; Greater Manchester Police was temporarily cut off from the

national crime database in January this year after finding the bug in its system.


The Twitter worm

Reckoned to have affected up to 100,000 Twitter accounts, this attack on Twitter took hold while many

of the company's US-based security team slept. Although users of third-party applications were

unaffected by the hack, thought to be the brainchild of Japanese developer Masato Kinugawa, Twitter

users flooded the site with panicked messages until the problem was solved. Kinugawa said he reported

the vulnerability to Twitter last month before discovering that the redesigned site – launched on 14

September – had the same problem.

Source : guardian.co.uk

Wednesday, 7 November 2012

Samsung Galaxy S3

     Samsung Galaxy S III Jelly Bean update key features:

  • Project Butter - smoother UI animations with higher frame rate
  • Google Now
  • Blocking mode
  • Offline voice typing support
  • Better notification area with expandable notifications
  • Two different homescreen modes
  • Pop-up play window is now resizable
  • Smoother and faster web browser
  • New in-call features - boost loudness and turn on/off noise
    cancellation
  • Video recording pause/resume functionality
  • Enhanced brightness control
  • Easier widgets management
  • Reorganized Settings menu

Monday, 5 November 2012

Facebook Slimmer


Facebook testing new ‘slimmer‘ Timeline layout


Social networking giant Facebook is testing out a new, slimmer Timeline layout featuring a single column of posts, instead of the current double column.
The test layout keeps the boxes that highlight friends and activities on the right side.
According to Inside Facebook, the firm is currently rolling out the test to a small number of users.
"This is a new design Facebook is testing with a small percentage of people to make navigating timeline even easier," CNET quoted a Facebook spokeswoman, as saying.
The right hand column keeps the existing boxes such as "Recent Activity," "Friends," "Photos" and "Likes," as well as any app activity displayed by users.
But with the new design, the boxes are a smaller size than posts, the report said.
Below those boxes, the test design features only whitespace where the current design would display more posts, it added.

Saturday, 3 November 2012

Microsoft launches hosted ALM service

After a year in beta, Microsoft has launchedits Team Foundation Service, a hosted version of its application lifecycle management (ALM) software. Its usage, for the time being, has been limited to five or fewer users, however.
"ALM has traditionally been known to be very enterprise heavy, but [this service] could be utilized by people who may not need enterprise scale but could still benefit from tools and services to manage their projects," said Karthik Ravindran, senior director of ALM marketing and management.
There will be no cost for using TFS for five or fewer users, and it can be used for an unlimited number of projects. Subscribers to Microsoft MSDN's premium, ultimate and test pro plans will also get free access along with their subscriptions. Microsoft launched the service in conjunction with its annual developer-focused Build conference this week in Redmond, Washington.
Microsoft did not offer a date for when the service would be available for more than five users, nor how much the service would cost when it will be offered. The costs would be based on a combination of features and usage of computational and networking resources,
Run on the company's Windows Azure cloud service, Team Foundation Service is a hosted version of the company's Team Foundation Server (TFS) ALM software. The service offers most of the capabilities of TFS, including version control, work item tracking, project planning and management, build automation, and continuous deployment. Building tools are still offered only in preview mode.
TFS supports not only the development of .Net software programs for Windows, but for other languages as well, including Java, PHP, JavaScript and PHP. The service can be incorporated into Microsoft Visual Studio, Eclipse and the Mac-centric Xcode IDEs (integrated development environments).
Microsoft is initially marketing the service to smaller ISVs (independent software vendors) as well as to larger organizations that may want to try ALM without purchasing the software. In the long term, Microsoft will offer the service as a full-scale replacement for on-premises ALM, or to be used in a hybrid mode where code management is shared between in-house servers and cloud services
The hosted service does not include all the capabilities of TFS, such as the ability to easily connect the ALM services with in-house deployments of other Microsoft server-based products, such as SharePoint,
But one advantage that the hosted service would offer over TFS itself is that it is closely tied in with the Microsoft Windows Azure PaaS (platform as a service), Ravindran said. Someone building an Azure-based service can link the hosted ALM service directly with their Azure account, allowing them to "set up a continuous deployment where the bits can be seamlessly deployed into the Azure end-point,"
The service also supports distributed version control, through the use of a bridge to the open-source GIT version-control software. Developers can use their local copies of GIT to clone the code base from the service, work on the code, and then, when finished, merge it back into the canonical code base on the Team Foundation Service. "Not all companies are comfortable with their developers having local versions of all the source code. [Distributed version control] is a pretty common pattern with startups, but it's not common in enterprises," Ravindran said.
ALM software manages the development of software programs across different departments within an organization. It includes not only version-control software -- which captures all the changes of the developing code -- but also includes testing, building and deployment capabilities, as well as oversight tools for project managers and product owners. "Development of the code becomes a team process, especially as the project starts scaling,
In addition to Microsoft, other companies such as Hewlett-Packard, IBM, CollabNet, CA Technologies and Coverity offer ALM software as well.


Friday, 2 November 2012

Top 5 deadliest mobile malware threats of 2012

While the amount of malicious software focused on the growing number of mobile devices on the market remains a drop in the bucket next to the amount targeting PCs, attackers are steadily turning the devices in consumers' pockets into targets.

So far this year, several pieces of malware have popped onto the radar and underscored the growing sophistication of cybercriminals targeting mobile devices. After fielding feedback from security pros, here in no particular order is Dark Reading's list of the five most dangerous, sophisticated, and prolific pieces of mobile malware that have appeared thus far in 2012.
 
1. FakeInst SMS Trojan and its variants

"FakeInst disguises itself as popular apps like Instagram, Opera Browser, [and] Skype, and sends SMS messages to premium-rate numbers
"It is selected because it has been widely infected. There are many variants in the FakeInst family, such as RuWapFraud, Depositmobi, Opfake, and JiFake," Yang says. "Sixty percent of total Android malware we found belong to the FakeInst family. Geographically, it mainly exists in Russia. There are also samples found from all over the world."

2. SMSZombie
Also on the list is SMSZombie, which was recently spotted in third-party markets in China and has infected more than 500,000 devices in the past few weeks. The malware works by sending SMS messages to China Mobile's online payment system and "top-up designated accounts
"The amount of payment, frequency, and destination are all controlled by malware developer," he says. "It is significant because it takes extra steps to protect itself."
Once installed, it obtains Device Admin privileges and is very difficult to remove, prompting TrustGo to publish details of a manual removal process on its blog.
"We expect more Android malware will adopt similar techniques to protect themselves," he says.

3. NotCompatible
Discovered by Lookout Mobile Security in April, NotCompatible is the first piece of mobile malware that used websites as a targeted distribution method, notes Derek Halliday, lead security product manager at Lookout.
"NotCompatible is automatically downloaded when an Android browser visits an infected website," he says. "The downloaded application is disguised as a security update in an attempt to convince the user to install it."
If it successfully installed, NotCompatible can potentially be used to gain access to private networks by turning an infected Android device into a network proxy, and can be used to gain access to protected information or systems, Halliday says.

4. Android.Bmaster
Bundled in with legitimate applications, Android.Bmaster was spotted on a third-party Android app market earlier this year. The majority of the infected victims were Chinese users. Once on the device, the malware swiped sensitive data from the phone, including the Cell ID, location area code, and IMEI (International Mobile Equipment Identity) number, and caused users to send SMS messages to premium numbers.
"Analysis of Android.Bmaster's command-and-control servers indicate the total number of infected devices connected to the botnet over its entire life span numbered in the hundreds of thousands," says Kevin Haley, director of Symantec Security Response. "The number of infected devices able to generate revenue on any given day ranged from 10,000 to 30,000, enough to potentially net the botmaster millions of dollars annually if the infection rates are sustained."

5. LuckyCat
LuckyCat was the name given to a campaign of targeted attacks that struck the aerospace and energy industries in Japan as well as Tibetan activists and others. To broaden their attack, the perpetrators have brought the attack to the Android platform.
Once installed, the application displays a black icon with the text "testService," and opens a backdoor on the device to steal information.
"Luckycat is the first APT [advanced persistent threat] targeting Android platform "It is a Trojan horse for Android devices that opens a back door and steals information on the infected device."

Tuesday, 30 October 2012

Apple smallest yet fastest: iPad Mini

A greater announcement made by Apple the lowest budget Gadget .


Here comes iPad mini Sleeker Smarter and Better.


The full experience of iPad


Enjoy the Full experience of iPad ......There is less of it,But not less too.With 10 hrs of battery backup.
That is your iPad is smaller but much bigger than any other economic tablet in its class.


Beautiful 7.9 inch display



While holding iPad in your hand feel the fluid, fast, beautiful and high responsive screen. Color are vivid and texts are sharp. A super 7.9 inches LED backlit IPS display with 1024X768 pixels of resolution.


Ultrafast Wireless


Fastest Connection.The World Over.
An advanced Wi-Fi with twice that of the previous one. This neXt generation Wi-Fi and Cellular Connection lts you Download Content, Steam Video and Browse the web at amazing Speed.

Over 275,000 apps

If it's made for iPad its made for iPad mini.
From the starting each and every application designed for iPad will work for iPad mini. They are immersive , full screen let us do any thing and every thing beyond your imagination.

Other Information

Apple come with A5 Chipset which iss already familiar  in iPad 2, with A9 ARM Cortex 1 Ghz Dual core Processor. PowerVR SGX543MP2 Graphic and 512 MB of RAM also 5MP of camera for 1080p video recording and 720p with front facing Camera on the board .
The cost of WiFi model 32 GB is 329$ and the Cellular with 459$.
 

Monday, 29 October 2012

How To Display the Full Path in the Windows Explorer Title Bar in Windows 8

Open Windows Explorer and then switch over to the View tab.


On the right-hand side click on options and then select Change folder and search options from the drop-down.
When the Folder Options dialog opens, switch over to the View options.
Here you will need to tick the Display the full path in the title bar check box.
You are done :)
Source: HowToGeek

Wednesday, 24 October 2012

MacBook with Ratina display

Apple has announced MacBook Pro 13 in with Ratina Display.

Just as the name suggests, Apple 13 inches MacBook comes with high resolution of 2560 X 1600 pixels IPS Display and 75% less reflection.
In support of Ratina Display is Integrated Intel HD 400 Graphics Bundle powered by Dual Core i5 or i7 Ivy Bridge Processor.
 

As per the Main Memory 8 GB is quiet impressive .And a huge compactable Secondary memory 768 GB SSD.With a great Connective option like USB 3.0, full HDMI port .
 

The MacBook Pro 13 inches with Ratina Display with 2.5 Ghz core i5 Processor and 8GB  RAM and 128 GB SSD will BE dilivered at the price of 1699$.

Friday, 19 October 2012

Move Out oF World oF Wire :Its time to be wireless every where

No more cables


Now you can boost your Nokia Lumia’s battery without plugging it in. Nokia Lumia 920 has wireless charging built-in. And you can charge Nokia Lumia 820 wirelessly by adding on a wireless charging shell.
Our energy-efficient wireless chargers come in all shapes, sizes and colours, so you can pick one to match your phone.
Best of all, they’re all Qi-compatible, which means you can use any wireless charger you like. And your friends can share yours too.


Nokia Wireless Charging Plate.
Phone down, power up

Place your phone on a charging plate and watch its battery go up. There’s no need to align it carefully – the charger will work as soon as it senses your Lumia on top.




Nokia Wireless Flat Pillow By Fatboy.
Put your Phone to bed.


When you go to bed, your phone can too. Just rest it on its pillow to start charging. They even come in bright colours to match your Lumia.


Nokia Wireless Charging Stand.
Charging for multi-taskers. 



Want to keep using Nokia Lumia while it Charge? Place it on our wireless charging stand so the screen's easy to see. You can even pre-set the stand to open on your phone -like an alarm or SkyDrive




JBL PowerUp Wireless Charging Speaker.
Charge while you listen.



Listen to the tunes you love with high-quality sound. And charge your Nokia Lumia wirelessly at the same time. The JBL PowerUp Wireless Charging Speaker has NFC built-in, so one tap is all it takes to connect your phone. Then while you enjoy the music, just rest your phone on top of the speaker to charge its battery. 



5 Hidden dangers of Facebook

           5 Hidden dangers of Facebook

Over the last few years, Facebook's growth has been phenomenal. The world's no. 1 social networking site also sometime back beat Google to become the most visited Web site in the US for an entire week at a stretch. However, the site has also lately being receiving lot of flak for its privacy policies.
An expert in online privacy drew attention to the five dangers of sharing information on social networking site Facebook.

Risk 1: Your information is being shared with third parties

According to Facebook policy last updated on April 2012, "When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends' names, profile pictures, gender, user IDs, connections, and any content shared using the Everyone privacy setting. ... The default privacy setting for certain types of information you post on Facebook is set to "everyone." ... Because it takes two to connect, your privacy settings only control who can see the connection on your profile page. If you are uncomfortable with the connection being publicly available, you should consider removing (or not making) the connection." 

Risk 2: Privacy settings revert to a less safe default mode after each redesign

In March, private e-mail according to a Gawker report, private email addresses that many Facebook users wanted to keep hidden were revealed publicly on a multitude of Facebook profiles.

Risk 3: Facebook ads may contain malware

Recently, a Facebook event invitation was reportedly sent to some over 2,300 friends of Jim Breyer, Accel Partners venture capitalist who sits on Facebook's board of directors, asking "Would you like a Facebook phone number?" However, the message was actually a scam and the users who entered their passwords in response to the message in turn sent the whole thing to their friends lists too.

"This was a phishing scam and Jim's account appears to have been compromised," read a statement from Facebook as provided to venture industry news site PEHub. 

Risk 4: Your friends unknowingly make you vulnerable 

On May 6th, the popular social network patched a major security bug that allowed users to snoop on their friends' private chats, and view their pending friend requests. The exploit forced Facebook to temporarily disable chat.

Risk 5: Scammers are create fake profiles 

Earlier this week, 15 privacy and consumer protection organizations filed a complaint with the Federal Trade Commission, alleging that the site manipulates privacy settings to make users' personal information available for commercial use.


India is world leader in spam output

      India is world leader in spam output

A new report shows that computers based in India now send out more spam than ever before, with some having "been turned into spam-spitting zombies in botnets."

India has surpassed the U.S. and taken the lead as the greatest spam-sending country in the world. One out of every six junk messages that litter users' e-mail inboxes are coming from India, according to a new report from Sophos lab
The security vendor's third-quarter "Dirty Dozen" report of spam-relaying countries found that India upped its percentage of global spam for the third quarter in a row and now accounts for more than 16 percent of all junk e-mails.
What is important to note, however, is that this spam doesn't necessarily come directly from India's computers -- but rather from the country's "ill-protected machines" that "have been turned into spam-spitting zombies in botnets." So those people who are creating the spam could be originating from anywhere. 


 According to Sophos, 5.3 percent of the world's Internet users are from India -- ranking it as the third most connected country after China and the U.S. -- but only 10.2 percent of the population has Internet accessibility. Sophos notes that this may be one of the reasons why there is a lack of security measures for the country's computers.
The U.S.had been the number 1pamming country for years, but was bumped by India in April. However, India has long maintained a top three spot. Other countries known for being top spam-senders are Italy, Saudi Arabia, and Brazil.
Security reports over the last year have shown that malware is on the rise. According to a report by McAfee last month,malware is multiplying at faster pace now than any other time in the last four years. Worms, viruses, botnets, Trojans, and spam are increasingly attacking computers, laptops, and mobile devices.

Tuesday, 16 October 2012

store 10 terabits on a fingernail-sized device


Soon, store 10 terabits on a fingernail-sized device


A new discovery may open the way for the development of next generationdata storage devices with capacities of up to 10terabits (10 trillion bits) per square inch - vastly enhancing storage on much smaller data devices. 

Imagine storing thousands of songs and high-resolution images on data devices no bigger than a fingernail. 

An ultra-smooth surface may be the answer, according to a discovery by the researchers from Agency for Science, Technology and Research's (ASTAR) Institute of Materials Research and Engineering (IMRE) and the National University of Singapore (NUS), reports the journal Nature reports. 

The self-assembly technique is one of the simplest and cheapest high-volume methods for creating uniform, densely-packed nanostructures that could potentially help store data, according to an ASTAR statement. 

However, attempts to employ self-assembly on different surface types, such as magnetic media used for data storage, have shown varying and erratic results to date. This phenomenon has continued to puzzle industry researchers and scientists globally. 

Researchers from ASTAR have now solved this mystery and identified that the smoother the surface, the more efficient the self-assembly of nanostructures will be. 

This breakthrough allows the method to be used on more surfaces and reduces the number of defects in an industrial setting. The more densely packed the structures are in a given area, the higher the amount of data that can be stored. 

"A height close to 10 atoms, or 10 angstroms in technical terms, is all it takes to make or break self-assembly," said MSM Saifullah, one of the key researchers from ASTAR's IMRE who made the discovery. This is based on a root mean squared surface roughness of five angstrom.

Monday, 15 October 2012

Biomatrix password



Soon, eye movements can be your new password

 
Taking cue from iris scans used in UID in India, researchers are developing a new biometric system that can identify people by the way they flicker their eyes while looking at a computer screen. 

Oleg Komogortsev, a computer scientist at Texas State University-San Marco, is making use of the fact that no two people look at the world in the same way . 

When looking at a picture, different people will move their eyes among points of interest in different sequences, researchers observed. 

Even if two people trace the same paths, the exact way they move their eyes differs, the 'LiveScience' reported. 

"We are seeing there are enough differences so we can talk about this as a biometric," Komogortsev told TechNewsDaily. 

A biometric is a measurement of something on the body - fingerprints, for instance - used to identify people. 

Computer scientists all over the world are studying biometrics for crime solving, for border security, and just as a high-tech way to sign into smartphones, tablets and other devices. 

Komogortsev's research is in its earliest stages and needs years of work before it might show up at airports, high-security workplaces or even home computers. 

However, he thinks eye movements could be part of the next generation of a more established biometric iris scans, which are already used in some airports and private companies, and in a countrywide ID effort in India. 

Previously, researchers showed that crooks could fool an iris scanner with printed contacts, or by holding up a high-quality printout of the correct person's eye in front of the scanner. 

Komogortsev hopes adding an eye-movement sensor could prevent this type of counterfeiting. 

"The strength of our method is it can work together with iris [scanning]," he said. 

Komogortsev's system records eye movements and analyzes two features. In one, the system measures "fixations", the times when people linger their gaze over a point on screen. 

In another, it measures "saccades", the swift movements the eye makes when it flies between points. 

His system considers both the exact path that people's gazes take and the fixations and saccades they make along the way. 

From those movements, the system calculates unique properties about people's eyes, including the force their eye muscles use and other properties about the fat and flesh around the eye and the eyeball itself, Komogortsev said. 

UID is an initiative of Unique Identification Authority of India of the Indian government to create a unique ID for every Indian resident
.

Thursday, 11 October 2012

Validating Email Addresses in PHP 

A very quick snippet today because I've told two people to use this approach in the last few days and both of them told me they didn't know about it. How to check if an email address is valid in PHP: use one of the Filtter Function, like this:
  
 $email1 = "nonsense.something@dottiness"; // not a valid email
 $email2 = "dotty@something.whatever"; // valid email
 
 $clean_email1 = filter_var($email1, FILTER_VALIDATE_EMAIL); // $clean_email1 = false
 $clean_email2 = filter_var($email2, FILTER_VALIDATE_EMAIL); // $clean_email2 = dotty@something.whatever


The Filter extension was new in PHP 5.2, but is one of the unsung heroes of the language. It's rare for me to ever describe one approach as the "right" way to do something - but for validating data, Filter really is excellent, offering both validating and sanitising filters and generally making it super-easy to clean up incoming variables. Many of the frameworks offer equivalents, and I'm sure many of those are wrapping this too.


Source- INTERNET


Barcode turns 60!


Barcode, distinctive black-and-white stripes that provide details relating to an object you purchase, has turned 60. 

There are more than five million individual barcodes in use around the world, according to regulator GS1 UK. 

Although barcodes were filed in the US on October 7, 1952, they did not make their first appearance in a US shop until 1974 - because the laser technology used to read them did not exist, the 'BBC News' reported. 

Barcode is an optical machine-readable representation of data relating to the object to which it is attached. 

The first item to be scanned by a barcode was a packet of chewing gum in an Ohio supermarket in 1974, the report said. 

However, the black-and-white stripes did not get a universal welcome, with some wine manufacturers refusing to incorporate barcodes onto their labels for aesthetic reasons. 

Now it occasionally doubles as body art, with US singer Pink among those who sport a barcode tattoo. 

"Barcodes are an icon and rightly so - we're quite pleased about it," said Gary Lynch, chief executive of GS1 UK.

Wednesday, 10 October 2012

How To See Hidden file Using Dos .



To see the Hidden file in system, you can use dos command.
Start->Run->cmd
Write the drive name in which you want to see the hidden file .
For example if you want to see hidden file in D drive then you have just type following command:-
>D: (Press enter)
D:\> dir /ah
If the list is too long u can use
D:\> dir /ah/p/w

App helps tell your colourful pills apart.

 EVER wondered if you've popped the right pill? Now there's an app to help. There are thousands of prescription pills but few colours and shapes to choose from, which can lead to dangerous mix-ups, especially in hospitals.To help prevent such errors, Jesus Caban at the US National Institutes of Health and colleagues have developed software that can identify a pill from a phone camera image. 

Websites such as Drugs.com and Webmd have tools to help distinguish between pills but you have to type in a description, making these services too time-consuming to use in a clinical setting.Caban's software extracts the shape, colour and imprint of a pill from its image and identifies the drug with 91 per cent accuracy in less than a second. 

Future accuracy will be improved when the system learns to recognise a pill from a wider range of angles. The technique is also simple enough to work as a smartphone app so could be used at home.The team tested the system on images of 568 of the most prescribed pills, taken from different angles and in a range of lighting conditions. They present the work at the International conference on image processing in Orlando, Florida, this month.

5 Features that makes HTML5 on the Top


1. Offline storage: 

HTML5 brings a host of desktop like power to web applications, and one of the features that media organisations such as the Financial Times are already using is HTML5’s offline storage capabilities. That means that you can cache content or use a web app to use when you’re not connected to the Internet. An e-commerce HTML5 application could allow people to add items to buy later and then finish the purchase when they are back online.

2. Location: 

This isn’t part of HTML5, but geolocation is one of the features being brought to the next generation Web. If you use Safari, Chrome of Firefox 4 and newer, then you might have already seen a pop-up asking if you want to allow a website to access your location. That means, it’s not just your mobile phone that knows where it’s at anymore. Modern Web browsers can also access location on desktop computers or other non-mobile devices based on location information connected to WiFi hotspots. Businesses could deliver deals to you based on your location. You could get weather and traffic information based on where you are at without having to enter your location. Privacy-sensitive features are also being built into the specification to help keep your information and you safe.

3. Advanced graphics: 
Canvas is a new Javascript graphics library that brings a lot a host of animation effects that previously were only available via Adobe’s Flash. If you’d like to get a sense of the power of these applications, you can already play simple games all based in the browser. If you want to see the power of these graphics elements and other features of HTML5, check out this presentation all created using the new mark-up language. It’s like PowerPoint with nothing more than a web browser.
4. Multimedia: 
Good bye plug-ins. We all remember the bad old days when to play audio or video on the web, you often ran into a message saying that you needed this plug-in or that plug-in. It got better when Adobe’s Flash became the dominant way to play multimedia on the web, but now, HTML5 can easily allow audio and video playback without any plug-ins at all.
5. WORA – Write once. Run anywhere: 
The first generation of the Web was strictly about desktop computers, and the mobile web was a horrible experience. Until smartphones raised the bar for the mobile Web, there were literally hundreds of different mobile browsers. It made it extremely difficult to develop sites for mobile. With the rise of tablets and smart TVs, the Web is ready to conquer new devices. In the past, new devices meant new browsers, which meant a real headache for developers. With HTML5, browsers are much more standardised from the mobile Safari browser in the iPhone to the browser in Android handsets. Hitachi, Samsung and LG all use HTML5 browsers based on the Webkit technology that is the basis of Apple’s Safari and Google’s Chrome.
There were only 109m devices in 2010 that were HTML5 capable, but that is expected to jump to 2.1bn mobile devices by 2016, according to research by ABI Research. This is a huge opportunity, and while HTML5 won’t be finalised until 2014, that’s not stopping forward-looking companies
Source : Firstpost

How to access the files when Windows is damage

  You Need An optical drive (CD,DVD or Blu-Ray) drive on the computer you wish to repair. An  burning capable  optical drive on your working...