Microsoft Said : Windows 8 Will be As Revolutionary As Windows 95


Microsoft Corp's Windows 95 truly reinvented the PC experience and revolutionized the PC industry back sixteen years ago in 1995. This week Microsoft opened up Windows 8 development blog and said that its next-generation Windows 8, which will be available for public testing in the coming months, will be as revolutionary as the legendary Windows 95.
 
"So much has changed since Windows 95 - the last time Windows was significantly overhauled - when the 'desktop' metaphor was established. Today more than two out of three PCs are mobile (laptops, netbooks, notebooks, tablets, slates, convertibles, etc.). Nearly every PC is capable of wireless connectivity. Screen sizes range from under 10" to wall-sized screens and multiple HD screens. Storage has jumped from megabytes to terabytes and has moved up to the cloud," said Steven Sinofsky, the president of Windows and Windows Live division at Microsoft.
 
Although Microsoft continues to remain mum about the release date of Windows 8, many believe that the next-generation Windows will be launched in 2012. In its new blog, the world's largest designer of software plans to share how it focuses on performance, reliability, compatibility, security, and quality of Windows 8 and plans to continue the dialog around performance and fundamental engineering of Windows with its customers and end-users.
Microsoft previewed its Windows 8 in June and started by showing user experience and interface on a range of mobile devices. The graphics user interface (GUI) is one of the most important elements of operating systems as end-users interact with it every day. But Microsoft stresses that the new GUI along with compatibility with ARM-based system-on-chips are not the only innovations when it comes to Windows 8. The software giant claims it has engineered changes across the full range of Windows capabilities.
 
"We know people who care a lot about networking want to know our plans there. We know people who are invested heavily in storage want to know what is new in that area. Many want to know about performance and fundamentals. We know developers, IT pros, and gamers all want to know what's new for them. There is so much packed into Windows 8 and there are so many unique and important lenses through which to view Windows 8, and so we want to be sure to take the time to cover as many of these topics as possible, to build up a shared understanding of why we’ve taken Windows where we have. So in the next weeks we will just start talking specifics of features, since there is no obvious place to start given the varying perspectives. From fundamentals, to user interface, to hardware support, and more, if something is important to you, we promise we'll get to it in some form or another," said Mr. Sinofsky.

To See of official Blog of Windows 8 Click Here 

-News Source (Xbitlabs)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

New Swype Keyboard (With Customized Features)

It’s hard to believe that it’s been nearly three years since Swype first made a splash at Tech Crunch 50, and since then it’s quickly popped up on handset after handset. Easily one of the most popular alternative input methods out there, Swype has announced today a special agreement for users of the Sprint Nexus S 4G: you bring the hardware, they’ll bring the latest version of Swype.
While the concept behind the keyboard remains the same, the new update packs some few nifty new tricks. The biggest by far is the keyboard’s newly added support for gestures: basic moves like Cut (Swype key -> X), Copy (Swype key -> C) and Select All (Swype key -> A) are all here, but the new Swype integrates with certain apps with aplomb.
Consider Twitter: if you highlight a bit of text and swipe from the Swype key through ‘T’ and ‘W,’ your Twitter app will open up and your witticisms will be good to go. Ditto for addresses: highlight and swipe from Swype key through ‘G’ and ‘M,’ and Google Maps will open and point out your path. Custom dictionary management has also been pumped up, which will hopefully make working with specialized vocabularies less of a headache.
Sprint Nexus S 4G users are getting the update exclusively at first (available at this page) — which, of course, is really just a fancy way of saying “Sprint Nexus S 4G users will have it exclusively for a few hours before the hacking communities find a way to tear it out”. For all of you itching to get your fingers swyping on the latest and greatest, fear not: someone out there is bound to release a working .apk soon.

For more information about swype click here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

blog of .co.in Compromised, 78000+ Indian Sites Hacked BY ZHC


blog of .co.in compromised more than 78000 Indian sites hacked by ZCOMPANY HACKING CREW (ZHC) to raise the awareness. We must have to consider that this was indeed one of the biggest ever hactivism ever done on the cyber fence of India.
The Attack was done for the 15 August (The independence day of India). ZHC displays that kashmiri people observe black day on 15th August and the same message had been shown by ZHC on each and evry deface page (78000+) for all indian people in protest ...

Official Message of ZHC :-

"ZCompany Hacking Crew Observes Black Day with the people of Indian occupied Kashmir on 15th August

Free Kashmir .. Freedom is our goal..// End the Occupation. . . .

This message is not for Indian government but common Indian people who dont know what their government hides. For those of your politicians who boast of Kashmir being an integral part of India read your own law books:

" Indian Penal Code(Act No. 45 of 1860) CHAPTER-II SEC 18: “India”.- “India” means the territory of India excluding the State of Jammu and Kashmir."

The 15th of August is special for you because you got freedom on this day yet you should think that do you really deserve to celebrate this freedom if you do not stop the wrong doings in Kashmir. Everyday people are not only being humiliated but killed as well. Fake encounters and rape is the order of the day in Kashmir. Kashmiris have protested time and again against Indian occupation and many people were killed mostly teenagers. When media tried to show it they were banned ( eg PRESS TV ), people were arrested for even protesting on Facebook and still India claims to be the largest democracy in the world. We ZHC will reveal what Your Govt try to conceal, if you really want to be proud of your nation rise for what is right. Support Kashmiris in their dream to achieve Freedom which is everyone's basic human right.

We are ZHC - UNITED WE STAND DIVIDED WE FALL ..."
To See the List of those hacked Sites Click Here 

-News Source (ZHC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Firefox Ver 6.0 is Now Available (With Lots of New Features)

Mozilla released Firefox v6.0 on the 16th of August. To know what is new on this version and more information cheek the following statements.  

What’s New in Firefox 6.0:-

The latest version of Firefox has the following changes:
  • The address bar now highlights the domain of the website you're visiting
  • Streamlined the look of the site identity block
  • Added support for the latest draft version of WebSockets with a prefixed API
  • Added support for EventSource / server-sent events
  • Added support for window.matchMedia
  • Added Scratchpad, an interactive JavaScript prototyping environment
  • Added a new Web Developer menu item and moved development-related items into it
  • Improved usability of the Web Console
  • Improved the discoverability of Firefox Sync
  • Reduced browser startup time when using Panorama
  • Fixed several stability issues
  • Fixed several security issues
To see the fixed Bug in this version of Firefox click Here


To download Firefox v6.0 Click Here  

To see the official press release of Mozilla cheek the following Link:-
http://www.mozilla.com/en-US/firefox/6.0/releasenotes/

-News Source (Mozilla) 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Bootloader Unlocker Tool By HTC


The good news is that as promised phone-maker HTC has launched a new web tool that you can use to unlock the bootloader on selected Android smartphones. The bad news is that right now selected smartphones means the European version of the HTC Sensation… and that’s it.
Soon HTC plans to add the HTC Evo 3D and HTC Sensation 4G phones from Sprint and T-Mobile in the US to the list, but for now US customers are going to have to stick with unofficial bootloader unlocking tools.
The bootloader is a program that loads the operating system on your device. By locking the bootloader HTC could tighten security on a smartphone. But by giving users the ability to unlock their own bootloaders, HTC is making it easier for customers to load custom software such as CynaogenMod or other complete operating system replacements onto their phones.
While HTC is making it easier for users to unlock their bootloaders, the company is not officially supporting phones once the bootloader is unlocked. In other words, if you use the HTC tool to unlock your device you’ll void your warranty.
The unlocking process is a little complicated, and requires you to have the Android software development kit installed, Java running, and HTC Sync software.

Fore More Information Click Here

-News Source (HTC & Mobiputing)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The NCP White Paper : SSL VPNs Pose Serious Network Security Risks


The use of secure sockets layer (SSL) virtual private networks (VPNs) opens up networks to security risks, according to a white paper by NCP Engineering.

The NCP white paper:– 
Debunking the Myths of SSL VPN Security - warns that vulnerabilities are endemic is SSL to the point where banks have their customer data stolen at “an alarming rate" and "web application developers create a false sense of security by trusting the confidence and credibility of a protocol that is likely to fail them before they can get through a single development cycle.”
Many of the attack vectors used against SSL are from other technologies using SSL or that SSL makes use of, such as block ciphers, stream ciphers, document format, and authentication and authorization schemes, according to the white paper.
The white paper exposes what it terms “myths” about SSL VPN. One myth is that SSL VPN is clientless. It warns that clientless SSL VPN products from multiple vendors can enable an attacker to use these devices to bypass authentication or conduct other web-based attacks.

“By convincing a user to view a specially crafted web page, a remote attacker is able to obtain VPN session tokens and read or modify content, including cookies, script or HTML content, from any site accessed through the clientless SSL VPN. This effectively eliminates same origin policy restrictions in all browsers. For example, the attacker is able to capture keystrokes, while a user is interacting with a web page”, according to the white paper.

“Clientless is a nice marketing term. It sounds great”, commented Rainer Enders, one of the authors of the report and chief technology officer for the Americas with NCP Engineering. “Guess what, it is not clientless”, he told Infosecurity.
Another myth identified by the white paper is that online banking via SSL sessions is secure. Banks use SSL for web browser banking sessions to provide secure transfer of sensitive information from customers or partners. Hackers exploited a weakness in the SSL connection and the web browser to breach Citigroup credit card customers information, the white paper noted.

“If your browser has security flaws, your SSL VPN has security flaws”, warned Enders.

Another myth, according to the paper, is that using trusted certificates from a certificate authority is secure. “Certificates used to authenticate an SSL connection allow for the certain identification of each party and for the negotiation of an encrypted channel for communication. The certificates themselves are files whose alteration can be easily detected and whose origin are verified by a trusted certificate authority, such as Comodo or VeriSign”, the white paper explained.
The problem is that the trusted certificate authority can be hacked, as happened with Comodo earlier this year. A half dozen of Comodo’s registration authorities (RAs) were hacked into, and the hackers obtained digital certificates. The hackers could spoof the certificates, enabling them to pose as Google and Yahoo and gained access to information over a secure connection, the white paper said.
Enders recommends using a hybrid solution - similar to one offered by his company - that includes both SSL VPN and IPSec to address security issues with both technologies.

-News Source (Info Security)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Us Boiling Springs & Baptist Church's Site (Including Sub-domains) Hacked By ZHC


Us Boiling Springs, First Baptist Church's Domain and Sub Domains Hacked and Defaced by ZHC UNKNOWN To Deliver The MSG To the peoples Of USA that....  

"Muslims in General are not your Enemy Stop Killing innocent Muslims .They are also Human Being..."

Hacked Sites:-
 
http://stewardship.bsfbc.info/
http://video.bsfbc.info/
http://stats.bsfbc.info/
http://cgi-bin.bsfbc.info/
http://upgrd.tar.gz.bsfbc.info/
http://wp-admin.bsfbc.info/
http://wp-content.bsfbc.info/
http://wp-includes.bsfbc.info/

http://bsfbc.info/

http://audio.bsfbc.info/


Mirror Links-

http://zone-h.org/mirror/id/14690347
http://zone-h.org/mirror/id/14690348
http://zone-h.org/mirror/id/14690349
http://zone-h.org/mirror/id/14690350
http://zone-h.org/mirror/id/14690351
http://zone-h.org/mirror/id/14690352
http://zone-h.org/mirror/id/14690353
http://zone-h.org/mirror/id/14690354
http://zone-h.org/mirror/id/14690355
http://zone-h.org/mirror/id/14690367



The Official Message Of ZHC:-

"- The insidious evil of Zionism from the standpoint of US lies in inspiring the alliance of US Zionists and Neocons. These political factions have joined in a commitment to maintain a racist Jewish colony in Palestine by means of the brutal oppression and suppression of the natives.

- Wake up American's! The Palestinians; Pakistani's; Muslims in general are not your enemy! Your enemy walks in the corridors of your administration! The ones sending your son's to kill Muslim Children and to be killed - for Israel; for The New World Order (NWO) Globalist agenda; for greed!

- You may be inspired by misguided feelings of guilt and a confused need for atonement - but how much guilt do you wish to pass onto your children as surely every empire weakens and America is weakening - what will they answer when asked ' why did your forefathers kill so many of our children and rape so many of our women' - What atonement will they receive?

- You burn the Holy Quran, You use drones to kill innocent muslims in Pakistan, You cause controversy in the arab lands for oil, You ban the niqab, You kill innocent muslims in palestine, You torture innocent muslims in guantanamo bay, You rape & torture muslim women(aafia siddiqui), yet we are the terrorists. . . . . . . ."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...