RSS
 

Arquivo para August, 2013

Common screen now is touch too

08 Aug

With the arrival of Windows 8 and html5 facilities beyond the photos,ApenTouch videos and sounds, touch interactivity also here to stay.

But what to do with the common screens that still use a pen came to turn them into touch screens too.

The device Apen Touch 8, E Fun, is secured with a small device with magnets in the corners of the screen and connected via USB to the computer, which has a pen at the other end “optics”.

So the movement of the pen on the screen makes iterative identical to a touch screen, no need for any software or any device more.

Actually the pen is not optical, but ultrasound, as it uses the technology of motion capture by infrared rays, the play on the monitor attached, it captures the movements of the pen and creating the feeling that the commands are triggered by touch on the screen.

The device is sold in the U.S. since the beginning of the year at a price of R $ 160 (U$ 89), and is present at CES 2013 as one of the news.

 

Marco Civil: Liberty and security

07 Aug

The project Marco Civil (PL 5403/01) which should Blogset this month to regulate the Internet in Brazil, will progress as neutrality, which means that providers can not discriminate traffic between ordinary users and businesses.

But the American paranoia that sees a world in permanent war (just close by 12 embassies terrorist threat), and among Ace disclosures Snoewden, back now the subject of dictatorship “National Security”, “National Sovereignty”, etc..

There is no excuse for the U.S. government invasion of privacy of citizens who have no criminal proceedings against them, which, however we think that the state is not national or must care for private data, just have a database in Brazil does not solve the problem which is what they do with the data.

Expounded in two previous posts the differences between security and privacy, all want security, but we must be against any invasion and privacy that is not justified by any judicial discretion fairly clear.

Unfortunately this involves a vision of “sovereign” is the term that pushes the word sovereignty, which is the liberal thought of the early modern period, we need to respond and neither Marco Civil responds, is what rights and duties of the state, not just the citizen who is the subject of “democratizing democracy”.

 

First smartphone open-source

06 Aug

The Mozilla enterprise of browser Firefox now no longer sells “open-source” smartphoneGeeksphone2 in Spain, Colombia and some European countries, is the first smartphone with Firefox OS, and the enterprise announced that the phone will come to Brazil this year.

The device had been released to developers and hobbyists, called Geeksphone (Geeks is another slang term for nerd), with the propaganda “one-time, limited promotional price” of € 149 / $ 196 ($ 300 without taxes here), but not reported to be sold to a “standard price” via onlin stores, which would be starting in September.

The initial model was called the Peak, with a more robust version called Peak +, double the RAM (1GB) and the latest version of Firefox OS (v1.1).
Specifications, the same for both versions include dual-core 1.2 GHz Qualcomm 8225 chipset, multitouch screen 4.3 “qHD IPS, 8 megapixel rear camera (with flash), 2 megapixel front camera, and tri -band UMTS / HSPA, and a 1800 mAh battery, say have the best battery management and better graphics performance.

The company’s marketing is Movistar in Colombia, with two models Fire One Touch, Alcatel, and Open, ZTE, for a price of around 200,000 pesos (about U.S. $ 125).

 

More about security and privacity

05 Aug

The issue is recurrent, since the internet (the middle physical´s initial) and Web (the popular application that started in the 90´s) ComumPrivadowere expanding it became more frequent, and is now a priority issue on the destination Web.
Now with former hacker official U.S. government announced the spying on American citizens and on other countries, it has become more important on the Web.
But security and privacy should not be treated as a single topic, although it is impossible to separate one from the other, in the privacy the individual knows what information people who allow them to be collected and published, and knows how to treat this information, but this should know how control this privacy.
According to an article from AT & T this information may be collected and would be correct to look at them.
Here comes the aspect of safety, only security should include factors that include physical security and human, ie “only security information” where factors including business, physical integrity of persons and / or disaster recovery may be included these factors, there is an international standard for this to ISO 17799.
Safeguarding customer information, this means that any site or social tool (not just Facebook, but mostly he) must protect the security, confidentiality and integrity of information from a “client”.
Management and Identity and Access Management (IAM, Identity and Access Management walks), which is undoubtedly the most critical factor of privacy, but not always given due attention because of the difficulty and cost of implementation.
Users are often employees, customers, suppliers, or a simple computational access to the environment and engage in corporate services without knowing what they do. The environments themselves are becoming increasingly complex, make offers “knowing” the taste of the client, exploring their consumption capacity and interconnecting applications.
The clouds are a particular danger for this invasion of privacy, SOA (Service oriented Architecture), since his own role as a service is to use the functions or services and not just traditional applications, and this causes the control access more difficult.
Security, coding, testing and application management is another risk factor, as application attacks have a great success due to the ease of vulnerabilities in most program code, programmers are famous for, the risks of programs written in Java, but weaknesses imply how many programs and services have been implemented.
Such findings may be accidental, such systems have recently been discovered in Apple’s iOS and Androids, showing that this is not the privilege of any company, but they are important as they are detected and remedied when companies advise their customers as part of a recall, but this is not done.
The safety aspects are not few, but should also include: protection and data encryption, protection against malware (viruses), managing and monitoring operational risk.

 

Smartphone with face of Google

03 Aug

Motorola Mobile, which was sold to Google in the amount of $ 12, 5 million, MotoXhas two years after its first unit of this new phase: the Moto X.

It has Qualcomm Snapdragon S4 processor, 2,200 mAh battery with autonomy of 13 hours of talk time and can reach 48 hours of use, with no new charge.

The memory is 2 GB of RAM, as versions of 16 GB or 32 GB storage, 4.7-inch screen, rear camera shoots 2 megapixels and has 10 mega in front, makes shooting with 1080p resolution cameras in transeira and is activated moving the unit, admits 4G connectivity.

Among the new applications include the Motorola Connect, which allows you to use various functions of the devices through the browser Migrate Google and Motorola, which lets you move data such as photos, videos, music, contacts and aparelhe chip, and records call and SMS.

The unit can be customized by the user and its launch is scheduled for the end of August in the U.S.A., Canada and Latin America, there the price of $ 199.

 

Security and privacy in Social Networking

02 Aug

Security and privacy are not the same thing, actually often safe (governments and companies want)PrivacidadSegurança can work against privacy, see the case Snowden.

The security fundamentally depends on the companies that provide social networking and governments here do not exclude anyone, we should recognize the rights of citizens.

The right to privacy is some of all human life, not just social networks, ever thought of someone opening a letter from you, even if someone in the family?

The privacy in social networks is old, two years ago, the social networking users had a choice of cryptographic key called TLS (Transport Layer Security), which can be clearly seen with the appearance of “https” in the Web address, URL browsers.

TLS is the successor to SSL (Secure Sockets Layer), it is a system key “public” encryption to ensure more privacy in data exchange on both ends of the connection.

All who work in the area are aware that there is much work to do, but the first users to be aware that they have to maintain your privacy, organizing publication criteria and visibility of your messages and then using appropriate techniques.

 

Internet security is worse

01 Aug

According to the news that was widely publicized, it isXKeystore very simple information just by the mere affiliation of an analyst in a Web site, the program KeyScore news released by English newspaper The Guardian.

 

The XKeyscore is a program that covers “almost everything that a normal user does on the internet”, including the content of e-mails, pages viewed, and even what you are looking on the net.

Snowden received a temporary asylum in Russia as a “refugee”, according to the Interfax agency, according to his lawyer Anatoly Kucherena said yesterday: “I just give him the documents of the Federal Migration Service of Russia.”

The program Xkeyscore allows analysts to search the metadata and content of e-mails and almost all activities on the Internet, having a browser history, even when there is no e-mail account name (one “switch” in the jargon NSA) associated with the individual who is the subject of the breach of privacy.

The lawyer said he went to a “safe place”, and that it will not be publicly revealed, “Safety is a very important issue for him,” state television said Kucherena Russia 24. “He himself will decide where to go” from now.