Comparison of Galaxy S III vs iPhone 4S vs HTC One X

The battle in the mobile market is sure to be a class above the more intense after the presence of Samsung Galaxy S III.

Samsung Officially Launches Galaxy S III

After a long wait, finally Samsung officially unveils Galaxy S III. Android's latest generation of South Korean vendor will soon be visited Europe and Asia followed this by the end of May 2012.

New Nokia Photo Samples from 808 PureView, Wow

For those of you who are interested to buy Nokia 808 Pureview, it's good to see the first images captured using a camera phone. This time the sample photos of the 41MP camera has been obtained through Nokia's official Flickr account.

Samsung: Planning for Windows Phone 8 Smartphone with Base Galaxy S III?

Windows Phone 8 is still not officially announced, but rumors about the smartphone vendors who are making phones with the operating system in it keeps popping up. WP-Life.com this time claiming that they heard the initial details about plans for a product Samsung Windows Phone 8.

6 Expected Features Available on the iPad Mini

Re hot news comes from a family line of iPad. Apple rumored to be making a new tablet with a 7 inch size with a price tag in the range of USD 200. This was done to compete with the Kindle Fire.

Froyo - Android's Most Popular

Various versions of Google's Android was launched. Which is the most widely adopted? The latest data from Google shows Android Froyo or Android version 2.2 finally became the most widely used.
In early December 2010, 43.4% had adopted Froyo Android phones, up from 36% in November. Naturally, because Froyo is the latest version of Android. Stalking closely behind is the Android 2.1 or Eclair with the percentage of use of 39.6%.
Versions 1.5 and 1.6 are still relied upon a number of handsets, although the rates began to decline significantly. As quoted from TechRadar detikINET on Friday (12/03/2010), there are 17% of the handset is still 'stuck' Android jadul wear it.
Froyo breezed into top position about 7 months since this began menyambangi Android phones. Various devices that have adopted them Froyo Desire HTC HD, LG and Samsung Optimus One Galaxy Tabs.
Google is now ready to launch Android 2.3 or Gingerbread although not clearly mention when the precise moment. In November, Google CEO Eric Scmidht only states Gingerbread will debut within weeks

Update Antivirus free 'Kill' Windows 7

Typically, antivirus updates needed to keep computers safe from malicious interference. But there is one update that it can 'kill' a particular computer.
This happens on AVG free antivirus update issued December 1, 2010. If the user happens to install the update, the computer will not be lit again.
As quoted from PCWorld, Friday (3/12/2010), it occurs only in updata AVG free version that runs on Windows 7 64-bit version.
The problem lies in the update is said 271.1.1/3292 (432/3292). When installed, this update will require a PC to restart. But if it is done, the computer will display an error message c0000135. And after that could no longer be booted.
AVG has removed the update since it is known that there is a problem. Also, for those who are already taxable, the AVG site provides ways to overcome them.

Software Companies Also 'hostile' Wikileaks

Company United States (U.S.) WikiLeaks that the software used to create and display a graph of U.S. diplomatic secret documentation decided to withdraw its product from that site.
Tableau Software, the name of the software company said it had pulled her own plug on Wikileaks, along with same day when ejecting the Amazon site Wikileaks from its server.
Just like Amazon, this policy is part of the response to public demand, represented by Senator Joe Lieberman as Chairman of the Senate Homeland Security Committee in the U.S..
Reported by AFP and quoted on Friday (03/12/2010), Tableau Softwarementions WikiLeaks has published data visualization more than 250,000 U.S. diplomatic documentation to the Public Tableau, a free service offered by his company.
"Tableau Software erase data visualization published by WikiLeaks to Public Tableau," said Tableau Software in the company's official blog.
It is said by the Tableau, the services they require people who use Public Tableau not upload, post, email, all forms of content that is not their right.
"Besides, if we receive complaints about specific data, ourentitled to investigate the situation and if necessary remove any data that is considered offensive, "he added.
Tableau also not taking any chances given the controversy surrounding the Wikileaks increasingly widespread. Especially about who actually has the rights to the leaked data.
Tableau Software which claimed to have been flooded with comments on his blog criticizing this thing, and most of the bad comments

WikiLeaks expelled from Amazon Server

Server whistleblower site WikiLeaks has reportedly thrown from Amazon.com. This action was mentioned the impact of government intervention the United States.
WikiLeaks news expulsion from Amazon itself came from U.S. Senator Joe Lieberman, chairman of The House Security Committee.
"This morning, Amazon informed my staff that they have ceased to host the WikiLeaks site," said Lieberman, quoted from Mashable, Thursday (02/12/2010).
The senator true hope, the Amazon from the outset should have been taking steps to deny shade WikiLeaks server because the site has been phenomenal publishing confidential materials.
"But Amazon's decision to break with the WikiLeaks was the right decision and should also be followed by other companies which used WikiLeaks to distribute illegal materials," explained Lieberman.
Amazon did not reveal the reason why they no longer want to overshadow WikiLeaks. But the U.S. government is believed to have contributed to the sudden action this.
WikiLeaks has indeed been the subject of public discussion of the world, after the so-called have a stack of U.S. secret diplomatic cable data.
No doubt, this site also became the target of computer attacks that cause them overwhelmed and made inaccessible Wikileaks some users for several hours.
Manager Web site WikiLeaks said suffered a Distributed Denial of Service (DDoS) and those not yet known who carried out the attack.
Well, to be more secure, WikiLeaks also yesterday had reportedly been rented Amazon's servers in order to create stability for Wikileaks if attacked again later.
But now after the expulsion of the Amazon, it looks like WikiLeaks must find new shelter to shelter where their servers.

WikiLeaks in Action - Should WikiLeaks Blocked?

Very interesting info we read in today's news portal 'site whistleblower' WikiLeaks again attracted attention because of leaked diplomatic wires U.S. government around the world. Even WikiLeaks plans to divulge more than 3,000 documents the U.S. Embassy in Jakarta. What about it? "
We know that at this time has been widely leaked Wikileaks variety of classified information (confidential information) that is very troublesome U.S. government, various things have been experienced managers from threats to Wikileaks from the attack site in a DoS Attack (Denial of Service Attack), which is an attack that does not damage server but make it so busy that no longer able to handle access to Wikileaks servers which in turn inhibited people who want to know the contents WikiLeaks.
With plans Wikileaks certainly all governments of Indonesia (from the time of Sukarno to SBY) and the U.S. ambassador in Indonesia (from the beginning until now) definitely worried about the opening of the confidential information. Because all things involving the U.S. government could be revealed from the start of economic, political, and international relations.
Confidential information can be about the U.S. government itself, or the Indonesian government who met the U.S. embassy as well as information which is the U.S. cooperation with the government and Indonesian intelligence.
When this happens in the days of the new order can be believed to direct the government to block access to the Wikileaks (but not it time that the Internet is not widespread as it is now). However, at present facing the Indonesian government dilematik enough because there has not blocked the site anyway, if now we knew there blocking it will make people wonder more and more suspicious.
With current technology, ICT, although the government did pemblokiranpun on the site, the site can still be easily accessed by those who have knowledge of telematics intermediate level (not necessarily sophisticated).
In addition, although the government still desperate melaukan eg blocking, please note there are hundreds of millions of people outside Indonesia who can easily access the Wikileaks and they could easily do a screen capture of Wikileaks information is then sent to the non-text format (an image) to colleagues in Indonesia in the file formats PDF, GIF, JPG.
Of course this method is difficult to detect automatically on the network management institution in Indonesia such as IIX, ISP, NAP, ID-SIRTII, and so forth. Thus, screening should be done manually which would take a lot of effort and resources and how it must be difficult (read: tedious but with results that are not effective).

WikiLeaks Pemblokiarn Will Sia-Sia
With the above possibilities, surely almost be said blocking access to the Wikileaks will be in vain. Thus all parties associated with the leak of Wikileaks information and proved to hold an important role on these issues would have to put square off against attacks from political opponents who will use the information to drop it.
The goal must be packaged with the words "national interest". But basically to bring down each other between individuals from starting a group within the party until the inter-party and the ultimate goalnya is clear: after the election victory in 2014.
And indeed this is what is happening in our country where an information that should be accepted and digested with great maturity and responsibility in the national interest, but instead used to simply bring down each other's political opponents.
You can imagine with the prolonged process of doing homework for all parties involved justice and constitutional affairs will be busy with thousands of issue (3000 issue that many are not). And surely in the end there will be a lot of negotiations to special interests that it can confront the many issues now being dealt with justice, for example an issue of Wikileaks is enough to make a corruption case received a letter that is more beautiful than a love letter that is SP3 (Penghetian Warrant Termination Investigation).
You can imagine there are at least 3000 people from 6 regime are now pounding on every leak of Wikileaks is. And the name that will be drawn more.
So is there any way that can be done to cover it? Because this issue is Telematics technology-based data (which always can reveal many things) so I can confirm that the key is not the end-point (point receiver), but the starting-point (sender / pelansir) so the key is only there in the manager's own Wikileaks .
As they've spread the information is then opened his case. So what can be done? Oh wait (for those who wait), excited (for those who feel a lot of affairs with the U.S. embassy).
And since we live in an information age where ICT becomes the main base in the information was no longer block the information because it will be in vain.
The unfortunate is the plan of the least Wikileaks will hurt Indonesia-US relations are harmonious, harmony since the arrival of President Obama.

5 Cyber Security Trends in 2011

In fact, cyber crime is very attractive to criminals. With the growth of mobile services platform superb, criminals will have more ways to attack.

Then would like  about cyber security trends in 2011? Here are 5 predictions according to Symantec:

1. Important Infrasturuktur So Target Attack, Slow Reacting Government

The attackers seemed to have seen the impact of the threats that attack Stuxnet in industrial control systems industry. Symantec estimates that cyber criminals take a lesson from what Stuxnet.

This is the most significant example to date in terms of a computer virus created specially to change the behavior of the system hardware to produce a physical effect in the real world. Although initially slow, it is estimated the frequency of this type of attack will increase.

The findings of the 2010 Critical Information Infrastructure Protection (CIP) Survey Symantec also menggaungkan this trend because 48% of respondents said they expect to get an attack in the next year and 80% believe that the frequency of such attacks will increase.

"Most of the critical infrastructure providers to give support and really hope to be able to cooperate with their governments in planning for CIP. However, we would not expect much movement on the government side related matters referred to in this year," says Symantec.


2. Zero-Day Vulnerability and Target Very Special

In 2010, Hydraq aka Aurora, provide concrete examples of the target class with a very specific threat that is growing. The threat was trying to infiltrate into a particular organization or a particular type of computer systems by exploiting software vulnerabilities that were previously unknown.

Attackers have used this security hole for years, but when the threat to the very specific target gained momentum in 2011. Symantec predicts, users will see zero-day vulnerabilities appear more in the next 12 months than in the previous year.

The main drivers behind this trend is the nature of the low distribution of malware. Threat with specific targets to focus only on a small number of organizations or individuals in order to steal valuable data or infiltration / access the target system.

By exploiting this fact, the attacker intends to increase their madness and attack their targets in a single attack without being noticed.

3. New IT Security Model

The use of smartphones and tablet continues to grow at a pace that is unprecedented. IDC estimates that by the end of the year, shipments of new mobile devices will increase by 55% and Gartner meproyeksikan that in the same time, 1.2 billion people will use mobile phone with a rich web connectivity capabilities.

When the devices become more sophisticated while only a small portion of mobile platforms that dominate the market, it is inevitable that the attacker will enter the mobile devices in 2011 and that mobile devices will become the main source of loss of confidential data.

Therefore, the spread of this gadget is not showing signs of decline in the years to come, companies will be attracted by the new security model to protect data that is stored and can be accessed through the device.

Moreover, when employees become more mobile and work when you travel, the company also had to overcome various challenges associated with adopting new models, such as security in the cloud, for appropriate solutions that will work seamlessly on many platforms and devices .

4. Triggering Encryption Technology

Explosion in the use of mobile devices in the corporate environment does not only mean that the company will face new challenges in keeping the device and critical data in it easily accessible and safe. But they also must comply with various industry data protection regulations of data protection and privacy.

Despite these regulations, many companies / organizations do not disclose when the device moves that contains important data is lost, as they did with the laptop.

"In fact, employees do not always report the loss of these devices into their company. This year, we predict that regulators will begin to take action against this problem and this will encourage companies / organizations to further enhance the use of encryption technology, especially for mobile devices," Symantec said.

The company is also believed to be a more proactive approach to data protection by adopting encryption technology to meet the standards of compliance with regulations and avoid heavy fines and damage to their brand which is caused by a data breach.

5. Attacks Triggered Political Interests

In the study CIP Symantec, more than half of all companies said they suspect or reasonably believe that they have launched an attack with a specific political purpose.

Previously, these attacks particularly in the area of cyber espionage or attack type of denial-of-service to the Web service. However, with the opening of Pandora's box because Stuxnet, it seems we will see these threats move more than just a game of espionage and interference, because the malware is armed to cause damage in the real world.

Symantec assumes that Stuxnet probably only the first tangible indication of death from the efforts that some people call it a 'cyber war' that has been occurring for some time now.

"In 2011, indications that more clear about the efforts to control the digital arms race which is currently ongoing will come to the surface," added Symantec

Beware Applications' Who's Looking at Your Facebook Profile'

Whether lately often see bid to find anyone who sees your profile? Be careful, you should not have to click it, because it ensured the application link is the latest malware or a malicious program that was circulating on Facebook.
Yes, it's fraud was heavily wara-Wiri in News Feed up. One form is through Facebook friends status updates, which reads: "OMG OMG OMG ... I cannot believe this Actually works! Now you really can see WHO's viewed your profile! On [LINK]."
Well, the curious user will most likely be clicking on it and they too become victims. Computer and internet security firm Sophos noted, just a few hours more than 60 thousand people have been clicking the link above.
"When clicking on it, you are directed to a web page that encourages you to allow the application to have access to your Facebook profile," said senior technology consultant at Sophos, Graham Cluley, as quoted from PC World, on Tuesday (11/30/2010).
Cluley warned try Facebooker that the application is false. Moreover before, Facebook is also already been confirmed that there is no way to know who has seen our profile
"We worked hard to block and remove websites, pages and applications that claim to be able to do this. If you see things like this, do not be fooled, and immediately report it to us," said up on the page on their site security.
Already be a victim? Do not worry Cluley have any advice for menghalaunya powerful. "Delete the reference to the link from the News Feed you, and pull the right for odd applications to access your profile through the Account / Privacy Settings / Applications and Web sites," Cluley advises.
More specifically, you can follow the steps more or less similar to banish tips malware up via video Lindsay Lohan and Mc Donald ads that also had crowded decorate up some time ago.