Tuesday, 9 October 2012

Hi guys,

sorry i havent been posting in a while been a bit hectic, i did a review on the iphone 3g which you should diffenetly go check out here - Iphone 3g review  so head over to my channel give it a watch and dont forget to comment, like, share, and subscribe and share it with your friends.

i will also be doing a review on the apps that it comes with as well as my top 3 apps that i use on a frequent basis i will also be doing some reviews on cases for the iphone 3g. I will be doing a review on the new itunes when it launches so keep a eye that.

so thanks for reading, and watching my channel,
cool beans.

Monday, 6 August 2012

Incase you were wondering i have not forgotten about you ipad lovers out their, i found this artical by complete accident but after reading it, it made so much sense. Amazon has released a instant video app for the ipad. here is the original artical posted.

Amazon rolls out a nifty Instant Video app for the iPad

________________________________________

Seemingly out of nowhere (unless I missed a memo) Amazon launched an Instant Video iPad app yesterday. I've often said that Amazon needs to get its video streaming content onto more devices and it's slowly getting there. In addition to the new iPad app you can watch Amazon Instant Video on Roku, Playstation 3, Xbox 360, Tivo, certain Internet-connected TVs and Blu-ray players and of course, the Kindle Fire.

Hmm, maybe it isn't getting there...maybe it has arrived.
The nice thing about Amazon Instant Video is that it offers 'free' content along with your $79/year Amazon Prime subscription (which also offers free 2-day shipping and the Kindle lending library as perks), as well as offering content to rent or purchase on a per item basis. This means you can often get newer content on Amazon than you can on Netflix, providing you're willing to pay for it.
I checked out the iPad app and it works as advertised. One nice bonus feature is the ability to download TV episodes to your iPad; this only works with purchased content but if you're going to be without an Internet connection it'll be a handy option.
Oddly there doesn't seem to be a way to search from the iPad interface, only browse through the categories they decide to show you. Of course your iPad has a perfectly usable browser so it's not a big deal to switch over and set up your Watchlist. Oh, and as expected the iPad supports WhisperSync so you can start watching on one device and finish on another without losing your place.
I find it interesting that Amazon is embracing the iPad, given all the emphasis it's been putting on the Kindle Fire. One of the unique aspects of the Fire was that it was the only tablet that offered Instant Video. Of course the $200 Kindle Fire and the $500+ iPad service different markets. It'll be really interesting to see if Amazon brings Instant Video to Android tablets (particularly the Nexus 7, which is in direct competition with the Kindle Fire).
Anyway, consumers win here. More options for viewing content are always welcome and it's good to see Amazon Instant Video joining Netflix, Hulu Plus and HBO Go on the iPad.

 

Friday, 3 August 2012

The hidden ways mobile sites and free games are killing your battery

You think you know how mobile browsing and games are killing your battery, but it's actually a bunch of unseen inefficiencies.

_____________________________________________________

Chart of mobile website energy usage from Stanford study











Chart via "Who Killed My Battery?"; click for larger view

You know about some of the things that are putting such a hurt on your mobile battery that you can’t hit 4 p.m. without a warning. Streaming music over 3G, for example, or keeping the screen on for long camera sessions. But mobile web sites and certain free apps might be killing your phone’s juice in sneaky ways, according to some recent studies.
At the World Wide Web 2012 conference in Lyon, France, this week, Stanford researchers plan to present , a study of how much power is consumed by mobile browsers on popular websites. They hooked up an Android phone and its battery to a rather geeky-looking monitor, and started surfing the mobile web. Even among those sites that offer mobile-optimized versions, there were some serious battery killers in the crowd: Wikipedia, Tumblr, IMDB, and Blogger, among others.
The main culprits are cascading style sheets (CSS) and JavaScript, which need to be downloaded and parsed by the mobile browser. On Wikipedia’s mobile site, the researchers actually modified the page scripts themselves, and came up with a version that reduced energy usage by around 30 percent, without any change to the content itself. Image formats (using JPG instead of GIF or PNG) make a difference, too, but the real difference is in how you handle interaction. The site that came out looking slim and powerful was Gmail’s mobile site, which uses HTML-based scripts to create an app-like experience, caches what information it can on the phone, and pares everything down for lower processing and data radio demands.
What would really help, the researchers suggest, was if more sites offloaded some of the computation, script-handling, and image scaling to their own servers, rather than asking your phone to handle it. Stanford researchers suggest both front-end proxies (which intercept data from web servers and render them in optimized form for the phone, as on Opera and Skyfire mobile browsers) and back-end servers (which the phone sends data to for processing). And if Google Analytics would allow mobile sites to be cached on the phone, instead of demanding fresh versions on every view for traffic-measuring purposes, that would help a lot, too.

 

Thursday, 2 August 2012

Survey: Drivers like in-car Internet but worry about safety, privacy

Auto makers are now including more connected services in their vehicles and trying to balance them with safety

____________________________________________________

U.S. drivers seem to hold conflicting opinions on in-car Internet access, viewing the technology as a driving hazard and even a threat to privacy while praising the entertainment and safety features it offers.
These opinions, presented in a Harris Interactive poll released Wednesday, come as automakers are seeing increased driver demand for digital technology and are adding more of it to their vehicles.
More than three out of four (76 percent) of the survey's 2,634 respondents answered that in-car connectivity causes too much distraction and is dangerous to have in vehicles. Automakers have gone too far in including this technology in their vehicles, according to 55 percent of those surveyed. U.S. drivers tend to attach strong emotions to their vehicles, and the poll reinforced that view, with 61 percent of people saying their car is "a haven from the outside world" and they don't always need an outside connection.
The auto industry said it understands the technology's potential safety risks and incorporates it in a way that creates the fewest disruptions. Integrating a smartphone into a car reduces the distractions that would be present if the phone was simply placed in the passenger seat, said Wade Newton, director of communications for the Alliance of Automobile Manufacturers (AAM), an automotive trade group whose 12 members include Ford, Mazda, Toyota and General Motors.
"If the phone rings you have to reach over, grab it and see who's calling," he said. "If it is integrated, with one button they can accept the call, turn down the radio and open the speakers."
Integrated mobile phone use was an early example of in-car connectivity. Now the technology can turn vehicles into wireless hotspots, allow people to search the Web from dashboard touchscreens and connect to roadside assistance services by pressing a button.
All auto makers have introduced in-car connectivity features in some degrees and promote them on their websites. When asked to comment on the survey, though, some of the manufacturers declined to comment and others did not respond to interview requests by deadline.
BMW USA did reply to an interview request but could not comment on the survey. However, in an emailed statement, the company said that interest in safe motoring "is a healthy sign that consumers are concerned about distraction while driving, and we consider that a big success."
The statement added that BMW uses "science-based analysis" to incorporate smartphones and other in-car technology into its vehicles. "We have 5 driving simulators that are constantly evaluating the driver experience, plus we do mobile driver clinics in Europe, the U.S., and the Far East to assess driver reactions," the company said.

 

Wednesday, 1 August 2012


NYC Starts Offering Free, Unlimited WiFi Via Payphone Kiosks
___________________________________

    The first WiFi payphone at West 58th and Broadway (Jen Chung/Gothamist)

You may start "using" public payphones a lot more: Today, New York City officials announced a pilot program to provide free, unlimited WiFi to the public through public payphone kiosks. Rahul Merchant, the city's Chief Information and Innovation Officer and Commissioner of the Department of Information, Technology and Telecommunications, noted how offering free broadband access part of the Bloomberg administration's "efforts to promote greater digital inclusion for New Yorkers."
The first location is at West 58th Street and Broadway, near Columbus Circle in Manhattan. The kiosk will say "Free WiFi" on the sides (right now, there are no plans for advertising on the payphone kiosk, but there may be in the future). The other locations in the pilot are:
  • 30-94 Steinway Street, Astoria, Queens
  • 545 Albee Square, Brooklyn
  • 2 Smith Street, Brooklyn
  • 402 West Broadway, Manhattan
  • 458 Seventh Avenue, Manhattan
  • 28 West 48th Street, Manhattan
  • 410 Madison Avenue, Manhattan
  • 1609 Broadway, Manhattan
  • 230 West 95th Street, Manhattan
The goal is to get locations in the Bronx and Staten Island set up soon. The estimated radius of the signal is about 100-200 feet, depending on the location. The city hopes to spread the public WiFi throughout the city—there are over 12,000 payphones in about 9,000 locations. City Councilwoman Gale Brewer, who has previously chaired the Council's technology committee, pointed out that even though the city has been introducing more online access at schools, libraries and senior centers, they aren't open all the time, while this would give 24/7 access to free WiFi.
To access the WiFi on a device, you select the "Free WiFi" option. Then, after you've agreed to accept the terms and conditions, you're taken to the NYCgo.com website, the city's tourism arm, and then you've got free WiFi. A 5-minute YouTube video loaded pretty quickly—perhaps even more quickly than our home Time Warner Cable WiFi.
Merchant, who also announced the DOITT was issuing a RFI asking the public for feedback about what they want from NYC payphones (like would they want 311 services, etc.), did not believe the city's goal was make a profit on the venture, but rather to give a "service" to New Yorkers and visitors. Peter Izzo, senior operations executive at Van Wagner Communications, an outdoor company that owns many payphones, said the cost of installing the WiFi devices was about $2,000 per location, and that the maintenance and ongoing usage costs would be borne by them and other phone companies (a total of 13 companies, such as Van Wagner and Titan Outdoor, operate public payphones; the city regulates all of them).
When asked about crime and potential vandalism, Izzo said payphones were more likely to be damaged by graffiti or "a taxi careening into one" and that vandalism like a missing phone had dropped dramatically. He added that after decades of working with payphones, "you learn something."



Obama Signs Executive Order Giving Him and Federal Government Control of All Forms of Communication Under Any Circumstances
_____________________________________
 
On Friday, July 6, 2012, without any fanfare or publicity, President Barack Obama signed an executive order titled Assignment of National Security and Emergency Preparedness Communications Functions.  Chances are that Obama didn’t want to bring attention to this action because of the power it places in his grasp.

Section 1 of the executive order reads:
“The Federal Government must have the ability to communicate at all times and under all circumstances to carry out its most critical and time sensitive missions. Survivable, resilient, enduring, and effective communications, both domestic and international, are essential to enable the executive branch to communicate within itself and with: the legislative and judicial branches; State, local, territorial, and tribal governments; private sector entities; and the public, allies, and other nations. Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies, and improve national resilience. The views of all levels of government, the private and nonprofit sectors, and the public must inform the development of national security and emergency preparedness (NS/EP) communications policies, programs, and capabilities.”
Basically, this executive order gives the president and Department of Homeland Security the authorization to take over and control any and all lines of communications any time they want to, as spelled out in Section 5.2 of the executive order:
Sec5.2. The Secretary of Homeland Security shall: (a) oversee the development, testing, implementation, and sustainment of NS/EP communications, including: communications that support Continuity of Government; Federal, State, local, territorial, and tribal emergency preparedness and response communications; non-military executive branch communications systems; critical infrastructure protection networks; and non-military communications networks, particularly with respect to prioritization and restoration;

(b) incorporate, integrate, and ensure interoperability and the necessary combination of hardness, redundancy, mobility, connectivity, interoperability, restorability, and security to obtain, to the maximum extent practicable, the survivability of NS/EP communications defined in section 5.2(a) of this order under all circumstances, including conditions of crisis or emergency;”
Some analysts have reviewed the executive order and state that this section gives the Department of Homeland Security the authorization to seize any and all private communications facilities it deems necessary.
The National Communications System defines the communications infrastructure as:
“The communications infrastructure is a complex system of systems that incorporates multiple technologies and services with diverse ownership. The infrastructure includes wireline, wireless, satellite, cable, and broadcasting, and provides the transport networks that support the Internet and other key information systems.”
When you wade through the executive order and other related government documents, you discover that this document gives the president the power to seize and control every form of communication within the United States for any reason they so desire.
Now add this to the National Defense Authorization Act passed by Congress last year that gives the United States government to arrest, detain and hold indefinitely any American without a warrant, formal charges or any reason other than declaring the person is a threat to the nation.  Any detained under this act will be sent to a military run prison and held until such time as the government decides to release them.
I have never been a conspiracy nut and usually avoid those that are, but I can’t help but see the evidence over the past year to indicate that Barack Obama has almost everything in place to allow him to declare martial law and suspend the American way of life.  He has the power to control all forms of communication and detain anyone he wants.  He has purposely driven the economy and job market to the brink of collapse.
As much as I hate to admit it, I honestly believe that if Obama gets re-elected, that he will finalize the economic collapse of America and in so doing, will declare martial law and take control of all communications.  He will arrest and detain anyone who opposes him.  In all likelihood, he will disband Congress, the Supreme Court and stop all elections.  Ultimately, he will declare himself to be the supreme ruler of the nation and assume complete dictatorial control of the country.
This November’s election IS the most important presidential election in the history of America.  It may very well be the last election we will ever have.  I pray I’m wrong, but all of the evidence points to that conclusion.


Tuesday, 31 January 2012

Why SOPA and PIPA Suck, V1.0

Why SOPA and PIPA Suck, v1.0
Published by: senjespar, on 2011-12-29 12:36:56
"Why SOPA and PIPA Suck" - A quick-start guide to how this legislation may very well miss up the internet.

This was originally written as a textfile, so I apologize if the formatting is off.

***DISCLAIMER*** I threw this together quickly, in an effort to get the information out there. I attempted to ensure the technical accuracy of the information, and provide adequate resources so that
interested individuals could easily dig deeper into this matter. I apologize for any errors in grammar, technical information, or general stupidity. It's been a long day. If you find any errors, please let me know.

|||===================================================================
||| I. INTRODUCTION
|||===================================================================
The "Stop Online Privacy Act" (aka "SOPA", H.B. 3261) is a bill that was proposed to help fight
online piracy, such as counterfeit goods and intellectual property/copyright infringement. -[1,2]-Although
there has been much speculation in the online communities about what specific methods would be used to
block "bad" sites, a lot of attention has been placed on DNS filtering, and therefore will be the focus
of this pastebin. Also of interest is the Preventing Real Online Threats to Economic Creativity and Theft
of Intellectual Property Act of 2011 (aka "PROTECT IP", S.968). -[4]-The PROTECT IP Act is a similar bill
which was started in the Senate.

In an article dated November 18th, 2011, CNET quotes Markham Erickson, who states:

"It would cover IP blocking...I think it contemplates deep packet inspection." -[3]-

Assuming the legislation passes (in either form), there are a number of ways to go about blocking
these terrible websites that are causing so much harm. The first method I will present is the DNS filter -
in short, this is a rather ineffective method of filtering, and may end up actually "breaking" the web.
But more on that later.

Another, more effective method, is IP blocking - in other words, your ISP (Verizon, Comcast, etc.) would
receive a notice to block all requests for a certain IP address. In effect, the Peoples Republic of
America could make any site (or computer for that matter) essentially disappear from the internet.

The last method I will quickly mention is "deep packet inspection". This is a method that China uses
to block their subjects from seeing anything "harmful" to their state interests.* -[6]- In brief, deep
packet inspection involves the government reading NEARLY EVERY SINGLE BIT OF DATA that you send or view
online. This, in my opinion, is the only truly effective way of enforcing censorship, and comes at the
price of Big Brother regularly viewing and scanning each and every word, picture and file that is
transmitted via the internet. If this sounds like universal wiretapping to you, then you are right. In
2008, a bipartisan group of representatives denounced NebuAds attempts at deep packet inspection,
stating it was "flatly illegal". -[7]- Flatly illegal, that is, unless it's Congress trying to do it.

***DISCLAIMER: OPINION***
It is often difficult for us average folk to sympathize with the billionaire performers in
Hollywood and RIAA/MPAA who claim that we are stealing from them and compromising profits. We often defend
this point with "Kanye/Britney/whomever can afford to lose that $0.99 I would pay on iTunes", which they
undoubtedly can. They are correct - it is stealing, plain and simple. However, you dont see blanket
legislation that infringes our basic privacy for any other crime, like shoplifting. In fact, I would be
willing to bet that, dollar-for-dollar, more money is lost in the retail world through petty theft each
year than in the music/movie industry. To the best of my knowledge, Congress has never enacted this type
of blanket legislation that invades our privacy - except in the name of combating terrorism, of course.

One more quick note - I know, I know. I used Wikipedia for several sources. Fuck off, this isn't a
scholarly paper, its a quick-start guide for folks who are not familiar with the technical implications
of this legislation.

|||===================================================================
||| II. WHAT IS "DNS"?
|||===================================================================
DNS stands for "Domain Name System", which is a system of servers that routes internet traffic,
making it easier for humans to navigate to their favorite websites. The DNS allows us to type in a URL,
such as "www.example.com" and arrive at the website, rather than remember an IP address (123.456.789.00).

In a simplified example, your computer queries a DNS server to ask directions to a website. Your computer
has a list of pre-defined servers to ask first - usually set by your ISP (e.g., Comcast) in order to
speed up your internet service.

This DNS lookup sounds something like this:

COMPUTER: "Hey, anyone know where "foo.com" is at?"
DNS SERV: "Yeah, try 123.456.78.90."
[COMPUTER looks at 123.456.78.90]
SERV 2: "Can I help you?"
COMPUTER: "Yeah, I am looking for "foo.com". Any idea where it's at?"
SERV 2: "Sure, its over at 444.555.66.77."
[COMPUTER connects to foo.com]

In this conversation, the DNS SERV would be the first place your computer would ask for directions - this
is typically determined by your computer's settings and your ISP. This server would in turn reply with
a server who can give better directions, or maybe it knows by itself. Typically, you are routed several
times.

In short, the DNS is often likened to a "map" or "phonebook" for the internet world. It lets us browse
to the correct sites by simply remembering the (hopefully) human-friendly URL. Without the DNS, we
would not necessarily be lost, we would just have to keep a hard copy directory that lists the website and its
respective IP address.


|||===================================================================
||| III. WHAT IS "DNS FILTERING"?
|||===================================================================

DNS filtering is commonly employed by companies, educational institutions and other places which
may not want their employees or students accessing non-work-related sites, commonly social media and
pornography sites. DNS filtering works by pointing your computer to the filter as the DNS server. The
filter is the first server your computer will ask for directions. This server recognizes that you are
trying to access a forbidden site, and gives your computer bad directions - usually to that "This webpage
is blocked" page.

|||===================================================================
||| IV. CIRCUMVENTION OF DNS FILTERING
|||===================================================================

The easiest way to circumvent DNS filtering is by accessing the site directly by IP. Instead of
typing "google.com" into your address bar, try typing "http://74.125.113.104/". You should arrive at the
same page. By doing this, your computer does not need directions, because you gave it the exact address
to go to. Unfortunately, this does not always work, because many sites use various forms of redirection
and other sites to host their content. For example, Twitter (IP: http://199.59.149.230/) also uses a site
called twimg.com to store images and style/layout data. Most DNS filters will block these sub-components,
resulting in the page loading incorrectly.

To fix this, we can modify the HOSTS file, which is on virtually every operating system. The
HOSTS file is typically empty, but can act as a map or phonebook for your computer, in lieu of, or to
supplement, the DNS. By adding websites and their IP addresses to the HOSTS file, our computer no longer
needs to query the DNS for directions. While editing your HOSTS file can result in loss of some internet
connectivity if done incorrectly, it's not much more difficult than using proper grammar in an e-mail.

There is also the possibility of manually setting your computer to point to DNS servers that will
give you the answers you want. For example, you could point your computer to DNS servers outside the USA
that would return the correct IP address for a blocked website, thereby completely circumventing any
filtering that the government puts into place.

Finally, there are several browser plug-ins and programs that will attempt to resolve the IP
address for you, without consulting the DNS. These were specifically developed to circumvent internet
censorship. Tor is a common program that is used by Chinese citizens to get past their governments
censors. You can download Tor at https://www.torproject.org. You may need to download the "bridge"
portion of the program, too.

|||===================================================================
||| V. SECURITY RISKS CREATED BY GLOBAL DNS FILTERING
|||===================================================================

If you have not guessed by now, users WILL circumvent any DNS filtering that the US puts into
effect. However, as anyone who has ever gotten one of those pesky "redirect viruses" knows, this poses
major security risks.

First and foremost, the sheer number of users desperate to download the latest song or movie will
eventually click on ANYTHING that lets them download what they want. There are a number of studies online
that show with overwhelming evidence that most internet users are not the smartest, and despite knowing
that a link or file may contain a virus, will click on it anyway. Feel free to google for this data.

A malicious user could easily craft a script to modify the HOSTS file on your computer to point
your bank website to a phishing site, under the guise of giving you access to pirated media. Also, a
malicious user could give you erroneous DNS information, claiming it would give you access to the sites
you want. However, you are now routing ALL of you internet traffic through THEIR servers. This should
immediately be a red flag to anyone who has ever heard the words "computer" and "security". -[8]-

There are several other major risks involved, and I will refer you to a Technical Whitepaper -[9]-
for more details. The last one I will touch upon is the fact that such widespread DNS filtering and
redirection could very well "break the internet". If you use online banking, or sites like eBay or Amazon
you are already familiar with secure browsing. Most sites currently use some form of authentication,
typically in the form of SSL (HTTPS), certificates, etc. A better solution has been proposed, which is
DNSSEC (DNS Security Extensions) -[10]-. In short, the governments interference with the DNS will cause
a break in the chain of trust - similar to a problem you have probably already encountered when your
browser gives you the "You are about to be redirected to a connection that is not secure." error.

Finally, there are several other concerns, and I will again refer you to the Whitepaper (-[9]-) for
further detailed explanation. You should now be familiar with some of the basic principles, and how
these acts could very well destroy the internet as we know it today, as well as create a giant step
backwards in internet security. I should take this time to once again state that I do not have a problem
enforcing illegal downloads, as it is technically theft, but I believe that, once again, Congress has
given in to lobbyists and created blanket legislation in the interests of one single group, thus
continuing to neglect the rights of the American people.

|||===================================================================
||| VI. REFERENCES, RESOURCES AND OTHER PROOF THAT I AM NOT PULLING THIS OUT OF MY ASS
|||===================================================================

[1] Bill Text: 112th Congress (2011-2012) H.R. 3261 -- Stop Online Privacy Act
---> http://thomas.loc.gov/cgi-bin/query/z?c112:H.R.3261:
(Accessed 19-DEC-2011)

[2] "Stop Online Privacy Act" (Wikipedia)
---> http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act
(Accessed 19-DEC-2011)

[3] "SOPA's Latest Threat: IP blocking, privacy-busting packet inspection" Pub: 18-NOV-2011
---> http://news.cnet.com/8301-31921_3-57328045-281/
sopas-latest-threat-ip-blocking-privacy-busting-packet-inspection/
(Accessed 19-DEC-2011)

[4] Bill Text: 112th Congress (2011-2012) S.968 -- Preventing Real Online Threats to Economic
Creativity and Theft of Intellectual Property
---> http://thomas.loc.gov/cgi-bin/bdquery/z?d112:s.00968:
(Accessed 19-DEC-2011)

[5] "PROTECT IP Act" (Wikipedia)
---> http://en.wikipedia.org/wiki/PROTECT_IP_Act
(Accessed 19-DEC-2011)

[6] "Deep Packet Inspection" (Wikipedia)
---> http://en.wikipedia.org/wiki/Deep_packet_inspection
(Accessed 19-DEC-2011)

[7] "NebuAd Grilled Over Hot Coals in Congress on Privacy" Pub: 17-JUL-2008
---> http://news.cnet.com/8301-13578_3-9993554-38.html
(Accessed 19-DEC-2011)

[8] "What is a host hijack?"
---> http://www.adoko.com/hijackers-host.html
(Accessed 19-DEC-2011)

[9] "Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP
Bill - A Technical Whitepaper" Pub: May 2011
---> http://www.circleid.com/pdf/PROTECT-IP-Technical-Whitepaper-Final.pdf
(Accessed 19-DEC-2011)

[10] "Domain Name Service Security Extensions" (Wikipedia)
---> http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions
(Accessed 19-DEC-2011)