BlogHotel.orgAccueil | Créer un blog | Imprimer la page Imprimer | Blog hasard Au hasard | Chercher des blogs Rechercher | Entrer dans le chat du blog Chat | | Jeux Jeux | Adminitration et édition du Blog Manager

http://www.kaufen-akku.com

Accueil - Profil - Archives - Amis

Lenovo IdeaPad Y471 Battery www.all-laptopbattery.com

Posté le 18/1/2018 à 06:41 - poster un commentaire

Since Nadella slashed into the former Nokia business and pulled smartphone activities back to fewer models and markets, the main focus is the enterprise space, and the idea that W10 smartphones can be companions to their more successful tablet and PC stablemates – an argument often used by Apple, of course, which believes that adoption of one of its devices nearly always leads to the uptake of others. It is a cornerstone of the W10 strategy – and another borrowing from Apple – that the new Microsoft OS should do the same, providing a sufficiently enticing user experience for customers to want it on all their screens, and offering the simplicity of a single set of apps and interfaces on each one.These devices promise to fuel even more enthusiasm and opportunity for the entire Windows ecosystem, claimed Nadella in a statement, while devices chief Panos Panay went further, claiming that the W10 handset would be a natural extension of the huge in-stalled base for the operating system on other products.Now, we want to put Windows in your pocket, he said. 110 million people using Windows 10 right now. If you haven't thought about these phones, wake up! Spend a minute, with the universal apps coming. 110 million users in eight weeks - the opportunity is unbelievable.

Microsoft has been gradually moving towards a unified experience across all screens, building on the Universal Apps platform that first appeared in Windows 8. Facebook, Instagram and Uber were among those announcing Universal Apps which work in the same way across different W10 devices. Also, with a new Display Dock, users can connect a Lumia to a monitor, keyboard and mouse, turning the smartphone into a small desktop PC.Like Apple again, Microsoft has announced a flagship smartphone in two screen sizes. Both the 5.2-inch Lumia 950 and 5.7-inch Lumia 950 XL have 20-megapixel cameras with high level imaging functionality (a key Nokia strength), including 4K UHD video capture. The handsets run on Snapdragon 808 and 810 processor and cost $549 and $649 respectively. They are due to go on sale in November.Pumped up by a (claimed) $1bn in profit in 2015, Chinese phone-maker Xiaomi will start selling Linux laptops early next year, according to a report.DigiTimes suggests that two models will be built by contract manufacturers, Inventec and Compal, and feature 12.5 inch and 13.3 inch displays.According to the trade paper, Xiaomi has been tapping up Lenovo executives aggressively to manage the new laptop venture.

The consumer electronics upstart is best known for selling smartphones at cost, or close to cost price, a strategy that allowed it grab the No.3 spot in vendor market share worldwide.It's currently slipped to No 5, and Huawei has clawed back top spot in the PRC in the most recent quarter.Xiaomi already produces a curious mix of white goods, networking kit and consumer electronics, ranging from an air humidifier to routers, TVs, and a fitness band. So why not?There's no indication that Xiaomi will impact Western buyers, but as we've seen with phones, the volumes generated in the highly competitive Chinese market can have a dramatic impact. Popular apps like Facebook and WhatsApp, combined with weaknesses in LTE protocols, could help spooks or attackers locate users, a group of German and Finnish researchers have found.The problem, however, isn't the apps, but the network protocols they use. The work, here at Arxiv, details how LTE protocols can be attacked to deny service to a target's device; and how the network can be persuaded to leak device locations.The location problem is this: the social apps – and other applications, like Voice over LTE – generate broadcast “paging” messages from the network to the device, and the supposedly-anonymous Global Unique Temporary ID given to devices by the network lasts so long (up to three days) that it's easy to de-anonymise devices.

Those messages have always existed, but as the group writes here, in the 3G world the broadcasts covered areas of 100 km2, which isn't so useful for tracking a user.The designers of LTE wanted better user location, so broadcast activity is now confined to the much-more-snoopable 2 km2 – and building kit to sniff all the broadcast messages a network transmits is relatively easy. The boffins needed only a laptop running open-source LTE baseband software, and a suitable software-defined radio card.In Facebook, the paging messages are triggered by incoming messages, and in WhatsApp, they're generated to tell you that the other person in a conversation is typing. Since the broadcast message only reaches the cell you're connected to, watching those broadcasts gives an attacker your location within that cell.The other key to the location attack is to get the network to leak a user's IMSI, but the authors say there are a variety of existing attacks that will do this. With IMSI and user presence in hand, it's then easy to refine location to a much finer degree, by getting users to log into a rogue cell (think “Stingray”).

Luckily, the authors note, the fix for the location tracking bug should be easy enough for operators: if they cycle GUTIs often enough (a pain in the neck if operators have to comply with data retention, but there you go), it becomes impossible to associate paging messages with a specific individual.The over-the-air denial-of-service attacks the paper presents are based on LTE network signalling messages that aren't protected – “Tracking Area Update” (TAU) messages.Because LTE devices don't check the integrity of these messages, the messages can be sent from a rogue access point to force downgrade or deny services either to a specific device, or all devices in reach of the attacker.The DoS attacks are a much thornier problem: forcing authentication of all the network messages requires at least infrastructure upgrades, and in some cases, new LTE protocols. Powerful malware with speculative National Security Agency (NSA) links has infected the private laptop of Germany's secretary of state in the Federal Chancellery, according to reports by national news digger Der Spiegel.The Regin-derived malware in question is thought to be a plugin dubbed Qwerty, used in the NSA's WarriorPride framework.

That connection is based on Snowden documents and deep technical analysis that also shows Regin bears links to the infamous Stuxnet malware and spin-offs Flame and Duqu, as well as the long-running and truly advanced Equation hacking group which has operated for some 15 years and infected hundreds of targets.The current Chancellery chief is Peter Altmaier, who has held office since 2013. The Chancellery is charged with assisting the German Chancellor, presently Mrs Angela Merkel.Der Spiegel does not specify who was in the seat when the attacks occurred but says the compromise was discovered in 2014.Germany's federal prosecutor's office is investigating the attacks but has not provided a timeline for the probe.News of the alleged infection comes after the country's former Attorney General Harald Range dropped a probe into the alleged tapping of Chancellor Merkel's mobile phone revealed in October 2013.Merkel was also thought to be the first of multiple German Government officials to be compromised by Russian-based actors who used her computer to spread a trojan thought to have ultimately infected some 20,000 systems.

Windows 10 has its benefits but not everyone is willing to stomach the force-fed upgrade. This week a Reg hack found out the hard way that latest Microsoft OS had knackered his laptop's mic and webcam, preventing him from using Skype properly.Microsoft says users who have selected the do not notify me again option or who have manually disabled notifications through registry key settings will not see the update, as will those who have previously uninstalled Windows 10, have had a failed installation, or don't have PCs that can support the new OS.This comes as Microsoft has been widely criticized for forcing the Windows 10 upgrade on folks and popping up migration screens at wildly inappropriate times. It's hoped that after the free period is over, and you'll have to pay for Windows 10, Microsoft will dial down its efforts to cram its software onto people's machines. A West Midlands man who bought gun parts on the so-called Dark Web has been sentenced to 10 months in prison.

Moynul Haque, 21, paid about £900 in Bitcoins for the slide, barrel and recoil spring of a Glock 9mm pistol.The unnamed seller hid the parts in an antique radio and posted it to Haque from an address in Michigan.The parcel was intercepted by US customs officials, who promptly contacted the UK’s National Crime Agency. The NCA searched Haque’s home in Smethwick and seized a laptop and a small quantity of amphetamines.With the assistance of the West Midlands Police Cyber Crime Unit, they found that Haque had tried to check the status of the parcel sent from the US.Haque paid well over the odds for the parts. And his motives remain a mystery, according to local paper The Express and Star's court report.Prosecutor Philip Beardwell said: There is no evidence he was part of a network or received money to buy the parts on someone else's behalf. There is equally no evidence of any links to terror groups. It is a very curious case.According to Haque's defence counsel, he was unemployed when he purchased the gun parts – and playing a lot of video games. His somewhat reclusive client may have simply not thought through the full extent of what he is doing when ordering the parts, The Express and Star reported.


« Précédent :: Suivant »

Blog suivant >> Signaler un abus?Haut de page