Windows 10 Free For All

Even for PIRATED VERSIONS of Windows

Windows 10 For Phone

Microsoft Revealed What's New In Windows 10 For Phones

Featured Post

POWER MANAGER - A WINDOWS APPLICATION

Do you find it difficult to change the power plan while plugging in or plugging out your laptop? If yes, then keep reading. I am writing t...

Pages

POWER MANAGER - A WINDOWS APPLICATION

Do you find it difficult to change the power plan while plugging in or plugging out your laptop? If yes, then keep reading. I am writing this to introduce my third application. (Other two are nProxy and VMware Disk Utility)

Power Manager is an application which automatically switches your power plan according to your settings. For example, you want Balanced mode when running on battery, and High Performance when plugged in. The application will do it for you automatically. Just fire the application once, save your settings, and it will take care of it.

The application has a feature to check for updates, so you will be notified when a new version is available. You can also report any bug that you encounter. The application is absolutely free with no-ads. I have developed this application out of my passion for Computer Science and I want to share this with the masses.

Download it from below and share it among your friends.

MACS ARE VULNERABLE TO THUNDERSTRIKE 2 FIRMWARE MALWARE

Macs have long been said to be immune to viruses and malware -- but there is a long list of vulnerabilities that show this to be a false. Apple's claims that its hardware was not vulnerable to the firmware security flaws as PCs is proven wrong.

At the InfoSec event in Las Vegas which focuses on different security topics, Trammell Hudson, Xeno Kovah, and Corey Kallenberg will show that Macs are just as vulnerable to remote attacks as PCs using the Thunderstrike 2 backdoor.

Thunderstrike 2 is impressive in its efficacy. The malware can be remotely installed and can spread between Macs even if they are not connected. Thunderstrike 2 locks itself into firmware which makes it impossible to remove even after reinstalling OS X. Security software are unable to detect it. Xeno Kovah says:
For most users that's really a throw-your-machine-away kind of situation. Most people and organizations don't have the wherewithal to physically open up their machine and electrically reprogram the chip
Apple has previously stated that in order to become infected with firmware malware, direct physical access to a Mac is required. Although there is a wide-spread belief that Macs are more secure than PCs. There are far more PCs in use than Macs, so it make sense to hit as many system as possible with PC-specific attacks.

What do you think about Thunderstrike2 vulnerability? Let me in the comments.

VMWare Disk Utility v2.0

Today, I am releasing the version 2 of VMware Disk Utility. It contains bugs fixes and other features implementation such as
  1. Bug reporting
  2. Checking for update
If you are using version 1, you will have to manually download the latest version from here because the earlier version did not include Check for update feature. This has been fixed in this release and future updates will be available from the application. I apologize for the inconvenience. 

What is VMWare Disk Utility?

A few days back, I wanted to merge multiple vmdk disk files into a single one. I look around the internet and did the job. It was all console based so I decided to make a GUI for it.

The program uses the functionality of the vmware-disk-manager which is a part of VMware workstation. It is just like a wrapper-class that provides an interface to use the mentioned software with ease.

When you run the application, what you see is vmware-disk-manager presented to you with a graphical user interface. The hard part stays behind while you easily merge the vmdk disk files with just 3 clicks.

You can download the program from the links below:
Your feedback is appreciated. If you find any bug, report it from the application or comment below

ANOTHER SERIOUS ANDROID VULNERABILITY DISCOVERY

A famous security company Trend Micro has found another vulnerability in Android which can send your device into totally non-functioning state. This is inconvenient, and can also be proven deadly.

Trend Micro says
"We have discovered a vulnerability in Android that can render a phone apparently dead -- silent, unable to make calls, with a lifeless screen. This vulnerability is present from Android 4.3 (Jelly Bean) up to the current version, Android 5.1.1 (Lollipop). Combined, these versions account for more than half of Android devices in use today. No patch has been issued in the Android Open Source Project (AOSP) code by the Android Engineering Team to fix this vulnerability since we reported it in late May"
The company further explains,
"the vulnerability lies in the mediaserver service, which is used by Android to index media files that are located on the Android device. This service cannot correctly process a malformed video file using the Matroska container (usually with the .mkv extension). When the process opens a malformed MKV file, the service may crash (and with it, the rest of the operating system). The vulnerability is caused by an integer overflow when the mediaserver service parses an MKV file. It reads memory out of buffer or writes data to NULL address when parsing audio data"
The worst part is that this is affecting many versions of the operating system-- Jellybean 4.3, to Lollipop 5.1.1.

Even worst is that Trend Micro reported this to Google in May and the company merely categorized it as a "low priority".

Does this vulnerability make you worry about your Android phone or tablet?
Tell me in the comments.

Source: Betanews

n-Proxy - A Part Of Project For All Initiative

Proxy Servers are a great way to secure the communication between client and server. It is often used at offices, educational institutes such as college and universities, or even homes. However, changing the proxy settings on computer whenever you move from office to college to home can be troublesome. For this reason, I have made an application that will automatically set the proxy server settings on based on the connected Wi-Fi name (SSID).

n-Proxy

First time when you will run this application, enter all the proxy settings for the respective SSIDs (names of Wi-Fi) and let the application run in the background. It will monitor for changes in connected network and set/reset proxy accordingly.

This application is completely free and does not show ads. Download it and give your feedback.

Features

In the first release, I have implemented the basic necessary features. I have plans to update it according to feedback.

The current features include:
1. Add as many proxy settings as you want
2. Set a specific proxy setting from the list
3. Real-time Monitoring
4. Delete a selected proxy server setting
5. Delete all added proxy server settings
6. Check for update
7. Report a bug

Version 2.1 is available
nProxy v 2.1.0 is available with new features and improvements.The new version will be available to download to older version. Check for updates if you are already using nProxy or download from the link below.

1. New Installer
2. New Icon
3. New Interface Design
4. Add to startup
5. Bug Fixes and Improvement

Version 2.1.1 is available
A new version of n-Proxy was released fixing some minor issues and improving the overall performance of the program.

If you find any bug/issue, please report it from the application. Your feedback will help me make this application better.


I believe this application will be helpful to the users.

Please note that this application currently supports Chrome/Internet Explorer/Opera and other browsers which use Windows proxy server settings. Firefox is not currently supported.

Download Links (For version 2.1.1)

Download Link

Your feedback is appreciated. If you find any bug, report it from the application or comment below.

6 REASONS TO KEEP YOUR OLD PC INSTEAD OF UPGRADING

New PCs cost hundreds of dollars, and we can all use more money in our pockets. Ask yourself if you really need that new hardware, or just want it. Before you decide to buy a new computer, read this article.

Unless you are a hardcore gamer, or a master in 3D designing and animation, buying a new machine might not be really necessary. Read along to find out what you can do with your old PC instead of buying a new one.

1. Your old PC still works just fine

You don’t need a ton of processing power to perform the daily computing tasks. You can stream 1080p video, sling email, surf internet, and edit Office documents on your old PCs. 

Also consider that processor performance increases have trailed off dramatically over the years. Earlier, CPU performance could leap by more than 30% every year, but since the past decade it’s no more the case. New processors tend to be only 5 to 10% faster than their predecessors, and clock speeds have largely remained stagnant.

Linley Gwennap, the principal analyst at the Linley Group stated
“You can hold onto your PC five, six, seven years with no problem. Yeah, it might be a little slow, but not enough to really show up [in everyday use]" 
 2. Give your old PC a speed boost


PCs don’t slow down over time. It’s the software part that make things slower. It can be Windows installation that’s just become unstable after years of use; or it can be malware residing inside the operating system. When a system gets slower, check for viruses and corruption in the files of the operating system. Google the internet you and will find free ways to make your old PC run faster.

Keep your system up-to-date and install an antivirus. Read this about anti virus programs.

3. Install an SSD

Upgrading to an SSD can make any old PC with a lazy mechanical hard drive feels better than new again. Moving from a hard drive to a SSD fills your PC, from boot times to application launch times to browsing files. Investing in an SSD is hands-down the smartest upgrade any PC user can make.

You can now pick up new SSDs for under $100—depending the amount of storage space.

4. Windows 10 is old PC’s Best Friend

While new hardware used to be necessary for the newest versions of Windows, it is no longer the case. Microsoft’s pushing hard to fit Windows into cheap devices with low specification. Windows 8 performed well on lower end PCs excluding some of old processors and outdated motherboards.

Microsoft really wants everybody to upgrade to Windows 10 rather than sticking to on older operating systems. The Redmond based corporation will offer Windows 10 as a free upgrade to all Windows 7 and 8 users.

5. Linux is lighter Than XP?

If you are still using an operating system that died a year ago, i.e. Windows XP, you should really dump it for security’s sake. That doesn’t mean you need a new PC to do so, however.

Older Windows XP machines might not meet the system requirements to upgrade to a more modern version of Microsoft’s operating system, but Linux demands far less from hardware. There are 3 distributions of Linux that have designed specifically for lower-end machines. Ubuntu, Zorin OS, LXLE are the 3 operating systems that you can run on your XP-machine.

6. The World of Web Apps

Now a days, you might not even need to use desktop software. More and more services are available in the form of web apps, rather than standalone desktop software. Email, presentation creation, banking, video chatting, and more are all possible from your web browser these days. Even Office and Photoshop have online versions now.

If you spend the majority of your time online, buying a new PC won’t really offer much of a performance increase, unless your computer is particularly ancient. You’d be better off spending that money on a faster Internet connection.

Read my post for the PC Gamers: Can We Build A Gaming PC on Console Budget?

Source: PCworld

VMWARE DISK UTILITY - A SMALL PROJECT

When it comes to virtualization on the desktop, two products stand front and center: VMware Workstation and VirtualBox. VMware is the long-standing original keeper of the flame, from the company that gave us PC-centric virtualization technology as we know it. The latter is an open source project now under the stewardship of Oracle, with its own strongly competitive set of features.

I personally use VMware however, I am not comparing the two software. A few days back, I wanted to merge multiple vmdk disk files into a single one. I look around the internet and did the job. It was all console based so I decided to make a UI for it.

The program uses the functionality of the vmware-disk-manager which is a part of VMware workstation. It is just like a wrapper-class that provides an interface to use the mentioned software with ease.

When you run the application, what you see is vmware-disk-manager presented to you with a graphical user interface. The hard part stays behind the scene while you easily merge the vmdk disk files with just 3 clicks.

Expert users might like the old command-line way to merge the files, this program can be alot of help for the users who wants to get the job done.

You can download the program from the links below:
Please note, I have made sure to make this a perfect release, there still can be a bug in the software. If you found any, let me know in the comments.

PIRATES CAN UPGRADE TO WINDOWS 10 FOR FREE

We knew Windows 10 will be a free upgrade but now Microsoft has acknowledged that even the users running the pirated versions of Windows will be able to upgrade to Windows 10.

Speaking to Reuters the Windows chief said:
"We are upgrading all qualified PCs, genuine and non-genuine, to Windows 10".
Microsoft later expanded on this by saying:
"Anyone with a qualified device can upgrade to Windows 10, including those with pirated copies of Windows".
This sounds like that Microsoft has given up the fight against the piracy. Upon further clarification, Microsoft’s spokesperson said:

"We have always been committed to ensuring that customers have the best Windows experience possible.  With Windows 10, although non-Genuine PCs may be able to upgrade to Windows 10, the upgrade will not change the genuine state of the license. Non-Genuine Windows is not published by Microsoft. It is not properly licensed, or supported by Microsoft or a trusted partner. If a device was considered non-genuine or mislicensed prior to the upgrade, that device will continue to be considered non-genuine or mislicensed after the upgrade. According to industry experts, use of pirated software, including Non-Genuine Windows, results in a higher risk of malware, fraud (identity theft, credit card theft, etc), public exposure of your personal information, and a higher risk for poor performance or feature malfunctions".
Microsoft is deviating from its regular sales model for the first time, giving away Windows 10 for free, at least for the first year. With the latest announcement about Windows 10, Microsoft has completely eliminated the need to pirate the software. It's free for everyone, even those with illegal copies, but it seems pirates won’t get the full benefit.

MICROSOFT ANNOUNCES THE NEW MOST AFFORDABLE LUMIA 430



Microsoft announces Lumia 430 dual-SIM Windows Phone. This super-budget dual SIM phone will hit the markets of India, the Middle East and Africa, Asia-Pacific, Russia, Kazakhstan, and Belarus all for just $70 USD in April.


Microsoft has not cut back in the critical areas of smartphones that are important these days. The Lumia 430 has 1 GB of RAM, 8 GB internal storage (micro SD expansion) and both rear and front-facing cameras. The device is also eligible to get Windows 10 later this year.


Specifications

  • Colors: Orange or Black 
  • Qualcomm Snapdragon 200 1.2 GHz dual-core processor 
  • 4-inch WVGA (800 x480) LCD at 235 PPI  
  • Networks: GSM/EDGE: 850/900/1800/1900 MHz WCDMA: 900/2100 MHz 
  • 1GB RAM 
  • 8 GB internal storage; micro SD up to 128 GB, 30 GB free OneDrive cloud storage 
  • 2 MP fixed-focus rear camera; 0.3 MP VGA front-facing camera 
  • Sensors: Accelerometer, Proximity, Ambient Light Sensor 
  • 1500 mAh removable battery 
  • BT 4.0, USB 2.0 Micro-USB connector, A-GPS+GLONASS 
  • WLAN 802.11 b/g/n 
  • Size: 120.5 x 63.19 x 10.63 (volumetric) mm 
  • Weight: 127.9 g 
  • Standby time: up to 24 days (576 hours); Talk time: up to 7.6 hours (GSM) up to 8.4 hours (3G) 
In a press release, Jo Harlow, Microsoft's corporate vice president for Phones said:
"People around the world have responded enthusiastically to our affordable Lumia range. We continue to invest in this segment to ensure that as many people as possible can enjoy signature Microsoft experiences, regardless of budget.The Lumia 430 Dual SIM continues our commitment to combining the right hardware, software, services and apps with the right price to give people a smartphone they can afford and be proud to use."
Lumia 430 looks like a fixed version of Lumia 530 which doesn't have Proximity and Ambient Light sensors, front-facing camera, and only have 512 MB of RAM. 4-inch display will be good for those who don't like to hold a big-screen in their hand.

With it's size and price, it will be good option for anyone who is willing to give Windows Phone a try. We have seen in the past, that budget phone, such as Lumia 520, are a successful hit in the market 

NEW WINDOWS 10 BUILDS HAVE IMPROVED WI-FI SELECTION

Windows 10 build 10036 has started to show up around the internet and there are a couple of enhancements. In the builds prior to 10036, when you click on the 'Wi-Fi' option in the Action center, it opens up a full Settings app.

If you look at the image below, you can see that this new build has an updated Wi-Fi selection Window with a new design. You can see that a smaller window opens to make selecting a new network faster.


Source: Neowin

WINDOWS 10 SEEMS TO HAVE PEER-TO-PEER UPDATING SUPPORT

A leak image of Windows 10 build 10036 (shown below) shows a setting option that allows user to download app and OS updates from Microsoft, PCs on your local network as well as PCs on the internet.
Windows 10 Leaked Settings screenshot. Source: Neowin
This can speed up the download process for users while reducing the stress on the Microsoft's servers too. For Microsoft, it's surely positive step. Microsoft hasn't provide any details about this new feature so we have to keep our fingers crossed. For now, it does look like this functionality is coming to Windows 10.

Source: Neowin

FRIDAY THE 13TH - COMPUTER VIRUS



Friday the 13th is considered to be unlucky day in Western superstition. It is also termed as Black Friday. For computer users, especially tech experts, Friday the 13th is also notable date because of the infamous malware.

Friday The 13th is one of the oldest viruses. Some users believe that it may be extinct. However, some virus researchers still have some copies in hand. The original virus is 419 bytes long, but several minor variants are known, with slightly different lengths like the Lehigh virus.

History

Friday the 13th malware is also known as virus Jerusalem. It is said to be created in Israel in 1988 to celebrate the 40th anniversary of the creation of the Jewish state. Some people are of the opinion that the virus was designed by someone religious or superstitious.

The virus was simply activated when the calendar hit Friday the 13th. All the programs and files that were being used would be infected and eliminated.

There was no  specific method to spread the virus, but it was done through then normal systems like floppies, CD-ROM or as email attachments.

In the late 1980s, it was the leading virus attacking computers around the world.

How It Worked

  • Infects files with extensions of COM, EXE or SYS
  • Increases the file size whenever the file is executed
  • Reduces the memory available on the computer
  • Causes your computer system to slow down

Variants

Virus-B
A variant where the destructive part has been disabled and which was distributed for demonstration purposes.

ENET 37
This 613 byte virus contains the text:
ENET N§37 Virus benigno - Por EDGE BAND! Realizado por un alumno del Enet 37 (?) 25/5/92 ..Hmmm.. Te parece usar la computadora un Domingo? Presiona una tecla.
Other variants of the Jerusalem virus included additional effects, such as cryptic slogans populating the command line interface. While other versions restricted the execution of programs during specific days of the week, such as Saturday and Sunday.

Slowly, the virus stopped causing problems for newer operating systems. During the late 80's it contributed to some serious computer crashes around the world.

 Sources: techopedia, pandasecurity, f-secure

MICROSOFT REVEALS ITS WINDOWS 10 UNIVERSAL APPS PLANS



At the Mobile World Congress, Microsoft took some time to reveal some its Windows 10 universal app plans to developers present at the conference.

Microsoft wants developers to make apps for the Windows that will work on everything from small screens of smartphones to the Xbox One console to upcoming large screen devices like Surface Hub.

In a blog post today, Microsoft's Kevin Gallo stated:
"As we built the universal app platform, we set out to ensure that all Windows developers would equally benefit from this one core. The platform enables a new class of Windows universal apps – apps that are truly written once, with one set of business logic and one UI. Apps that are delivered to one Store within one package. Apps that are able to reach every Windows 10 device the developer wants to reach. Apps that feel consistent and familiar to the customer on all devices, while also contextually appropriate to each device's input model and screen size. The new universal app platform completes our developer platform convergence by providing you with the ability to finally create one app that can run on mobile, desktop, console, holographic, and even IoT devices."
Interacting with an app on a small smartphone touchscreen is different than using the same app on a larger tablet or the Xbox One. Gallo wrote:
"Windows 10 will determine, at runtime, how the customer is interacting with your app and render the appropriate user experience (e.g. on a laptop with a touch-screen, an app fly-out control will provide larger touch-targets if tapped with touch, as opposed to clicked with a mouse)."
Developers can even repackage their website as an app and will have an easier experience with Windows 10.
"Once installed, your website can update and call Universal APIs from JavaScript, creating a more engaging user experience." Gallo said
Microsoft's app plans for Windows 10 will be revealed more in late April during its 2015 Build developer conference in San Francisco.

Source: windows central

MICROSOFT ANNOUNCES THE LUMIA 640



Today, at MWC 2015, Microsoft has announced the new Lumia 640, a 5-inch (1280×720) Windows Phone 8.1 device that will be upgrade-able to Windows 10 for phones.

The device has a 1.2 GHz quad-core Qualcomm Snapdragon processor, 8 MP camera, 1GB of RAM, 8GB of storage, a 2500 MAh battery, 3G/LTE, 1MP front facing wide-angle camera, and an 8MP camera at the rear. It will be available in Cyan, Black and White. The Lumia 640 will begin a global rollout in April. Pricing will vary by market and operator, but is estimated to be around EUR 139 for the 3G model and EUR 159 for the LTE model.

Additionally, when you buy a Lumia 640, you will also receive a one-year subscription to Office 365, as well as the latest fully installed versions of Office Suite for the Lumia.

MOST VULNERABLE OPERATING SYSTEMS IN 2014

According to a new report from GFI, Apple's Mac OS X and iOS are the most vulnerable operating systems in 2014.
The report states:
"It is interesting that although Microsoft operating systems still have a considerable number of vulnerabilities, they are no longer in the top 3. Apple with OS X and iOS is at the top, followed by Linux kernel"
It further adds that
"2014 was a tough year for Linux users from a security point of view, coupled with the fact that some of the most important security issues of the year were reported for applications that usually run on Linux systems. Heartbleed, for example, is a critical security vulnerability detected in OpenSSL while Shellshock is a vulnerability that affects GNU Bash"

OS chart

But that's not all. Microsoft is not out of the race as Internet Explorer tops the list of most vulnerable applications.

proxy?url=http //oi61 tinypic com/263gal2 jpg&co

"Not surprisingly at all, web browsers continue to have the most security vulnerabilities because they are a popular gateway to access a server and to spread malware on the clients. Adobe free products and Java are the main challengers but web browsers have continuously topped the table for the last six years"
Security is a issue when it comes to operating systems and applications but now you know that Windows is more secure than Apple's operating systems for desktop and mobile.
Be sure to keep your apps and operating system up-to-date.

THE PIRATE BAY IS BACK

On February 1st, 2015, The Pirate Bay is back up and running two months after it was taken down by Swedish authorities. (Read the story here) The site has been blocked by Internet service providers in various countries. The Pirate Bay had been hit with raids in the past, but always got back to its operational capacity in few days. The raid last year marked the longest time the site was offline. 

The website is not fully functional. It lacks RSS feeds, the ability for new users to register accounts, and a working “contact us” link. However, the core service is back to exactly where it was on 9 December, when the raid occurred.

Not every member of the Pirate Bay is happy with the relaunch. According to Torrent freak, key staff have criticized the decision of bringing the site back. They have said that they'll start up a rival Pirate Bay — the old one.

CRITICAL VULNERABILITY AFFECTS LINUX SYSTEMS

http://www.extremetech.com/wp-content/uploads/2012/01/linux.jpgA highly critical vulnerability has been revealed in the GNU C Library (glibc) that could allow attackers to execute malicious code on servers and remotely gain control of Linux machines.

The vulnerability, called as "GHOST" was discovered and disclosed by the security researchers from California-based security firm Qualys on Tuesday. Hackers could exploit it to silently gain complete control of a targeted Linux system without having any prior knowledge of system credentials

WHAT IS THE ISSUE?
The problem actual originates from a heap-based buffer overflow found in the __nss_hostname_digits_dots() function in glibc. This function is especially invoked by the _gethostbyname and gethostbyname2() function calls.

According to the researchers, a remote attacker has ability to call either of these functions which could allow them to exploit the vulnerability in an effort to execute arbitrary code with the permissions of the user running the application.

EXPLOIT CODE
In an attempt to highlight the severity of the risk, security researchers were able to write proof-of-concept exploit code that is capable to carry out a full-fledged remote code execution attack against the Exim mail server.

The researcher’s exploit able to bypass all existing exploit protections (like ASLR, PIE and NX) available on both 32-bit and 64-bit systems, including position independent executions, address space layout randomization and no execute protections.

Using the exploit, an attacker is able to craft malicious emails that could automatically compromise a vulnerable server without the email even being opened, according to Amol Sarwate, director of engineering with Qualys.

So far, the company has not published the exploit code to the public but eventually it plans to make the exploit available as a Metasploit module.

VERSIONS AFFECTED
The vulnerability affects versions of glibc as far back as glibc-2.2, which was released in 2000.
"Unfortunately, it was not recognized as a security threat; as a result, most stable and long-term-support distributions were left exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6 & 7, CentOS 6 & 7, Ubuntu 12.04, for example," researchers from Qualys said in an advisory published Tuesday.

FIXES AVAILABLE FOR SOME LINUX DISTRIBUTIONS
However, major distributors of the Linux operating system, including Red Hat, Debian and Ubuntu, updated their software on Tuesday to thwart the serious cyber threat. In order to update systems, core functions or the entire affected server reboot is required.

Red Hat, the No. 1 provider of Linux software to businesses, recommends its customers to update their systems "as soon as possible to mitigate any potential risk."

Source: TheHackerNews

DROPBOX APP FOR WINDOWS PHONE IS FINALLY HERE


After a long, long wait, Dropbox has launched an official app for Windows Phone today. Dropbox originally announced that they were working on the app back in November as part of a new partnership with Microsoft.

As an added bonus, Dropbox, which previously only had an official Windows 8.1 app, is now a universal between phones and PCs.

Dropbox lets you bring your photos, docs, and videos anywhere and share them easily. Access any file you save to your Dropbox from all of your computers, phones, tablets, and on the web. With Dropbox you’ll always have your important memories and work with you.

Features:
  • Access your photos, docs, and videos from any device
  • 2 GB of free space when you sign up
  • Share even your biggest files with a simple link — no more attachments!
  • Add files to your “Favorites” for fast, offline viewing



Use Dropbox to save and share photos, docs, and videos in a snap. And if something happens to your Windows phone, your stuff is always safe in Dropbox.

This should be a boon for those of you who were previously relying on third-party apps, such as CloudSix. Will you be switching over to Dropbox's official offering?

Download Dropbox for Windows Phone from here.

If you want to contribute to this blog, read here

WINDOWS 10 FOR PHONES

Microsoft officially unveiled Windows 10 for phones on 21st January at Windows 10 event. Below find a look at the various features announced.



Above is Windows 10 start screen. Besides the background wallpaper there does not seem to be anything new here.



The tiles seem completely opaque (update – the tiles are in fact semi-transparent).



Above is the app list. New apps will now occupy a slot above called Recently Installed.



This is the new notification tray.



Many new quick action buttons are now supported.



Settings are now more organized and grouped.



Toast notifications are now actionably.







Voice typing is now supported, and the keyboard is repositionable.



It now also features a mini-joystick for precise cursor positioning.



The messaging app will now support sending text messages via Skype and other carrier IP providers.



A new version of Word, Powerpoint and Excel will be available which will run the same code as the desktop.






The apps have the full power of office, including, review, formatting and everything else, and is powered by hardware acceleration.



Outlook now use the Word engine to render email.



It will also let you flag or delete email with a swipe.



The new calendar app is a lot more colourful.



The Lumia Camera app will be the default camera app on all Windows 10 phones and will simply be called Camera.





The new photos app will automatically enhance your pictures…



and also automatically create albums.




Above is the new People Hub



and the new Xbox Music app. It will support a new OneDrive music locker which will arrive in 2 months.



The new maps app will replace Here maps on the phone, and provide walking and turn by turn directions. On the maps page view Cortana will always be listening, and you could say “Cortana, repeat that” to hear directions again.



The new Spartan browser will initially be available only on the desktop. It will eventually also come to the phone.


You liked this post and want to contribute to this blog, then read here

EXPLOIT ALLOWS ASUS ROUTERS TO BE HACKED FROM LOCAL NETWORK

A vulnerability in Asuswrt, the firmware running on many wireless router models from Asustek Computer, allows attackers to completely compromise the affected devices. Malicious hackers, however, need to launch their attacks from within the local networks served by the vulnerable routers.

The flaw is located in a service called infosvr, which runs on Asuswrt-powered routers by default. The service, which is used by a tool called the Asus Wireless Router Device Discovery Utility, listens to packets sent to the router’s LAN (local area network) interface over UDP broadcast port 9999.

“This service runs with root privileges and contains an unauthenticated command execution vulnerability,” security researcher Joshua Drake, who found the vulnerability,said on his GitHub account.

Drake published his findings after someone else independently found the same issue and released an exploit for it.

While attackers can’t exploit this flaw from the Internet, they can use it to gain control of routers if they first compromise a device connected to them or if they manage to connect to the local network in some other way. Any local computer infected with malware can therefore become a serious threat to a router that’s vulnerable to this attack.

Routers are valuable targets for attackers, because they provide them with a foothold inside networks from where they can attack other devices. A router compromise is much harder to detect than a PC infection, because there are no antivirus programs running on such devices.

By controlling routers attackers gain the ability to intercept, inspect and modify incoming and outgoing Internet traffic for all devices that connect through them. Among other things, they can strip SSL from secure traffic and use DNS hijacking techniques to misrepresent legitimate websites.

Until Asus releases firmware updates for the affected routers, there are several mitigations available, although applying some of them requires technical skills.

The simplest way to block potential exploits for this vulnerability is to create a firewall rule that blocks UDP port 9999 on the router, but unfortunately this cannot be done through the Web-based administration interface. Users will have to connect to their router via Telnet and type “iptables -I INPUT -p udp —dport 9999 -j DROP” without the quotes on the command line interface.

The command sets up a firewall rule to block UDP port 9999, but it’s not persistent across reboots so the procedure needs to be repeated every time the router restarts.

Eric Sauvageau, the maintainer of Asuswrt-Merlin, a popular custom firmware for Asus routers that is based on Asus’ unified Asuswrt firmware, suggested a persistent fix that involves using the non-volatile JFFS partition available on Asus routers.

Users who run Asuswrt-Merlin on their routers can simply upgrade to version 376.49_5 of the firmware, which contains a fix for this vulnerability. Howerver, it should be noted that installing custom firmware can void the device warranty and should only be done by users who understand and accept all the risks associated with this procedure, including the possibility that their device might be damaged.

Source: WMPowerUser

VLC FOR WINDOWS PHONE NOW AVAILABLE FOR DOWNLOAD FROM STORE

The much awaited VLC Player app for Windows Phone is now available in Store. The main advantage of VLC app is that it allows playback of wide variety of videos and audio formats including MKV and others.

App Description
VLC media player is a portable, free and open-source, cross-platform media player and streaming media server written by the VideoLAN project.
VLC media player supports most audio and video compression formats, files and streaming protocols.
The app is still a beta and receiving updates daily. All WP users must try the VLC beta app and wait for the Full Release.

Download it here from Windows Phone Store for free.