Wednesday, December 31, 2014

LG puts on Ultra HD – CHIP

LG has been recognized by the Consumer Electronics Association as a “Partner 4K Ultra HD for international CES 2015″. It is the company’s honoring achievements in the segment of Ultra HD and a nod to the latest line of TVs LG presented at this year’s fair. Modern 4K Ultra HD from LG are equipped with Wide Color LED technology and Quantum Dot, which display palette of colors, their depth and realism are supposedly on the same level as those offered by the Professional Series monitors LG ColorPrime.

Debuting at CES 2015 LG TV 4K Ultra HD TV with Wide Color LED diodes are using phosphors, which affects the parameters such as depth of color and natural picture. On January at LG for the first time in the history of present its 4K Ultra HD screens with Quantum Dot technology, providing more accurate about 30% of the colors.

The TV LG 4K Ultra HD 2015 collection also ensure that the quality of 4K (3840 x 2160) 4K IPS panels. Additionally, True Black Control technique is to improve the contrast of allowing for the effect of a darker, deeper blacks. A new feature for 2015 is also the Natural Color, which minimizes errors in color reproduction, while the Contrast Optimizer option maximizes the contrast and brightness.

Five TVs with 4K Ultra HD line from LG comes with a multi-channel surround system Ultra, developed in collaboration with experts sound Harman / Kardon. In addition, models for 2015 with a series of high-end UF9500 have an integrated stand, which reflects and focuses the sound so as to maximize the experience … or so says the manufacturer.

LG has also introduced enhancements to the platform of smart TV – by optimizing the system operating webOS 2.0, which is reportedly more friendly and intuitive for users. Boot time has been reduced by almost 60%, and pairing with mobile devices is simpler. In addition, to further personalize your TV, users webOS 2.0 models can create your own menu on the main toolbar.

The latest models of LG 4K Ultra HD was used 4K Upscaler advanced algorithm, which effectively changes the resolution of SD, HD and Full HD quality content close to Ultra HD. Moreover, a special codec built 4K Video Codec High Efficiency (HEVC) that processes content from external devices 4K recorded in both 30p and 60p which also means that the LG TV will be compatible with future standards transmission Ultra HD.

LikeTweet

Anyone can steal your fingerprint. Just picture – Newsweek Poland

Hacker copied fingerprint of German Minister of Defense. Enough pictures of her thumb he made at a press conference. This can be a serious problem for the owners of smartphones.

Our fingerprint form non repetitive pattern. It would seem that based on fingerprint security can not be broken. Therefore, the various readers are becoming increasingly popular. Guaranteed by the security is purely illusory. This has been proved by German hackers.

Members of the Chaos Computer Club have already proven that they can without any problem to copy and use the imprint left on the smooth surface of the

During a conference organized by the hacker group Chaos Computer Club Jan Krissler described how the baby easily took possession of the thumbprint Minister Ursula Van der Leyen. It was enough to hand image captured during a press conference with a number of different angles. Then the man used the VeriFinger readily available software that is used to identify fingerprints in a variety of security systems.

By Krisslera pictures made quite an ordinary camera. Needed was a few shots, and the process of obtaining a complete fingerprint is very simple, if you just know how to operate the software. A clever hacker demonstrated how to do it during the presentation, which was posted on YouTube.

Now Krissler demonstrated that it is possible to copy fingerprints without having a physical object in which they are reflected.

Members of the Chaos Computer Club have already proven that they can without any problem Copy use the imprint left on the smooth surface. In 2008,. The glasses, which used the then Interior Minister Wolfgang Schauble married German imprint of his index finger. Then published it, and comforted the fans of the group can see that the thus obtained biometric data can easily be used in security systems. Enough to be used for this purpose a copy of the fingerprint Schäuble.

LikeTweet

The defeat of biometric security! The fingerprint can be … – Interia

1 hour. 29 minutes ago

How to copy our fingerprints? It turns out that this can be done without physical contact us or objects, which touched. Such was the case German Defence Minister Ursula von der Leyen.

Ursula von der Leyen victim of theft … fingerprints.

/ AFP

Documents released by Edward Snowden not only showed that the US service invigilates the whole world, but revealed by the way some of their weaknesses. What services and security methods constitute a problem for American spies? read more

I remember how intrigued me the information that the German group Der Sperrtechnik Sportsfreunde reconstructed using 3D printing key that opens the police handcuffed solely on the basis of the image captured to some policeman on the street. The key turned out to work, and its design was then made available on the network. Just a few years was enough to fell another bastion of security – fingerprint.

Scan fingerprint authentication is a popular way. We can find it both in castles, opening different doors, as well as in electronic equipment. I really liked the convenience afforded by this method of authentication – instead of using the username and password, just touch your finger to the reader in a laptop, tablet or smartphone.

Unfortunately, it turns out that our fingerprints, we can easily steal. And it is not about busy collecting fingerprints (film recalls scheme – give someone a glass of soda to get the impression), but of acting without physical contact – at a distance.

Theft finger minister

Victim of the “theft” fell in October quite important figure – German Defence Minister Ursula von der Leyen. Informed the Jan Krissler the Chaos Computer Club (CCC), which also described the way in which managed to get fingerprints minister.

He used to ordinary digital camera, which, during a press conference at different angles taken a series of pictures of her hand. That was enough to play and copy fingerprint fingerprint.

The fingerprint is no longer safe

It’s hard to imagine what the consequences are this event. And it’s not just the fact that fingerprint scanners manufacturers use various electronic gadgets, such as Samsung and Apple. The case is much more serious, as evidenced for example. Used in Brazil, biometric voter identification system is based on fingerprint scanning granting access to various facilities or premises. According to Jan Krisslera is the end of biometric security based on fingerprints.

The article used the information from the website Hacker News, Rzeczpospolita, the Guardian and the Mirror.

Luke Michalik

gadżetomania.pl

LikeTweet

Tuesday, December 30, 2014

CES 2015 – LG will showcase new 4K TVs – Interia

At CES 2015, LG will showcase a new line of Ultra HD 4K TVs, which will be launched later in the year. The series has a number of features and solutions refining the image quality and modern design.

The new 4K TVs LG will be presented at CES 2015

/ press releases

More than 5 million homes are equipped with TVs LG webOS system. Version 2.0 is the next step in the direction of maximum intuitiveness. read more

Modern 4K Ultra HD LG are equipped with Wide Color LED technology and Quantum Dot, which display palette of colors, their depth and realism are just as good, as those offered by the Professional Series monitors LG ColorPrime.


Debuting at CES 2015 LG TV 4K Ultra HD TV with Wide Color LED diodes are using phosphors, which affects the parameters such as color depth and naturalness of the image. On January at LG for the first time in the history of present its 4K Ultra HD screens with Quantum Dot technology, providing more accurate about 30 percent. colors.

TV LG 4K Ultra HD 2015 collection also provide exceptional quality 4K (3840 x 2160 pixels) IPS panels 4K. True Black Control improves contrast allowing for the effect of a darker, deeper blacks. A new feature for 2015 is also the Natural Color, which minimizes errors in color reproduction, while the Contrast Optimizer option maximizes the contrast and brightness. The latest series of TV has been designed with the utmost attention to detail – from the frame, the screen, right to the very back of the TV according to modern trends.

Five TVs with 4K Ultra HD line LG is equipped with multi-channel surround system ULTRA, developed in collaboration with experts sound Harman / Kardon. Deep, rich and powerful sound enhances the visual sensations. In addition, models for 2015 with a series of high-end UF9500 have an integrated stand, which reflects and focuses the sound so as to maximize the experience.

LG also introduced enhancements to the platform of smart TV – by optimizing the operating system webOS 2.0. Boot time has been reduced by almost 60 per cent., And pairing with mobile devices is easier than ever before. In addition, to further personalize your TV, users webOS 2.0 models can create your own menu on the main toolbar.

The latest models of LG 4K Ultra HD was used 4K Upscaler advanced algorithm, which effectively changes the resolution of SD, HD and Full HD quality content close to Ultra HD. Moreover, a special codec built 4K Video Codec High Efficiency (HEVC) that processes content from external devices 4K recorded in both 30p and 60p which also means that the LG TV will be compatible with future standards Ultra HD broadcast.

LikeTweet

These data encryption tools have tormented … – Computerworld


 
 
 Since then, the two above-mentioned tools detected different sensitivity. First identified in Tor (thanks to the FBI could track users using the services of the network), and the second application Tail (which allowed hackers to capture IP addresses assigned to users of its services). So far, only the TrueCrypt application failed to find any vulnerabilities that would allow her to figure out (at least do not know about that, because some say it is different).

For no one should be no surprise that, NSA that depend most on the break just these tools. Recently revealed that applications developed by NSA XKeyScore (used to capture Internet traffic) detected a mechanism for determining who uses the services of portals Tor and Tails. This reinforces the belief that the agency was interested in – and it’s very hard – these tools.

See also:

A report published by Der Spiegel document contains information confirming the suspicion that the NSA had targeted these applications. She viewfinder is an understatement – it necessarily wanted to figure out, in order to be able to steal data from servers that have used these tools for their protection.

The tools have been classified by the NSA, taking into account, inter alia, for example. Degree their advancement. Whereas this criterion, the first three places were taken by Tor applications, Tails and TrueCrypt. I took them agency unless indeed, as indicated by the fact that, with the amount in 2013, more than $ 10 billion, US $ 34.3 million has been spent on the project “cryptanalysis and Exploitation Services”.

There are of course This hard evidence that it is the NSA could be found in applications that track and Tails susceptibility to enable interception and decryption of data, but this is highly unlikely. There are speculations that the agency also figured TrueCrypt application. Proponents of this kind of conspiracy theory believe that they are so indirect evidence. The idea is that developers avoid this solution as if instinctively felt that it is not safe, although officially no audit has not demonstrated that it may contain a hole.

Among other tools, the agency placed on the aforementioned list (thinking that maybe they are not as important as Tor and Tails and TrueCrypt, but you should take care of them) is Redphone program. This tool supports applications transmitting voice, data encryption using ZRTP (whose creator Phil Zimmermann). Zimmermann has developed two decades ago, another tool for data encryption, bearing the name of the PGP (Pretty Good Privacy). It turns out that the NSA is also a tool to put it drew up the list of most dangerous for the data encryption systems.

It is interesting that the NSA had – and probably is – a lot of problems with unstructured data. At least that can be inferred from published by Der Spiegel document. It is worth remembering that the document was created in 2012 and since then a lot of things could change. About this we will, however, only when it finds a second Snowden and reveals another document showing the latest methods of work of the NSA.
 
 
 
 
 

Welcome to conferences and workshops
 


 
  19 February 2015.
 
  Sign up
 

 Complement fixed speeches at the conference in 2015 Techworld e-seminars will be delivered online via the Internet. In this electronic form will provide information relating to these aspects of infrastructure that is difficult to show on stage. Participants will learn about such aspects as the implementation process, some technical details, and also shown live elements discussed infrastructure. E-seminars are conducted in an inte ractive format, so …

LikeTweet

Hacker forged fingerprint policy based on the pictures! – Computer World

One of the members of the association of several thousand hackers from countries
 German club Chaos Computer Club, created ideal
 Reproduction fingerprint Ursula von der Leyen, German
 Minister of Defence.

To perform this task, he needed no trace of a finger
 found on a mug or Macro – enough for a pair
 photos taken during the minister’s press conferences.
 The man made a whole bunch of pictures of the thumb so widely
 VeriFinger dostępnemu software, and then created the physical
 a replica of the fingerprint. Already proven that fake fingerprint
 made the technique he used a hacker can easily deceive
 For example, fingerprint reader placed in the iPhone.

It’s frightening how easily gain access to someone’s confidential
 information protected by fingerprint – you do not even have
 direct contact with the person, or with any object,
 she held. How to protect yourself from the threat? The author discussed
 in takście method advises politicians that appeared in public
 meetings with gloves.

The best way to avoid potential problems would be
 However, the total abandonment of the use of fingerprint sensors
 serious purposes. This system could replace, for example,
 Biometric technology system analyzes the individual lived in
 toes, which operates only in contact with real leather
 living man. The first ATMs using such
 sensors have already appeared in Japan and … in Poland.

And do you trust fingerprint readers? Perhaps the
 unlocking the screen on your smartphone, however, better suited than
 pattern to that code?

»View
 What we need to worry about cyber threats in 2015
 year

Source: ExtremeTech, photo. wiki commons

LikeTweet

Fingerprints can spoof on the basis of a normal photo – Money.pl

2014-12-30 17:30

 Fingerprints can spoof on the basis of a normal photo

[Photo: sxc / cc / flaivoloka]

Using photos taken during the press conference of the German defense minister Ursula von der Leyen, the hacker John Krissler recreated minister thumbprint using commonly available software – tells BBC News / Science.

Krissler, also known as ,, Starbug “, a member of the Chaos Computer Club hacker (CCC) has benefited from photos taken with a digital camera normal during the October conference. He was able to get a close-up photo showing thumb von der Leyen lady, also benefited from other images taken at different angles and applied program called VeriFinger. Scores praised when held in Hamburg exit CCC – existing for 31 years of the European association of hackers.

Scan fingerprint biometric is used as the equivalent of a password among others Smartphones Apple and Samsung, it was also used to identify voters during this year’s presidential election in Brazil. However, experts do not consider this technology to be particularly safe.

It is more difficult to fake, eg. The way we move and the pattern of subcutaneous veins (venous pattern use an infrared sensor, used eg in some ATMs installed in Japan and Poland). To the reader checking finger vein system to work, the finger must be a real and connected to a live person.

Krissler suggested that after the publicity of his achievements politicians will be publicly only with gloves. (PAP)

pmw / mrt /

LikeTweet

Alpha Galaxy disappears from the market, it will replace the Galaxy A5 – Gazeta.pl

Galaxy Alpha, One of the newest Samsung smartphones, was poorly received by the market. Less than half a year after its release, it turned out that the production of the smartphone will be carried out only “until the materials.”



Beautiful, but too expensive

Alpha Galaxy looks much we liked. Samsung finally dared to experiment with form – and succeeded. However, other features of SmarTone not distinguish it from the competition. The Verge highlights the poor performance of the battery and an exorbitant price. Samsung has created some strange device: the ośmiordzeniowym, but slower than the processor and quad-screen is full HD. For the price of 2700 zł (reduced a few weeks after the release of the 2000 PLN), you can have a smartphone with better performances.



New idea for “the average shelf”

Samsung Galaxy A5 Fig. Samsung

The Samsung plans most likely place to another device. In the market of mid-end devices to be king of the Galaxy A5 – smartphone unveiled a month ago in China. The phone is designed in the same style as the Alpha is a little thinner and made of high quality metal. In China, costs the equivalent of approx. 360 dollars.

According to the website Sammobile Galaxy Galaxy A5 and A3 have hit Europe next year. Better model will cost 410, 310 weaker euro.

Image & # x119; of Samsung GALAXY Alpha Blue  Image & # x119; of the Samsung Galaxy S5 blue  Image & # x119; of Samsung Galaxy Note 3 SM-N9005 white & # x142; y
Samsung GALAXY Alpha Blue Samsung Galaxy S5 blue Samsung Galaxy Note 3 SM-N9 …
Compare prices » Compare prices » Compare prices»
Basic Information
Screen size 4.7 inches 5.1 inches 5.7 inches
OS Android 4.4 KitKat Android 4.4 KitKat Android 4.3 Jelly Bean
Parameters Technical
RAM 2 GB 2 GB 3 GB
Processor Exynos 5430 Snapdragon 801 Quad Core
Processor Frequency 1.8 GHz 2.5 GHz 2.3 GHz
Screen Resolution 1280 x 720 1920 x 1080 1920 x 1080
Battery 1860 mAh 2800 mAh 3200 mAh
Memory Card Reader No Yes Yes
Features
Digital Camera 12 mpx 16 megapixel 13 megapixel
Additional camera 2.1 megapixel 2 megapixel 2 megapixel
Communication
Wireless Yes Yes Yes
LTE Yes Yes Yes
Physical
Size 132.4 x 65.5 x 6.7 mm 142 x 72.5 x 8.1 mm 151.2 x 79.2 x 8.3 mm
Weight 114 g 145 g 168 g
LikeTweet

More children without compulsory vaccination. “Roses in the EU … – Gazeta.pl

Growing discouragement to vaccinations. Are behind this so-called. antyszczepionkowe movement – a group of people who believe that vaccines bring more harm than good. In Poland in 2011. Have not been vaccinated about 3 thousand. children, in 2012. it was their 5.3 thousand. and in 2013. – 7.2 thousand.

Marek Posobkiewicz, p.o sanitary inspector, believes that it is expected that in 2014. more children have not been vaccinated mandatory. – Fortunately, it is still a small group. It represents only 0.08 per cent. children subject to compulsory vaccination protection – he added.

Are the vaccine is less disease

President of the Foundation Institute Infection Prevention in Warsaw, Dr. Paul Grzesiowski says that in Poland is still high is called. wyszczepialność (ie the number of completed vaccinations – ed.) population against measles. Vaccine against this extremely dangerous disease received more than 90 percent. population of children and adolescents. As a result in 2011. Registered only 38 cases of measles in 2012. – 60 cases.

In the West, it is worse. And in the United States …

In other industrialized countries is much worse. In Europe and the US increased incidence of measles due to more frequent omissions vaccination against the disease.

In 2013. An increase in measles cases reported in the United Kingdom, Germany, the Netherlands, Bulgaria, Spain, Italy, Denmark, Sweden and Lithuania. More than a total of 9200 cases were registered in Georgia and Turkey, where some infections can be zawleczonych to the countries of the European Union.

According to the “New England Journal of Medicine,” in many schools in New York vaccinated against measles is less than 70 percent . population of students.

Thirty years without polio and diphtheria

Prof. Eve Bernatowska immunology clinic Child Health Center in Warsaw points out that, thanks to good acting is still protective vaccination program Poland is a country free from polio. Since 1984. There has been a single case of the disease caused by this virus, which in the 50s. The cause many deaths and permanent disability – muscle paralysis of arms and legs.

– The same is true of many other serious infections . For 30 years it was in our country suffering from diphtheria, and for 29 years was not caused by neonatal tetanus – adds specialist.

The unexpected return of rubella men

Prof. Bernatowska admits that still exist in our country rubella among young men. Data from the National Institute of Public Health – National Institute of Hygiene shows that in the first half of 2013. Registered more than 32 thousand. infections – almost ten times more than in the same period of 2012.

– This disease should no longer exist in any country of the European Union – emphasizes the expert. In Poland, however, is not related to the evasion of vaccination, but with incomplete vaccination program.

Since 1988. Vaccinated against rubella only girl in the 13th year of life; these vaccinations were not boys. That is why there has been so. compensatory epidemic disease attacked mostly men aged 19-24 years of age and a little older than 25 to 28 years of age.

“The vaccine policy as”

According to Professor. Bernatowski, vaccination is the most important insurance policy on the health of all of us, regardless of age and gender. They are much safer than the resistance obtained after passing the infection.

– A small child after przechorowaniu infectious diseases such as whooping cough, or those caused by the so-called. encapsulated bacteria such as Haemophilus influenzae and Streptococcus pneumoniae (diplococcus of pneumonia) and meningococcus should be vaccinated against the disease, which had suffered, and in the shortest time as possible – emphasizes the expert.

He added that especially in children up to the age of the immune system is so immature that infectious diseases can cause catastrophic consequences.


Bieńkowska, Putin, elections … [memes BEST YEAR] & gt; & gt; & gt;

LikeTweet

Monday, December 29, 2014

Hacker “cloned” fingerprints – Polish Radio

In his opinion, enough pictures Minister Ursula von der Leyen made an ordinary camera. Needed was just close your finger and other photos from the press conference. This made it possible to clone the fingerprint of the thumb.

The fingerprints are used, for example, to identify users of devices from Apple and Samsung. The same method of biometric identity was confirmed by the voters during the election in Brazil this year.

According to experts, fingerprints are not very safe way of identification. Krissler himself says that after his actions politicians, showing up in public places should wear gloves.

(IAR)

LikeTweet

Poland Android is more popular than Windows 8.1 – Gazeta.pl

Luke Józefowicz
  2014-12-29

  Ranking Gemius presents data on the operating system used by the Poles to browse the web. Windows 8 does not fall here the best …

For a long time I did not check for ranking Gemius Poles used by operating systems, which is why today’s data surprised me a little. First of all, more people to surf the web using Android than Windows 8.1.

Windows loses to ... Android

+ click to enlarge

Fig. Gemius

Of course, if users add 8 and 8.1 version is the percentage beats Android in this ranking. These include, however, that this statement compares the operating systems, which the Poles use to connect to the network – it shows how important it is for us to smartphones and tablets.

That’s not to say, is an innovative Windows 8 is not easy life and its popularity in our country is comparable with the hated Windows Vista:

Windows 8 and Windows Vista

+ click to enlarge

Fig. Gemius

Microsoft has always had a problem with encouraging users to migrating to a new version of windows. See how it goes in the case of Windows 10, which promises to be interesting.

Also of interest are the results of operating systems for mobile devices. Despite the huge popularity of Windows Phone in our country (the largest in the world!), Few people use these smartphones to connect to the Internet. Very likely, therefore, that the people accustomed to traditional mobile phones, they are treated as a lesser evil, especially since you can get a lot Lumii with operators at extremely low prices. Unfortunately, the users do not assist in the development of the platform, because neither surfing the web, or install the application.

operating systems on mobile devices

+ click to enlarge

Fig. Gemius

In this chart missing from Windows Phone 7, but the percentage of its users is now only 0.12%, so it is almost negligible.

In the table below the percentage for the period 15.XII -21.XII 2014. Values ​​at the graphs are the 29th of December. HERE you will find all the rankings.

Summary of Poles used by operating systems in the period 15.12 to 21.12

+ click to enlarge

Fig. Gemius

LikeTweet

Cybercriminals accurately attack in 2015. Targeting cards and … – Media2.pl

The company Eset, a global provider of computer security software companies and individuals (such as ESET NOD32 Antivirus) published a list of 4 trends in computer threats for 2015:

with targeted attacks

 One thing is certain – the number of targeted attacks has increased over the past few years and this trend will continue in 2015. Usually with targeted attacks, and so attacks against a specific recipient or institutions are carried out using social engineering or exploit 0-day type, and so those that exploit vulnerabilities still unpatched by manufacturers and application security solutions.

In 2010 identified 3 large with targeted attacks, while in 2014 the number of large attacks rose to 53. These are the figures for detected attacks, and many of them could pass unnoticed. One of the most common attacks of targeted campaigns for BlackEnergy or Windigo.

Attacks on płatnościowe systems

 More and more people are paying by credit cards. This trend decided to use cyber criminals, creating a family of threats ie POS terminals JacksPos or Dexter. This is probably using those threats, cybercriminals stole 56 million data cards, which were paid in supermarket chains Home Depot. ESET Experts predict that in 2015 the attacks on payment card terminals will become even more popular.

Ransomware, malware and bitcoiny

 ESET Experts predict that cybercriminals will carry out more attacks associated with virtual currencies. This year, the biggest cybercriminal behind this type of attack has earned the equivalent of $ 000 600 in bitcoinach, using a network of compromised computers (botnets) to generate a virtual currency.

Also, ransomware threat to screen or block access to files and in return for a ransom demand to release them, they will become even more popular in the coming year. By 2014 many large companies, including Yahoo, AOL, have become victims of such threats. This year ESET also discovered the first threat encryption files on smartphones with Android – Simplocker.

The Internet of Things

 ESET Experts also predict an increase in the number of attacks on devices with internet connection. This year, the observed attacks on devices such as Smart TV, smart phones biometric systems, routers, as well as Google Glass. Despite the popularity fledgling Internet of Things, cyber-criminals try to exploit this trend to achieve their goals.

LikeTweet

How Google’s Beijing wants to fight? – Newsweek Poland

The Chinese authorities apparently are not going to improve your relationship with Google. I blocked one of the key Internet services giant – Gmail mailing service.

– I think the government is trying to eliminate the Google China , and this goes farther and farther away. Perhaps it even the weakening of its position outside the United States – says in an interview with the newspaper “The Guardian” requested anonymity GreatFire.org member organizations fighting in China for freedom of speech. – Imagine Gmail users are not able to reach customers in China. Many people outside China may be forced to abandon Gmail.

Google’s data shows that the movement of the Chinese servers started to decline as early as Christmas evening to the morning on December 26 fall to zero. On Sunday 28 December a group of Internet analysts Dyn Research announced on Twitter that the Chinese authorities blocked IP addresses using Gmail. Representatives of Google in an email sent to the editor of the weekly “Time” assured that “everything checked on their side, and there is no error.”

– Do not should have thus block or Google or Gmail. This is an attack on the spirit of the Internet – Yuan Shengang, executive director of the company dealing with cybersecurity Netentsec, criticizes the decision of the Chinese government in an interview with “The New York Times”. Also, according to Chinese journalists 36kr.com technology of service “current situation is without precedent.”

Gmail effectively prevents the lock because the use of the popular website called bypassing mailing. Great Firewall of China, which is the most advanced web inspection system in the world. The only way to defeat the security is to use a Virtual Private Network (VPN), which is a private network that operates within a public network (eg. Internet).

LikeTweet

Policewoman “hunting” for walking on the belts. Shocking video of … – Polish Radio

As a senior midshipman IAR says Mariusz Mrozek of the Metropolitan Police cruiser headed one of Warsaw policewomen. Initiated disciplinary proceedings against her, stopped driving and the matter was referred to the court. Despite this, the woman is still working, but it was moved to a different position. Mariusz Mrozek notes that although we are talking about a very serious offense, you can not process the whole situation “in the witch hunt.”

What is your opinion on the film, which has posted on a social networking web surfer, you will see Not yielding to pedestrians, which exceeds the transition. But, in assessing officer should be 10 points and 350 penalty fine gold. To how the notes policeman, a police car changed lanes at a pedestrian crossing. For this, in turn, threatens to 6 penalty points and a fine of 250 dollars.

IAR, bk

LikeTweet

Review of the year on Facebook rozdrapało wounds. Service … – Newsweek Poland

For an American, Eric Meyer past year associated with the struggle for the life of her daughter, who suffers from a brain tumor. Facebook called the pain, juxtaposing the tragic events in an idyllic setting. Tactless composition for the service chiefs apologize memories you.

In his summary algorithm Facebook takes into account the pictures and posts that received the most “ lajków “, that is, those that have gained popularity among other users. Sam the account holder does not mention the possibility of selecting that really were important to him.

In the case of Meyer’s liking these were an expression of support in the fight against disease, 6-year-old child. American described the tragic events in the form of miniblogu, by which he tried to cope with the tragedy. Automatic statement squeeze tears photography, completed the slogan “May the next year was even better,” offended father.

In the case of Meyer’s liking these were an expression of support in the fight against disease, 6-year-old child.

Meyer wrote: “Those who have lived with the specter of death of the person you love, spend most of their time in hospitals or forks to have lost their jobs or experienced other falls in the past year, did not want to look at the past. Rebecca’s face with the signature ‘See how was your year’ cause jarring to read. If you would describe a man, it would be at least inappropriate. In the case of the algorithm is an unfortunate mistake. “

At this, Facebook responded heads. In “The Washington Post” posted a formal apology for the pain that caused the summary.

“Apka assessed positively by many users, but in this case, instead of joy przysporzyliśmy pain – wrote Jonathan GHELLER, service representative. – It is also important feedback for us. Next time we’ll do a better summary. We are grateful to Mr. Meyer, that took the time to write miniblogu on our site. “

LikeTweet

Sunday, December 28, 2014

Reaction needed in connection with the frost – Deon.pl


 

  Government Security Centre calls for departments to report cases of people at risk of chronic exposure to cold.

 

 According to the information of the Police Headquarters that the festive Friday reported two dead cold. Also, the past day two people died of hypothermia.

 

 Since the beginning of October found 34 deaths from hypothermia in December so far because of the cold 19 people died.

 

 Due to the low temperatures call for service to respond to any incident that could endanger the life of a person who is outside.

 

 “Let’s not be indifferent. When we see a person sleeping on the bench, or know that someone lives on land, dzwońmy the number of municipal police, the police or the emergency number 112. Then, the relevant departments will be addressed,” – said on Sunday PAP Bozena Wysocka the Government Security Centre .

 

 She added that aid the homeless offers each province. “Support provide night shelters and soup kitchens. The sides of the provincial offices for a list of schools. Of course, the homeless rather on this page will not come, but help can we, ordinary people,” – she said.

 

Two victims of hypothermia were recorded recently in the Lodz region. On Saturday dukcie Causeway forest between the villages and the terrace in the district of Radomsko found dead 51-year-old man. According to police, the man was under the influence of alcohol probably died of hypothermia – PAP reported on Sunday, police spokeswoman Deputy Inspector Lodz. Joanna Kącka.

 

 A day earlier in Wieruszów factory in nearby street was found dead 60-year-old man. The doctor as the most likely cause of death indicated hypothermia. Since the beginning of November in Lodz region from the cold dead four people.

 

 With police statistics show that last winter season (from 1 November 2013. To 31 March 2014.) Across the country reported 87 victims of the cold.

 

 

LikeTweet

19-year-old went missing. He walked out of the restaurant without a jacket and fell under the … – Gazeta.pl

1 ->

Boy on the night of Thursday to Friday 23.30 an hour left the restaurant in Prusice Riviera. The building left a jacket. Since then did not show up in your home. 19-year-old is about 180 cm tall, average body build, brown eyes, black short hair cut for the hedgehog and a round face. The boy on the disappearance was wearing a gray sweater, light blue denim pants and black sneakers sport with three white stripes.

The police are asking everyone who can help locate the missing man to contact the District Police Headquarters in Trzebnica, tel . 71 38 88 200/222 or the nearest police unit under the numbers 997 or 112.

LikeTweet

On the Facebook application “Year’s” controversial and … – Gazeta.pl

The application is simple – based on the popularity of photos selects a dozen of them, divided into the period of the year and shows, along with descriptions of what they have used. The idea seemed to Facebookowi safe, but apparently failed to detail.

The standard text, which featured a contribution to the review year, sounded in English, “It’s been a great year! Thanks for being a part of it.” What on Polish very neatly translated as “Thanks to you, it was a great year.” That’s it – great. Not for everyone this year was great and not everyone wants to remember him. Meanwhile, Facebook impose themselves with their application for all users. Some of them feel that offended .

This is what happened in the case of Eric Meyer, designer websites and writer . In 2014 years died of brain cancer, his 6-year-old daughter, Rebecca. Therefore, Eric, as a conscious Internet user he avoided creating for her review of the year – it would be for him just too painful.

But Facebook know better what to whom you need. If you do not voluntarily decided to watch the images prepared for us, after a short time began they themselves appear in our stream of messages. What is true is shown by their annotation that are not visible to others, but this time it was not the point. Eric Meyer hurt combination of the words “It was a great year!” From the face of his dead daughter in June.

After the entry on the blog, where Meyer described the situation of the case made out loud. Many people in the comments at the texts that speak about the whole situation solidaryzowało with Meyer. The representative contacted Facebook with Eric Meyer and apologized for the situation.



Cruel algorithm

However, it’s not that clear and Meyer wrote this on his blog. The idea is to mindless algorithms that choose their (in good faith) photos, or construct other content automatically generated were equipped with mechanisms that take into account the worst-case scenario. In the end, a lot of people dead loved ones, many do not consider this to be a fantastic year, many have no desire to commemorate him. The problem is that the Facebook app is imposed despite the lack of interest of the user.

Although my year – fortunately – it was not even a fraction of such a tragic, like Meyer, it does not feel like I have too much to dwell on it. Facebook solicitation completely ignored and not interested in what for me has prepared. Despite this, just two days after the appearance of the applications on the network every day, it started to insert your image into my stream of inviting me to share the content of others. After a few times I turned off it from the drop-down menu, but this method was neither obvious nor easy.

How much easier it would be to ask if I wanted to Facebook generated an overview of the year for me. Certainly most willingly would benefit from this opportunity. Sure it would be less of them than when everyone was getting in his face, and a review of the year would be weaker promotional effect that Facebook wanted to achieve. But promotion should not be more important than human feelings.

LikeTweet

Facebook apologizes – showed a photograph of the deceased child … – Gazeta.pl

If you only use Facebook, certainly in the last days of the application encountered a “Year of the user.” While this overview of pictures from 2014 years to serve excited memories and emotions, it is in some they were too painful to want to return to them.

The application is simple – based on the popularity of photos selects a dozen of them, divided into periods of the year and shows, along with descriptions of what they have used. The idea seemed to Facebookowi safe, but apparently failed to detail.

The standard text, which featured a contribution to the review year, sounded in English, “It’s been a great year! Thanks for being a part of it.” What on Polish very neatly translated as “Thanks to you, it was a great year.” That’s it – great. Not for everyone this year was great and not everyone wants to remember him. Meanwhile, Facebook impose themselves with their application for all users. Some of them feel that offended .

This is what happened in the case of Eric Meyer, designer websites and writer . By 2014, his 6-year-old daughter Rebecca died of brain cancer. That’s why Eric avoid creating for themselves a review year – it would be too painful.

But Facebook know better what to whom you need. If you have not decided on a voluntary basis prepared for us to view the photos, after a short time they themselves began to appear in our stream of messages. It is true annotation is shown next to them that they are not visible to others, but this time it was not the point. Eric Meyer hurt combination of the words “It was a great year!” From the face of his dead daughter in June.

After the entry on the blog, where Meyer described the situation of the case made out loud. Many people in the comments at the texts that speak about the whole situation solidaryzowało with Meyer. The representative contacted Facebook with Eric Meyer and apologized for the situation.



Cruel algorithm

However, it’s not that clear and Meyer wrote this on his blog. The idea is to mindless and cruel algorithms that choose their (probably in good faith) photos, or construct other content automatically generated were equipped with mechanisms that take into account the worst-case scenario. In the end, a lot of people dead loved ones, many do not consider this to be a fantastic year, many have no desire to commemorate him. The problem is that the Facebook app is imposed despite the lack of interest of the user.

Although my year – fortunately – it was not even a fraction of such a tragic, like Meyer, it does not feel like I have too much to dwell on it. Facebook solicitation completely ignored and not interested in what for me has prepared. Despite this, just two days after the appearance of the applications on the network every day, it started to insert your image into my stream of inviting me to share the content of others. After a few times I turned off it from the drop-down menu, but this method was neither obvious nor easy.

How much easier it would be to ask if I wanted to Facebook generated an overview of the year for me. Certainly most willingly would benefit from this opportunity. Sure it would be less of them than when everyone was getting in his face, and a review of the year would be weaker promotional effect that Facebook wanted to achieve. But promotion should not be more important than human feelings.

LikeTweet

Jaasta – the first keyboard with E-ink technology, which adjusts … – News 24

It would seem that the computer keyboard can not surprise you. Jaasta company raises money for the implementation of an unusual device. Keys in it made in the E-ink technology. This will make it conform to a currently used by our program. It will also enable a smooth change of language.

 / Fig. press releases Jaasta a keyboard that displays any information on the buttons. All thanks to the E-ink technology known ebook readers. For example, when you use Photoshop will be able to replace traditional switches each function keys (eg. Trimming, brush or stamp). When using Office dynamically switch your keyboard to offer an appropriate shortcuts. Another advantage is the possibility of a smooth change the keyboard language. By default, there are fifty, including exotic for a European Korean or Japanese.

 / Fig. press releases Developers keyboard write about it jokingly,” as a last level on the evolution ary ladder connecting man and machine. ” The device is wireless, it is equipped with a 3.5-inch touchpad. Its advantage is to be low power consumption (12 months on one set of batteries. It has, of course, media keys for controlling volume and playback movies or music.



Read also: the 10 most important events of 2014 years of technological


/ Fig. press materials The disadvantage of the device is its price – $ 299. At the moment it is not possible to pre-order it or buy. You can only enter the mailing list to receive email notifications when the product will be available.

LikeTweet