Home Blog Page 38

Organs on a Chip: Harvard Plans to Recreate the Human Body on Silicon

0

One day, pharmaceutical companies might not have to test new drugs on animals or even humans. Instead, drugs could be tested with organ-on-a-chip technologies. These are not silicon chips that simulate organs or organisms, mind you; they contain real living, human tissue.
The Wyss Institute for Biologically Inspired Engineering at Harvard University is going even further with its organ-on-a-chip research by linking up 10 of these individual chips to simulate the entire human body.

Wyss Institute’s Human Lung-on-a-Chip (top) and Human Gut-on-a-Chip (bottom). [Credit: Wyss Institute]
These organ chips are made with a silicon polymer with microfluidic channels carved into them. The channels are filled with human cells, as well as pumps and other mechanical elements that move the cells to replicate the movement of the actual organs.
The lung-on-a-chip, for instance, contains an air sac, a layer of lung cells, a separating membrane, and a blood channel that contains red blood cells. The chip can be connected to a vacuum pump that expands and contracts the organ like the real thing.
The Wyss scientists also produced a gut-on-a-chip that contains intestinal cells that writhe like a human gut going through the motions of peristalsis (pushing food though).
The idea is to replicate the function and composition of an organ on a chip that can be easily tested in order to study effects of diseases, toxins, and pharmaceuticals. The system could provide faster and more accurate human drug testing results than the slower, inaccurate process provided by animal testing.
http://player.vimeo.com/video/29463381?title=0&byline=0&portrait=0
The Wyss Institute recently announced it has entered into a $37-million cooperative agreement with DARPA to create a system that integrates 10 organ-chips to create a complete human-on-a-chip system. The researchers are already well onto their way in develop a chip that mimics the heart, bone marrow, and the human kidneys. With a complete human imitating system, scientists could see the biochemical effects of drugs across the entire human body.

Facebook’s Recommendations Bar: A Privacy Concern?

0

Facebook has rolled out a new feature called the Recommendations Bar for website owners. The Recommendations Bar allows website owners to tap into the social network’s database of what you and your friends read, share, and like.
Here’s how it works: as you read a story on a website that has the Recommendations Bar feature activated, you’ll see pop-up windows in the bottom right corner of the page. The pop-up window will contain stories from the website that your Facebook friends have shared or liked. The window also contains a Like button, allowing you to like the story without ever leaving the website.
Also Read: How to install Facebook Recommendation Bar In Your Blog

Several sites already use this feature, including the tech blog Mashable, entertainment site Wetpaint, and U.K.-based tabloid The Mirror. Recommendations are limited to articles on the website that were shared by Facebook users. Websites using the new feature reportedly see as much as three times as many clicks on stories that are recommended in the pop-up boxes.
This feature obviously benefits the website owner, but what’s the benefit to you? There isn’t really one–it’s just another reason to be worried about your privacy on the social networking site.
Don’t get me wrong–relevant recommendations from friends might be helpful. There’s a good chance that the recommended content will be something that we’ll be interested in reading, since we often pick our friends based on shared interests.

But there’s another side to this issue, and that’s the potential privacy concern. When Facebook debuts services that share, without your explicit permission, what you’re doing online…well, it always seems to go south.
In May, my colleague Sarah Jacobsson Purewal noted this issue regarding Facebook’s social reader apps. She said these types of features create a “giant circle of awkward oversharing that people have little control over.” Who knows–what you’re reading might reveal things about yourself that you’re not necessarily willing to share with the world.
Since there’s no way to control what type of content is shared, except to not share or like it altogether, your personal reading habits will be on display for all your friends. The only positive here is hat, unlike Social Reader, you physically need to take action on Facebook–whether you share or like the story–for it to show up in the Recommendations Bar.

How To Add Facebook Recommendations Bar To Blogger

Finally, Bloggers can keep readers to their site by using this fantastic recommendation bar.
It’s designed to display additional recommended articles right after readers have finished reading an article or spent some time on your blog. It will collapse on page load and expand once a reader has reached a specific location on your blog or finished reading the post.

Only those articles are displayed that are previously liked or shared on Facebook. The number of likes are displayed under each article along with page title and a thumbnail. It also contains a like button and previously contained an Add to Timeline button that has been removed now.

Unlike Facebook Recommendations box which offered related stories but with lack of user friendly interface and engagement, Facebook bar will force readers to stay longer on your site leading to increased pageviews, page impressions and thus traffic.

HOW TO INSTALL ON BLOGGER

This widget works on both blogger blogs and wordpress blogs. Now i’m going to take you true on how to add it on your blogger blog, the amounts of comment i get will determine if i’m going to show the wordpress tutorial. follow this simple steps to add on blogger:  

Step1: Create a Facebook Application

For this plugin to work you will need to create a Facebook App in seconds. The below method is the standard and correct method for creating any FB App you like.

  1. Log into Facebook Apps
  2. Click on Create New App button towards Top-rightcreate new app
  3. In the box that pops up, type “My Recommendation Bar” inside the App name field and leave other options as default. Click continue.

app name
     4.   Enter the captcha security code. Click Submit
     5.  You are app is almost complete. Just click Website with Facebook Login tab and inside the box input your blog URL. See the screenshot below. Do not touch remaining options and click Save Changes.

 6.   You will see two strings of alpha-numerical characters. One is App ID and the other is App secret. Just copy the App ID code and keep it save in a notepad. We will need it later.
App ID
Congrats App finally created! Lets proceed to step2.
Step2: Add “Recommendations Bar” To Your Blog
Follow these steps to add the bar to Blogger:

  1. Go to Blogger > Template
  2. Backup your template
  3. Click Edit HTML > Proceed
  4. Search For this : <html

Replace it with this code:
xmlns:fb=’http://ogp.me/ns/fb#’
This will make the plugin compatible in older versions of  internet explorer also. Since blogger templates are coded in XML therefore inserting this XML namespace will enhance the plugin performance and compatibility.

     5.   Next search for <body> and just below this tag paste the following code:
Note: If you are using the new blogger templates like Simple, Awesome Inc., Travel, Watermark or Picture window then please search <body for instead. Make sure to paste the code below the entire body tag.

</p> <div id=’fb-root’></div> <p> <b:if cond=’data:blog.pageType == “item”‘></b:if><b:if cond=’data:blog.pageType != “static_page”‘></p> <div style=’z-index:999999; position:absolute;’> <fb:recommendations -bar action=’like’ max_age=’0′ num_recommendations=’3′ read_time=’10’ side=’right’ site=’https://ewtnet.com’ trigger=’40%’></fb:recommendations></div> <p></b:if>
You are almost done. Make these changes:

     6.   Save your template and you are all done!
Visit your blog and scroll down about 50% of your page and wait for 10 seconds for the plugin to expand. Enjoy the new way of free pageviews juice! 🙂

Optional Steps

Below are optional customization and control options. You can skip them if you want max_age: will decide the age limit of articles. Sometimes you don’t want to display too old articles so you can set it to display up to 1-180 days old posts. But if you don’t want to take age into account then let it be 0 as default.  num_recommendations: You can set how many articles to display. By increasing or decreasing the value 3
read_time: As soon as the user reaches a specified location, the plugin would expand and before expanding it will take some time. I have kept it equal to 10 seconds, you can increase it to 30 or more as you wish.  side: You can decide the location of plugin. By default it shows up towards the bottom right corner of your page. You set it to float to left  trigger: On page load the plugin collapses and as soon as it reaches a specified location it expands. You can choose that location in three ways i.e. onvisible, X% or manual. I prefer locating the trigger point by percentage for better pageviews. The widget will expand as soon as the user scroll downs 40% of your page. You can increase or decrease this value. If you wish that the plugin must expand as soon as the reader reaches the end of your article then instead of pasting the code between the purple lines paste it just below data:post.body tag and use the value onvisible instead of 40%.  The widget will display only on post pages and not on homepage or static pages. To display it on all pages, then simply delete the purple bolded lines

Researchers Develop Solar Panels That Still Let the Sunlight Through

0

In the last year, we’ve seen scientist try to put photovoltaic materials everywhere–the paint on your walls, in space, and even your coffee table. Now, a team of researchers from the University of California, Los Angeles (UCLA) and the University of California, Santa Barbra (UCSB) has developedtransparent solar panels that could be used as power-generating windows for your house.   The new transparent solar panels are a flexible, plastic cell that pulls energy exclusively from the infrared spectrum of the sun’s rays. At the same time, the panels allow the visible light to pass though pane that’s nearly 70 percent transparent. Previous attempts at developing transparent solar panels have always resulted in a poor balance between efficient energy production and transparency. These researchers, however, developed a special recipe that’s achieved a 4 percent power-conversion efficiency rate while being the most transparent solar panel ever created. [Credit: ACS Nano]The researchers created the clear solar panel by using a polymer that’s sensitive to near-infrared light overlaid with a silver nanowire composite as a transparent electrode. The biggest breakthrough of the research was the creation of a transparent electrode, produced by mixing silver nanowires with titanium dioxide nanoparticles, to replace the opaque metal electrode that was used in the past. Polymer solar cells are a particular item of great interest because they are lighter, more flexible and potentially cheaper to produce at high volume than traditional solar panels. If the scientists work out a way to mass-produce their clear solar cells, the cells could be integrated into every home, skyscraper, car, and mobile device. [UCLA and ACS Nano via Extreme Tech]  

Tablets, According to Staples

0

The original Kindle Fire.Amazon Readying Mulitple New Kindle 

 

Amazon has big plans for its coming onslaught of tablets to compete with Apple’s iPad and Google’s Nexus 7. Reuters reports Staples US Retail president, Demos Parneros as saying there are five or six upcoming tablets, among them a a 10-inch model. That 10-inch model would clearly be positioned against iPad, as well as a plethora of Android tablets. Rumors about a bigger Kindle Firehave been circulating for some time, but since Staples sells the Kindle Fire, this 10-inch model is a bit more believable now.

Amazon’s first-generation Kindle Fire.According to previous reports from BGR, the 10-inch Kindle Fire will be feature-packed with a quad-core processor, front-facing camera, microUSB port, and possibly an HDMI-out port. The new tablet will apparently be a major step up from the current Kindle Fire in terms of appearance and design.

Other Upcoming Kindle Fires

The original Kindle Fire tablet which Amazon debuted in September last year is due for a refresh any day now (rumors point to the end of July), so we could count the 7-inch Kindle Fire 2 as one of those other many tablets Amazon has planned. It’s not clear if the five to six tablets Pareneros mentioned are actually really two tablet models (a 7-inch and a 10-inch) with different storage options or even display resolutions—or if another Kindle Fire size is coming too. The Kindle Fire has a 1024 by 600 pixel resolution, but NPD DisplaySearch recently told CNet about an additional 7-inch model with 1280 by 800 pixels resolution—on par with the flying-off-the-shelvesGoogle Nexus 7. That high-resolution display will help make the Kindle better suited for reading. NPD DisplaySearch analyst Richard Shim also noted he expects an 8.9-inch Kindle Fire 2 with a 1920 by 1200 pixels full-HD display. It might not be the iPad’s (2048 by 1536 pixels) retina display, but the bump in pixels would certainly make the Kindle Fire more competitive. Digitimes alsoreported an 8.9-inch Kindle Fire is coming. Whatever this bunch of Kindle Fire tablets turn out to be, tablet wars will be in full swing before the holidays.  

Streaming Services Increase Pressure on TV

0

More choices in original programming are surfacing on Hulu and PlayStation 3. Who needs TV? The assault on traditional TV continues. While things over in the Netflix camp have been relatively quiet (their last big news was that Breaking Bad Season 4is now available for streaming) Hulu has continued to announce new shows.

hulu

For instance, last week Larry King returned to the small screen with the launch of Larry King Now on Hulu. King says (on Hulu’s blog) that it was the capturing of Osama Bin Laden that convinced him to come out of retirement. When coverage was all over the airwaves and King wasn’t part of it, he missed the rush and knew he had to get back in the business.
Dramatic story, but I’m not sure how it fits in with his first guest being Family Guy’s Seth MacFarlane. We’ll see what kinds of guests King on Hulu can draw.

playstation

Hulu has also announced its first international co-production. It is partnering with the BBC to produce a fourth season of satirical comedy show The Thick Of It. If, like me, you’re unfamiliar with the series you’ll be happy to learn that Hulu will start running the first 3 seasons on July 29.PaidContent has more info. Stepping away from Hulu, Sony has announced another streaming app coming to the Playstation 3. This time it’s The Laugh Factory. This app will offer stand-up routines from the Hollywood-based comedy club of the same name. It goes live on September 1 and will be free for all PS3 owners until December. After that it’ll cost $3/month.

ps3

Some PS3 owners seem to be skeptical of that monthly fee. I’m not much of a comedy fan (anyone will tell you I have no sense of humor) so it’s hard for me to judge the value. That seems pretty cheap even if a lot of the content can be found for free by searching YouTube or wherever. The convenience of having it all queued up on the PS3 seems like it’d be worth $3 to me, but I guess we’ll see. More info is available on the Playstation Blog. The other day I speculated that perhaps Sony was ramping up their video streaming efforts in response to Microsoft doing the same. Three new channels (NeonAlley, CrunchyRoll, and The Laugh Factory) in three days is a good start.
For more computing news, visit ITworld. Story copyright © 2011 ITworld Inc. All rights reserved.  

Firefox 15 Beta Tackles Memory Leaks

0

Mozilla has released a beta version of the next version of its Firefox browser with better memory management and significant speed improvements. “Firefox 15 prevents most memory leaks caused by add-ons, including Firebug,” Nicholas Nethercote writes in a Mozilla blog. Firebug is a Firefox add-on for debugging web pages. “For many users with add-ons installed, this will significantly reduce Firefox’s memory consumption, without requiring upgrades to those add-ons,” he adds. “For those users, Firefox 15 is likely to be faster (sometimes drastically so) and less likely to crash, especially if they have multiple add-ons installed and/or keep Firefox running for a long time between restarts.” Nethercote explains that add-on memory leaks are caused by “zombie compartments,” where information from web pages is stored and remains after you close a page or depart from it. Firefox 15 cleans out those compartments, a move that its developers weren’t entirely sure would work. Much criticism has been leveled at Firefox since its inception over its piggish memory practices, but in recent months it has made great strides in its memory management. Last November, for instance, it put SpiderMonkey, the Javascript engine used by the browser, on a diet. And in May, it announced its campaign to plug memory leaks in add-ons.

In addition to better memory management, Firefox 15 also supports theOpus audio format. The format, which can be played directly in Firefox 15, offers better compression formats like MP3, Ogg, or AAC; is good for both music and speech; can dynamically adjust bitrate, audio bandwidth and coding delay; and supports both interactive and prerecorded applications. “We think Opus is an incredible new format for web audio,” Timothy Terriberry writes in a Mozilla blog. “We’re working hard to convince other browsers to adopt it, to break the logjam over a common

format.” The “prime time” version of Firefox 15 is scheduled for avaiability August 28.  

Spam Halved With Grum Takedown

0

An international effort by spam fighters has taken down the infamous Grum botnet, slashing in half the worldwide amount of spam e-mail. Grum’s last servers were taken offline in Russia last week, effectively killing the botnet that has no fallback mechanism, said Atif Mushtaq, a researcher at FireEye’s security lab, which collaborated with the Russian Computer Security Incident Response Team and the Spamhouse Project in battling Grum. At its height, Grum was the world’s largest spam botnet, since January. Before the takedown, the botnet’s120,000 malware-infected, active computers were spewing 18 billion spam e-mail a day, or roughly a third of the world’s spam, said Trustwave. The impact of Grum’s collapse went beyond the spambot. Stopping Grum caused a slowdown in the world’s largest spam botnet, Lethic, Mushtaq said Thursday. “Due to this [international] community reaction, Lethic has gone underground for awhile.” With Grum down and Lethic quiet, the total amount of the world’s spam has been cut in half, at least temporarily, said Mushtaq. Aside from the numbers, the spam-fighters’ success is expected to have a chilling effect on Russian and Ukrainian spam operations, which can no longer assume the countries offer a safe haven, due to weak laws.

Security Teams Unite to Fight

The Grum operation was done without any involvement by law enforcement, showing that security researchers working together can also be effective in fighting botnets, which besides spam are used in denial of service attacks against websites.

With security researchers globally watching them, cybercriminals now have to deal with far more adversaries than in the past. “That will have a huge impact on the mindset of bot herders, and that may be the reason Lethic is going underground,” Mushtaq said. Bot herder is the name given to people who control hijacked computers, or bots, in an illicit network. Grum’s death leaves tens of thousands of inactive, malware-infected computers. But without the original master computer and the IP addresses of the infected systems, the botnet is unlikely to be resurrected. “There’s no way to hijack this botnet,” Mushtaq said. “[the computers] are lost to us and to bot herders.” The Grum-killing operation started about two weeks ago when authorities in the Netherlands pulled the plug on two servers. This led to other servers in Panama being taken offline early this week. In a cat-and-mouse game with spam fighters, the Grum operators launched more servers in Russia and the Ukraine. A service provider in Russia took the last of those computers off the Internet on Wednesday. How long spam numbers will remain down is unclear. Spammers are sure to start filling the gap at some point. “Major takedowns can have a perceptible impact for weeks, even months, but that doesn’t mean it will be the case here,” David Harley, senior research fellow at ESET, said in an e-mail.  

Psychedelic Dude Hexagram Version 1.0?

0

This was a question asked by a member of crowdanswers that I chose to answer here for the purpose of those who might be asking the same question.
Psychedelic Dude Hexagram Version 1.0 is a modified Version of the original abstract Image 766 of abstract image series by Bill M. Trace. This image is a derived image from the old 

Trusted, “PSYCHEDELIC DUDE”. This was expanded using the filter, “PERSSIANRUG” from DC special. This effectively quadrupled the original pixel size, since it was rather small. This went on to put the resulting image through the filter,

Kalaidoscope 2.1 by Mehdi, set to six mirrow petals, making it
A six pointed hexagram star.

Square Launches Election Fundraising Tool on iOS

0

With the 2012 election campaign heating up, Square on Friday added a new feature to its iOS-based card-reading system: The ability to make and collect campaign donations. Square CEO Jack Dorsey announced the new feature via Twitter, touting it as compliant with federal fundraising laws enforced by the Federal Election Commission. Using the card-reading device that attaches to an iPhone or iPad, candidate can accept on-the-spot donation at rallies and appearancesand Squares new fund-raising feature allows campaigns to collect FEC-required information on a donors name, address, occupation, and employer. The collected funds would be available for a campaign to spend the next day, the company said in a press release. Campaigns can also use Squares dashboard to track contributions and manage contributor information, the company said, while designating which staffers have access to the . It did not indicate whether Square would collect its customary 2.75 percent-per-swipe fee on transactions. Campaigns have grown increasingly sophisticated about using online resources in recent years; Barack Obama’s 2008 election campaign, for example, collected nearly half-a-billion dollars from online donors. The iPhone was an infant during that cycle, though, and the iPad didnt even exist. But now both Obama and his Republican challenger, Mitt Romney,have already started using Square to collect donations in this cycle. Fridays announcement opens up Squares services to federal candidates of all stripes. Users mustregister with the company in order to receive the card readers, which plug into the audio jacks of iPhones and iPads. The app itself is free, and compatible with all devices running iOS 4.0 or later.
For more Macintosh computing news, visit Macworld. Story copyright © 2011 Mac Publishing LLC. All rights reserved.  

Funny! Samsung-Apple Rivalry Spreads to Retail Stores

0

 

Apple and Samsung have been locked in unceasing patent battles over their offerings, and now some people are accusing Samsung of even ripping off the design of Apple’s retail stores. But Apple doesn’t own the corner on using an open floor design and it certainly didn’t invent the idea of minimalism. And any retail store that sells phones and gadgets is going to have tables for playing with them. Microsoft stores do. Samsung recently opened its first North American retail store in Burnaby’s Metropolis at Metrotown, Vancouver, British Columbia and it can’t be denied that it does resemble an Apple Store with its open floor space, demo tables, and blue-shirted staff. But is Samsung intentionally copying Apple Store design?

Image compilation from Apple/Vancouver, B.C. SunImage from BetaNews.com Apple uses wood tables and Samsung has gone with white. Big deal? Not really. From what I’m seeing, Samsung’s store looks similar to countless exhibits you’d see at CES. As for the blue shirts that both Apple Store and Samsung Store employees wear, it’s worth remembering that Samsung’s company color is blue. This is hardly the first time Apple and Samsung have tangled. The former managed to get the latter’s Galaxy Nexus smartphone and Galaxy Tab 10.1 pulled from store shelves recently. A graphic from BetaNews’ Joe Wilcox is a great summation of the attitude many people have regarding Apple’s incessant insistence that other companies, Samsung in particular, are ripping it off. What’s your impression? Does it look to you as if Samsung intentionally cloned the Apple Store in its new retail location?  

iOS Apps for Gamers, Artists, Social Media Users and Space Junkies

0
This week’s roundup of iOS apps is full of old favorites: Cookie Monster gets an app of his own, the creator of Angry Birds returns with Amazing Alex, and the popular Tiny Wings gets an update.

Already this week we told you about a new magazine-reading app called Next Issue, the new TED Books app, a new cloud storage service from Neat, and an updated offering from Stay.com–and we also brought you a roundup of the best comic-reading apps, just in time for Comic-Con.
Also, this week saw the launch of Business Card Reader HD, as well as updates to HipSwap,TheNote, and News360 for iPad applications.
Here are other new and updated apps that caught our eye this week.
Amazing Alex: The creators of Angry Birds have unveiled a new game that features neither rage nor avians. Amazing Alex is a $1 game for iPhone that features a “whiz kid”–one who comes up with Rube Goldberg-style chain reactions to do chores like cleaning his room. As Alex, you get to devise just how those creations will work, and share your most successful ideas with friends. There are 35 “interactive objects” to build with, and more than 100 levels to challenge players. Users can also download and play levels created by other players. None of those levels, however, involve destroying pigs.
Corel Cinco for Painter: This isn’t a standalone app, but artists and graphic designers may find it useful nonetheless: Corel Cinco for Painter is a free iPad app that makes your tablet into a companion tool for users of the desktop Corel Painter 12 program. The app lets users drag and drop buttons onto the screen–for sketching, accessing a color wheel, and other activities–to let users complete projects efficiently. The button placement can be customized according to your hand size and finger placement. Corel promises the app will make it easier to create an uninterrupted workflow by spending less time in Corel Painter clicking on icons and hot keys.
Google+Google+/Twitter: It was a big week for social networking services on iOS. Google+updated its free iOS app with full iPad support, the addition of the new Events feature, the ability to attach photos to posts, as well as the option to start and join Hangouts. Twitter’s free app, meanwhile, offers a range of updates: Avatars are now tappable, so that user profiles can be viewed more easily, and users can now set up notifications that let you know when particular people have tweeted. There are other improvements and changes, including a new Twitter bird, as well as an enhanced ability to see media posted to the service’s partner websites.
The Great Cookie Thief: COOKIES!!!!! Omnomnomnomnom! The folks who gave the world The Monster at the End of This Book have returned, shifting their sights from Grover to the Cookie Monster. The Great Cookie Thief, a $1 offering for iPhone and iPad, looks at first glance to encourage both obesity and larceny–but of course, there’s more going on here. Unlike its predecessor, The Great Cookie Thief is less narrative-driven and more focused on activities: Users can make wanted posters in their efforts to track down the thief, just one of a number of tools designed to help children build their visual identification and observation skills. There are also tips for parents on how to help their kids use the app. But no, the app does not include Cookie Monster’s “Call Me Maybe” parody video.
Spacecraft 3D: We’ll admit to worrying that NASA might be getting better at producing awesome multimedia than it is at putting astronauts into space. Luckily, that multimedia is really cool. Have you seen the Seven Minutes of Terror video about the latest Mars probe? Now there’s Spacecraft 3D, a free app for iPhone and iPad from the Jet Propulsion Laboratory, which gives users an up-close-and-personal look at the variety of satellites being used by NASA to explore the solar system and beyond. The app lets users see how the probes move, as well as get a look at the engineering feats used to construct them. Spaceflight is cool.
Tiny Wings. Image from iTunes.Tiny Wings: Macworld’s Phil Michaels called an earlier version of this $1 iPhone game “sneakily challenging and frighteningly addictive.” Now developer Andreas Illiger has updated Tiny Wings to version 2.0, adding a new Flight School game mode in which you compete against AI opponents, as well as 15 levels of gameplay, and upgraded graphics for Retina display. There’s also now iCloud support, allowing users to sync the game with its iPad version. (Said iPad version also includes a local split-screen multiplayer mode.) The fundamentals of gameplay remain familiar, however: The birds have (natch) tiny wings, and use hills and momentum to give them flight throughout the game. Fly, little birds, fly!
Macworld
For more Macintosh computing news, visit Macworld. Story copyright © 2011 Mac Publishing LLC. All rights reserved.

A Look at the Worst Security Snafus of 2012 So Far!

0

Could things really be this bad? From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches, security snafus have ruled the first half of 2012. Here’s a look at some of the worst snafus month-by-month.

The year started off with the FBI raiding the cloud file-sharing and storage Megaupload site, based in Hong Kong and founded by 38-year-old New Zealand resident Kim Dotcom, on content piracy charges to the tune of $175 million. And that action, supported by the U.S industries which hailed it as bringing down a big fish that was devouring their intellectual property, has triggered a year’s worth of lawsuits and retributions from all even remotely involved. It turned confrontational when outraged users of Megaupload were invited by hactivist group Anonymous to attack law enforcement and industry websites supporting the raid by downloading do-it-yourself denial-of-service software such as Slowloris. But by March it was apparent some of this DoS advice came from hackers who were merely tricking users into downloading Trojan software, such as Zeus, from infected links. Another twist: A New Zealand judge in March ruled an order granted to law enforcement allowing them to seize luxury cars and other personal effects of Dotcom is invalid mainly because the local police commissioner applied for the wrong type of seizure order that was requested by the U.S. That ruling mean Dotcom has a chance to get back some of his enormous bling, like his Rolls-Royce and pink Cadillac, seized during his arrest at his mansion outside Auckland. But of course, attorneys for the U.S. are arguing otherwise,. Dotcom, free on bail but subject to electronic monitoring, is expected to undergo extradition proceedings in August. Other January Snafus: ” Online retailer Zappos disclosed hackers had likely broken into its network and stolen information on Zappos.com customers, including name, address, billing and shipping address, phone number and the last four digits of credit-card numbers and cryptographically scrambled passwords stored in hash form. Zappos informed customers all passwords were expired and customers should create a new one. ” Researchers from Seculert discovered what they say is a botnet command-and-control serverholding 45,000 login credentials Facebook users exploited by a pervasive worm, Ramnit, infectingWindows and designed to infect computers and steal social networking usernames and passwords. ” Source code used in older Symantec enterprise security products, Symantec Endpoint Protection 11.0 and Symantec AntiVirus 10.2, as well as older versions of pcAnywhere and Norton Internet Security, was exposed online by hackers calling themselves Lords of Dharmaraja with a leader named Yama Tough in Mumbai. The gang claimed to obtain the code from a third-party associated with the Indian military. Symantec, acknowledging the authenticity of the source code, also said the security firm had been subject to the hackers vainly trying to extract an extortion payment of about $50,000 in exchange for not posting the stolen code. Symantec engaged in a cat-and-mouse game to catch them, with help from law enforcement — but so far without apparent success. Symantec said it isn’t certain where the hackers obtained the stolen cache of source code, and the security incident did prompt Symantec to devise security patches it advised some customers using older software to apply, with additional outreach to customers around the incident related to the stolen source code. FebruaryRight in the midst of a conference call the FBI was having with its agents and law-enforcement officials overseas at Scotland Yard, cybercriminals hacked their way into the phone conversation, recorded it and posted it online. The conversation was about hackers facing charges in the U.K. The group Anonymous took credit for the intercepted call. The FBI said it appeared likely the cybercriminals may have hacked into a law-enforcement official’s email to get the information for the conference call dial-in. Other February Snafus: ” Brazilian banks were targets for distributed denial-of-service attacks, with massive assaults against HSBC Brazil, Banco da Brasil, Itau Unibanco Multiplo SA and Banco Bradesco SA. Hactivists took credit for the DDoS spree. ” Whistleblowing website Cryptome.org, dedicated to exposing confidential information, was compromised by an intruder that loaded an attack code that tried to launch drive-by exploits at visitors to the site. ” The University of Florida had to notify 719 individuals that their Social Security numbers were improperly stored on a state website operated by the Bureau of Unclaimed Property for more than six years. ” Verizon had to acknowledge the Verizon 4G LTE network was knocked offline again just two months after its last serous outage. The outage on Feb. 22 lasted from about 10 a.m. to 1:20 p.m. ” Microsoft’s Azure cloud infrastructure and development service experienced a serious worldwide outage on Feb. 29. Microsoft later blamed the outage on a “Leap Year Bug” that was triggered in a key server housing a certificate that had expired on midnight on Feb. 28, and a time-calculation control hadn’t taken into account the extra day in the month of February this year. ” Taiwan-based Apple supplier Foxconn was hacked by a hacker group calling itself Swagg Security, apparently in protest related to media reports about poor working conditions at the electronics manufacturer’s factories in China. The hackers posted usernames and passwords that they said would allow attackers to place fraudulent orders under other companies’ names, including Microsoft, Apple, IBM, Intel and Dell. ” The FBI arrested a computer programmer in New York and charged him with stealing proprietary software code from the Federal Reserve Bank of New York (FRBNY). The software is known as the Government-Wide Accounting and Reporting Program (GWA), which handles all kinds of U.S. government financial transactions, and it cost over $9 million to develop. The accused thief, Bo Zhang, a contract employee at FRBNY, used the GWA code in a private business he ran to train individuals in computer programming. Zhang, a Chinese citizen in the U.S. on a work visa since 2000, is also known as “Bryan Zhang,” and in a plea agreement in April he pled guilty to theft of government property, admitting he’d copied the code onto an external hard drive and then transferred the GWA program to a home computer, knowing that was wrong. March At least 228,000 Social Security numbers were exposed in a March 30 breach involving a Medicaid server at the Utah Department of Health, according to officials from the Utah Department of Technology Services and Utah Department of Health, which theorized that attacks from Eastern Europe bypassed security controls because of configuration errors. In May, Utah CIO Steven Fletcher resigned because of it. Other March snafus: ” The Vatican found its websites and internal email servers subject to a weeklong attack after the Anonymous collective said it was felt justified in this by the fact that the Vatican Radio System has powerful transmitters in the countryside outside Rome that allegedly constituted a health risk, including supposedly “leukemia and cancer,” to people living in the vicinity. Another justification given were claims the Vatican allegedly helped the Nazis, destroyed books of historic value and that the clergy sexually molested children. ” Hackers in the LulzSec group associated with the broader Anonymous movement found the tables turned when they were arrested by the FBI and European law-enforcement agencies — and it was LulzSec leader Hector Xavier Monsegur, alias “Sabu,” who turned in his friends as part of a deal to work as a stooge for the FBI after being arrested in New York City last year. ” By the end of March, LulzSec claimed to be “reborn” and took credit for hacking a dating website for military personnel, MilitarySingles.com, leaking more than 160,000 account details from its database. ” Dutch police arrested a 17-year-old suspected of compromising the account data on hundreds of servers belonging to telecommunications operator KPN. The teenager, arrested in the Dutch town of Barendrecht, “made a confession,” according to Dutch authorities. In the wake of the hacking spree, KPN said it would appoint a chief security officer and set up a permanent control center to monitor its systems. ” A flaw was discovered in Barclays contactless bank cards that could allow customers’ data to be stolen and used fraudulently with them knowing about it, according to an investigation by ViaForensics in conjunction with Channel 4 News. But Barclays dismissed the claims as inaccurate. ” Security firms knew there was trouble when Kaspersky Lab identified code-signed Trojan malware dubbed Mediyes that had been signed with a digital certificate owned by Swiss firm Compavi AG and issued by Symantec. Symantec said it found out that the digital certificate’s private key held by Compavi had indeed been stolen; whether by an insider or an outside attacker wasn’t known. ” A security firm based in Slovakia, ESET, asserted a website operated by the country of Georgia has been used as part of a botnet to conduct cyber-espionage against that country’s residents. But ESET researchers admitted they aren’t sure whether the Win32/Georbot they have been monitoring is being directly operated by the Georgian government or by cyber-spies through a compromised Georgian agency. AprilThe Federal Communication Commission fined Google $25,000, asserting the search-engine giant impeded an investigation into how Google collected data while taking photos for its Street View mapping feature. The FCC maintained in a report that Google “deliberately impeded and delayed” the investigation for months by not responding to requests for information and documents. But the FCC also said it won’t take action against Google over its data collection because it still has questions it wants answered. The FCC had subpoenaed an unnamed Google engineer — now known to be Marius Milner — but he had apparently declined to testify, invoking his Fifth Amendment rights against incriminating himself. Other April snafus: ” Hactivist group Anonymous brought down the websites of trade groups U.S. Telecom Association and TechAmerica, apparently for their support of the cybersecurity bill proposed by Rep. Mike Rogers that would allow the private companies and the government to share any information “directly pertaining to a vulnerability of, or threat to” a computer network. Privacy advocates, including the ACLU and Center for Democracy and technology, contend the bills shreds privacy protections. ” A U.S. grand jury charged two residents of China with 46 criminal counts, including infringing software copyrights and illegally exporting technology to China, for allegedly operating a website that sold pirated software used in engineering, manufacturing, space exploration, aerospace simulation and design, and other fields, with a commercial value of other $100 million. Xiang Li, 35, was earlier arrested by agents from the U.S. Immigration and Customs Enforcement’s Homeland Security Investigations in Saipan, Northern Mariana Islands. Chun Yan Li remains at large. Both face charges in the U.S. District Court for the District of Delaware. ” A 31-year-old Russian national living in New York, Petr Murmylyuk, was charged with hacking into accounts at Fidelity, Scottrade, E*Trade and Schwab in a complex scheme that involved making unauthorized trades that profited the gang he recruited to open bank accounts to receive the illegal proceeds. The brokerage firms said they lost $1 million because of Murmylyuk’s fraud. ” VMware’s ESX source code was stolen and posted online, but VMware said the code, amounting to a single file from sometime around 2003 or 2004, doesn’t mean any increased risk to VMware customers. Security firm Kaspersky said it believes the code was stolen from a Chinese company called China Electronics Import & Export Corporation during a March breach. ” A terminal at New Jersey’s Newark Liberty International Airport was shut down for more than an hour on April 27 after officials discovered that a baby hadn’t been properly screened. The baby in question had been handed back and forth between the parents after a metal detector went off sounding an alarm with the mother holding the baby. The father had already gone through the screening, and the parents and baby left the checkpoint to head to the gate. But Transportation Security Administration officials decided to “err on the side of caution” to shut down the terminal and go locate the baby to make sure it went through screening. Some passengers that had already boarded flights said they had to evacuate it and go through security screening again. Speaking of the TSA, one of the agency’s critics, security expert Bruce Schneier, who is involved in a lawsuit with the agency to get them to stop the TSA’s full-body scanner program, had been invited to testify before Congress about the TSA but the House Committee on Oversight and Government Report then “uninvited” Schneier last March after the TSA formally complained about him, obviously preferring not to be challenged directly by him right in front of Congress. ” Automotive manufacturer Nissan admitted a data breach involving employee user account credentials had occurred, and that it had to spend some time cleaning its network of the malware apparently responsible for that before disclosing the breach. ” The hacker who stole Facebook’s source code, Glenn Mangham of York, England, offered an explanation of why he did it, saying, “I was working under the premise it is sometimes better to seek forgiveness than to ask permission.” He said he did little to hide his actions and that even if he got caught, Facebook would let him off the hook. But that didn’t happen, and Mangham was sentenced to eight months in prison in February, though the sentence was reduced to four months by an appeals court in April. He said he only had the source code for three weeks, but never had any intention of selling it to anyone who might exploit it for scams, for example. Mangham even made the grandiose claim that his basic good intentions saved Facebook from “potential annihilation.” ” Payments processing services company Global Payments acknowledged a data breach of up to 1.5 million card numbers had been stolen in a data breach, and in June also said it was investigating whether a server containing merchant applicants’ information had also been breached. Global Payments said its PCI compliance status had been revoked by some of the card brands because of the breach and it was working to regain it. MayHackers claimed to have breached the systems of the Belgian credit provider Elantis and threatened to publish confidential customer information if the bank did not make an extortion payment of $197,000. Elantis confirmed the data breach but said the bank will not give in to extortion threats. Meanwhile, Anonymous claimed it hacked a U.S. Department of Justice website server tied to the U.S. Bureau of Justice Statistics and claimed to release 1.7GB of stolen data from it, with the statement, “We are releasing it to end the corruption that exists, and truly make those who are being oppressed free.” The data was offered on The Pirate Bay. And then Yahoo accidentally leaked the private key that was used to digitally sign its new Axis extension for Google Chrome. Axis is a new search and browsing tool from Yahoo. Security blogger Nik Cubrilovic discovered the package included the private crypto key used by Yahoo to sign the extension, noting it offered a malicious attacker the ability “to create a forged extension that Chrome will authenticate as being from Yahoo.” Yahoo was forced to release a new version of its Axis extension for Google Chrome after that. June The University of Nebraska in Lincoln acknowledged a data breach that exposed information of more than 654,000 files of personal information on students and employees, plus parents and university alumni. The information was stolen from the Nebraska Student Information Systems database; a student is the suspected culprit. Other June snafus: ” Hacker gang Swagger Security strikes again, this time breaching the networks of Warner Bros. and China Telecom, releasing documents and publishing login credentials. The group said it notified China Telecom of the hack by planting a message in the company’s network. “Fortunately for them, we did not destroy their infrastructure and rendered [stet] millions of customers without communications,” Swagger Security, also known as SwaggSec, said in a note. ” About 6.5 million cryptographic hashes of LinkedIn user passwords were stolen and posted online, a breach LinkedIn acknowledged though it didn’t discuss specific numbers, which may be much less due to duplicates. LinkedIn invalidated the passwords of impacted users and the company said emails will be sent to users whose passwords were compromised, though it warned about updating passwords via links sent in email. ” Right after the LinkedIn fiasco, dating site eHarmony also confirmed a breach of 1.5 million passwords that were hashed. ” The Federal Trade Commission announced that data broker Spokeo will pay $800,000 to settle FTC charges it sold personal information it gathered from social media and other Internet-based sites to employers and job recruiters without taking steps to protect consumers required under the Fair Credit Reporting Act. ” The New York Times article asserting that the cyber-weapon Stuxnet is a creation of the U.S. with Israel, and was launched in a covert action authorized directly by President Barack Obama against an Iranian facility suspected of developing a nuclear weapon, has stirred up a firestorm of controversy in Washington about leaked information. Now that another cyber-weapon for espionage, Flame, has been discovered and linked directly with Stuxnet, there’s more concern, with the United Nations division International Telecommunication Union warning countries that Flame is dangerous, and some saying the U.S. is losing the moral high ground as its secret cyberwar efforts become known. Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. For more information about enterprise networking, go to NetworkWorld. Story copyright 2011 Network World Inc. All rights reserved.  

Yahoo Patches Password Leak

0

Yahoo says it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one of its many services.

The company also provided more information about whose passwords had been pilfered. “We have…now fixed this vulnerability, deployed additional security measures for affected Yahoo! users, enhanced our underlying security controls and are in the process of notifying affected users,” the company announced in a post to its blog early Friday. Yahoo has offered no specific information about the attack, how it was carried out or even when. Itconfirmed the attack Thursday. The hacker group D33Ds Company took responsibility for the breach, saying it had exploited a basic SQL injection vulnerability in a Yahoo service to steal the usernames and passwords associated with 453,000 accounts. The group published the passwords and e-mail addresses on the Web.

Hack Affects Associated Content Accounts

Yahoo also confirmed that the stolen account credentials belonged to registered users of its Yahoo Contributor Network, which was previously known as Associated Content. Yahoo Contributor Network is a platform that generates high-volume, low-cost content by letting writers photographers, and others share their work with Yahoo members and earn money based on the traffic their content generates. Users who contribute to the network are required to sign in using a Yahoo, Google or Facebook ID.

Associated Content, which was founded in 2005, was bought by Yahoo for just over $100 million in May 2010. Yahoo renamed the service in late 2011, when it also launched Yahoo Voices, a portal where users access content posted by the Yahoo Contributor Network. According to Yahoo, only people who registered as providers with Associated Content before the 2010 acquisition were affected by the password theft. “[The] compromised file was a standalone file that was not used to grant access to Yahoo! systems and services,” Yahoo maintained. Just under a third of the stolen passwords were linked to accounts registered to a yahoo.com e-mail address, security company Rapid7 said Thursday. Significant chunks of the file, however, were composed of Gmail (23.6 percent of all accounts) and Hotmail (12.2 percent) addresses. All users with older Associated Content accounts, no matter the e-mail address used, should immediately change the passwords for those e-mail accounts as well as any identical or similar passwords used to secure other online services or websites, security experts have said. Rapid7 security researcher Marcus Carey said Thursday that the file published by D33Ds included 123 government e-mail accounts — ones ending with “.gov” — and 235 military-related addresses (ending with “.mil”). Among the government e-mail accounts, Carey found several associated with the FBI, the Transportation Security Administration (TSA) and the Department of Homeland Security (DHS).

Security Experts Blast Yahoo

Security experts have been scathing in their criticism of Yahoo, in large part because the passwords were stored in plain-text, making the hackers’ job of exploiting the stolen accounts a breeze. Mark Bower, a data protection expert and executive at Voltage Security, said, “It’s utter negligence to store passwords in the clear.” Rob Rachwald, director of security strategy at Imperva, also took Yahoo to the woodshed. “To add insult to injury, the passwords were stored in clear text and not hashed (encoded),” Rachwald wrote in a blog post. “One would think the recent LinkedIn breach would have encouraged change, but no. Rather, this episode will only inspire hackers worldwide.” The LinkedIn breach Rachwald referenced came to light last month, and involved approximately 6.5 million encrypted passwords belonging to members of the networking service. In its Friday blog, Yahoo again apologized to users affected by the password theft.  

Google+ Hangouts Host Olympic Athletes

0

Google’s Hangout feature is once again giving Google+ users a chance to get closer to the stars, this time with a Olympic twist. The New York Times-sponsored series started on Wednesday with basketball stars Carmelo Anthony of the New York Knicks, and Chris Paul of the Los Angeles Clippers. Both are members of the 2012 USA Basketball team. The hangouts will run through next Tuesday.

Google Hangouts have been a favorite stop of politicians, celebrities, and friends.President Obama used the feature to connect with voters back in January, and musical artists the Black Eyed Peas participated in a hangout last October to chat with fans shortly before they took the stage at a concert in New York City. But with the Olympics coming up in short order, it makes sense for these hangouts to feature some of America’s top athletes, doesn’t it? That said, the list of athletes participating is heavy in the marathoner department, with three runners. Friday’s chat featured Shalane Flanagan, a long distance runner planning to participate in the Olympic Marathon. Monday’s Olympic Games Hangout will also feature another runner, male marathoner Ryan Hall, who is expected to contend for a medal in London. His Google Plus hangout begins at 2 p.m. ET. Hall will be followed by brothers Bob Bryan and Mike Bryan, the second ranked men’s doubles team in the world and widely expected to earn a medal in the Olympic tennis tournament. Their chat occurs at 5 p.m. ET Monday.

The Hangout series ends on Tuesday at 6 p.m. ET, with yet another marathoner, Kara Goucher. All chats occur from The New York Times’Google+ page. If you would like to ask a question, either comment on the post announcing the Hangout or post the question to your own Google+ wall with the hashtag #London2012Hangout. Those with the best questions will get the chance to ask them live of the athletes during the event, the paper says.  

iPad Enters Qantas Cockpits

0

 

Australian airline Qantas has announced that it will be giving its pilots iPads for use during flights. Qantas has teamed up with mobile provider Telstra to bring more than 2200 64GB iPads to the cockpit to enable pilots to access operational information digitally, replacing paper charts, flight plans, manuals and forms for good, reports GeekZone.
Currently, Qantas prints around 18,000 pages a day, a figure that will be reduced to just 3000 pages with the introduction of iPads. Plus, the weight of the paper on board will drop by 44 pounds (20 kilograms). Each of the iPads will have two apps that have been developed specifically for use by pilots. One app is for flight charts and the other is developed by Qantas itself for other flight information. “The revolutionary capabilities of iPad technology, combined with the powerful customized apps, give our pilots the ability to replace cumbersome hard copies — saving time, resources and costs,” said Qantas Technical Pilot, Captain Alex Passerini. Several other airlines have also been scrapping paper for iPads over the past couple of years, including Alaska Air. It’s not just pilots that are getting their hands on iPads, U.K. officials are also being given iPads as desktop PC and laptop replacements in order to reduce printing costs. Scientists are also getting equipped with Apple’s tablet. Qantas already provides iPads for passengers on board certain of its flights, as do several other airlines.  

How to Add Attribution Links to Texts Copied from your Website/Blog

The world is changing rapidly, don’t let your pains-taking articles go without credits. What am about to introduce to you are mostly used by cooperate news websites like ehow and the likes. This widget is a free service provided by tynt, it automatically add a credit (attribution) links to any text that is copied from your blog or website, it works on blogger, wordpress and websites.

Why is important to use the tynt widget? If you added the floating Social or social media button we earlier discussed in our forum then I suppose many people will be bookmarking or sharing your post using this button. Now when someone shares your article via email our any of the sharing options it automatically add your link at the bottom of the post. Like me, you might be wondering how you can acquire the services of this great widget in your blogger blog, wordpress blog or website. No need to hurry, listen and let me brief you on what you really need to know about this widget.

Important: If you are running a tutorial blog and share a lot of codes, it is potentially recommended that you do not add this to your blog as it will automatically and some texts to the code you are sharing.

Install Tynt on your site

Here we go, follow the simple steps below to install this feature on your blogger blog, wordpress blog and website.
  1. Sign up at tynt
  2. Submit your Email and in the Domain field submit your website address without adding http:// and the back slash (/) at the end of URL. Your link should look as follows:
e.g: If you are using a sub-domain your link should like this: eobasi.blogspot.com
    If you are using a full domain then your link should look like this: www.ewtnet.com
     3.  Accept the privacy agreement and hit Submit
     4. Now you will be provided with a code. Do not copy it and first Click the customize Script button just below that code
customize script
  5. Then click the customize attribution button on next page
  6. You can now customize what text to display and what to hide. If you wish you can only display the read more link and disable  Attribution and social profile links by keeping their fields empty.
Submit your twitter and Facebook usernames if you would like to show them below copied text.
You can also decide whether to display the article URL or Page Title or both. Set URL to canonical. Set placement to “below the copied text” for better chances of being ignored by the copier.
See the screenshot below for settings:
     7.   Click Save and then press Done

      8.  Copy the code and go to your Blog (blogger or WordPress). Inside your template search for the closing head tag

</head>

Paste the tynt script just above this tag.

Tip: Blogger users may go to Template > Edit HTML > Proceed and then search the tag.
Tip: Wordpress users will find the head tag by going to Appearance > Editor > header.php
       10.  Save your template and you are all done!
Visit your blog and copy a snippet of any text you like and then paste it anywhere to see the attribution links working just fine.

Track Reader Engagement

By going to your Homepage at tynt account, you will see 4 options to track the text being copied.
  1. SEO:
  2. Keywords: This is where you will see which keywords are copied the most
  3. Content
  4. Social
You play around with these options to take maximum benefit out of this free tool.

Earn Real Money Online with Google Adsense

1

Adsense is considered as one of the most powerful tool in a website publisher’s arsenal. It enables a person to monetize their sites easily. If used properly, it can generate a very large and healthy income for them.

However if you are not using them rightly and just maximizing the income you squeeze from it, you are actually leaving a lot of money on the table. Something all people hate doing.

Start Earning with Google Adsense

How you can start earning money with Adsense can be done easily and quickly. You will be amazed at the results you will be getting in such a short period of time. Start by writing some quality content articles which are also keyword incorporated. There are a lot of people given the gift of being good with words. Writing comes easy for them. Why not make it work in such a way that you will be earning some extra cash in the process.

New Google AdSense Interface (Year: 2016)

There are actually three steps to put into mind before you begin writing your ads and having an effective Adsense.

  1. Keyword search

    Find some popular subjects, keywords or phrase. Select the ones which you think has more people clicking through. This is actually a keyword selector and suggestion tool that some sites are offering to those who are just their Adsense business.

  2. Writing articles

    Start writing original content with keywords from the topics that you have achieved in your search. Take note that search engines are taking pride in the quality of their articles and what you will be writing should keep up with their demands.

  3. Quality content site

    Build a quality content site incorporated with Adsense ads that is targeting the subject and keywords of your articles and websites. This is where all that you’ve done initially will go to and this is also where they will prove their worth to you.

The proper positioning of your ads should be done with care. Try to position your ads where surfers are most likely to click on them. According to research, the one place that surfers look first when they visit a certain site is the top left. The reason behind this is not known. Maybe it is because some of the most useful search engine results are at the top of all other rankings. So visitors tend to look in that same place when browsing through other sites.

Techniques to Maximize your Adsense Earning

Some of those who are just starting at this business may think they are doing pretty well already and thinking that their clickthrough rates and CPM figures are quite healthy. However, there are more techniques and styles to generate more clicks to double your earnings. By knowing these techniques and working them to your advantage, you will realize that you will be getting three times more than other people who have been previously doing what they are doing.

Finally, Adsense has some excellent tracking statistics that allows webmasters and publishers to track their results across a number of site on a site by site, page by page, or any other basis you wanted.

You should be aware of this capability and make the most of it because it is one powerful tool that will help you find out which ads are performing best. This way, you can fine tune your Adsense ads and focus more on the ones being visited the most rather than those who are being ignored.

Another thing you should know. Banners and skyscrapers are dead. Ask the experts. So better forget about banners and skyscrapers. Surfers universally ignore these kinds of ad formats. The reason behind this is that they are recognized as an advert and advert are rarely of any interest that’s why people ignore them.

To really start making money with Adsense, you should have a definite focus on what you wanted to achieve and how you will go about achieving them. As with any other kind of business ventures, time is needed coupled with patience.

Do not just ignore your site and your Adsense once you have finished accomplishing them. Spare some time, even an hour, making adjustments to the Adsense ads on your sites to quickly trigger your Adsense income. Give it a try and you would not regret having gotten into Adsense in the first place.

Mozilla Puts the Brakes on Thunderbird

0

Mozilla may be best-known for its popular Firefox browser, but some 20 million users around the globe also know it for Thunderbird, its free and open source desktop email client.
Just a month after the release of the latest version 13 of Thunderbird, however, a leaked email on Friday apparently forced Mozilla to admit that it’s putting the brakes on internal Thunderbird development.


“Once again we’ve been asking the question: is Thunderbird a likely source of innovation and of leadership in today’s Internet life? Or is Thunderbird already pretty much what its users want and mostly needs some on-going maintenance?” wrote Mitchell Baker, chair of the Mozilla Foundation, in a blog post on Friday.
Mozilla’s conclusion, it turns out, is that “ongoing stability is the most important thing, and that continued innovation in Thunderbird is not a priority for Mozilla’s product efforts,” Baker added.
Accordingly, it has developed a plan that “provides both stability for Thunderbird’s current state and allows the Thunderbird community to innovate if it chooses,” she explained.
Two Thunderbird Tracks
Specifically, Mozilla will continue to provide security maintenance updates through an Extended Support Release (ESR) process similar to what it has for Firefox targeting large organizations that use the software.
There is already a Thunderbird ESR version, and the next release of that software is due in November. “It will inherit the then-current Thunderbird feature-set,” Mozilla explains in an article on the MozillaWiki. “This release will be updated every six weeks, for the duration of the ESR cycle to ensure the best possible security and stability for organizations.”
The non-ESR version of Thunderbird, meanwhile, will be released with the same feature set as Thunderbird ESR and will be updated every six weeks for security and stability. Unlike Thunderbird ESR, however, this version could evolve over time feature-wise if members of the community choose to work on it.
Baker’s sentiments were largely echoed in a follow-up blog post on Sunday by Thunderbird Managing Director Jb Piacentino, who noted that Mozilla is increasingly shifting its focus towards Web and mobile projects such as FirefoxOS.
A Final Plan in September
Indeed, as Web-based email services skyrocket in popularity, it’s not entirely surprising to see Mozilla make this move.
Still, as a longtime user of Thunderbird, I can’t help but feel a little sad. I hope that some passionate fans out there will pick up the project and keep it vibrant, but Baker doesn’t sound entirely confident that that will happen.
Who knows? Maybe we’ll even see Ubuntu Linux maker Canonical step in, as at least one observer has suggested.
In any case, Mozilla is interested in any feedback, particularly from potential developers interested in picking the project up. It aims to share a final plan of action in early September, Piacentino says. I’ll let you know if I hear any significant news before that.

Create a Bootable Mac OS X Flash Drive

1
mac osx

A bootable Mac OS X thumb drive comes in handy when you need to troubleshoot OS issues for yourself, your family, or your friends. It’s also extremely useful for keeping your basic setup consistent across multiple computers, if you find yourself switching hardware regularly; and I’ve had fun in the past setting up a bootable USB keychain loaded with all the apps and files I need to turn any Mac-compatible computer into a viable media center quickly and easily.
With Mac OS X Lion and a new piece of free software, it’s easier than ever to create a USB keychain that you can boot from. All you need is a few minutes, a copy of Lion, and a USB flash drive with at least 4GB of storage (though more is preferable).

Preparation

The first step in getting Lion onto your USB drive is to obtain a copy of the OS itself. Unfortunately, the file you download from the Mac App Store to your computer deletes itself after you update to Lion, so you’ll probably need to re-download the OS update.

This is a simple but slightly time-consuming process. Go into the App Store application and open the Purchases tab at the top of the screen. From there, you should see OS X Lion as one of your previous purchases.

Click the Download button next to Lion, note the directory that it downloads to and wait for the download to finish. During testing it took me about 50 minutes to re-download the 4GB or so of content that comprises Lion.

Create a Bootable Mac OS X Flash Drive

Once the OS has finished downloading (and you’ve verified that Lion has landed safely in your Applications folder), you’re ready to transfer it to your trusty USB flash drive.
If you already own a copy of OS X Lion, you should be able to download a fresh copy at any time from the Purchases tab of the Mac App Store.

To streamline the process, download the free Lion DiscMaker app. Downloading a third-party app just to handle this process is a bit of a bother, but Lion Discmaker enormously simplifies the process of installing Lion on a USB keychain.

Now, before you start formatting your drive, back up anything currently on your flash drive that you’d like to keep–because this process will completely erase the contents of the USB drive and rewrite it with a copy of Lion. You have been warned!

Creating Your Bootable Drive

Lion DiscMaker makes this part of the process a snap. Start the Lion DiscMaker app with your USB flash drive plugged in and with the Lion install file sitting inside your application folder. The app will give you the option of creating a bootable drive out of either a DVD or a USB keychain.

Select the USB keychain option. (If you happen to own a Mac with a disc drive, consider creating a DVD backup of Lion. I prefer keeping Lion on a USB keychain so that I can add files to the USB drive to customize the installation; but if you’re just looking for a bootable copy to troubleshoot your hardware, feel free to go with the DVD option and save yourself a little cash.)

Create a Bootable Mac OS X Flash Drive


Lion DiscMaker makes it easy to create a bootable thumb drive.
Once you’ve indicated that you want use a bootable drive, the app will ask whether you’d like to use a USB thumb drive or some other kind of disk. Select the USB thumb drive option again; and when prompted, choose the disk that you’d like to install Lion to. Select your flash drive and you should be ready to rock.

If you’re using a thumb drive that has only 4GB of free space, Lion DiscMaker will remind you that you won’t get a complete of OS X Lion package because there won’t be room for the “additional speech voices” package. This should be no great loss. Select Okay and then, to confirm that you’re aware the volume will be erased, click the Erase then create the disk button.

The copy procedure will take a few minutes and will open a few windows in your finder automatically, but Lion Discmaker should automate the whole process. All you have to do is wait for your Mac to cease displaying its “Copy in progress, please wait…” message, which will indicate that DiscMaker has finished installing Lion onto your flash drive. Once that’s done, you’ll have a bootable USB flash drive that fits in your pocket and can handle system recovery, OS installation, and even basic Web browsing in a pinch.

If you have any space left over on your flash drive, you can add a few of your favorite applications and files, to customize a new installation. Regrettably, these files won’t be accessible when you boot directly from the USB flash drive; but once the installation is finished, they can help you save considerable time while setting up a new computer.

Of course the bootable drive that this method creates is no substitute for a fully customized Mac OS X Lion-based computer, but considering how fast and easy the drive is to set up–and how much time it could save you the next time you need to reinstall or troubleshoot your Mac OS X–there’s no good reason not to make your own bootable copy of Lion to carry in your pocket. Good luck!

Sponsored