Sunday, September 30, 2012

APPLE NEW MAPPING SERVICE APPLICATION

Yesterday, Tim Cook penned a letter to iOS 6 users, apologizing for the sorry state of their new Maps application and promised that they are working hard to make it better. While most would have stopped at that, Cook went on to suggest alternative mapping services that users can use till Apple Maps becomes usable.



Now, Apple has gone one step ahead and created a section in the App Store that can you can find on your iPhone, titled ‘Find Maps for your iPhone’. Clicking on it will show you a bunch of different mapping services, free and paid, that you can download and install on your iOS device.
What’s missing from the list are Google and Nokia’s services, but that’s because they don’t have a dedicated application for iOS. Apple has, however, provided a dedicated page, where you can find out how to access their web services and save it as an icon on your homescreen for quick access.

google map service in india with feature navigation

Although the basic Google Maps service has been available in India for years now, some of the fancier features such as Navigation remained unavailable. That is, until now.



Google has now enabled the Navigation feature in India, which means now along with being able to get driving directions you will also have a voice reading them out so you can focus on the road instead of your phone’s display.
Along with voice navigation, Google is also offering live traffic updates for major roads in six large Indian cities and their surrounding suburbs: Bengaluru, Mumbai, New Delhi, Chennai, Pune and Hyderabad. This feature is also available on the desktop version of Google Maps. As usual, it will use colors to indicate the intensity of the traffic so you can avoid the congested roads.
The feature is now live within the existing application (no need for an update) and can be used by anyone with Android 2.2 and above.



Sunday, September 23, 2012

GOOGLE NOW..EASILY CONFIGURE NOW


What is Google Now?

There’s some confusion out there in the Android world. Google Now is not Android’s “Siri killer”, that’s Voice Search (which you can get to and use from within Google Now). Google Now is much, much more than an application that listens to queries and spits out answers. I’m not even sure we can call Google Now a virtual assistant either. Google Now is about automating your life and in return, making your life easier. Google Now does that by providing a vast amount of information, pertinent to you, at your fingertips. There’s just one catch though. Those of your that often go full tin foil hat mode really won’t be able to fully enjoy Google Now to its’ full potential. So take off your head gear and let’s get started.
[Google Now] tells you today’s weather before you start your day, how much traffic to expect before you leave for work, when the next train will arrive as you’re standing on the platform, or your favorite team’s score while they’re playing. And the best part? All of this happens automatically. Cards appear throughout the day at the moment you need them.

How to setup Google Now

To get started, you’ll first need to launch Google Now from either your lock screen by swiping up towards the ‘Google’ icon or by swiping up from any of your soft keys. You can press in and swipe up from the back arrow, home key, and recents key.

If you haven’t launched Google Now until…now… you’ll need to tap through the welcome screen setup


Now go ahead and scroll down the to very bottom and tap the 3 dots (menu button) in the bottom right corner. This will launch the Google Now / Voice Search settings. Tap Google Now to customize your Google Now cards.


You can also view Sample Cards and configure them from the Google Now home screen. Scroll all the way down to the bottom and tap “Show sample cards”.



Most of you will probably need to leave these settings set to default until you get a better feel for Google Now and what information you wish to have at your fingertips, without having to dig through your phone.  Now that you have your cards setup, you need to populate them with some data. You can do that by using Voice Search. You can tap the microphone icon and search for your favorite sports team, weather, restaurant, flight numbers, or anything related to the sample cards provided for you.
For example: “What’s the weather today?” “Do the Yankee’s play today?” “I’m hungry for Chinese food”. You get the idea.
Now you privacy folks you’ll need to remove your tin foil hats for the next part. As I said earlier, to fully get the most of of Google Now, you’ll need to setup a few more tasks revolving around your location.
For your location settings, first head back into the Google Now settings and tap Privacy accounts. By default, all of these settings should be enabled.


Next, tap Manage location settings. This will take you into Maps settings. For best results, you’ll want location history enabled.


Next, so that Google Now can identify your home and work address correctly (instead of your favorite place to hangout) launch Maps. Now select Location history. From here you’ll have the option to configure your home and work locations. (Yes, I work more than 21 hours a week on average. My building at work doesn’t provide the greatest GPS window.)



Now you have Google Now setup and ready to show you some cards. You should start seeing cards immediately for weather, distance to work / home, and possibly other locations. If you’re near a bus station you may see that data populate right away as well. As mentioned earlier, you’ll want to start using Voice Search and searching for other card related items to let Google Now know you’re interested. After you start putting information into Google Now, you’ll start to see cards show up in your notifications. Just tap on them to view them or at anytime you can swipe up from your soft keys or home screen.

Tips and Tricks

Once you close or swipe away a card in Google Now or from your notifications, it isn’t gone, don’t worry. It will come back the next time data for that card changes. For example: if you swipe away your weather, it won’t come back until your location changes or your weather information changes.
You can force cards to reappear by tapping the menu icon at the bottom of Google Now and tapping the refresh button. If you’re still having problems, you can always go into Google Now settings, flip the toggle switch off, reboot, and then re-enable Google Now. You shouldn’t have to do this though.
Add locations to your Calendar events. Google Now will then give you a notification when you need to leave to arrive on time.
If you’ve used Latitude to Check-in to many businesses in your area, you may start to see those show up in Google Now. If you just swipe those away, they’ll keep coming back. When these cards are shown, you have the option to no longer track those places by tapping the settings.
Enabling Web History drastically improves the functionality of Google Now. You can control these settings at www.google.com/dashboard.
Lastly, the more you use Google Now, the better it becomes. Enjoy!





Friday, September 21, 2012

What's New in WINDOWS 8?


The Release Preview of Windows 8 is out today, complete with a new tablet interface and some enhancements to the traditional mouse-and-keyboard desktop. Here's what it looks like.
This is everything Microsoft talked about in their initial announcement of Windows 8, but if you want a more in-depth look at what's new, check out our test drive of the Metro UI, the desktop, Windows Explorer, and the revamped Task Manager, plus our video walkthrough of the Consumer Preview above. Today's release doesn't bring us much that we haven't seen, but if you're curious, you can check out Gizmodo's look at what's new in the Release Preview as well.
Microsoft's "re-imagining" of Windows 8 is focused very heavily on a new, Metro-style touch-based interface. However, they make a big deal of saying that it's just as usable with a mouse and keyboard—and no matter what device you're on, you can switch between the simple Metro interface and the traditional Windows desktop to fit whatever your needs are at that given moment.

Performance Increases

What's New in Windows 8
One of the issues that's been on our minds since they previewed this new interface was whether this will keep bogging Windows down with more running processes, and whether running a full Windows desktop on a low-powered tablet was really a good idea (after all, we've seen Windows run on netbooks).

Microsoft knows your fears, and has addressed them: Windows 8 is slated to have better performance than Windows 7, even with this metro interface running on top of a desktop. We ran a few tests back when the the Developer Preview came out and found that to be the case, especially when it comes to boot times. Tablet users and netbook users especially should notice a fairly significant performance increase with Windows 8. Especially considering that any of your tablet-based apps will suspend themselves when you jump into the traditional desktop, so they don't take up any of your resources.

The Lock Screen

What's New in Windows 8
Windows 8's lock screen is pretty much what you'd expect: it's got a beautiful picture along with a few little widgets full of information, like the time, how many emails you have, and so on. However, after swiping to unlock, Windows 8 shows off some pretty neat touch-based features, particularly a "picture password" feature. Instead of using a PIN or a lock pattern to get into your system, you swipe invisible gestures using a picture to orient yourself (in the example they showed, the password was to tap on a persons nose and swipe left across their arm). Android modders might find this similar to CyanogenMod's lock screen gestures.


The Home Screen

What's New in Windows 8
The home screen is very familiar to anyone who's used Windows Phone. You've got a set of tiles, each of which represents an application, and many of which show information and notifications that correspond to the app. For example, your email tile will tell you how many unread emails you have (and who they're from), your calendar tile will show upcoming events, your music tile will show you what's playing, and so on. You can also create tiles for games, contacts, and even traditional Windows apps that will pull you into the Windows desktop. The tablet-optimized apps are all full screen and "immersive", though, and you can rearrange their icons on the home screen easily (just as you would on any other tablet platform).

Running Apps

What's New in Windows 8
Running a basic app works as you expect—you tap on its home screen icon and it goes full screen. The browser has lots of touch-based controls, like pinch to zoom and copy and paste, and you can access options like search, share, and settings through the Charms bar, which you can get by swiping from the right edge of the screen or pressing Win+C. Apps can share information one another easily, such as selected text or photos. After picking your media from one app, you'll then be able to choose which app you want to share with, and work with it from there. For example, you can share photos to Facebook, send text from a web page in an email, and so on.

None of this is brand new to touch-based platforms, but what is new is the ability to not only multitask, but run these apps side by side. Say you want to watch a video and keep an eye on your news feed at the same time. Just like in Windows 7 for the desktop, you can dock an app to one side of the screen while docking another app at the opposite side, which is a seriously cool feature. Imagine being able to IM and play a game at the same time, or browse the web while writing an email. It's a fantastic way to fix one of the big shortcomings of mobile OSes, thus allowing you to ignore the full desktop interface more often and stay in the touch-friendly, tablet view.

The Windows Store

What's New in Windows 8
The Windows Store, which is now available in the Consumer Preview, looks much like the home screen, with tiles that correspond to different categories and featured apps. From there, you can look at a more detailed list of the available apps in a given section. And, the store contains not only touch-based apps for the tablet interface, but some of the more traditional desktop Windows apps you're used to, so you have one portal to discover all your Windows apps no matter what interface you're using.

Right now, the Windows Store is full of free apps from Microsoft and its partners, so you can check out some of the upcoming apps now. When Windows 8 officially releases to the public, though, you should find many more apps in the store, including paid ones. What's really cool about the app store is that you can try apps before you buy, and then download the full version without losing your place in the app or reinstalling anything.

Sync All Your Data to the Cloud

What's New in Windows 8
The cloud is taking center stage, with your Microsoft account driving all the syncing in Windows 8. Your address book, photos, SkyDrive data, and even data within third-party apps can sync up to the cloud, and you can access them on any Windows 8 device—even a brand new one. Just sign in, and you'll have access to everything (not unlike Chrome OS, which immediately loaded your themes and extensions when you logged in—great for lending your computer to a friend). The address book also syncs with other services like Facebook and Twitter as well. You can even sync all of your settings from one Windows 8 PC to another. Just sign onto your Windows 8 with a Microsoft account and you'll get all your themes, languages, app settings, taskbar, and other preferences will show right up. It's a pretty neat feature if you have multiple Windows 8 PCs and don't want to set them all up separately—just a few taps and you've got all your preferences ready to go.

The Desktop

What's New in Windows 8
The traditional desktop is still there, though it may be a tad different than what you're used to. First and foremost, there's no start button to speak of. Your taskbar merely shows the apps you have pinned, with your system tray on the right, as usual. You can jump back to the start screen (that is, the Metro screen) by pressing the Windows key or by moving your mouse to the bottom left corner of the screen. Other than that, everything looks pretty similar (though the windows no longer have rounded corners). The Control Panel has been updated a bit, as well as the Task Manager and Windows Explorer, which we'll discuss below.

A New Task Manager

What's New in Windows 8
Microsoft's finally redesigned the task manager, and it looks pretty great. You have a very simple task manager for basic task killing, but if you're a more advanced user, you can bring up the detailed task manager filled with information on CPU and RAM usage, Metro app history, and even startup tweaking—so you can get rid of apps that launch on startup without going all the way into msconfig. For more information on the new Task Manager, check out our in-depth look at it.

Windows Explorer

What's New in Windows 8
They didn't show us a super in-depth look at the new Windows Explorer, but we did get a little peek. Most of it isn't new information: we'll have native ISO mounting in Windows Explorer, a new Office-style ribbon, and a one folder up button like the old days of XP (thank God). It also has a really cool "quick access" toolbar in the left-hand corner of the title bar, that gives you super quick access to your favorite buttons from the ribbon. For more info, check out our in-depth look at the new Windows Explorer.

Other Features

What's New in Windows 8
Along with these cool features, Windows 8 also comes with other features we've come to know and love in our mobile OSes. It's got system-wide spellchecking, so you don't have to rely on a specific app to keep your writing top-notch, as well as a system-wide search feature, that lets you search anything from your music library to your contacts to the web itself. It also has a really cool feature for desktop users that lets your run the Metro UI on one monitor while running the traditional desktop on the other.

It also has a really cool feature called "refresh your PC", where you can do a clean install with the tap of a button. Whether you're selling your machine or just want a cleaner, faster installation of Windows, you can do it all in one click. You can even set refresh points, similar to restore points, so you can refresh your PC to the way it was at a certain point in time.






The Benefits of Mobile Blogging for Designers and Artists


Current technology today, from smartphones to tablets, encourages instant gratification; people want to be able to access their email, blogs, and videos all in one device. From a business point of view, these devices are a goldmine. If people can access their personal messages and browse the Internet, why not offer them a blog that displays your artistic endeavors and create a business niche from there? In fact, bloggers from around the world are utilizing media, such as photos, podcasts, and video, to highlight their talents. However, designers and artists cannot sit in front of a stationary computer all day long; many artistic pursuits and inspirations occur outside. Enter mobile blogging.
Mobile blogging allows artists to share the world around them from their point of view by using a cell phone or tablet device. As a result, they can sell more of their art or services, such as a writing talent. Consumers looking for a distinct artist do not want to view a boring blog page, complete with profile mug shot and short biography. To bring in more business as an artist, the blog must be full of different media types to complement the particular genre.
If you liked our selection, perhaps these other posts will interest you too, Free Mobile WordPress Themes, Mobile Web App Frameworks, Best Android Photography Apps, and Coolest Android Apps.
Title
A good example of mobile blogging benefits is through a photographer’s eyes. A talented photographer may be walking near the ocean or within a botanical garden. He or she may come upon a beautiful subject, such as a blooming red rose. Being an avid photographer, he or she will normally have a quality cell phone with a equally good camera. Snapping pictures away, the photograph
er can choose the most inspirational photo and post it instantly to the blog through the cell phone. The photographer can even caption the photo or write a small story about the discovery of the natural treasure. The moment is literally captured through image and words so that anyone visiting the blog will be inspired by the obvious excitement of the photographer. As a result, that person may just receive a call or email for a paying photo shoot.
Freelance writing can also benefit from mobile blogging. For example, a writer may be inspired by a particular event that just occurred during the day, such as a damaging storm system. He or she may want to write a fictional short story that uses that storm as a key element. The short story can be easily typed onto a cell phone or tablet and instantly uploaded to his or her blog. Additionally, the writer can even enhance the story by adding a short video of themselves; the video can describe the inspiration for the story while the writer is still excited about the day. Capturing this pleasure on video, and uploading it to the blog through a mobile device, will solidify the quality of the short story when readers understand the muse behind the words.
Not only can mobile blogging capture the excitement of the artist, it can also be used to edit photos taken on the road. Have you ever been driving along on a road trip and stumbled upon an unusual building, plant, or rock formation? Artists and designers with tablet devices can easily take a picture of the subject. However, rather than uploading the picture directly to the blog, he or she can use photo enhancing software to modify the shot. Color, light angles, and trimming techniques can be employed to alter the photo into a unique artistic expression. Uploading the shot to the blog, or even to current art clients, will help generate business for the designer.

TOP MOST POPULAR ANDROID APPLICATION



What’s new in this version:
  • Improved navigation within sections, visible when you tap on section’s name
  • Easier access to Google Reader feeds and folders
  • In-app hints that expose helpful functionality
  • New shopping cart features (Gilt Taste section)
  • Improved performance and bug fixes
I’ll admit I have never used Flipboard, but everyone who does seems to love it. Call me old fashioned, but I just read my news through RSS feeds. And when it comes to “social news”, I turn to news.me. This latest update to Flipboard includes improved access to Google Reader feeds and tips for new users, so I’m downloading it right now.

What’s new in this version:
  • Introducing Photo Maps! A fun, new way of browsing photos on a map
  • New design for user profiles and many other parts of Instagram
  • It’s now easier to write longer captions when sharing photos
I’m obsessed with sharing pics on Instagram so I was excited to see this new update. Verion 3.0 introduces a new feature called Photo Maps that lets you browse photos on a map. Over 10 million Android fans have already installed Instagram since it was released earlier this year, so it’s worth installing it if you have been holding out.

What’s new in this version:
  • Yes! HD version is here for you now, thanks a lot for your patient and support.
  • This is a beta version, HD output only support Grid mode now, we will HD other modes(long wide free) in following version.
  • Support 320×240 device.
Speaking of Instagram, Photo Grid HD is a great companion app to the photo sharing service. It allows you to easily arrange groups of photos into a grid layout. If your Instagram stream is looking stale, try Photo Grid to spice things up.
What’s new in this version:
  • Various improvements
From the creators of FatBooth and BaldBooth comes Mix Booth. This update is fairly minor, but MixBooth is a fun app to play with if you want to see what happens if your friends mated.

What’s new in this version:
  • Smart Space – fixes typos even if you miss spaces as you type
  • New look – two beautiful new themes for your keyboard
  • Easier layout – larger space bar, quick punctuation key and other tweaks
  • New languages – seven new languages for our international friends
  • Improved prediction – the words you want, more of the time
I’m never giving up the stock Android keyboard, but there are plenty of phones out there that don’t ship with the stock keyboard. If you are a fan of alternative keyboards, then you might want to check out Swiftkey 3. It has a completely new look and improvements to the layout and text prediction.
What’s new in this version:
  • Fast access to your profile (click on user image)
  • Personalize your home screen
  • Speed improvements for the home screen
  • Show which users likes an app (instead of who recently installed)
  • Improved profile settings and privacy configuration
  • Bug fixes
If you are still reading this post you might be an app addict, which means AppAware deserves a place on your device. We have been big supporters of these guys and it’s still my favorite service for keeping up with the latest apps and games. The new update allows you to customize the home screen and includes speed improvements.

What’s new in this version:
  • Fixed bug causing login failure
  • Added 5 new languages: Suomi,Hrvatski,Bahasa Indonesia,Dansk,Română
It’s been a couple months since we mentioned AirDroid, so I thought it was time to give them another shout out. This app lets you wirelessly manage your Android from your favorite browser, and it’s pure awesome. The latest update includes various bug fixes and adds five new languages.

What’s new in this version:
  • Added various language support
The number one problem with older Android phones seems to their limited internal storage. If you have a friend with a device that keeps getting a low space warning, then you might want to check out this pair of apps from Infolife. Easy Uninstaller allows batch removal of apps and History Eraser helps you free storage with one tap.
hat’s new in this version:
  • NFC toggle (opens the settings screen)
  • Lock toggle can work with pin/password protection (admin add-on is needed)
  • Software info screen: new accessibility, drm and media effects rows; rows can be hidden
  • Uninstall and Add-ons screens are merged
  • Profiles: enable/disable application action (works only on rooted devices)
  • Support of Relative humidity sensor
  • Displays new information available from ICS
  • Other small changes and bugfixes (gps toggle)
Do you want to know everything about your device? Elixir 2 displays information for just about everything related to your Android device. The latest update adds a ton of new features, so head over to the Play Store to check it out.

What’s new in this version:
  • New added tablet interface and support!
  • Find in page
  • Request desktop site feature
  • Added text selection
  • Performance improvements
  • New start page
  • On phones, Flash support
  • Updated minimum system requirements to Android 2.2+ for optimized experience
I am one of the many people who gave up on Firefox and moved over to Chrome, but the Mozilla team is still hard at work on improving their Android browser. The latest beta version supports tablets and includes desktop toggle, so it might be worth another look.










Thursday, September 20, 2012

APPLE RELEASE IOS 6 IN APPLE PRODUCTS



Apple has released the iOS 6 for the public for iPhone 4S, iPhone 4, iPhone 3GS, the new iPad, iPad 2 and iPod Touch (fourth generation). Apple announced the iOS 6 at WWDC 2012 in June that brings 200 new features including Apple-designed Maps app with turn-by-turn navigation, new Siri improvements, Facebook integration, Shared Photo Streams, Passbook app and more.
The iOS6 update would remove the Google Maps apps that would be replaced with the Apple’s own Maps app. The YouTube app would also be removed, but you can download the new standalone YouTube app. Some features are available only in select countries and select devices. You can see the complete list of features available in your county from the Apple Site.
You can update your devices via iTunes or download the OTA update (iOS5 only) your device from the Settings > General > Software Update.

TWITTER IN TAMIL


சமூக வலைத்தளமான ட்விட்டர் தனது பக்கத்தினை தமிழில் வடிவமைத்து வழங்க இருக்கிறது.
ட்விட்டர் பக்கத்தில் ஹோம், கனக்டு, ஃபாலோவர் என்ற அனைத்து வார்த்தைகளையும் ஆங்கிலத்தில் பார்த்து வருகிறோம். இனி தமிழ் மொழியிலேயே ட்விட்டர் பக்கத்தினை பார்க்கலாம். ஐரிஷ், தமிழ், கன்னடா, பெங்காலி என்று தொடங்கி இப்படி மொத்தம் 16 மொழிகளில் மொழிபெயர்ப்பு மையத்தினை (ட்ரேன்ஸிலேஷன் சென்டரை) வழங்க
உள்ளது ட்விட்டர்.

உதாரணதிற்கு கூகுள் பக்கத்தில் தமிழ் என்ற ஆப்ஷன் கொடுக்கப்பட்டிருக்கும். இதனால் தமிழ் என்ற ஆப்ஷனை க்ளிக் செய்தால் அந்த பக்கம் முழுவதும் தமிழ் மொழியில் மாற்றப்பட்டிருப்பதை பார்க்கலாம். இப்படி ட்விட்டரும் தனது பக்கத்தினை 16 மொழிகளில் வடிவமைக்க இருக்கிறது.
இதில் புதுமையான விஷயமும் ஒன்றும் இருக்கிறது. இப்படி தமிழ் மொழியில் ட்விட்டர் பக்கத்தினை வடிவமைக்கும் வாய்ப்பினை ட்விட்டர் உறுப்பினர்களுக்கே வழங்குகிறது சமூக வலைத்தளமான ட்விட்டர். அதாவது ட்ரான்ஸிலேட்.ட்விட்டர்.காம் என்ற வலைத்தளத்தில் நுழைந்தால் உங்களுக்கான வார்த்தை கொடுக்கப்பட்டிருக்கும்.
அந்த வார்த்தைக்கு சரியான மொழிபெயர்ப்பை டைப் செய்து சமர்ப்பிக்க வேண்டும். அதே வார்த்தைக்கு ஆயிரக்கணக்கான ட்விட்டர்வாசிகள் தாங்கள் மொழிபெயர்த்த வார்த்தையை ட்பை செய்து சமர்ப்பித்திருப்பார்கள். இப்படி வந்து சேர்ந்த ஒட்டு மொத்த வார்த்தைகளிலும், வாக்கிளிக்கும் (வோட்)முறையின் மூலம் சிறந்த வார்த்தைகள் தேர்வு செய்யப்படும். மேலே கொடுக்கப்பட்டிருக்கும் ட்விட்டர் முகவரியில் நுழைந்து (லாகின் செய்து) எல்லோரும் எளிதாக வார்த்தைகளை சமர்ப்பிக்கலாம்.
வலைத்தளங்களில் இது போல் மொழியை மையப்படுத்தி ஒரு வசதி வழங்கப்படுகிறதென்றால், அதில் தமிழ் மொழி சிறந்த இடத்தை பிடிக்கிறது. 16 மொழிகளில் ட்விட்டர் பக்கத்தில் வடிவமைக்கப்படுவதாக கூறப்படும் பட்டியலில் கூட தமிழ் இரண்டாவது இடத்தில் காட்டப்படுகிறதென்றால் இது பெருமையான விஷயம் தான்.

Wednesday, September 19, 2012

SHORTCUT KEYS FOR FACEBOOK


பெரும்பாலானவர்கள் பயன்படுத்தும் சமுதாய இணைய வலைத் தளமாக பேஸ்புக் தளம் உயர்ந்து வருகிறது. இந்த தளத்தில் பயன்படுத்தக் கூடிய ஷார்ட்கட் கீகளை இங்கு காணலாம்.
face
ஷார்ட்கட் கீகளைப் பயன்படுத்தும் முன், முதல் கீயான மாடிபையர் கீ ( கீ போர்டின் செயல்பாட்டினை மாற்றித் தரும் கீ) நீங்கள் பயன்படுத்தும் பிரவுசருக்கானது என்ன என்று அறிந்து, அதனை இணைக்க வேண்டும்.
விண்டோஸ் இயக்கத்தில் பயர்பாக்ஸ் பிரவுசருக்கு Alt+Shift, குரோம் மற்றும் இன்டர்நெட் எக்ஸ்புளோரர் பிரவுசரில் Alt. இந்த கீகளுடன், கீழே தரப்படும் கீகளை இணைத்துப் பயன்படுத்தலாம்.
1. புதிய மெசேஜ் பெற  -M
2. பேஸ்புக் சர்ச் -?
3. நியூஸ் பீட் தரும் ஹோம் பேஜ்-  1
4. உங்கள் புரபைல் பேஜ் 2
5. நண்பர்களின் வேண்டுகோள்கள் – 3
6. மெசேஜ் மொத்தம்  -4
7. நோட்டிபிகேஷன்ஸ் 5
8. உங்கள் அக்கவுண்ட் செட்டிங்ஸ் 6
9. உங்கள் பிரைவசி செட்டிங்ஸ் – 7
10. பேஸ்புக் ஹோம் பக்கம் 8
9. பேஸ்புக் ஸ்டேட்மென்ட் மற்றும் உரிமை ஒப்பந்தம்  -9
10. பேஸ்புக் ஹெல்ப் சென்டர்  -O

இறுதியில் தரப்பட்டுள்ள கீகளை, மேலே குறிப்பிட்டது போல, அந்த மாடிபையர் கீயுடன் பயன்படுத்த வேண்டும்.
எடுத்துக் காட்டாக, பயர்பாக்ஸ் பிரவுசர் பயன்படுத்துபவர்கள், அவர்களின் புரபைல் பேஜ் பெற Alt+Shift+2 பயன்படுத்த வேண்டும்.
இந்த ஷார்ட்கட் கீகளில் உள்ள எண்களை, நம்லாக் செய்து கீ பேடில் இருந்து பயன்படுத்தக் கூடாது. எழுத்துக்களுக்கு மேலாக உள்ள எண்களுக்கான கீகளையே பயன்படுத்த வேண்டும்.

PREVENT FROM FACEBOOK HACKING

உங்கள் பேஸ்புக் கணக்கு வேறொருவரால் ஹேக் செய்யப்பட்டிருக்கும் அனுபவம் ஏற்பட்டிருக்கலாம். அல்லது அவ்வாறு செய்யப்படுவதிலிருந்து வருமுன் காப்பதற்கு சில நடைமுறைகளை இங்கே பார்க்கலாம். இவை எப்போதும் பேஸ்புக் நிறுவனத்தாலேயே அறிவுறுத்தப்படும் விஷயங்கள் ஆகும்.
1. பாஸ்வேர்ட் பாதுகாப்பு
  • பேஸ்புக்கில் பயன்படுத்தும் பாஸ்வேர்ட் கடினமானதாகவும் வேறு தளங்களில் பாவிக்காத பாஸ்வேர்ட்களாகவும் இருக்க வேண்டும். நம்பர் மற்றும் ஸ்டிரிங்க் ஆகிவற்றையும் பயன்படுத்தி உருவாக்குவதே சிறந்தது. குறைந்தது 6 எழுத்துக்கள் வருமாறு பாருங்கள்.
2. பிரைவட் பிரவுஸிங்க்
பேஸ்புக் பாவித்தபின்னர் லாக் அவுட் செய்து எப்போதும் உலாவியை பூட்டி விடுங்கள் (முடிந்தால் கணிணியை அணைத்து விடுங்கள்) . இன்ரநெட் சென்டர்களாயின் இது மிக முக்கியம். Remember Me ஐ எப்போதும் செக் செய்யவே கூடாது.
3.மின்னஞ்சல் பாதுகாப்பு
பேஸ்புக்குடன் தொடர்புடைய மின்னஞ்சல் கணக்கையும் எப்போதும் பாதுகாப்பாக வைத்திருங்கள் ஏனெனில் தொடர்புடைய மின்னஞ்சல் கணக்கை பயன்படுத்த முடிந்தால் பேஸ்புக்கிலும் இலகுவாக நுழைந்துவிடலாம். இரண்டிற்கும் வேறு வேறு பாஸ்வேர்ட்டை எப்போதும் தருவதே நல்லது.
4.பாதுகாப்பு கேள்விகள்
பேஸ்புக் கணக்கை தொடங்கும் போது சில பாதுகாப்பு கேள்விகள் கேட்பார்கள். இவை பாஸ்வேர்ட்டை மறந்து விட்டால் கணக்கை மீண்டும் பயன்படுத்த உதவும். எனினும் இவற்றில் எப்போதும் கடினமான கேள்வி பதில்களை தேர்வு செய்யுங்கள். அவ்வாறு செய்யும் போது மற்றவர்கள் அவற்றை ஊகிக்க முடியாது. இதுவரை கேள்வி பதில்களை செட் செய்ய வில்லையாயின் Account Settings page சென்று அவற்றை உருவாக்கி கொள்வதே நல்லது.
5. எப்போதும் facebook.com சென்ற பின்னரே லாகின் செய்யுங்கள்.
மின்னஞ்சலில் வரும் தெரியாத இணைப்புக்களில் லாகின் செய்ய வேண்டாம்

GOOGLE-LEADING IT DEVELOPER IN INDIA

உலக அளவில் மிகப் பெரிய நிறுவனங்களிடம் இருந்து மாபெரும் ஆர்டர்களைப் பெறுவதிலேயே இன்போசிஸ், விப்ரோ, டிசிஎஸ் போன்ற இந்தியாவின் முன்னணி சாப்ட்வேர் நிறுவனங்கள் தங்களது முழு கவனத்தையும் செலுத்திக் கொண்டிருக்கும் நிலையில், ரூ. 80,000 கோடி சந்தை கொண்ட இந்தியாவின் நடுத்தர, சிறிய நிறுவனங்களுக்கு தனது தொழில்நுட்ப சேவையை வழங்கி அந்த சந்தையை வளைத்துப் போடுவதில் கூகுள் நிறுவனம் தீவிரமாகக் களமிறங்கியுள்ளது.இந்தியாவில் இதுவரை சுமார் 1,000 நிறுவனங்கள் கூகுளின் சேவைகளைப் பயன்படுத்த ஆரம்பித்துவிட்டன. இந்த நிறுவனங்கள் எல்லாமே இந்திய சாப்ட்வேர் நிறுவனங்களால் கண்டுகொள்ளாமல் விடப்பட்டவை ஆகும்.அமெரிக்கா, ஐரோப்பா, இப்போது வளைகுடா நாடுகள் பக்கமே இந்தியாவின் முன்னணி சாப்ட்வேர் நிறுவனங்கள் வழக்கமாக கவனம் செலுத்துகின்றன. பொதுவாக உள்நாட்டு சந்தையை அவை மதிப்பதே இல்லை.இந் நிலையில், இந்த சிறிய, நடுத்தர நிறுவனங்களுக்குத் தேவையான தொழில்நுட்ப சேவைகளை கூகுள் வழங்க ஆரம்பித்துள்ளது. கூகுள் சேவைகளை பயன்படுத்தும் நிறுவனங்களில் வோல்டாஸ், யெபி, நீல்கமல், ஹிராநந்தனி, இன்டியா இன்போலைன் போன்றவை முக்கியமான நிறுவனங்களாகும்.வேர்ட் பிராஸஸிங், இமெயில் சேவை, தரவுகள் (டேட்டா) சேமிப்பு உள்பட தன்னிடம் உள்ள எல்லா வகையான சேவைகளையும் கூகுள் இவர்களுக்கு வழங்குகிறது.இவர்களை குறி வைக்க என ‘India, Get Your Business Online’ என்ற புதிய விற்பனைத் திட்டத்தையும் தொடங்கி, தனது மார்க்கெட்டிங் டீமை முழுமையாக களமிறக்கி விட்டுள்ளது கூகுள்.இந்தத் திட்டத்தின் கீழ் இதுவரை 50,000 நடுத்தர, சிறிய தொழில் நிறுவனங்களை தனது வலையில் இழுத்துவிட்ட கூகுள், இவர்களுக்கு இலவச கூப்பனையும் வழங்குகிறது. இதை வைத்து கூகுள் இணையத்தளத்தில் தங்களது நிறுவனத்தையும் பொருட்களையும் இவர்கள் இலவசமாக விளம்பரம் செய்யும் அனுமதிக்கிறது.2014ம் ஆண்டுக்கள் 5 லட்சம் இந்திய தொழில் நிறுவனங்களை தனது சேவைக்குள் கொண்டு வருவது கூகுளின் திட்டமாம்.

Monday, September 17, 2012

HONEY POTS



          
   Honey pots are an exciting new technology. They allow us to turn the tables on the bad guys.
        A honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. Our discussion in this paper is to show the possibilities of Honeypots and their use in research as well as productive environment.
            Compared to an intrusion detection system, honey pots have the big advantage that they do not generate false alerts as each observed traffic is suspicious, because no productive components are running in the system.
INTRODUCTION
                Global communication is getting more important every day. At the same time, computer crimes increasing. Counter measures are developed to detect or prevent attacks-most of these measures are based on known facts, known attack patterns. As in the military, it is important to know, who your enemy is, what kind of strategy he uses, what tools he utilizes and what he is aiming for. Gathering this kind of information is not easy but important. By knowing attack strategies, countermeasures can be improved and vulnerabilities can be fixed. To gather as much information as possible is one main goal of honeypot.
                 A honeypot is primarily an instrument for the information gathering and learning. Its primary purpose is not to be ambush for the blackhat community to catch them in action and to press charges against them. The lies on silent collection of as much information as possible about their attack patterns, used programs, purpose of attack and blackhat community itself.               
Honeypots are not the perfect solution for solving or preventing computer crimes. Honeypots are hard to maintain and they need the good knowledge about the operating systems and network security. In the right hands honeypot is effective tool for the information gathering. In the wrong, inexperienced hands, a honeypot can become another infiltrated machine and an instrument for the black hat community.
HONEYPOT BASICS
                 A honeypot is a resource whose value is being in attacked and compromised. This means, that a honeypot is expected to get probed, attacked and potentially exploited.
Honeypot do not fix anything. They provide us additional, valuable information.
A honeypot is expected to be attacked or compromised. The main goals are the distraction of an attacker and the gain of the information about the attack and the attacker.
Value of honey pots:
There are two categories of Honeypots.
Ø  Production Honeypots
Ø  Research Honeypots
             A production honeypot is used to help migrate risk in an organization while the second category, is meant to gather as much information as possible. These Honeypots do not add any security value to an organization but they can help to understand the blackhat community and their attacks as well as to build some better defenses against security threats. A properly constructed honeypot is put on a network, which closely monitors the traffic to and from the honeypot. This data can be used for a variety of purposes.
Ø  Forensicsàanalyzing new attacks and exploits
Ø  Trend analysisàlook for changes over time of types of attacks, techniques, etc
Ø  Identificationàtracks the bad guys back to their home machines to figure out who they are.
Ø  Sociologyàlearns about the bad guys as a group by snooping on email, IRC traffic, etc which happens to traverse the honeypot.
               In general every traffic from and to a honeypot is unauthorized activity. All the data that is collected by a honeypot is therefore interested data. Data collected by the honeypot is of high value, and can lead to better understanding and knowledge which in turn can help to increase overall network security.
 One can also argue that a honeypot can be used for prevention because it can deter attackers from attacking other systems by occupying them long enough and bind their resources.
CONCEPTUAL DETAILS
Low-involvement honey:  A low-level involvement honeypot typically only provides certain fake services. In a basic form, these services could be implemented by having a listener on specific port.
In such a way, all incoming traffic can easily be recognized and stored. With such a simple solution it is not possible to catch communication of complex protocols. On a low-level honeypot there is no real operating system that attacker can operate on.
This will minimize the risk significantly because the complexity of an operating system is eliminated. On the other hand, this is also disadvantage. It is not possible to watch an attacker interacting with operating system, which could be really interesting. A low-level honeypot is like one-way connection. We only listen; we do not ask any questions.
Mid-involvement honeypot A mid-involvement honeypot provides more to interact with but still does not provide a real underlying operating system. The fake daemons are more sophisticated and have deeper knowledge about the specific services they provide. At the same moment, the risk increases. The probability that attacker can find a security hole or vulnerability is getting bigger because the complexity of honeypot is increasing.
                Through the higher level of interaction, more complexity attacks are possible and can therefore be logged and analyzed. The attacker gets a better illusion of a real operating system. He has more possibilities to interact and probe the system. Developing a mid-involvement honeypot is complex and time consuming. Special care has to be taken for security check as all developed fake daemons needs to be as secure as possible.
High-involvement honeypot A high-involvement honeypot has a real underlying operating system. This leads to much higher risk as the complexity increases rapidly. At the same time, the possibilities to gather the information, the possible attacks as well as the attractiveness increase a lot. As soon as a hacker has gained access, his real work and therefore the interesting part begins.
A high-involvement honeypot is very time consuming. The system should be constantly under surveillance. A honeypot which is not under control is not of much help even become a danger or security hole itself. It is very important to limit a honey pot’s access to local intranet, as the honeypot can be used by black hats as if it was a real compromised system. Limiting outbound traffic is also important point to consider, as the danger once a system is fully compromised can be reduced.
                   By providing a full operating system to attacker, he has the possibilities to upload and install new files. This is where the high-involvement honeypot can show its strength, as all its actions can be recorded and analyzed.
HONEYPOT LOCATION
A honeypot does not need a certain surrounding environment, as it is a standard server with no special needs. A honeypot can be placed anywhere a server could be placed. But certainly, some places are better for certain approaches as others.
  A honeypot can be used on the Internet as well as the intranet, based on the needed service. Placing a honeypot on the intranet can be useful if the detection of some bad guys inside a private network is wished. If the main concern is the Internet, a honeypot can be placed at two locations:
               1. In front of firewalls (Internet)
               2. DMZ
               3. behind the firewall (Intranet)
In front of firewalls: By placing the honeypot in front of firewall the risk for the internal works does not increases. A honeypot will attract and generate lot of unwished traffic like port scans or attack patterns. By placing a honeypot outside the firewall, such events do not get logged by the firewall and an internal IDS system will not generate alerts. Otherwise a lot of alerts would be generated on the firewall or IDS.
      Probably the biggest advantage is that the firewall or IDS. Running a honeypot does therefore not increase the dangers for the internal network nor does it introduce new risks.  
DMZ: Placing a honeypot inside DMZ seems a good solution as long as the other systems inside the DMZ can be secured against the honeypot
             Most DMZs are not fully accessible as only needed services are allowed to pass the firewall. In such a case, placing the honeypot in front of the firewall should be favored as opening all corresponding ports on the fire is too time consuming and risky.     
Behind the firewall: A honeypot behind a firewall can introduce new security risks to the internal network, especially if the internal network is not secured against the honeypot through additional firewalls. This could be a special problem if the Ips is used for authentication.
By placing the honeypot behind a firewall, it is inevitable to adjust the firewall rules if access from internet should be permitted. The biggest problem arises as soon as the internal honeypot is compromised by an external attacker. He gains the possibility to access the internal network through the honeypot.
This traffic will be unstopped by the firewall as it is regarded as traffic to the honeypot only, which in turn is granted. Securing an internal honeypot is therefore mandatory, especially if it is a high-involvement honeypot. The main reason for placing a honeypot behind a firewall could be to detect internal attackers.
               The best solution would be to run a honeypot in its own DMZ, therefore with a preliminary firewall. The firewall could be connected directly to the internet or intranet, depending on the goal. This attempt enables tight control as well as flexible environment with maximal security.
HOST BASED INFORMATION GATHERING This section will discussion possibilities that offer gain of information about ongoing on a honeypot by installing information gathering mechanisms on the honeypot itself.
BASIC POSSIBILITIES Information gathering facilities can basically be grouped into two categories; facilities that generate streams of information and facilities that offer the information to peek into the system and get the information about a certain state of the honeypot.
Microsoft windows One could think the large amount of observed attacks on systems running ms windows operating system makes them ideal for the honeypot, but unfortunately the structure of this operating system makes the data gathering rather difficult.
                  
Until today the source code of the operating system of Microsoft is not freely available, which means that changes to the operating system are very hard to achieve.
UNIX derivates UNIX derivatives operating system offers interesting opportunities for deploying data gathering mechanisms since all of their components are available as source code.
         Network based Information Gathering: Host based information gathering is always located at the host itself and is therefore vulnerable to detection and once detected it can also be disabled. Network based information gathering does not have to be located on the honeypot itself. It can also be implemented in an invisible way, as network traffic only gets analyzed but not manipulated. Network based information gathering is safer as it is harder to be detected and quiet impossible to disable.
     
ATTRACTIVENESS
               Being the owner of a honeypot can be an interesting experience, but what if the members of the blackhat community do not find their way to the honeypot or, even more dramatically, are not interested in the honeypot at all.
Another approach to lure attackers is the offering of the interesting services on the honeypot. Of course the question arises, what an interesting services is or what it should look like.
      ADVANTAGES
Ø  Small Data setsàHoneypots only collect attack or unauthorized activity, dramatically reducing the amount of data they collect. Organizations that may log thousands of alerts a day may only log a hundred alerts with Honeypots. This makes the data Honeypots collect much easier to manage and analyze.
Ø  PositivesàHoneypots dramatically reduce false alerts, as they only capture unauthorized activity.
Ø  NegativesàHoneypots can easily identify and capture new attacks never seen before.
Ø  Minimal resources
CONCLUSION
Honeypot is not a solution to network security but a good tool supplements other security technologies to form an alternative active defense system for network security. Working with IDS and firewall, Honeypot provides new way t o   attacks prevention, detection and reaction.         A honeypot is just a tool. How you use that tool is up to you. There are a variety of honeypot options, each having different value to organizations.
REFERENCES
IEEE International Conference on Systems, Man, and Cybernetics,pp. 2275-2280,Oct.  
http://www.cert.org/reports/dsitribution