Resetting your passwords, enhancing your security

Written By: Guest Contributor - Feb• 19•15

According to the CM security website these are the worst password you should not have and must avoid because it is so easy to crack.

images

 

Check out the top 20 worst passwords, are any of yours in this list?

 1409797915660227

The iCloud flaw has resulted in hundreds of celebs having their accounts cracked and nude snaps leaked. Security issues like these may bother everyone from Hollywood stars to us. The CM Security Research Lab wants to remind you that creating a strong password is the easiest way to keep your private information safe in your devices.

New demands in digital era

The more complex your password, the harder they become to crack. Using a flimsy password just enables your juicy secrets to get stolen easily. Research[1] shows that an 8-characters-long password containing numbers, upper and lower case letters can be decrypted in 41 days. However, if you increase this length from 8 to 10 characters, it would take 8 years to crack instead.

CM Security Research Lab tested that how password format and length affect decryption time:

Capture

In the digital era, people have become overwhelmed with having to remember so many passwords. To bolster your security, setting strong passwords is crucial however.

Techniques for setting passwords

A short simple password in an ordered letter combination is the easiest situation for hackers. They can break them really quickly. Here are some easy-to-follow tips for setting passwords:

1.Long and complex is always best.
The random combination of numbers + letters + symbols makes passwords incredibly strong.

2.Use info that’s secretly special to you.
Try a sentence from your favorite poem or songs. Use different passwords for different accounts.

3.Add particular web info to your different accounts passwords.
We recommend you set different passwords for different website accounts. However, it might be easy to forget them. How about adding site names into the password? For instance, passwords for ebay: “ebay”+”bluemysz378”; passwords for twitter: ”bluemysz378”+”twitter”.

4.Replace letters and numbers in your own way: a→@; s→$; 1→!

Source: CM Security

 

 

Best three iphone and ipad applications of this week

Written By: Guest Contributor - Feb• 19•15

Hello SeniorNet fans

Today with the second week of the best three applications  for iphones and ipad of this week

1-Tripnary

Description

Tripnary lets you collect all the places you want to see and plan your next adventure. Easily create your travel bucket list. Share it with friends. Update it obsessively. Compare airfares to every place on your list in one tap. And go!
2bf06c59-df59-4079-a974-acc0ecbcfa08

Download here

2- Hopper – Flight Research & Predictions

Description

Save up to 40% on your next flight. Hopper analyzes billions of flight prices daily to predict how prices will change, and tells you when to buy your tickets.

hopper

 

Download here

 

3- TiltShift Video – Miniature effect for movies and photos

Description

TiltShift Video gives you all the editing features you need to turn your videos and photos into awesome tilt-shift creations. *
Universal app, optimized for all the Retina displays.

you can watch video samples by clicking on the picture

dsdsd

 

Download here

Alright by this we are done with the best three apps for iphone and ipad for this week

See you next week with android apps

until that time take care

Watch Cyber attacks live

Written By: Guest Contributor - Feb• 12•15

Watch Cyber attacks live

Hello everybody today we brought you a very good websites that allow you to watch cyber attacks live

Watch this video.

 

sssss

The first website: Click here

The second website: Click here

Thanks for your visit

If you like the video please share it with your friends and your followers on social media

 

 

best three android applications of the week on SeniorNet blog

Written By: Guest Contributor - Feb• 10•15

Hello SeniorNet fans

Today we provide you best three applications for android phones of this week

1- TouchRetouch

TouchRetouch is an award-winning photo editor that allows you to remove unwanted content or objects from any photo, using just your finger and your phone. Mark the items you want taken out of the snapshot and hit ‘Go’. That’s all there is to it. Photo editing has never been so quick, easy and convenient.

You recently got married on a beautiful Caribbean beach. Everything was so perfect. Luckily, you have a lot of memorable snapshots of the crystalline water and white sand backdrop of the ceremony, you and your new spouse silhouetted in the sunset, your guests under a palm tree, that nude sunbather that somehow got included in a shot taken during the exchanging of vows. Yikes! Before showing your mom those photos, take a minute to remove that accidental guest from an otherwise great picture. Open your TouchRetouch app. Using your finger, select the Brush or Lasso tool to mark what you don’t want in the shot, then hit the ‘Go’ button. Okay, you’re done and it’s now safe to share your picture-perfect memories with everybody.

TouchRetouch isn’t just for exotic or wedding photo touch-ups, of course. Use this easy yet ingenious application on any photo, newly snapped on your phone or taken from your gallery. Remove those wires that are in the way of an otherwise wonderful view, take banners off of buildings, get rid of people, eliminate spots and other imperfections. All without distorting the final image.

touchscreen

 

Download TouchRetouch

 

2RAR for Android

RARLAB’s RAR for Android is an all-in-one, original, free, simple, easy and quick compression program, archiver, assistant, extractor, manager and even a basic file explorer.

rar

RAR for Android can create RAR and ZIP and unpack RAR, ZIP, TAR, GZ, BZ2, XZ, 7z, ISO, ARJ archives. List of functions include repair command for damaged ZIP and RAR files, benchmark function compatible with RARLAB’s WinRAR benchmark, recovery record, usual and recovery volumes, encryption, solid archives, utilizing multiple CPU cores to compress data.  Additionally to standard ZIP files, unzip function supports ZIP and ZIPX with BZIP2, LZMA and PPMd compression also as password protected ZIP. Unrar command is available for all versions of RAR archives including the latest RAR5, password protected and multipart files.

If you wish to help us translating RAR to your language, please download RAR for Android language files in “RAR extras” section of www.rarlab.com and follow instructions in readme.txt. Thank you.

 

Download RARLAB’s RAR 

3-Google Gesture Search

gesture touch

Gesture Search lets you quickly access contacts, applications, settings, music and bookmarks on your Android device by drawing letters or numbers. It continuously refines search results as you add each gesture, and becomes better as it learns from your search history.

gest

 

Download Google Gesture Searc

That is all for this week, see you next week with new best Android and iPhone applications

Thanks

 

 

A smartphone dongle for diagnosis of infectious diseases at the point of care

Written By: Guest Contributor - Feb• 10•15

This work demonstrates that a full laboratory-quality immunoassay can be run on a smartphone accessory. This low-cost dongle replicates all mechanical, optical, and electronic functions of a laboratory-based enzyme-linked immunosorbent assay (ELISA) without requiring any stored energy; all necessary power is drawn from a smartphone. Rwandan health care workers used the dongle to test whole blood obtained via fingerprick from 96 patients enrolling into care at prevention of mother-to-child transmission clinics or voluntary counseling and testing centers. The dongle performed a triplexed immunoassay not currently available in a single test format: HIV antibody, treponemal-specific antibody for syphilis, and nontreponemal antibody for active syphilis infection. In a blinded experiment, health care workers obtained diagnostic results in 15 min from our triplex test that rivaled the gold standard of laboratory-based HIV ELISA and rapid plasma reagin (a screening test for syphilis), with sensitivity of 92 to 100% and specificity of 79 to 100%, consistent with needs of current clinical algorithms. Patient preference for the dongle was 97% compared to laboratory-based tests, with most pointing to the convenience of obtaining quick results with a single fingerprick. This work suggests that coupling microfluidics with recent advances in consumer electronics can make certain laboratory-based diagnostics accessible to almost any population with access to smartphones.

youtube

Article source: sciencemag

 

Phone control

Written By: Guest Contributor - Jan• 22•15

Ten signs you may be addicted to your smartphone

Watch the video

fdsfsdf

1. When you check your phone to see the current temperature instead of opening a window, and/or when you check your phone to see the current time instead of looking at the watch that’s right on your wrist. (I just did this!)

2. When you have to consciously say to your spouse “Let’s put our phones away” while watching TV because it’s more common that they’re out than away.

3. If you are answering emails in a dimly lit reception area while waiting for your massage therapist to destress you, you may have a problem. (OK, I’ve done this too!)

4. When your kids have to text you their carry-out orders because you’ve lost the ability to retain information that is not received on your phone.

5. When you hope you hit a bunch of red lights on the way home so you can comment on a Facebook post.

6. When one of your daughter’s first drawings of you has a BlackBerry in your hand.

7. When you wake up, you grab your phone and check it before you get up to pee.

8. When you drop a phone on your face because you’re dozing off.

9. When you choose your clothing based on the best pockets to hold your phone.

Source: CNN

Addiction of internet

Written By: Guest Contributor - Jan• 14•15

In this video there,  some people doing nothing in their life but surfing on the net, day and night.

ipp

This drone can steal what’s on your phone

Written By: Guest Contributor - Jan• 14•15

The next threat to your privacy could be hovering over head while you walk down the street.

Capture

This drone can hack your phone

Hackers have developed a drone that can steal the contents of your smartphone — from your location data to your Amazon (AMZN) password — and they’ve been testing it out in the skies of London. The research will be presented next week at the Black Hat Asia cybersecurity conference in Singapore.

The technology equipped on the drone, known as Snoopy, looks for mobile devices with Wi-Fi settings turned on.

Snoopy takes advantage of a feature built into all smartphones and tablets: When mobile devices try to connect to the Internet, they look for networks they’ve accessed in the past.

“Their phone will very noisily be shouting out the name of every network its ever connected to,” Sensepost security researcher Glenn Wilkinson said. “They’ll be shouting out, ‘Starbucks, are you there?…McDonald’s Free Wi-Fi, are you there?”

That’s when Snoopy can swoop into action (and be its most devious, even more than the cartoon dog): the drone can send back a signal pretending to be networks you’ve connected to in the past. Devices two feet apart could both make connections with the quadcopter, each thinking it is a different, trusted Wi-Fi network. When the phones connect to the drone, Snoopy will intercept everything they send and receive.

“Your phone connects to me and then I can see all of your traffic,” Wilkinson said.

JJJJ

Mini drones that fly in fleets

That includes the sites you visit, credit card information entered or saved on different sites, location data, usernames and passwords. Each phone has a unique identification number, or MAC address, which the drone uses to tie the traffic to the device.

The names of the networks the phones visit can also be telling.

“I’ve seen somebody looking for ‘Bank X’ corporate Wi-Fi,” Wilkinson said. “Now we know that that person works at that bank.”

CNNMoney took Snoopy out for a spin in London on a Saturday afternoon in March and Wilkinson was able to show us what he believed to be the homes of several people who had walked underneath the drone. In less than an hour of flying, he obtained network names and GPS coordinates for about 150 mobile devices.

He was also able to obtain usernames and passwords for Amazon, PayPal and Yahoo(YAHOF) accounts created for the purposes of our reporting so that we could verify the claims without stealing from passersby.

Related: Amazon drones? Time for a reality check

Collecting metadata, or the device IDs and network names, is probably not illegal, according to the Electronic Frontier Foundation. Intercepting usernames, passwords and credit card information with the intent of using them would likely violate wiretapping and identity theft laws.

Wilkinson, who developed the technology with Daniel Cuthbert at Sensepost Research Labs, says he is an ethical hacker. The purpose of this research is to raise awareness of the vulnerabilities of smart devices.

Installing the technology on drones creates a powerful threat because drones are mobile and often out of sight for pedestrians, enabling them to follow people undetected.

While most of the applications of this hack are creepy, it could also be used for law enforcement and public safety. During a riot, a drone could fly overhead and identify looters, for example.

Users can protect themselves by shutting off Wi-Fi connections and forcing their devices to ask before they join networks.

Source: CNN 

Amazing application for android and iphones

Written By: Guest Contributor - Oct• 31•14

Instantly share photos across multiple smart devices (iPhone, Android, iPad, tablets, etc.) with the swipe of a finger. The exclusive FotoSwipe technology allows you to select up to 10 photos, swipe them toward an intended device and you’re done! Never text or email photos again. Download for FREE right now.

FotoSwipe

FotoSwipe

Find it on google play on the following link:

https://play.google.com/store/apps/details?id=com.fotoswipe.android

watch this video on YouTube

https://www.youtube.com/watch?v=uvTNSUUN4r0

Technology is Making Seniors’ Lives Easier

Written By: Guest Contributor - Jul• 17•14

Seniors Technology Mobile Most senior citizens in the U.S. are already cell-phone-and-computer-savvy; nearly 80 percent of seniors 65 and older own a cell phone, while more than 60 percent own a computer or laptop. However, the use of other tech gadgets (i.e. smartphones and tablets) have yet to catch on in the “gray market,” as no more than 25 percent of U.S. seniors use either device.

With 10,000 Americans turning 65 daily—a trend expected to last for the next 17 years—the number of seniors using more tech devices should increase, as well. This bodes well for seniors, their families and friends and the digital market. For seniors not yet plugged in, making the transition from analog to digital is becoming simpler and is more practical now that tech and digital development experts are catering more to the needs of the boomer generation. Below are just a few ways that technology is benefiting seniors.

Apps for Everyday Use

There are other helpful apps, as well. One app—EyeReader—actually allows a person to use his or her smartphone as a magnifying glass for reading. Park’n'Forget is an app even younger generations might find useful, as it helps users remember where they parked their cars. It also has a timer on it to keep track of how long you’ve been parked, which is helpful when you’re in metered parking.

Apps for Safety

Start-up company Lively is a remote monitoring system for seniors that learns daily routines like taking pills, sticking to meal times and exercise. The sensors connect to a smartphone app, so family members can keep track of their loved one without compromising his or her privacy. Certain sensors are attached to items in the house, like pill boxes, the pantry or refrigerator and can even keep track of a user through a key fob that uses a Bluetooth low energy transmitter, in case one wanders past a certain range from home. Through the app on family members’ smartphones, they are alerted and updated on progress and activities.

What keeps seniors more independent is the ability to be mobile without their loved ones worrying about them falling or getting into an accident without them knowing. Devices like the GreatCall Splash are new, mobile-esque gadgets that allow a senior the freedom of leaving their home to shop or visit friends without worrying there could be an emergency and no way to call for help. While other press-a-button alert devices are still useful for the home, this device provides seniors security beyond their houses, giving them the ability to travel with only a button-click away from getting assistance from a 5Star Agent with the GreatCall Splash plan.

Support is Always Available, Just In Case

For many seniors, new technology can be so overwhelming that some people avoid it all together. In order for seniors to become more tech-savvy, new age companies have not only made devices more user-friendly, but many are offering easy “how-to” sites for seniors to help them learn new tech with step-by-step processes.

For example, the FaceTime app is a wonderful way for seniors to see and talk to faraway relatives through smartphones and iPads. How to even get to that app can be somewhat frustrating for some seniors. Dummies.com is really just a site that makes things simple for users. For instance, it has step-by-step directions for helping new users FaceTime using an iPad 2.

One reason many seniors avoid using technology is that, unaware of the options for protecting personal information and financial data, many of them are susceptible to identity theft. Big wireless corporations like Google, Apple and Samsung, as well as the four national service carriers have started a campaign to push the importance of data security for devices—with seniors specifically in mind. Lawmakers are lobbying for local and state governments to make “kill switches” mandatory on phones. The campaign is seeking laws where all phones manufactured in the U.S. after July 2015 be equipped with anti-theft features that include data wipe and lock capabilities, which can be reversed with the user’s password.