Thursday, July 14, 2016

Now You Can Track Your Car Using Your Smartphone

Lost your car and can’t remember where you parked? It happens to the best of us: wandering aimlessly through parking lots, clicking the panic button on your key chain to get your headlights to illuminate.
You don’t need a pricey radio transponder to keep tabs on your car. Uplinking your wheels to the great eye in the sky without breaking the bank is easier than you think.
Standalone GPS and radio triangulation units can cost hundreds. And that’s not counting the installation, activation fees, and monthly fees associated with whatever service you do choose. For most of us, it’s overkill. The good news is that some of life’s biggest problems seem to be disappearing because of new technology. If you frequently forget where you parked your car, there is a tiny gadget and app that could be what you’re looking for.

What is it about?


It’s about Trackr, A small and discreet device the size of a coin that is revolutionizing the market.


But… How does it work?

Very easy! It will take less than five minutes to put it to work. You simply pair it with your smartphone and download the free application which will allow you to locate it anytime.

Once this is done, you simply have to put it on your key chain, in your wallet or in any object you want to locate. In this case you just have to hide it in your car.

Now you just open the application on your smartphone and you can easily see the position of your TrackR on the map. If you lose your car or any other item, simply select “find device” and you’ll get the coordinates of the new location.

How much is it going to cost me?

You are probably thinking that this device will be very expensive…nope. This is the best part, you can acquire one for so little, the price is about $29. Not bad considering it gives peace of mind.

Other functions

Do you often forget your wallet? Forget where you left your keys? Or want to prevent your pet from escaping? With Trackr you can also track your personal belongings. Simply attach it to anything you consider important or easy to lose, link it to your Smartphone (with the Trackr application) and you will find what you lost, it’s that easy!

Detailed instructions on how to use Trackr

  Get Trackr from this website, you’ll get it delivered to your home in about 1 week.
  • Step 1: Get Trackr from this website, you’ll get it delivered to your home in about 1 week.
  • Step 2: Link Trackr Bravo with your Smartphone (iPhone or Android) and hide it in your car.
  • Step 3: Download the app and always have in hand the location of your valuables.
  • PRO TIP: TrackR is a great gift idea because THERE IS NO MONTHLY SUBSCRIPTION!
They have an amazing summertime sale going on right now and if you buy 4 TrackR’s they will send you 4 additional Trackr’s for FREE!

So pick up 4 TrackR’s and get 4 for FREE so you and your family can keep track of everything: Suitcases, pets, keys, bikes, toys, and even electronics like your iPad, laptop or kindle!
http://improvedmindset.com/trackr2/?voluumdata=BASE64dmlkLi4wMDAwMDAwNS1kOWM3LTQ3OWEtODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjA0OTZjMDAwLTQ5ZGMtMTFlNi04YzMzLWNiNTBhZmZjZTAxY19fY2FpZC4uYjc0ZjU5ZDYtMWJjMS00ZGQ5LWFjMjYtZjBhY2Y5OWJkMDZmX19ydC4uUl9fbGlkLi4xMmRlNzNkMC01MGQ3LTRmZTMtYjAwYi05NWQ2Y2MwMGFkYTdfX29pZDEuLjhmMGM3NGEyLTJiNDAtNDg1Yy1iNWZkLTM3YzM4MzQzZjIzY19fdmFyMS4uQ0E0X19yZC4ud3d3XC5ceWFob29cLlxjb21fX2FpZC4uX19hYi4uX19zaWQuLg&ad=CA4

Monday, March 30, 2009

Cyber spies break into govt computers

By CHARMAINE NORONHA, Associated Press Writer

A cyber spy network based mainly in China has tapped into classified documents from government and private organizations in 103 countries, including the computers of Tibetan exiles, Canadian researchers said Saturday.

The work of the Information Warfare Monitor initially focused on allegations of Chinese cyber espionage against the Tibetan community in exile, and eventually led to a much wider network of compromised machines, the Internet-based research group said.

"We uncovered real-time evidence of malware that had penetrated Tibetan computer systems, extracting sensitive documents from the private office of the Dalai Lama," investigator Greg Walton said.

The research group said that while it's analysis points to China as the main source of the network, it has not conclusively been able to detect the exact identity or motivation of the hackers.

The Chinese Embassy in Toronto did not immediately return calls for comment.

Students For a Free Tibet activist Bhutila Karpoche said she was not surprised about the possibility that China could be behind the network.

"Our computers have been hacked into numerous times over the past 4 to 5 years and especially in the past year," Karpoche said. She said she often gets emails that end up containing viruses that crash the group's computers.

The IWM is composed of researchers from Ottawa-based think tank SecDev Group and the University of Toronto's Munk Centre for International Studies. The group's initial findings lead to a 10-month investigation that has been summarized in the report, "Tracking GhostNet: Investigating a Cyber Espionage Network." It will be released online Sunday.

The researchers detected a cyber espionage network involving over 1,295 compromised computers from the ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan. They also discovered hacked systems in the embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan.

Once the hackers infiltrated the systems, they gained control using malware — software they install on the compromised computers — and sent and received data from them, the researchers said.

Two researchers at Cambridge University in Britain who worked on the part of the investigation related to the Tibetans are also releasing their own report Sunday.

In an online abstract for "The Snooping Dragon: Social Malware Surveillance of the Tibetan Movement," Shishir Nagaraja and Ross Anderson write that while malware attacks are not new, these attacks should be noted for their ability to collect "actionable intelligence for use by the police and security services of a repressive state, with potentially fatal consequences for those exposed."

They say prevention against such attacks will be difficult since traditional defense against social malware in government agencies involves expensive and intrusive measures that range from mandatory access controls to tedious operational security procedures.

Tuesday, June 17, 2008

Chinese company develops 'UFO'

Yahoo! News (AFP)

A Chinese company has developed a prototype flying saucer that can hover in the air and be controlled remotely from afar, state press said Tuesday.

The aircraft is 1.2 metres (four feet) in diameter and is able to take off and land vertically and hover at an altitude of up to 1,000 metres (yards), Xinhua news agency said.

The unmanned disc is driven by a propeller and can be controlled remotely or sent on a preset flight path, it said.

Its top speed is 80 kilometres (50 miles) per hour, it added.

It took the Harbin Smart Special Aerocraft Co Ltd 12 years and 28 million yuan (4.1 million dollars) to develop the prototype craft, which is designed for aerial photography, geological surveys and emergency lighting, the report said.

Monday, March 31, 2008

Yahoo! set to 'Shine' with advertisers on new Women's site

CNN - NEW YORK (AP)

Yahoo Inc. on Monday launched a site for women between ages 25 and 54, calling it a key demographic underserved by current Yahoo properties.

The site, Shine, is aimed largely at giving the struggling Internet company additional opportunities to sell advertising targeted to the key decision-maker in many households.

Yahoo said advertisers in consumer-packaged goods, retail and pharmaceuticals have requested more ways to reach those consumers.

Amy Iorio, vice president for Yahoo Lifestyles, said internal research also shows women are looking for a site to combine various content and communications tools.

"These women were sort of caretakers for everybody in their lives," she said. "They didn't feel like there was a place that was looking at the whole them -- as a parent, as a spouse, as a daughter. They were looking for one place that gave them everything."

Yahoo is entering a market already served by Glam Media Inc. and iVillage, a unit of General Electric Co.'s NBC Universal. It is Yahoo's first site aimed at a single demographic, although other Yahoo sites like Finance and Sports already draw specific audiences.

With Shine, Yahoo plans to expand its offerings in parenting, sex and love, healthy living, food, career and money, entertainment, fashion, beauty, home life, and astrology.

Shine likely will replace the existing Food site over time, although Yahoo plans to keep its Health site operating to serve men and women of other age groups.

Yahoo is working with media companies like Hearst Communications Inc. and Rodale Inc. to develop Shine-exclusive content. Hearst publishes Redbook, Cosmopolitan, Good Housekeeping and other magazines aimed at women, while Rodale publishes a range of magazines on sports and recreation, including Women's Health.

Yahoo also has hired a team of editors to produce original material and to seek out items of interest from elsewhere in Yahoo.

Unlike most other Yahoo sites, Shine will be presented in a blog form, with newest items on top and commentary from an editor.

Thursday, January 17, 2008

Breakthrough! New 40-Hour Laptop Batteries


Yahoo! Tech


Imagine running your laptop nonstop from New York to Tokyo -- crunch some numbers, work on a memo pop in a few DVDs -- and then do a full day of meetings, using your machine throughout the day and into the night. Imagine doing all this without ever plugging in your computer to recharge its battery.

This scenario may become reality in the near future, if Stanford University scientists succeed in commercializing a breakthrough in the laboratory. Assistant Professor Yi Cui and associates at Stanford's Department of Materials Science and Engineering said they have developed a method to increase the life of rechargeable lithium ion batteries to a whopping 40 hours.

Publishing in the journal Nature Nanotechnology, the Stanford researchers have shown that by using silicon nanowires as the battery anode instead of today's graphite, the amount of lithium the anode can hold is extended tenfold.

Revolution in Battery Design

"It's not a small improvement," Cui said. "It's a revolutionary development." And Cui means to move the development out of the lab as soon as possible. "We are working on scaling up and evaluating the cost of our technology," Cui said. "There are no roadblocks for either of these."

Cui has filed a patent on the technology and is evaluating the formation of a company or licensing the technology to a battery manufacturer. Potentially two-day batteries could be on the market within "several years," he said.

Silicon anodes are not a new idea. Researchers have known for some 30 years that they have the "highest theoretical charge capacity," but, until now, they haven't been practical because they change volume by 400 percent as lithium is inserted and extracted, the journal said. Cui's solution: a sponge-like network of tiny silicon nanowires, each of which expands but doesn't fracture.

"Nanowires grown directly on the current collector do not pulverize or break into smaller particles after cycling," the journal reports. "Rather, facile strain relaxation in the nanowires allows them to increase in diameter and length without breaking."

The Many Advantages of Nanowires

Not only can the nanowires handle the extreme volume changes, they also "provide good electronic contact and conduction, and display short lithium insertion distances," Cui wrote. "We achieved the theoretical charge capacity for silicon anodes and maintained a discharge capacity close to 75 percent of this maximum, with little fading during cycling."

The nanowires are grown directly on the metallic substrate that collects current, a process that has several advantages, Cui explained. First, the nanowires' small diameter can better accommodate the four-fold expansion in volume without fracturing. In addition, each nanowire is electrically connected to the metallic current collector, so all the nanowires contribute to battery capacity.

The nanowires also offer efficient "charge transport" and eliminate the need for additives to conduct electricity, which add weight, the journal stated. In addition to Cui, the researchers were Candace K. Chan, Hailin Peng, Gao Liu, Kevin McIlwrath, Xiao Feng Zhang and Robert A. Huggins.

Apple Launches new 13-Inch Ultralight MacBook Air

Christopher Null

Steve Jobs took the stage to kick off the annual Macworld Expo today. As usual, he brought with him a crushing amount of buzz and a pile of new product announcements. Here's what we'll be seeing from Apple, starting today!

As widely expected, Apple is launching an ultra-thin notebook called the MacBook Air. At 0.76" thick at its widest point, the three-pound Air has a wedgelike shape that tapers down to 0.16" thick at the front base. LED backlighting on its 13.3-inch screen, multi-touch trackpad (which offers some nifty features like rotating photos, all in the touchpad), and a backlit keyboard. Specs are decent: 1.6 or 1.8GHz Intel Core 2 Duo (on a cleverly shrunken socket), 2GB of RAM, and an 80GB hard drive (or 64GB SSD option). No optical drive (of course), and just one USB port. It'll set you back $1,799, which is on the inexpensive side for ultralight notebooks with specs like this. Ships in two weeks.

(By the way, as great as the MacBook Air sounds, calling this the "world's thinnest notebook" is hyperbole: The Sony X505 was 0.75" thick... and it was released in 2003.)

iPhone Software Upgrades

Apple isn't resting on its cell phone laurels; after selling 4 million iPhones, it's adding new features to the existing software package (including webclips, which will bookmark not just a web page but a specific zoom and pan and then let you place them on your home screen; multiple recipient SMS; and lyrics support for iTunes). Nothing major, but some nice, incremental upgrades to the existing software. iPod Touch gets the same upgrades as the iPhone, but it will cost you $20.

NOT announced: iPhone 2!

iTunes Movie Rentals

As widely rumored, Apple is launching a movie rental service to complement its TV and movie sales service as part of iTunes. All major studios are on board. Titles will be available 30 days after their DVD release and can be viewed on a PC or your iPod/iPhone. You have 30 days to start watching and 24 hours after that to finish. The price: $3.99 for new releases, $2.99 for old titles. Launches today. (Hey, that Netflix deal is looking pretty good!)

Also: The flagging Apple TV will get the same rental features, without the need for a computer. You'll also be able to get photos from Flickr and .Mac, podcasts, and YouTube videos via Apple TV. It will still sync with your computer via iTunes, but that isn't required if you just want to use it to watch web content. It also does high-definition... but rentals will run you a whopping $4.99 each. The Apple TV features will be a free software update to existing boxes (available in two weeks). New boxes drop in price to $229 from $299.

Time Capsule Wireless Hard Drive

Also announced: A wireless external hard drive designed to be used as a backup solution (with Apple's Time Machine backup software). $299 (500GB) and $499 (1TB).



Wednesday, November 14, 2007

Hidden risks of file sharing


By JOSEPH DE AVILA

The story isn't at all new, but the Wall Street Journal is bringing it into better focus, with specific examples and an indication that this trend is exploding. One man pleaded guilty last week to stealing tax forms, credit reports, and loan applications from more than 50 people, through the file-sharing program LimeWire. He then used the info to open credit accounts in those people's names, the usual form that identity theft takes. In September, Citigroup lost more than 5,000 Social Security numbers because one of its employees was using LimeWire and shared the wrong network. Ditto for Pfizer in June, which lost 17,000 employee records the same way.

Finding this stuff online isn't hard. Search any P2P network for hot-button words like "taxes," "resume," or "loan," and you'll come across personal information in seconds. It's also easy to misconfigure your computer to inadvertently share this information. One or two clicks is normally all it takes to share the entire contents of your hard drive instead of a specific directory intended for sharing. And no, all the security software in the world won't help you if you make a mistake like this.

What should you do? For starters, don't use P2P at all if you don't know what you're getting into. As the WSJ notes, using a computer dedicated solely to file sharing is a potentially good solution; just keep anything you don't want shared off the PC altogether. (It also goes without saying that you shouldn't share copyrighted material, either, but that's a lecture for another day.) Some networks are safer than others; certain P2P apps, like BearShare, no longer allow DOC or PDF files to be shared at all. On the other hand, in my experience, LimeWire is the network most likely to turn up private information.

The full story also has information on corporate software that can help protect you by monitoring what you're sharing, called Tiversa. Check out the link below for more details.

LINK: The Hidden Risk of File-Sharing

Many of the hundreds of millions of people around the world who swap music, movies and other digital content on their personal computers over the Internet have inadvertently put themselves at risk of identity theft.

Users of popular file-sharing services such as LimeWire have found themselves victims of identity theft when their personal information was inadvertently shared on a so-called peer-to-peer network. And recent high-profile breaches via these networks have put thousands of people's financial information at risk. The problem typically arises when users set up file-sharing software and create a folder for their downloads in the same location as their personal files.

Precise data on the incidence are hard to come by, in part because personal information can be accessed many different ways, and victims may not think to blame their file-sharing activities. But identity-theft experts say the problem is real and growing.

The risk from file-sharing "will get worse before it gets better," says Don McGillen, executive director of Carnegie Mellon CyLab, an initiative of the university in Pittsburgh that develops computer-security technology.

In the latest incident, a Seattle man this week pleaded guilty to charges of identity theft for using LimeWire to steal tax forms, credit reports and student-loan applications from the computers of more than 50 people. He used the information to set up phony credit accounts to buy merchandise online.

Citigroup in September confirmed that it was looking into a data breach where the names and Social Security numbers from 5,200 customer accounts were inadvertently leaked by an employee using LimeWire. And in June, Pfizer said the names and Social Security numbers of 17,000 current and former employees were leaked after the spouse of an employee downloaded file-sharing software onto a company laptop. Both companies say they aren't aware of any identity theft linked to the breaches, but they have offered the affected employees or customers free credit monitoring.

In another case involving charges of identity theft, computer crime and racketeering against a group in the Denver area, the final defendant pleaded guilty last week to racketeering. The group had used LimeWire to access several financial records and used the money from their practices to buy methamphetamine, according to the indictment.

"Once the meth addicts have discovered it, it is in widespread use" for identity theft, says Tom Sydnor,director of the Center for the Study of Digital Property with the Progress and Freedom Foundation in Washington, D.C.

Regulators, identity-theft experts and the file-sharing services themselves acknowledge the growing risk and are taking steps to address it. Last month, the House Oversight and Government Reform committee sent a letter to the Federal Trade Commission urging it to expand its focus on file-sharing to protect users from identity theft. At least one company, Tiversa Inc., Cranberry Township, Pa., is offering products to monitor the sharing of files online. And LimeWire and other file-sharing services say they are seeking to limit how files are shared. Many identity-theft experts, however, say the steps are inadequate or confusing.

File-sharing allows users to swap personal files on their hard drives -- from music files and videos to documents and PDFs -- via a peer-to-peer network (often called a P2P). Users download software from one of a number of services that operate on these networks, with names like BearShare, Kazaa, Morpheus and LimeWire. The software then lets users access one of several P2P networks. Once users are connected to the network, they can search for and download copies of files that other users have shared from their hard drives -- even users of other software that use the same network.

P2P networks are often disparaged by critics for enabling users to illegally download copyright material. P2Ps first came to national attention in the late 1990s and early 2000s, when the original version of Napster battled litigation from the music industry. The possibility of identity theft wasn't really on the radar then. But now, the newer applications such as LimeWire -- which unlike Napster don't house a database of files on their own servers, in an attempt to avoid copyright litigation -- have led to a surge in popularity. At any given time, as many as 12 million people world-wide are logged on to P2P networks, according to Tiversa, and 450 million copies of P2P software have been downloaded.

With growing use has come growing abuse, say identity-theft experts. But trying to pinpoint when inadvertent disclosure occurred is extremely difficult for law-enforcement agencies, says John Lynch, deputy chief of the Computer Crime and Intellectual Property Section with the U.S. Department of Justice. Identity theft on the Internet can come from several sources, including leaked files on a P2P network, an online phishing scam or a hacked credit-card company, Mr. Lynch says.

Here's how inadvertent file-sharing often starts: When a user sets up the software for the P2P service, one of the first steps is to create a folder for the files the user will be downloading. Often, the user will place that folder within the computer's "My Documents" folder -- where people also typically put their personal files, including tax returns or other financial documents. Depending on how the user set up the program, all the files in the "my documents" folder or whatever convenient host folder was chosen -- and all of the subfolders -- are then available to others in the network.

Someone who searches a network for, say, "tax return" may be able to download a copy of those personal files off other users' computers. If a user has a company laptop, or has access to company files on their home computer, these files can get leaked, too -- even from the corporate server, Tiversa says.

Even tech-savvy users often don't have a clear understanding of how this works and how to protect select files on their computers, say identity-theft experts. The P2P services' software can be confusing, these experts say, and sometimes users think they have limited the sharing of their files, when in fact, they haven't.

Each service requires different steps. Consumers can try to consult with their software provider, but some are located overseas, identity-theft experts say. And even some experts disagree on the correct steps to use. A recent report from the U.S. Patent and Trademark Office reviewed several online sources that offered instructions on how not to share files on P2P networks, and said most of the instructions were dated and inaccurate.

But for people who do want to use P2Ps, some experts advise reserving a separate computer just for file-sharing.

LimeWire -- one of the most popular P2Ps with an estimated 50 million users -- says confusion is mainly a problem for neophyte users. Mark Gorton, chairman of LimeWire, says the company doesn't track how much inadvertent sharing goes on, but he says the company has been tweaking the software to make it easier for people to avoid inadvertent sharing. For instance, he says that in the latest version of LimeWire, users are no longer able to share their entire C drive. The company has also added a warning icon that tells users how many files they are sharing and will show them a list if they click on it.

Another popular P2P service, BearShare, has had trouble in the past with users inadvertently sharing files. In 2006, BearShare was bought by a unit of iMesh Inc. as part of a larger settlement between the Recording Industry Association of America and BearShare creator Free Peers Inc. Talmon Marco, president of iMesh, says that the current iteration of BearShare helps to curb inadvertent sharing: Users can swap only media files, such as those for music or movies. Other files, such as PDFs, Word documents or text documents can no longer be shared.

Marty Lafferty, chief executive for the Distributed Computing Industry Association, questions the significance of file-sharing in the total cases of identity theft. Still, he says, the organization is developing best practices for the industry with regards to inadvertent file-sharing. For example, the DCIA is advising its members to rework their programs' warnings to make it clearer when users are sharing files that they might not intend to, says Mr. Lafferty.

Tiversa offers a consumer product that monitors customers' file-sharing, for an annual charge of $24.95. If a group of files that might contain sensitive information has been designated to be shared, the company will alert the customer and explain how to stop the sharing. Tiversa can also tell the user whether a shared file has been downloaded by another user.