Home Blog Page 378

Google launched Pixel smartphones — rival to the iPhone

Google launches Pixel smartphones

Google unveiled a new smartphones —  named Pixel , at its annual autumn event, considered to be  a high-end competitor to flagship devices like the iPhone and Galaxy S-series.

Starting at a price of Rs 57,000, the Pixel smartphones will come in two screen sizes — a 5.5-inch and a 5-inch variant. The phone will be available in two colours – Quite Black and Very Silver with memory configurations of 32GB and 128GB sizes.

Interestingly Pixel smartphones comes with the company’s artificial intelligence — Google Assistant, similar but much advanced one that we already saw in Google Allo messenger.

Also Read : Coming soon Andromeda OS — Google’s Android-Chrome OS hybrid

“Google is now moving forward from a mobile-first platform to an artificial intelligence-first platform. And the culmination of all the efforts is the Google Assistant,” Google CEO Sundar Pichai said, before he kicked off the keynote speech at Ghirardelli Square Fisherman’s Wharf area of San Francisco, California.
“The Assistant will help Google design a personal Google for everyone,” he added just seconds before announcing the launch of Google’s latest smartphones — Pixel and Pixel XL.

Device will run  Android Nougat 7.1 with a tweaked aesthetic and claims to be the “best ever” smartphone camera, which is 12.3MP with an f/2.0 aperture. And also the device is protected by Corning Gorilla Glass 4, will come with Qualcomm Snapdragon 821 processor along with a 4GB DDR4 RAM unit. Other specifications include a 2770 mAh and 3450 mAh battery options, latest Bluetooth module, USB Type C and 3.5 mm headphone jack. The phones will also come with Google Duo and Allo pre-installed.

Google launches Pixel smartphones | Credits : Google
Google launches Pixel smartphones | Credits : Google

Google also launched its latest Chromecast device called Chormecast Ultra — supporting 4K content, which Google is going to roll out under Play Movies app, it promises superior image quality. The product will retail for $69 from November.

Also Read : Google planning to add Social Network features in YouTube to compete with Facebook, Twitter

Chormecast Ultra
Chormecast Ultra | Credits : Google

The company also showcased network assisted Google wifi.Network assist works in the background to provide seamless connectivity. It also comes with an app which can control the routers for parental guidance. Google wifi will retail for $129 for single packs and $299 for larger homes and products will start shipping in December.

Google wifi.Network assist
Google wifi.Network assist | Credits : Google

Another product Google launched at the event was Daydream VR headset comes along with a controller. The virtual reality headset and motion-sensing controller make use of Pixel – and other forthcoming compatible phones – as a display.

Also Read : Google is developing a new Open Source OS that’s not based on Linux

Daydream VR headset
Daydream VR headset | Credits : Google

Another major launch was a smart  wi-fi speaker  — Google Home, which will activate by the trigger words “OK Google“, following which, owners can use it to : get answers to questions,control internet-connected lights and other smart home products,play music via Spotify, YouTube Music, Google Play Music and other services,set timers and alarms, create shopping lists and get travel updates.

Google Home
Google Home | Credits : Google

However, Google Home, wifi and Daydream VR headset may not be available in India soon. The Chromecast Ultra is expected to come to India soon. The company has not yet announced India prices for any of this products.

Also Read : Google introduced ‘Project Bloks’ to teach kids how to code

This Simple drag-and-drop feature in Windows explorer can save your time

This Simple drag-and-drop feature in Windows explorer can save your time

We are using different methods to copy or move files in Windows. Some of us use traditional “right-click —> cut/copy — paste” method while some other use drag-and-drop feature in Windows explorer to copy their files.

Drag-and-drop feature is most convenient method to copy your files in Windows. With drag-and-drop feature you can easily copy or move files around in Windows.

But what if i say there are some hidden Windows tricks that can make this feature more handy.

So check out how we can use this feature :

 Also Read : How to factory reset Windows 10 without losing your data

Easy drag-and-drop feature in Windows explorer :

We normally use our Left mouse button to drag files from one drive to another ,which usually copy files after releasing mouse. But this is not the only thing you can do with drag-and-drop feature.

Actually using drag-and-drop feature you can handle your files in three different ways :

Method 1 : Simply drag  files from one drive to another by holding “Left Mouse Button” and drop files by releasing mouse. to copy files.

This Simple drag-and-drop feature in Windows explorer can save your time

Method 2 : Hold “Shift + Right mouse button” while drag to move files from one drive to another.

This Simple drag-and-drop feature in Windows explorer can save your time

Method 3 : Use only “Right mouse button” to dragging files and when you drop the files, you will be prompted to choose which action to take. You can either choose “copy” or “move” or “create a shortcut” or “cancel” the operation.

This Simple drag-and-drop feature in Windows explorer can save your time

So now onwards use this simple hidden Windows drag-and-drop features to handle your files.

 Also Read : How to Hide Drives or Partitions in Windows 7/8/10

Now you can play Solitaire and Tic-Tac-Toe in Google search

Now you can play Solitaire and Tic-Tac-Toe in Google search results

Now you can play Solitaire and Tic-Tac-Toe directly in Google search results through your desktop and Google mobile apps.

Today in their official blog, Google announced the addition of two of the oldest and most popular games for all ages – Solitaire and Tic-Tac-Toe in Google search engine.

How to play Solitaire and Tic-Tac-Toe in Google search ?

So how to play them ?

Its easy – you just have to type in “solitaire” or “tic-tac-toe” to Google, and it will display the game for you to play, right in the search results.

Also Read : Google is developing a new Open Source OS that’s not based on Linux

Each game allows you to pick the difficulty level, and with tic-tac-toe, you can also play against another player sitting next to you. The company also included the ability to flip a coin by typing in “coin flip.”

Now you can play Solitaire and Tic-Tac-Toe in Google search
play Solitaire in Google search
Now you can play Solitaire and Tic-Tac-Toe in Google search
play Tic-Tac-Toe in Google search

Apart from these games, Google also added some neat tricks as well: type in “what sound does a lion make?” and it will bring back an audio result, as well as a short list of other animals.  The list is a bit limited, but hopefully it will add more to the list before too long.

Now you can play Solitaire and Tic-Tac-Toe in Google search
Animal sounds

Also Read : Google introduced ‘Project Bloks’ to teach kids how to code

Websites can use your phone’s battery status to track you online

Websites can use your phone's battery status to track you online

Researchers from Stanford University – Steve Engelhard and Arvind Narayanan,  recently found that your smartphone’s battery status may now provide a way for websites to track you online – “thanks to HTML5”.

With rise of HTML5 web developers can do a lot of things, in that HTML5 Battery Status API – information on your battery life percentage and time to discharge, as well as how long it would take to charge your phone can be used to track you online.

Also Read : Skype Now Hides IP Address By Default In PC And Mobile

HTML5 Battery Status API allows servers to determine when they need to send an energy-efficient version of a website. It lets them see how much charge a laptop, tablet, or smartphone has in terms of time remaining until discharge, and as an overall percentage.

And according to researchers – these two figures can be combined to provide a the unique combinations of the numbers which would give websites a way to match your battery information with your IP with fairly good certainty and there are about 14 million different combinations of battery life as a percentage and remaining time.

And also these figures about battery status updates after almost every half a minute, so these statistics can be used to identify the user on the website within the time frame of 30 seconds. Researchers claim that website can possibly reconstruct your battery’s identity, within that given 30-second timeframe, even if you visit a website using a proxy and then revisit the same website without proxy.

The worst part of this attack is that it’s hard to mitigate against it. You can’t deal with it as easily as you would wipe your browser cookies. VPNs and AdBlockers won’t help either. The only option is to plug the device into the mains. Although it’s unclear whether this sort of thing is being routinely used against users, for some time, many in the security community have held concerns about the Battery Status API.

Right now only Firefox supports Battery status disabling feature. So if you are too much concerned about your privacy switch to Firefox.

Click here to check if Battery Status API is Enabled/Disabled in your browser.

Also Read : Edward Snowden developed a special phone case to keep us safe from spying eyes

Google is developing a new Open Source OS that’s not based on Linux

Google is developing a new Open Source OS that’s not based on Linux

Google already created two operating systems – Android and  Chrome OS – but both are based upon the Linux kernel.

Reportedly some rumors states that Google is secretly developing a new Open Source OS – which is not just an upgrade to Android or Chrome OS and also hat’s not derived from the Linux kernel.

The new Google operating system is codenamed  Fuchsia,which Google planning to implement in future smartphones and computers.

Also Read : How to find all the apps you’ve ever installed on your Android phone

While Google hasn’t officially announced anything about the OS, it released details about the project on GitHub with the cryptic description “Pink + Purple == Fuschia (a new Operating System).” However, at the moment, the repository doesn’t include any source code.

So according to some reports, the upcoming Google Open Source OS – Fushia  uses  Magenta kernel, which is designed to compete with IoT-oriented operating systems like FreeRTOS or ThreadX.  Dart is the main programming language and Flutter support indicates that the OS will likely use Material Design for its user interface.

Till now Fushia OS is in dark and may be we can hope one day this Google’s new Open Source OS will be a better competitor for Microsoft Windows.

How to find all the apps you’ve ever installed on your Android phone

How to find all the apps you've ever installed on your Android phone

Sometimes its happens – Once you installed an awesome app from Google Play Store and because of low memory or some other reason you deleted  that app. Now you have a better Android phone and like to install that particular Android app that you uninstalled years ago :

But your memory sucks! You forget that app name.

But don’t worry Google knows you…. because your Google account saves the list of all the apps you’ve ever installed on your Android phone from Play Store.

Also Read : Now Google Lets You To Use Apps Without Installing Them On Your Phone

May you can say Google spying on you – but this time you can take the advantage of that spying eyes.

So lets find out all the apps you ever installed from Play Store :

Of course, first you have to launch Play Store.

Now tap on the hamburger menu for options and choose ” My apps &  games“.

How to find all the apps you've ever installed on your Android phone

Now a new screen will load…..there tap on “All” tab to find all the apps you have ever installed on your Android phone from Google Play Store.

How to find all the apps you've ever installed on your Android phone

So now you know the trick.If you find it interesting share it with your friends.

Also Read : Top 15 Best Android Hacking Apps for Script Kiddies and Security Experts | 2016 List

Edward Snowden developed a special phone case to keep us safe from spying eyes

Edward Snowden developed a special phone case to keep us safe from spying eyes
Edward Snowden developed a special phone case to keep us safe from spying eyes

We all know, Edward Snowden who always fight against government’s policy about spying their citizens. So this time Snowden comes up with a new gadget concept to keep us safe from spying eyes.

On Thursday, Snowden and hacker Andrew Huang presented a possible solution – MIT Media Lab, with Snowden speaking on video from Russia – that could prevent the government from finding your location.  Tracking a person’s location is quiet easy for government because now everyone have smartphones with GPS and according to Snowden – ” smartphones are the perfect tracking device”.

Also Read : This is what Edward Snowden said About Tor Project

Governments can monitor a user’s location through the radio signals from the phone and this can put journalists, activists, and rights workers in danger, he warned.

So Snowden and fellow hacker Huang comes up with a gadget concept called the introspection engine,” and it’s designed to alert the user if and when the phone’s radio signals are turned on.

Yes smartphones generally come with an airplane mode that can turn off a phone’s cellular and Wi-Fi connections. But even that can be misleading, Snowden warned. The GPS, for instance, will still remain active on some handsets, like the iPhone. In the worst-case scenario, malware could also infect the handset to secretly send radio transmissions, he added.

Also Read : Edward Snowden Doubts Security of Telegram, but Founder Pavel Durov Disagrees

How Snowden’s Device Keep Us Safe from Spying Eyes


Snowden’s solution is designed to detect any errant phone signals when the handset is switched into airplane mode. His concept functions like a battery case that can attach to an iPhone, but it also wires into the handset’s SIM card slot. A small computer in the case will then detect the handset’s radio transmissions.

Edward Snowden developed a special phone case to keep us safe from spying eyes
Conceptual rendering of a “battery case” style introspection engine, piggybacked on an iPhone6 | Credit: Edward Snowden

Any unusual activity can trigger an alarm. A small display embedded on the case can also show updates. To guarantee that no signals are sent out, the case could also built with a “kill switch” that disconnects power to the phone.

Snowden said that he designed the technology to help protect reporters working in dangerous situations.

“Unfortunately, journalists can be betrayed by their own tools,” he added. That may have happened in 2012, when U.S. reporter Marie Colvin was killed while covering the Syrian civil war. A lawsuit alleges that the Syrian government assassinated her by tracking Colvin’s satellite phone communications to find her location.

Snowden’s introspection engine, however, is still just a concept. He hopes to develop a prototype over the coming year. The technology will be open source and is meant to easily be applied to other phone models.

Also Read : NSA Chief Hacker Explains How To Avoid NSA Spying

What is Data Security ? Why is it so important?

ssl-cloud-big-data-security1

There is one thing that makes us so vulnerable is ignorance. Today, everything is going to have depended on the internet. We share most of our information on the internet without taking care of it. Most of the information can be shared publicly but not all information like your personal life details, Credit card details, Bank details, etc. To secure the information and the data, We should have a better understanding of Data security.

What is Data Security?

Data security is the practice of keeping your data protected from being corrupt and unauthorised access. Whether you are using Facebook to chat with your friends, watching YouTube videos, or doing any important online work you must be aware of data security.

There are two serious problems in the field of data security: the amount of information that you store or transfer, and the ease with which this information can you withdraw. Many of us keep all data (contacts, correspondence, and documents) on laptops and even mobile phones, including the confidential information of tens, hundreds or even thousands of people. Not too difficult to steal phone (laptop) or quickly copy content.

By using encryption, you can not only increase the level of Data security but also complicate access to classified information to those who are physically able to get to it. In a computer or mobile phone, it is easy to lock a password, PIN-code or protection by means of a gesture. Alas, the lock will not help protect data in the loss of the device. Such a lock is easy to get around because the data is stored on the device in a readable form. All you need to do an attack – to connect to the storage medium directly. Then he will be able to view and copy the data without knowing the password.

If you use encryption, an attacker will have not enough information to access the device. To decrypt the data it will need your password. To bypass this protection is not possible.

The best way – not to encrypt individual folders and all data. Most computers and smartphones support a full encryption. In Android, you will find this option in the section “Security”, in Apple devices (eg, iPhone, iPad), it is called the “Data Protection” and it automatically turns ON when you activate the lock short password. On computers that are running Windows Pro, there is BitLocker application for encryption .

Whatever application you use, reliable encryption as much reliable your password. If the device falls into the wrong hands, it will have plenty of time for password guessing. The forensic software allows selecting passwords at speeds of millions of operations per second. Four-digit PIN-code for a while to protect your data. Even a longer password will not be able to restrain the attack for a long time. A really secure password should contain more than fifteen characters.

Most of us do not like the idea to remember and enter the passphrase on your phone or another mobile device. Thus, encryption is able to reliably protect data from accidental access only. For a truly confidential information, it should ensure the physical safety and inaccessible to intruders. You can limit the work with such data on one computer is more secure than others.