When bad passwords past make your life impossible in this?

bad passwords

It is one of the day’s news: Mark Zuckerberg will have “hacked” his Twitter and Pinterest account. It is not the only person to have suffered an attack in recent days, and accounts of celebrities seem to have been the favorite targets of attackers. The main cause? Although still to be confirmed, it looks like it is related to the recent leaks of passwords for different services … after attacks that were carried out in 2012 and 2013.

Specifically, in mid-May appeared for sale on the Internet a list of more than 117 million users of LinkedIn, all with their respective email and password. Although information emerged in the 2016, it appears that the data is stolen from LinkedIn in 2012. If at that time you were a user of this social network, then it is very likely that your data is in the list.

Because right now? That’s the million dollar question. In 2012, after the attack, it was believed that only 6 million passwords had been leaked, without more information. The current filtration shows that, as some warned, that was only a fragment and, in fact, provides more information, such as e associated with each password. With all password hashes (SHA1 without skipping) in hand, it is still very difficult for the experts “crackears” for the actual password.

Read more

Who remembers Longhorn? This was the lost Microsoft project that never came to see the light

Longhorn

After the launch of Windows XP in Microsoft began tinkering with a project called Longhorn. Which theoretically would be a minor update to its operating system it became a particularly ambitious development.

In fact it was so ambitious ever came to see the light (at least not in final version): Microsoft had to abandon many of the innovative ideas that sought to carry out this operating system and turned it into a version that would end up being one of the most criticized and hated of Microsoft: Windows Vista. Now a user makes us rediscover that lost project.

Read more

Tips for Improving Website Usability

You can’t be all things to all people, but you can certainly try improving website Usability for both web browsers and the visitors who trickle onto your site. Still, it can be an agitating task. But there’s good news. It doesn’t have to be that way. Avoiding the frustration of trying to make your website … Read more

Total bet for the Sony Xperia X? Everything points to other families begin to lose weight

Sony Xperia X

Sony is one of those companies that seem to want to kill many times – and it is not our intention – but always walks reinventing or mulling how to improve this impossible market of smartphones or their market shares, nor its financial results correspond to the value of their products, and seems to have much to do with knowing sold, or hit with the type of product you have to offer.

The debate already had with the death sentence of the Xperia Z, and that there was more to look at the catalog of products that will flourish in the new family Xperia X, which overlaps with them and not make much sense there both terminal like less in a company that you have to do is cut and hit.

Read more

Are we ready to talk to machines?

Talk to machines

Voice attendees want to escape the cell. The first to show what they can offer these solutions has been Amazon with its Echo, a product that has recently seen two new additions and has become an extremely versatile solution for users who go beyond the basic wizard and begin to take advantage for tasks of all kinds.

That seems to have ignited the spark of a segment that continues to focus on the mobile but it also seems to want to start offering their chances on other devices. Manufacturers want to make the voice problem. They want to talk to machines.

Humanizing machines

Why so many digital assistants have female names? It is a question with an answer that has led to recent debates about sexism but also has an obvious explanation. Professor of Communication at Stanford Clifford Nass explained already in 2011 on CNN,” it is a well established phenomenon that the human brain is developed to like female voices.”

Read more

Windows 10 already supports G-Sync and FreeSync: Why is this important for gamers?

G-Sync and FreeSync

For months now that Microsoft have been working on supporting more and more technologies to squeeze the maximum field of video games in which they want to become absolute protagonists.

A new build of Windows 10 comes loaded with new features in this regard: the games of the new Universal Windows Platform (UWP) may already have support for technologies FreeSync AMD and NVIDIA G-Sync; plus another striking option among gamers: unlocking the frame rates of those titles.

The first games to take advantage of these features will be ‘Gears of War: Ultimate Edition’ and ‘Forza Motorsport 6: Apex’, and Microsoft expect other developers to provide such capability in securities that are part of the universal platform.

Read more

The creator of Siri presents the amazing capabilities of your new personal assistant Viv

Viv

Virtual assistants have spent several years between us, but let’s face it, few people actively use, either because they do not provide what we need, or just do not understand what we say, so it is still easier to do it through a search engine or manually in our smartphone.

When Siri appeared in 2011 as part of the iPhone 4s, demonstrating their capabilities left everyone with their mouths open because first you were talking naturally to a machine, an expected evolution to voice commands present in several mobile for several years. But it seems that is about to change again because today we have the first live demonstration of Viv, the new personal assistant of the creators of Siri.

Read more

7 ways to recover the key to your WiFi if you forgot it

WiFi

Our memory is not infallible, and may on occasion you have found with the need to remember the password for a WiFi network to which you connect to another computer soles. It’s not the end of the world if you have not signed up passwords, since computers store all passwords that you use.

You just have to know where and how to look, and so today we’ll have seven ways with which to retrieve the keys of WiFi networks that you soles connect to your computer with Windows, Mac OS X and GNU / Linux. We also say some basic trick and even an application to expedite the process.

Read more

Does using our skin as a touch pad to control a smartwatch?

SkinTrack

Despite carrying a few years between us, the popularity of smartwatches has not had the overwhelming response that many expected, this mostly by the limitations that still presents, as is a device that depends on our smartphone, a screen additional we avoid having to be pulling out the phone with each notification, although there are some attempts to make it more independent.

Another point that has not helped in the rapid adoption is the theme of the screen and limiting to interact with applications within such a small space, something that developers have met and few have been able to solve. But now we face an interesting project that seeks to solve this, making our skin serves as a touch pad to extend the capabilities of our smartwatch.

Read more