Mar 25, 2011

iPhone Review.

Salam sejahtera.
Mungkin ramai diantara kita masih lagi tidak berapa tahu mengenai iPhone yang
sememangnya adalah gadjet yang paling diminati ramai pada masa ini. Disini 
saya ingin menceritakan serba sedikit mengenai iPhone dari keluaran pertama
sehingga akan datang.

iPhone pertama adalah iPhone 2G yang dikeluarkan pada 9 Januari 2007.
mempunyai spesifikasi yang agak minimum, model ini hanya diminati oleh
segelintir shja. 

Kesemua iphone mempunyai spesifikasi yang berbeza dan setiap
keluaran model baru pasti mempunyai dalaman yang lebih hebat. Perbezaan pertama
adalah RAM iaitu untuk iphone 2g = 128Mb, 3G = 128Mb, 3GS = 256Mb dan
iphone 4 = 512Mb dan masing-masing mempunyai kamera 2mp, 2mp 3.2mp dan 5mp. 
Perbezaan dari segi RAM melibatkan kepantasan membuka
atau menutup sesuatu aplikasi.

Mungkin ramai yang tidak dapat membezakan antara iPhone 3G dengan
iphone 3GS. Untuk luaran, sememangnya adalah sama jika dipandang
sekali imbas. Tetapi jika diperhatikan dengan teliti, tulisan 'iPhone' untuk
3G sedikit pudar dan untuk 3GS lebih berkilau. Bagi spesifikasi dalaman,
3G tidak mempunyai rakaman video dan tidak sesuai untuk multitask applikasi
kerana RAM yang hanya 128Mb. Mungkin agak sedikit 'lagging'.

iphone 3GS sebenarnya sudah mencukupi untuk merasa kepuasan menggunakan 
telefon keluaran Apple ini. RAM 256Mb sudah boleh berfungsi dgn baik
multitask tanpa ada sebarang 'lagging' dan kelajuan membuka sesuatu aplikasi
juga sudah memberi kepuasan hati kepada setiap pengguna.

iphone 4 adalah model keluaran yang terbaru sekali dan dilengkapi
dengan Facetime Video ( sama seperti videocall) . Selain itu, dengan RAM sebanyak 512Mb,
model ini berfungsi dengan sangat baik melalui 'multitask' aplikasi iaitu
membuka banyak aplikasi dalam satu masa. Lebih kurang minimize application.

Dikatakan iphone 5 akan dikeluarkan pada Jun/Julai 2011 dan dilengkapi dengan
prosesor baru serta mempunyai saiz yang lebih besar. Pasti ramai yang tidak
sabar menantikan keluaran baru dari Apple.

Read rest of entry

Jan 15, 2011

How I’d Hack Your Weak Passwords 
Just now i went through just to see any interesting info about hacker. After reading some of the article, then i just bookmarked this site.. muahaha.. Quite interesting articles got in there. So here i just copy and paste for u guys to read on it. chill~
Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides knows a thing or two about password security—and he knows exactly how he'd hack the weak passwords you use all over the internet.
Photo remixed from subcircle.
Note: This isn't intended as a guide to hacking *other people's* weak passwords. Instead, the aim is to help you better understand the security of your own passwords and how to bolster that security. We originally published this piece back in March, but in light of our recent security breach, it seemed more applicable than ever.
If you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
Let's see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I'll probably get into all of them.
  1. Your partner, child, or pet's name, possibly followed by a 0 or 1 (because they're always making you use a number, aren't they?)
  2. The last 4 digits of your social security number.
  3. 123 or 1234 or 123456.
  4. "password"
  5. Your city, or college, football team name.
  6. Date of birth – yours, your partner's or your child's.
  7. "god"
  8. "letmein"
  9. "money"
  10. "love"
Statistically speaking that should probably cover about 20% of you. But don't worry. If I didn't get it yet it will probably only take a few more minutes before I do…
Hackers, and I'm not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)
One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. has a list of the Top 10 FREE Password Crackers right here.
So, how would one use this process to actually breach your personal security? Simple. Follow my logic:
  • You probably use the same password for lots of stuff right?
  • Some sites you access such as your Bank or work VPN probably have pretty decent security, so I'm not going to attack them.
  • However, other sites like the Hallmark e-mail greeting cards site, an online forum you frequent, or an e-commerce site you've shopped at might not be as well prepared. So those are the ones I'd work on.
  • So, all we have to do now is unleash Brutus, wwwhack, or THC Hydra on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.
  • Once we've got several login+password pairings we can then go back and test them on targeted sites.
  • But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser's cache. (Read this post to remedy that problem.)
And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker's computer, and the speed of the hacker's Internet connection.
Assuming the hacker has a reasonably fast connection and PC here is an estimate of the amount of time it would take to generate every possible combination of passwords for a given number of characters. After generating the list it's just a matter of time before the computer runs through all the possibilities – or gets shut down trying.
Pay particular attention to the difference between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters – like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.
How I’d Hack Your Weak Passwords
Remember, these are just for an average computer, and these assume you aren't using any word in the dictionary. If Google put their computer to work on it they'd finish about 1,000 times faster.
Now, I could go on for hours and hours more about all sorts of ways to compromise your security and generally make your life miserable – but 95% of those methods begin with compromising your weak password. So, why not just protect yourself from the start and sleep better at night?
Believe me, I understand the need to choose passwords that are memorable. But if you're going to do that how about using something that no one is ever going to guess AND doesn't contain any common word or phrase in it.
Here are some password tips:
  1. Randomly substitute numbers for letters that look similar. The letter ‘o' becomes the number ‘0′, or even better an ‘@' or ‘*'. (i.e. – m0d3ltf0rd… like modelTford)
  2. Randomly throw in capital letters (i.e. – Mod3lTF0rd)
  3. Think of something you were attached to when you were younger, but DON'T CHOOSE A PERSON'S NAME! Every name plus every word in the dictionary will fail under a simple brute force attack.
  4. Maybe a place you loved, or a specific car, an attraction from a vacation, or a favorite restaurant?
  5. You really need to have different username / password combinations for everything. Remember, the technique is to break into anything you access just to figure out your standard password, then compromise everything else. This doesn't work if you don't use the same password everywhere.
  6. Since it can be difficult to remember a ton of passwords, I recommend using Roboform for Windows users. It will store all of your passwords in an encrypted format and allow you to use just one master password to access all of them. It will also automatically fill in forms on Web pages, and you can even get versions that allow you to take your password list with you on your PDA, phone or a USB key. If you'd like to download it without having to navigate their web site here is the direct download link. (Ed. note: Lifehacker readers love the free, open-source KeePass for this duty, while others swear by the cross-platform, browser-based LastPass.)
  7. Mac users can use 1Password. It is essentially the same thing as Roboform, except for Mac, and they even have an iPhone application so you can take them with you too.
  8. Once you've thought of a password, try Microsoft's password strength tester to find out how secure it is.
By request I also created a short RoboForm Demonstration video. Hope it helps…
Another thing to keep in mind is that some of the passwords you think matter least actually matter most. For example, some people think that the password to their e-mail box isn't important because "I don't get anything sensitive there." Well, that e-mail box is probably connected to your online banking account. If I can compromise it then I can log into the Bank's Web site and tell it I've forgotten my password to have it e-mailed to me. Now, what were you saying about it not being important?
Often times people also reason that all of their passwords and logins are stored on their computer at home, which is safe behind a router or firewall device. Of course, they've never bothered to change the default password on that device, so someone could drive up and park near the house, use a laptop to breach the wireless network and then try passwords from this list until they gain control of your network — after which time they will own you!
Now I realize that every day we encounter people who over-exaggerate points in order to move us to action, but trust me this is not one of those times. There are 50 other ways you can be compromised and punished for using weak passwords that I haven't even mentioned.
I also realize that most people just don't care about all this until it's too late and they've learned a very hard lesson. But why don't you do me, and yourself, a favor and take a little action to strengthen your passwords and let me know that all the time I spent on this article wasn't completely in vain.
Please, be safe. It's a jungle out there.
EDIT: You might also want to listen to my interview on Connecticut Public Radio about password security.
Read rest of entry

Switched On: Making the call on Windows Phone 7

Each week Ross Rubin contributes Switched On, a column about consumer technology.

CES 2011 saw the debut of what could be the biggest challenge to the Wintel dominance of personal computing since Windows 95 cemented its position. The combination of the Android operating system on ARM processors -- ARMdroid if you will -- grabbed most of the attention in the emerging tablet category on products such as devices such as the Motorola Xoom and LG G-Slate. But it was also clear that manufacturers -- unconstrained by Cupertinian notions of what operating system is best suited to what kind of device -- are willing to take the combination in new directions that come much closer to the notebook form factor. A clear example of this was the ASUS Eee Pad Slider. If having the tablet thunder stolen from Microsoft wasn't enough to make the company uncomfortable, clearly encroaching designs like this were.

And so, at Steve Ballmer's keynote, the company announced that the next version of Windows will support not only x86 offerings from Intel and AMD – themselves moving closer to ARM-like system-on-chips – but ARM designs from companies such as Qualcomm and NVIDIA as well. Microsoft noted that the new chip support was requested by its partners, implying that PC companies want to take advantage of the long battery life and thin form factors enabled by ARM architectures, but also bring along Windows' broad driver and software support. Microsoft clearly considers the tablet another PC, albeit one that Windows' hardware and user interface layer needs to support better. However, in striking back at Android evolution, Microsoft risks collateral damage to its own mobile OS. Can Windows Phone 7 co-exist with a ARM-based version of the real thing?

Let's look at the competition. Microsoft's support of both x86 and ARM with its "desktop" OS and support of ARM with Windows Phone 7 represents a contrast to Apple and Google -- even though, as Microsoft accurately pointed out, both have dual OS strategies. Apple reserves Mac OS for notebooks and desktops while using iOS in its tablet and smartphone, although some believe that iOS will eventually replace and not just influence Mac OS later down the road. For Google, it's open season, so to speak, as device manufacturers call the shots, but while Android has been moving to support larger devices with the Honeycomb release, Google's Chrome team has also staked out the notebook. Both operating systems support x86 and ARM, and we will no doubt see notebook-like devices with both of them.

While Apple's position is defensible (and the only one that has been successful on both fronts), Switched On has previously questioned the role of Chrome in the wake of Android's success. Is there, then, a need for the just relaunched Windows Phone 7 in a world where Windows itself runs on ARM architectures? While Microsoft refrained from any discussion of the user interface of the next version of Windows, the company made sure to remind us of its touch expertise via a revamped flat-panel version of Surface, and Windows development chief Steven Sinofsky dismissed the challenge of implementing touch user interfaces, even scaled to a variety of differently-sized screens. The next version of Windows -- and apps developed for it -- may well dynamically adapt their UI depending on the usage scenario, with a traditional desktop mode when used as a clamshell notebook, a Metro-like touch experience when used as a tablet, and a Media Center-like experience when projected onto a television screen for a 10-foot entertainment experience.

Microsoft mentioned mobile devices as candidates for this revamped Windows; there's no telling at this point how small that will go. Confusing the matter a bit more, Intel CEO Paul Otellini noted on Intel's most recent earnings call that the PC chip giant will be able to ride "desktop" Windows as it slims down into the handset market. "[W]e have the ability to put our lowest-power Intel processors, running Windows 8 or the next generation of Windows, into phones." As it stands, we might see both of Microsoft's operating systems compete for the same realm.

However, there is a good reason to draw the arbitrary line between Windows and Windows Phone 7 at devices that are indeed phones. Whereas Microsoft's hardware partners may seek more openness in its tablets than what Apple provides, handset carriers want some degree of consistency and control to reduce support costs. Providing that degree of consistency and control could also help differentiate from Android. Or, much as will be the case with 10-inch notebooks running either Android or Chrome, we may well see 4.5-inch or 5-inch handhelds running Windows or Windows Phone 7 both. Perhaps some embedded version of the former will eventually cause the demise of the latter. For the time being, though, there is a place for Windows Phone 7 even as it shares ARM support with its big brother platform.
Read rest of entry


I believe that what you are seeing here is a product of something that Jose Julio’s daughter said to him: “Dad, can you build a robot for me?”
Man, if my daughter asked me that, I would try to deliver as much as I could. Still, I could never make a product of this quality. Granted, the ArduSpider has a certain DIY quality, but mine would probably be made of Lego and would require an instruction booklet.
It would also have been poorly assembled, but this Arduino-based ArduSpider robot looks better than the Anti-Gravity WebRunner toy that we reported about a while ago. Check out the video after the jump.
The ArduSpider robot can be controlled remotely and can also be autonomously operated. Best of all, it can do a lot of tricks like gymnastics and such. It could probably do a flip if it could ever get off its back. All the aforementioned Webrunner could do was climb walls through vacuum suction power.
I have got some words of advice to Jose Julio. Find a way to make a kit and market it so fathers everywhere can build an ArduSpider for their children. Better yet, have the children build it themselves. This is definitely is the Zoids of this generation.

Read rest of entry

What's New in iPhone 5

We're due for the next iPhone model this summer, and it may feature an upgraded processor. 
We’re months away from a supposed iPhone update, but Apple Insider has already reported some of the projected specs. Citing Apple Daily (a Hong-Kong based publication), Taiwan manufacturer Kinsus will allegedly supply parts for the device, including a new custom processor called the A8.
Apple relatively recently acquired two chip manufacturers, Intrinsity and P.A. Semi, which allowed it to dive into creating its own custom ARM processors. The iPad was the first Apple device to sport a custom portable processor with the A4, which was also built into the iPhone 4 and latest generation iPod Touch, as well as the Apple TV.
Now Apple will up the ante with the more powerful processor as well as a baseband from Qualcomm for the iPhone 5 (which may actually show up in the CDMA Verizon iPhone 4). Seeing as Qualcomm is a major manufacturer of CDMA chips, many are taking its involvement to mean that a Verizon version of the iPhone 5 will also be available at the product’s launch.
Read rest of entry


Cheddo Copyright © 2009 Gadget Blog is Designed by CroniXsouL Sponsored by CroniXsouL