Wednesday, May 3, 2017

8 Ways the iPhone 8 Can Beat the Galaxy S8

 Galaxy S8
Samsung Galaxy S8 IPhone 8: the top smartphones in advance comparison

Galaxy against iPhone: this year, it's going to be an extra year. In 2017, it promises to be particularly exciting. Samsung has to deliver after the note 7; Apple will introduce its anniversary iPhone. We compare the Galaxy S8 and the iPhone 8 based on the current rumour. At the Mobile World Congress 2017, there were some exciting smartphones to see.

The LG G6, the Huawei P10, and the Nokia 6 - all these devices could convince. Nevertheless: The very big highlight was missing this year. This was because Samsung pushed the presentation of the Galaxy S8 was postponed. After the presentation of the Galaxy Tab S3 there was only a short teaser, held an event on 29 March 2017. After all, almost all the specs, pictures and videos from the device have come into the public several times.

According to the company, the Galaxy S8 is once in a normal and the larger plus version. With Apple this year even three iPhones are pending. To the iPhone 8, which is apparently to be called iPhone Edition, the upgrades of the model from the previous year: the iPhone 7s and the iPhone 7s Plus.

The Samsung will probably differ only with the screen and the battery size as well as in the price. In addition, we can assume that the new Galaxys also offer top processing. Since there was in the past few years apart from the premium class nothing to complain about. Likewise, it will be experience with Apple. Well, the protruding camera lens in the last devices was perhaps not everyone's thing.

Display: OLED and curved is the trend

The Edge screen, which Samsung introduced with the Galaxy Note Edge and then with the Galaxy S6 Edge on both display pages, has now become the trademark of the premium class. Leaks show: Even 2017 do not differ from Samsung. On the contrary, for the first time, both Galaxy-S devices will come with curved displays, which extend over the entire front side. Infinity-Display calls Samsung the same, the smaller output is 5.8, the larger 6.2 inches. As far as the technology is concerned, everything that is not AMOLED would be a surprise.

Apple is also on the iPhone 8 gadget for the first time set to OLED. Whether the company from Cupertino sets on edge screens remains to be seen, but is not excluded. Apple will probably change the display size. The current iPhone 7 Plus offers a diagonal of 5.5 inches, the iPhone 8 is to come to 5.8 inches. That was in the past at 2560 x 1440 pixels. Apple's largest iPhone brought it 2016 to Full-HD.

The keys move to the screen

Both manufacturers had a physical home button under the display. It seems to be in the upcoming version. In Samsung, the fingerprint sensor moves to the back, everything else is solved via on-screen buttons. That was already seen on numerous leaked pictures

Apple should go even a step further and the fingerprint sensor in the screen. In addition, the well-known dock in iOS could give way to a touchbar-like bar that offers fast access to apps. There will be further optical differences in the connections. Apple has already renounced the iPhone 7 on the headphone connection and will not deviate from it. At Samsung, which also show pictures, the socket is still on board.

In terms of performance, both smartphones are not likely to be used in everyday use. Samsung is using the new Snapdragon 835. Samsung has secured a lot of chips for the production by an exclusive deal with Qualcomm - and thus also overpowered all competitors. Apple, on the other hand, is an open secret, the A11 chip is used.

As you know from the company, you will not reveal details on the timing. Instead, a chart of marketing boss Phil Schiller will once again show how much faster the new iPhone is compared to its predecessors. The company is also traditionally silent on working memory. You can assume that the speed at the iPhone 8 will again be very high.

Double or simple camera

Both Apple and Samsung have been known for years for excellent smartphone cameras. In the iPhone 7 Plus, Apple has switched to a dual camera, with which to shoot chic portrait photos. On Samsung, however, it did not look like a converted to double clips on leased images. A tweet, however, gave cause for surprise. Perhaps the dual camera at Samsung is used up front. Portrait Selfies would be fine. Apple also has something special - the front camera, it is to support depth perception. In principle, the technology even includes 3D self-esteem and facial recognition.

The software: the old song

With the software, Apple traditionally has the nose ahead. iOS 11 is adjusted exactly to the hardware of the iPhone 8. In addition, operating system updates are guaranteed in the following years as well. At Samsung it looks a bit different. The Galaxy S8 certainly comes with Android Nougat on the market. Until the update on Android O follows, it should then experience but again a few months.

Two personal assistants:

Siri is an old well-known one that fulfils the usual requirements more or less reliably. Samsung sends Bixby a whole new artificial intelligence into the race, which comes from the Siri inventors. Scope? Not clear! In addition, you can connect the Galaxy S8 to the so-called Dex interface to a monitor and use as a PC. That sounds exciting. With such a thing, Apple cannot serve. Finally, the iPad Pros and the MacBook Pros are working.

Prices and availability

Up to the presentation of the S8 it takes only a few weeks. Very shortly it should come on the market. The prices are rumored at 799 euros for the small and 899 euros for the big Galaxy. Apple traditionally invites in September. Especially in the anniversary iPhone, there is no reason to swerve from it. The prices always remain constant. But this year should only apply to the iPhone-7s series. The iPhone 8 should be significantly more expensive.

Monday, May 1, 2017

How to protect your Apple iCloud account

iCloud account

Protecting iCloud Password/Data

`Turkish Crime Family’, a London-based group may not have access to the names and password of 250-million Apple iCloud account. However they have access to some unspecified number of accounts and that could be adequate reason to be cautious. The following are some insights in protecting your iCloud password and data and save yourself from losing it:

Backup susceptible data

The first thing essential is to back up the iCloud data and the easiest method of doing it for your iPhone; iPad or iPod is to back up your files of your device to your Mac or PC with iTunes backup. This can be done by –

  • Plugging your device to your Mac or PC with iTunes on 
  • Towards the left hand area in iTunes, under play the controls, you will find a tiny phone icon. You could click here where you will be taken to the menu of the device 
  • You could click on Summary towards the left-hand area 
  • Here you come across three boxes and you could opt for `Backups’ 
  • You could opt for automatically or manually back-up your device. If automatic is chosen, iTunes tend to start backing it up each time you are likely to plug your gadget in. 
  • The issue here is that iTunes does not tend to back up everything. For instance, it will not back up your information and settings for Apple pay, photos, already on iCloud or purchased iTunes together with App Stores content 
  • In order to be on the safe side, users need to change and secure their password

Utilise Passphrases Rather than Passwords

Apple could provide support in changing the passwords and not only by paying off the Turkish Crime Family. The other major sites such as Amazon, LinkedIn and Netflix tend to buy cracked password list and use one-way hashing counterparts in order to check for prevailing passwords and then reset susceptible passwords asking users to switch passwords.

 Apple has not does that so far though it considers doing the same depending on how huge the threat would appear to be. Since Apple is presently not doing the same, it is up to the user to do it. In order to change the Apple ID password, the user should sign in to their Apple ID account page in any browser and follow the reset your password instructions.

The new Apple ID password should comprise of at least eight characters, together with a number, an uppercase letter as well as a lowercase letter. Spaces, the same character three times in a row, your Apple ID or a password used the previous year are not permitted.

The user should be aware of not using dumb passwords like `abcdefgh, qwerty or password’ In order to create an easy and secured password, that would not tax your memory would be to utilise passphrases rather than passwords which would be easy to evoke.

Add layer of Protection – Two Factor Authentication

Once the password has been changed the user will have to change it on all the Apple devices. Thereafter it will be essential to add another layer of protection namely the Two-Factor Authentication – 2FA. When the 2FA is activated, the user can access his account from trusted devices only like your iPhone, iPad or Mac.

Whenever you intend signing in for the first time to a new device, the two pieces of information is required, which is your Apple ID password and the six-digit verification code that is automatically shown on the trusted devices. For the purpose of utilising Apple 2FA, it is essential for the user to have a trusted phone number so that he can receive verification codes. The following steps can be taken to add a trusted phone number:

  • Go to the Apple ID account page 
  • Sign in with your Apple ID 
  • Click Edit by going to the Security section 
  • Click Add a Trusted Phone Number and edit the phone number

Trusted Devices – iPhone/iPad/iPod

The user is now ready for 2FA. In order to have a trusted device one would need an iPhone, iPad or iPod touch with iOS 9 and thereafter would need a Mac running OS X El Capitan or later that the user has already signed in with 2FA. In order to turn on Apple 2FA the following steps needs to be taken:

On iPhone/iPad/iPod touch with iOS 9 or later

  • Go to Settings > iCloud > tap on Apple ID 
  • You could Tap Password & Security 
  • Tap Turn on 2FA
On Mac with OS X El Capitan or later

  • Go to the Apple menu > System preferences > iCloud > Account Details 
  • Then click Security 
  • Click Turn on 2FA 

This could be time consuming but considering how much work it would take for the user to replace the important music, photos, books or documents, should your Apple iCloud account be hacked, it would be worth the efforts taken for the same and the user would have saved important data from being lost.

Friday, April 28, 2017

iPhone Users Warned About Potentially Dangerous "Siri 108" Prank

Siri 108

Caution – Viral Social Media Campaign 


The police department all across the United States are annoyed over a viral social media campaign which has encouraged iPhone users in saying the number 108 to Siri as a prank, which has gone viral. The police have stated that the scam has been spreading all over Facebook as well as Twitter and when iPhone users tend to test the Siri command `just for fun’, they are in reality tying up phones lines at the emergency call centres.

 If you dial 108 you will hear `calling emergency services in five seconds and within a span of five seconds, you will be transferred to 911. Sergeant Adrian Page with the Lonoke Police Department in Arkansas in a Facebook post which had gone viral with over 1,100 shares, had informed users not to fall for it, since it seems to tie up emergency lines. It has been designed specially as a panic code. The number 108 is in fact the emergency services number in India.

 As reported by sources, Apple desired to make it simple for people to contact emergency services from any location in the world and so telling Siri any emergency number of a country would get the user connected to the service for any location. You could ask Siri to call 911 if one is visiting the U.K. and it would dial 999 for local help.

Phone System Preventing Emergency Calls


The Annapolis Police Department in Maryland had mentioned that this prank has been spreading among Annapolis teens and has the possibility to tie up dangerously the 911 phone system preventing emergency calls from being instantly answered.

They have cautioned users not to fall for this trick. According to the National Emergency Number Association , around 240 million calls are said to be made to 911 each year in the U.S. most of which are made from wireless devices and placing prank call to 911 is said to be an offence.

The Marshall Police Department in Wisconsin had warned recently that this prank is problematic since it tends to use resources which are important for others attempting to receive help in case of genuine emergency conditions.

 The police has informed that essentially, telling Siri to call 108 is not a jest and the same should not be done unless in genuine emergency cases. The police agencies all over the U.S. have been cautioning iPhone users of a probable dangerous viral social media prank.

Users Call Emergency Services From Any Location

Pranksters are attempting to trick users into saying `Hey Siri, 108, prompting the digital assistant to contact emergency services wherein the number in India is equivalent of 911. Siri tends to begin a five second countdown on hearing `108’ enabling the users with the opportunity to terminate the call before it goes through.

 But pranksters who seem to share the trick tell users to `close their eyes and wait for 5 seconds before looking at their phone. Though 108 is said to be the emergency service number in India, Apple has made it that way in order that users can call emergency services from any location they may tend to be in the world, according to CNET.

 Users sharing the trick on social media may consider it as harmless but a similar incident had resulted in the death of a six month old boy wherein the caregiver had called 911 thrice on T-Mobile phone and was kept on hold each time she had called and resulted in the death of the infant.

See All the Mac’s Open Windows at Once

mac nyc times

See All the Mac’s Open Windows on a Single Click

In the contemporary world, where some of the most excellent developments have taken place, those are having great importance in the life of an individual and also in the society. The computer technology is one of such inventions that have changed the basic approach of our life to a great extent, as there is a bit of the computer in almost every single product or service in present days.

It is known to all; there are lots of computer manufacturing companies throughout the world and Apple is undoubtedly one of the front runners in this particular segment. The Mac operating system of Apple is the most popular one and since its inception, millions of people have tried it and find it very user-friendly. The constant upgrading of the system is considered as the key reason behind the success of the Mac system. Now there are some unique features available in this system, which are quite helpful for their users to get the best result, with extreme ease and comfort.

Issues to be noted

It is often found that a new user of Mac operating system unknowingly hit some button, which may be shown some of the most interesting and surprising results that caught the user in a baffled condition. It means, by tapping some buttons on the keyboard, some sorts of commands got generated and the unknowing incidents occurred and these can be rectified by some specific actions, made on the keyboard.

If someone is working on his system and suddenly hit some buttons and find that all kinds of open programs shrank down and get back to the normal position by hitting another button. This entire episode made the person concerned baffled and clueless of how these things are happening!!

It is a very simple thing; while anybody found that all open windows are on the top on the desktop, it means, the person hit the Mission Control feature. If in any case, the Mission Control is summoned intentionally; it can of great help in locating any particular program on the cluttered desktop. The temporarily move aside the specific program in the split view or full-screen modes or may be seen any of the alternative desktops spaces that have been created for a different task on the Mac.

Conclusion

The most important part of the Mac operating system is; The Mission Control screen can be used in several ways, depending on the hardware of the system. Some of the laptops, having a shortcut on the F3 key on the system keyboard.

While on Mac's dock; the Mission Control can be seen, which features three numbers of color squares on the black background. This same icon can be seen in the famous Launchpad, which is basically a system tool, displays the important clickable icons of entire installed applications at the center of the screen.

It can be done by pressing the all important F4 button or clicking silver rocket icon on the Mac laptop, which helps the user to get the intended and prompt result.

Wednesday, April 26, 2017

SmartPhone Motion Sensors Can be Used to Crack Your PIN

SmartPhone
Image Credit:AP
So you thought that the PIN lock present in the modern Smartphones is best way to safeguard your device from others. Apple’s tussle with government authorities where they were unable to unlock the iPhone without the rights set of PIN has also helped in cementing this notion. However a recent study conducted by the cyber security experts at Newcastle University in UK presents a completely different view with facts and figures. Their study has successfully showcased that the hackers can make use of the sensors present in the Smartphones to crack the four digit PIN which will give access to wide amount information.


In their study the researchers found that when a mobile user visits a website then code present on the page can be utilized in accessing the phone’s motion as well as orientation. This allows the hackers to correctly guess the PIN present on the device lockscreen. During this study researchers were able to guess the PIN in the first attempt for 75 percent of the time and in the third attempt for 94 percent of the time. This might be shattering news for a number of die hard users of smartphones but it also helps in showcasing how vulnerable modern devices are.


People are tired of being asked for Passcode


The major reason behind the feasibility of hacking into the device through analyzing the motion and movements of users is very simple. Most of the people are tired of being asked for permission therefore they tend t accept anything present on the website or app while installing or accessing them. Websites usually collects a lot of information about the users in order to bring better users experience but this can be used by the hackers for their own benefit. They can direct the users to such websites which is specifically designed to collect the location data as well as the motion sensors data in order to unlock the device remotely.


Today more number of websites is concerned with collecting the location information by bringing location pop up on the site. Secondly sensors are going to be become more commonplace in near future once people start adopting the smart home and kitchen based electronic products. This study shed light on the way hackers can make use of the motion sensors present on the Smartphones but later on it can be brought to other devices as well to gain access to critical information.


Preventive measures to take


The best way to get over this problem is to make use of highly complex passcodes on the Smartphones. An earlier research has already showcased that the Smartphone users tend to make use of dead easy combination of 1111 and 1234 in 27 percent cases when they have to opportunity pick anything in the 4 digit set. The major reason behind it is that people find it easy to remember and it is highly convenient to unlock the device quickly. Secondly one should always keep the mobile operating system up to date by receiving and installing the latest security and system upgrade patches on regular basis. Thirdly one should always download apps on their device from the trusted sources like App Store, Google Play store and other credible third party stores. And don’t forget to kill the apps after using them.