As access to the free flow of information on the web is increasingly critical, and online censorship becoming the order of the day in many conflict areas, tools to help those fighting for free expression around the world is now more than ever before most expedient. Psiphon's censorship circumvention tool gives you access to sites and web services that are blocked or otherwise unavailable through the normal service provider.

Whether it's to access sites that your provider is blocking, or to add a layer of protection when using open Wi-fi services, Psiphon is the best tool for accessing the open Internet.

The Psiphon's circumvention system uses a combination of secure communication and obfuscation technologies (VPN, SSH, and HTTP Proxy) to enable Internet users to securely bypass the content-filtering systems used by governments to impose extralegal censorship of the Internet. It works by the Android or Windows client connecting to servers run by Psiphon.

Psiphon utilizes multiple transport systems, so that if one protocol is blocked by a censor, it will automatically switch to an alternative mechanism.

It is specifically designed to support users in countries considered to be "enemies of the Internet". And it's an open source project, and the source code and design documents can be found on the project page.

Read More>>

Pinterest, the notorious virtual pin-board, has announced "Guided Search", a new mobile tool that taps into its massive user collection to bring the contents you’re really looking for right to the front page. Built primarily for mobile - iOS and Android, Guided Search will help users easily source for information , and also explore new frontiers on the iconic social network.

About 75 percent of Pinterest users comes via its mobile apps, stressing why a mobile-first search tool is essential to the visual pin-board’s future.

With Pinterest's ever-growing user-generated contents, it's become increasingly difficult to find what you're searching for, or useful contents amidst the massive pool of information. Therefore, the need for a search engine that's more about exploration and discovery on the social platform becomes pertinent.

The roll out of the new feature started last night for users on its mobile app, iOS and Android, while the possibility that it may land on the desktop platform remains high.

Read More>>

Why Choose Dual SIM Mobile Phones?

Posted by Unknown | April 23, 2014 |

Dual SIM smartphones have been at the peak of popularity for the past few years and still the frenzy of the users about double SIM phones is ever growing. Dual SIM mobile phones offer the greatest advantages of getting the best tariffs of the leading mobile carriers as well as staying connected with two different phone numbers.

What are the major benefits of opting for mobile phones with double SIM (2 cards) solution except of course, cost advantage?

The comfort of using one handset instead of using two phones for every card is one aspect. As well as time effective solution as you need to take care only of one handset (charging, servicing, and installing additional apps). Dual SIM mobile phones give you a chance to store more contact information on two SIM cards which will be of great use for users keeping all contact information of their friends in phone contact list (for example: the popular smartphone Lenovo S920).

Moreover, double SIM handsets are the best solution for travelers who often visit areas of poor connectivity, as chances are rather low that both mobile carriers will have poor coverage in the region, thus you will still be connected with your dual SIM phone as one of the cards may still be available.

However opting for a double SIM mobile phone you should keep in mind some disadvantages such as: Low battery life - dual SIM smartphones commonly bite into battery life severely. So you should take care of a timely phone charging to keep in touch.

There is the idea that double SIM phones are poorly equipped and feature fewer options than single SIM mobile handsets. However experience has proven that every user can find an optimum dual SIM solution meeting all needs and fancies.

Read More>>

Special Report: Adapting Security to the Cloud

Posted by Unknown | April 21, 2014 |

Cloud Computing has come to stay in modern IT architectures, and adoption of cloud technology can potentially change an organization's security requirements and how organizations can adapt their IT and security infrastructure to address these challenges.

Quite a number of trends are pushing organizations to look beyond traditional approaches to IT and consider adopting cloud technology.

And these trends have clearly defined that organizations of all sizes can no longer keep their IT architectures strictly within the four walls of their data center. While most organizations are more likely to feel confident adopting and reaping the benefits of the latest cloud technologies, by developing a roadmap for their IT and security infrastructure.

Download the free whitepaper on "Adapting Security to the Cloud", to learn how adoption of cloud technology can potentially change your organization's security requirement.

Read More>>

Google pushes +Post ads to all Advertisers

Posted by Unknown | April 17, 2014 |

Google first introduced +Post ads to limited number of advertisers as a new way to amplify content and create conversations across the web. +Post ads differs from the conventional "social ads", instead of streaming ads within Google+, Google will run it across the web, including news portals, blogs or other webpages, allowing brands to reach a larger audience.

It let brands take a piece of their public Google+ content, like a photo or video, and turn it into an engagement ad that runs across the Google Display Network.

The conventional "social ads" as implemented on sites like Twitter and Facebook, usually tagged "sponsored" content, sandwiched between posts from friends are what users have become accustomed.

Now, users will soon start to see new ads that look like posts from Google+, but outside of the social network.

+Post ads have been made available to all advertisers who meet a minimum of 1,000 Google+ followers.

The +Post ads is kicking off with two new features - promoted Hangouts on Air and automatic post promotion - to help brands create compelling ad experiences and make it easier to extend the reach of their social content.

Read More>>

Heartbleed Bug: What You need to Know?

Posted by Unknown | April 11, 2014 |

Heartbleed Bug is a vulnerability in the popular OpenSSL cryptographic software library underpinning major sections of the Web, which potentially exposes data supposedly encrypted from various sites. It allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

Robin Seggelmann, the coder, admitted that he "missed the necessary validation by an oversight."

The code in question was originally intended to enable a function called Heartbeat in OpenSSL's Transport Layer Security, which exchanges a packet of random data between your computer and a server to confirm they're connected.

Hackers, thereby can manipulate their computer to lie about how much data is in the original packet, allowing the server to give out the packet with data pulled from its memory before sending it back.

The Fixed OpenSSL has been released for Service providers and users to install the fix as it becomes available for the operating systems, networked appliances and software.

Read More>>

Microsoft has been strongly trailing the path of openness on the web, lately. And for no obscure reason, than the repeated success stories of the likes of Google with Android, proving beyond doubt that open platform has its great benefits.

And today, Microsoft took a rather foreseen step in opening up the source code of the Windows Library for JavaScript (WinJS) under the Apache 2.0 license as an Open Source project by MS Open Technologies, according to Windows blog.

WinJS is a JavaScript library that was first created for Windows 8 to enable first class, native-quality experiences in Windows Runtime apps using familiar web technologies like HTML, CSS, and JavaScript.

WinJS becoming cross-platform means that web developers can now take advantage of high-quality controls and infrastructure to expand their reach beyond Windows to the web and non-Windows devices. Extending WinJS to other browsers and devices beyond Windows further extends their reach and allows them to bring the personality of Windows apps to the web without rewriting code or learning new skills.

The new WinJS is now live, give it a try by going to the Try WinJS site in your favorite browser, view and edit code, and check out the results.

Read More>>

Special Report: History of Cryptography

Posted by Unknown | April 01, 2014 |

Internet as an insecure channel for exchanging information with a high risk of intrusion or fraud, such as phishing, is no longer the predominant notion with the present encryption revolutions. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it, which invariably reduces the likelihood that an intruder will be able to read the data.

This special report presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryption.

The development of cryptography, paralleled by the development of cryptanalysis (breaking of codes and ciphers) and the discovery and application of frequency analysis to the reading of encrypted communications represent a changing point in history.

Download the free whitepaper for an easy to understand history of cryptography, and the different methods that have been used to protect the transfer of data.

Read More>>