SEARCH KEYWORD -- Android security



  Microsoft is to promote 80-inch Win8 Tablet PC

Microsoft VP Frank Shaw told Wired that Microsoft is going to offer 80-Inch Windows 8 Tablets PC. He said that Microsoft CEO Steve Ballmer has one such tablet PC, “Steve Ballmer has an 80-inch Windows 8 tablet in his office. He’s got rid of his phone, he’s got rid of his note paper. It’s touch-enabled and it’s hung on his wall.”He mentioned the display screen of the 80-inch Windows 8 tablet PC will not be made by Sharp. Earlier this year, at the CES in Las...

   tablet pc,Window 8,80-inch,Microsoft     2012-05-28 06:05:33

  Beauty of code : How to write graceful PHP code

Writing good code is an art. In order to achieve this, it is necessary to develop good programming habits at the beginning. Good programming habits not only contributes to the early project design (modular),but also allows you to the code easier to understand, so that the maintenance of the code is easier. Bad programming habits will result in more code bugs, and will make future maintenance work difficult. We introduce some good programming habits taking PHP as example. Hope this will help you....

   PHP,Good code     2012-08-26 12:23:03

  How does JGSS read Windows native TGT credential?

MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...

   KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE     2015-03-25 03:42:32

  Why Outsourcing .Net Services is a Growing Trend?

IT companies are focusing more on .net for application development. This is because; the .net platform empowers developers with a wide range of tools and libraries to create diverse applications in an easy and efficient manner. The dot net framework allows users i.e. developers, to design and develop applications that can interact with web services and a range of online devices. .Net programming language is richer than others in many contexts. It has several objects oriented features like proper...

   dot net services, outsourcing, .net, framework     2014-10-23 22:30:43

  Samsung will build its own mobile browser

According to the Korean IT News, Samsung is developing its own brand mobile browser based on WebKit, make its the default browser for future Gaxlaxy products.Samsung has posted recruitment advertisements for recruiting Webkit developers in its Advanced Software Platform Lab located in the Silicon Valley. Webkit is an open-source browser engine, Apple's Safari and Google's Chrome are based on this open source engine.For many users, the phone's built-in default browser is still the most used, so S...

   Samsung,Browser,Webkit     2012-09-24 22:32:00

  Are NSA engineers better than engieers at Microsoft?

NSA is the US government department which takes care of the information and data security of US. It's said to be one of the largest of U.S. intelligence organizations in terms of personnel and budget. There are many excellent engineers working on information and data security and developing algorithms and software help US government to collect intelligence information from all around the world. Many people may be curious about whether NSA has better engineers than IT companies like Microsoft and...

   NSA,Microsoft     2014-01-09 07:24:43

  iPhone 5 vs Samsung Galaxy S3 drop test

With the launch of the iPhone 5, there are quite a few companies starting the test of Apple's new darling. Recently, Android Authority released a video of a test. The test is about ropping iPhone 5 and Galaxy S3 three times from different heights, the result is not good to Galaxy S3, although two phones can still work, the Galaxy S3 screen almost completely torn.In daily life, we may pull out the phone from our pocket and hold it in our hand, put the phone to our ear. In these three cases, the p...

   iPhone 5,Galaxy S3,drop test     2012-09-21 23:42:18

  Twitter prosecuted five companies

Recently Twitter sought help from law enforcement agencies because they can not stand spam emails. On Thursday, Twitter prosecuted five separate companies which provide tools so that spam on Twitter can be spread easier.Twitter said in a statement, Twitter now has 140 million active users, and the number of users are still increasing quickly, as Twitter continues to grow, spam also began looking to come to. Although the content of the spam on Twitter is not the proportion, it still gave rise to ...

   Twitter,Spam,Prosecution     2012-04-06 01:58:37

  Let’s Find Out What the Future holds for .Net Technology

Technology is more like an evolution, not a revolution. The disruptive industry seems to be changing day in day out. Due to which tech companies by default have to chase new trends in order to stay ahead of the curve. Now, Microsoft.Net framework has been around since the 1990s! Do you think such refined technology can be considered relevant now? From what I can see, .Net is going through a major transformation. It’s gone largely open source and has been getting modernized so that its wor...

   ASP.NET ,.NET     2018-06-12 05:07:53

  What is encryption? Its role in the modern age

“Messages and calls are end-to-end encrypted.” If you are a WhatsApp user, you must have read this statement at the top of chats you open. Now, what does it mean? The statement signifies that all the messages or voice notes shared between users are encrypted, and no one can read or listen in on them. As mostly all of us use messaging apps and emails, information security has become a major concern. Moreover, we don’t know how many digital footprints we leave on the web can be t...

   DATA SECURITY,VPN     2021-01-21 08:04:16