Friday 22 November 2013

PC Cleaner Pro 2013+Serial key

                      PC Cleaner Pro 2013+Serial key




Get the key here=====> Click me (Click and you will be directed to a webpage and copy the serial key from there)
Download from here

PC Optimizer Pro 2013 is an all in one program to maintain and optimize your windows based PC and it doesn't takes a guru to squeeze the maximum out of your system using PC Optimizer Pro 2013. If you are one of the people who use their PC on a regular basis then lots of system generated files keep gathering up in your PC that are no longer being used by your Windows or applications, it takes a single click to get rid of this unnecessary clutter.




One of the biggest issues faced by Windows users is that of system registry which keeps getting bulky due to obsolete program information, PC Optimizer Pro 2013 will scan your Windows registry and remove all incorrect or obsolete information. Also, just a single click will allow you to optimize your system settings so your PC is operating at its maximum capacity.
Malware can steal your confidential information and make your system unstable. PC Optimizer Pro 2013 can scan your system and remove all such malware. In short, PC Optimizer Pro 2013 is your one stop for all your PC maintenance and optimization needs.

Google building Spark, a Web-based development tool

Google building Spark, a Web-based development tool

The online programming tool, still in its early stages, is for writing Web apps within a Web browser. The open-source tool itself is built with Google's new Dart language.

                               Spark is a Google developer tool for writing Web apps from within a Web browser.
                               (Credit: Francois Beaufort)


Google likes Web apps, but one area where native software remains dominant is programming tools. A Google project called Spark that came to light Thursday could change that.
Spark is a Web-based IDE (integrated development environment) that runs in a browser for developers writing Chrome apps, according to Google's Francois Beaufort, who tracks Chrome developments closely. That means, among other things, that Chromebook coders would have a way to be productive without having to move to a Windows, Mac, or Linux box.
"This is still the very beginning," Beaufort said on Google+. "There's not much we can do for now." 

Intriguingly, Spark is built using Dart, Google's Web programming language that the company hopes will improve upon JavaScript. Google just released Dart 1.0 and now faces the challenge of persuading other browser makers to support it, but Dart programmers can use a utility called dart2js to convert their software into JavaScript. That means Spark should run on any modern browser.
What's a Chrome app? In short, it's a Web app that runs on Chrome. That means it can take advantage of Chrome abilities, such as Native Client, and be distributed through the Chrome Web Store. It's a concept that's somewhat antithetical to the cross-platform philosophy of the open Web, but it brings some order to a chaotic, fast-changing world.
Spark isn't the first such effort. Mozilla toyed with a project called Bespin; other online IDEs include Shiftedit and Cloud9.

Chrome beta disses plug-ins, speeds tapping on Android


Chrome beta disses plug-ins, speeds tapping on Android




Google released a beta of Chrome 32 on Thursday, fulfilling a promise to block many plug-ins and speeding up some tap operations on Android.
And Imgur fans will be eager to know that the new release also brings support for animated WebP images, a feature already added to Google's image format but that had to overcome hurdles before finding a place in Chrome, too. Some advocated for a shift to plain old video, but animated GIFs have attained newfound popularity. Google promises smaller file sizes with animated WebP as an alternative, said Urvang Joshi, the Google programmer who championed animated WebP support for Chrome, in a blog post Thursday.
In September, Google announced that it will ban plug-ins that use the NPAPI technology for interfacing with the browser and giving it extra abilities. The ban doesn't affect Adobe Systems' Flash Player, by far the most widely used plug-in, and will only affect several other widely used plug-ins after a more graceful phase-out period.

On Android, the Chrome 32 beta ditches a 0.3-second delay that bogged down the process of tapping on a link. The delay was necessary to make sure people weren't double-tapping to reformat a Web page for a mobile device. The delay is disabled for Web pages that Chrome judges to be designed specifically for mobile screens -- another incentive for Web developers to adjust to the mobile market.
The new browser also supports the Vibration interface, which lets Web apps buzz your phone the way native apps already can. That's one small step of the laborious process of trying to bring Web apps up to parity with those written directly for Android and iOS apps. 

All the news published here are from trusted source.

Google finishes 2,048-bit security upgrade for Web privacy

Google finishes 2,048-bit security upgrade for Web privacy

 

 

Never again are you going to get a Google Web site whose security certificate is protected with comparatively weak 1,024-bit encryption.
The Net giant has secured all its certificates with 2,048-bit RSA encryption keys or better, Google security engineer Dan Dulay said in a blog post Monday. Certificates are used to set up encrypted communications between a Web server and Web browser.
That means two things. First, traffic will be harder to decrypt since 1,024-bit keys aren't in use at Google anymore. Second, retiring the 1,024-bit keys means the computing industry can retire the technology altogether by declaring such keys untrustworthy. 

Google has been aggressively moving to stronger encryption because of U.S. government surveillance by the National Security Agency. According to documents leaked by former NSA contractor Edward Snowden, the agency gathered bulk data off Internet taps, including unencrypted data sent between company data centers on its own network, and actively worked to undermine encryption.
Google said it beat its internal end-of-year deadline for the 2,048-bit move. It's also moved to encrypt its internal data transfer between data centers, a move that Yahoo also is making.
In other words, the Net's technology giants are working actively to make surveillance, authorized or not, significantly harder. 



"Worry in Silicon Valley/Puget Sound: furor over NSA will cost billions cuz foreign customers fear US companies can't guarantee security," tweeted Strobe Talbott, president of analyst firm Brookings Institution, referring to the geographic regions where tech powers such as Google, Facebook, Yahoo, Microsoft, Twitter, Apple, LinkedIn, and Amazon are located.
There's a lot of work to be done yet, though. Google also supports a standard called "forward secrecy," which uses different keys for different sessions so that decrypting a single message doesn't mean previous messages can likewise be decrypted using the same key. But many other Net giants don't support forward secrecy -- though that's changing, too.

Google pays those who find Android security glitches

Google pays those who find Android security glitches

 

 

 Those who pinpoint vulnerabilities in Google's mobile operating system can earn cash rewards, similar to those paid out for identifying bugs in Chrome.

 

Google has expanded its bug-bounty program to cover vulnerabilities uncovered in Android.
The program began with Chrome and expanded to Google Web sites and other open-source software projects. Under the program, people who find security holes get paid bounties. That often equates to a few hundred dollars, but particularly skilled attacks can mean big money -- $50,000 last week for one expert who goes by the name Pinkie Pie, for example.
The broader expansion, called the Patch Reward Program, now includes Android, Google security team member Michal Zalewski said in a blog post Monday.
The program also includes three widely used Web server packages: Apache's http, Nginx, and Lighttpd, Zalewski said.

 

Battle brews as tech companies attempt to fend off NSA hacking

Battle brews as tech companies attempt to fend off NSA hacking



The NSA allegedly gathered millions of records from Google and Yahoo data centers around the world, but soon, the agency might have a much harder time trying to collect this type of data.
Google, Yahoo, Microsoft, Apple, and other prominent technology companies are investing heavily in stronger, 2048-bit encryption. Due to computing power constraints, it's expected to be more than a decade before this type of encryption can be easily overcome.
Google, one of the leaders in the effort, announced in May that it would switch over to 2,048-bit encryption keys by the end of 2013. Yahoo recently confirmed to Bloomberg, which spoke with several tech companies that are investing in new encryption, that it will make 2048-bit encryption standard by January 2014 for all its Mail users. Facebook also plans to move to 2048-bit encryption, a spokeswoman told Bloomberg, and will roll out "perfect forward secrecy," a feature that prevents snoopers from accessing user data even if they can access the company's security codes.


Microsoft and Apple are also reportedly ramping up their data-security efforts.
The technology companies' renewed interest in data security and encryption comes after several reports have suggested that the NSA has been accessing their data and using it for spying purposes. Those firms have gone on the record saying they comply with legal requests where appropriate, but are doing everything they can to keep user data safe. The investment in 2048-bit encryption is the next step in protecting the privacy of users.
Still, encryption is just one small piece of a broader puzzle the technology companies have yet to solve.
The NSA has the ability to overcome a wide array of security protocols. Last month, in fact, James Clapper, the director of national intelligence, said that the US employs "every intelligence tool available" to cull data from national security threats, according to Bloomberg. Whether those efforts are applied to technology company servers has been debated, though leaks from former NSA contractor Edward Snowden and others suggest they are.
Even so, the improved encryption efforts could lengthen the time at which it takes the NSA and other spying agencies around the world to access user information. And that's at least something.

Source:Trusted Source.

Senators criticize NSA snooping as unnecessary to US security

Senators criticize NSA snooping as unnecessary to US security





Three US senators with access to confidential NSA information don't see the agency's data-gathering methods as necessary to ensure US security.
On Tuesday, Senators Mark Udall (D-Colorado), Ron Wyden (D-Oregon), and Martin Heinrich (D-New Mexico) filed an amicus brief on behalf of a lawsuit filed by several organizations that claims the National Security Agency's bulk records collection violated their constitutional rights. In the legal brief, the three senators expressed the opinion that the information gathered through the NSA could have been obtained through less-intrusive ways.
"In recent years the balance between protecting our liberties and ensuring our security has become fundamentally broken," Udall said in a statement. "The dragnet collection of millions of innocent Americans' private phone records is a clear threat to our constitutional rights, yet we have seen no evidence that this exceedingly intrusive monitoring has provided any uniquely valuable intelligence."

The US has other "authorities" available through which it can access the phone records of suspected terrorists or people in contact with them, the senators said in the brief. Those other authorities could have been used to gather the same information that the government otherwise obtained for a few counterterrorism cases, they added.
The senators also expressed concerns that the government's interpretation of Section 215 of the Foreign Intelligence Surveillance Act (FISA) could be extended to obtain other data on US citizens, including financial and medical records.
"Because the government's call-records program needlessly intrudes upon the privacy rights of hundreds of millions of Americans, [the senators] believe the bulk collection of these phone records should be ended," the brief said.
The opinion of the three senators runs counter to the NSA's claim that its data-gathering methods are justified as the only way to protect the nation from terrorist attacks. Congressional members have been speaking out increasingly against the government's bulk records collection as a violation of US citizens' privacy.
Along with Richard Blumenthal (D-Connecticutt) and Rand Paul (R-Kentucky), Wyden and Udall have introduced a bill known as the Intelligence Oversight and Surveillance Reform Act that would amend certain sections of FISA to prohibit the bulk collection of Americans' phone records.

FBI Agent: We've Dismantled The Leaders Of Anonymous


FBI Agent: We've Dismantled The Leaders Of Anonymous

 

The hacker collective Anonymous has not produced as many high-profile cyber attacks as it once did, a drop-off that can be directly attributed to the arrests of the group's core members, an FBI official told The Huffington Post this week.
Starting in late 2010, Anonymous captured worldwide attention through a series of attacks against U.S. companies and government agencies, stealing data and defacing or crashing websites.
But the arrests last year of five members of Lulz Security, an influential splinter group of hackers, had a "huge deterrent effect" on Anonymous by creating an "added layer of distrust" within the hacking group, according to Austin P. Berglas, assistant special agent in charge of the FBI's cyber division in New York.
“All of these guys [arrested] were major players in the Anonymous movement, and a lot of people looked to them just because of what they did,” Berglas said in an interview with HuffPost.
The 2012 arrests relied on the help of a key informant, Hector Monsegur, aka "Sabu," who was caught and then cooperated with the FBI. The fear that one of their own could turn them in has sowed distrust within the hacking collective, according to Berglas.
"The movement is still there, and they're still yacking on Twitter and posting things, but you don't hear about these guys coming forward with those large breaches," he said. "It's just not happening, and that's because of the dismantlement of the largest players."
Gabriella Coleman, a professor at McGill University who studies Anonymous, said there was "no doubt" the arrests dealt a major blow to "a central node of activity" within the group. But Anonymous is still very much alive, she said.
"They could easily emerge again as a force to contend with," she told HuffPost in an email.
The arrests of members of Anonymous last year were among several highlights to come out of the FBI's cyber division in New York. (The five core members of Lulz Security have pleaded guilty.) In another case, the FBI in New York led an investigation that resulted in the arrests earlier this year of three alleged operators of the Gozi virus, which infected at least 1 million computers and stole millions of dollars from banks around the world.
A former Army captain, 41-year-old Berglas leads the FBI's cyber division in New York, one of the busiest of the FBI's 56 field offices. His office overlooks the skyline of lower Manhattan, the center of the financial world and a frequent target of hackers. Last month, a Russian man was charged with breaking into the servers of the Nasdaq stock exchange and deleting, changing and stealing data.


The cyber division in New York is divided into five teams of investigators. One unit is tasked with getting digital evidence off cell phones, cameras, computers and tablets to support investigations into a wide range cases, from organized crime to computer hacking to child pornography. Berglas said the investigators for the Computer Analysis Response Team have become increasingly adept at breaking encryption methods used by suspects to conceal the contents of computer files.
The other four teams divide their attention to cybercrime based on the hackers' country of origin. Since most hackers attack U.S. computers from overseas, the FBI often works with law enforcement in other countries, Berglas said. Sometimes, investigators find evidence of hackers from several different countries inside the network of a single U.S. company.
"We call it the dirty pond environment," he said. "You think it might just be one actor responsible for the intrusion, and once you get in and start looking at the company there's remnants of a whole host of actors -- from week-old activity to multiple years they've been inside some companies and they just don’t know about it."
Cybercriminals have a variety of motives, but their methods are often the same. Most break into computer systems by tricking people to click on malicious links in emails that appear to come from trusted sources, a technique known as "spear phishing," Berglas said.
"It’s the number one most common intrusion vector we see in any type of attack,” Berglas said. "Major financial companies spend millions and millions of dollars on security, and all [hackers] have to do is get someone with credentials to click on a spear-phishing site and that’s how they get in.”
Cybercriminals have become adept at hiding their IP addresses -- the string of numbers assigned to individual computers -- to disguise their locations from law enforcement. But eventually, even the most skilled hackers get sloppy, Berglas said.
Hector Monsegur, aka "Sabu," the FBI informant whose cooperation led to the arrests of LulzSec last year, left his IP address exposed. The error allowed investigators to track his location to an apartment in Manhattan's Lower East Side and eventually led to his arrest.
It's that type of misstep that the FBI is looking for.
"It’s easy to sit behind a computer and think you're anonymous and do these illegal types of activity, whether it’s hacking into a company or trading child pornography or buying and selling stolen identities," he said. "But it’s just a matter of time before these criminals make mistakes and we capture them. All it takes is just one time."