flight

flight
flight

Wednesday, June 20, 2018

YOUR PC is RISK !!!!!!!


Mc AFEE  -- Security scan plus

You are Vulnerable to 6000+ new threats  every day.

Exclusive McAfee® Active Protection™ technology


Safeguards against viruses, hackers,
and other threats
Protects from dangerous websites

Firewall protection
Web protection
Threats Detection
Anti-Virus
Anti-spyware
Anti-Spam
Anti-phishing
Two-way firewall


My internet Speed for WEDNESDAY #20180620 . Download= 5.9 mbps & Upload =1.7 mbps

https://testmy.net/results


My internet Speed for WEDNESDAY #20180620 . Download= 5.9 mbps & Upload =1.7 mbps

Monday, June 4, 2018

Apple jams Facebook's web-tracking tools


"We're shutting that down," declared Apple's software chief Craig Federighi, at the firm's developers conference.
He added that the web browser Safari would ask owners' permission before allowing the social network to monitor their activity.
The move is likely to add to tensions between the two companies.
Apple's chief executive Tim Cook had previously described Facebook's practices as being an "invasion of privacy" - an opinion Facebook's founder Mark Zuckerberg subsequently denounced as being "glib".

Wednesday, May 9, 2018

Hidden camera found in Starbucks washroom in Toronto's financial district

Hidden camera found in Starbucks washroom in Toronto's financial district



http://www.680news.com/2018/05/09/hidden-camera-found-starbucks-bathroom/

Toronto police tell CityNews they are investigating after a hidden camera was reportedly found in the washroom of a Starbucks in the financial district, at the corner of Yonge and King Streets.
A customer told the store’s manager there was a camera in the electrical outlet in one of the unisex washrooms at the Starbucks at 4 King on May 2. A day later, Starbucks alerted Toronto police to the hidden camera.
Police now have the camera in their possession and have launched an investigation.
CityNews reached out to Starbucks Canada regarding the incident, but the company would not confirm a camera was found.
In a statement, a Starbucks spokesman said, “employees regularly clean and stock the washrooms multiple times a day. Employees are told if they notice anything or are alerted to anything unusual to immediately report it to police.”
CityNews asked Starbucks why it took 24 hours to notify police, but they have not responded.
A Starbucks employee posted a screenshot online of a message from a Starbucks managers’ chat group that acknowledges a recording device was found in the washroom.
The employee tells CityNews they posted the message after becoming “concerned” by the company’s failure to notify the public.

Wednesday, March 28, 2018

Over 400 Popular Sites Record Every Keystroke, Claims Princeton Study

Over 400 Popular Sites Record Every Keystroke, Claims Princeton Study

https://gadgets.ndtv.com/internet/news/over-400-popular-sites-record-every-keystroke-claims-princeton-study-1778117

Researchers at Princeton's Center for Information Technology Policy (CITP) claim that over 400 of the world's top 50,000 websites use 'session replay scripts' to track user behaviour. While this in itself may not be that disconcerting, the researchers add that these sites often do not strip personally identifiable user information from the behaviour data they glean, potentially giving hackers access to a trove of personal data sometimes even including passwords, should this data be exposed.
Detailing their findings last week in the first of several posts about online privacy, CITP researchers Steve Englehart, Gunes Acar, and Arvind Narayan said they looked at seven of the top session replay companies, which provide session replay scripts and frameworks to websites. These were, namely, Clicktale, FullStory, Hotjar, SessionCam, Smartlook, UserReplay, and Yandex. To scrutinise what data was collected and how the collection took place, the researchers set up test pages with session replay scripts from six of the above-mentioned companies. They were also able to estimate the number of popular sites that use such scripts.
The researchers claim that at least 482 of the world's top 50,000 websites use session replay scripts, and that this number may be on the lower side as the scripts don't record the actions of every user that visits, throwing off the researchers' detection rate. Researchers have compiled a full list of the script-using websites they found. Getting to the bit about why this business practice can backfire on users, researchers say a host of information usually ends up being collected during each session, some of which can be linked to personally identifiable data.
"Collection of page content by third-party replay scripts may cause sensitive information such as medical conditions, credit card details, and other personal information displayed on a page to leak to the third-party as part of the recording. This may expose users to identity theft, online scams, and other unwanted behavior. The same is true for the collection of user inputs during checkout and registration processes," the CITP researchers explain.
Some session replay script providers - like SessionCam and UserReplay - don't collect user data at all, instead tracking clicks, and almost all provide a dashboard with automatic and manual redaction tools to remove user data. However, there remain a few problems with this approach, as some user data still usually ends up being collected due to the sheer volume making manual scrubbing infeasible, while content displayed on screen is always collected. This last is especially worrying, as oftentimes even sites with other user data redaction methods in place will end up collecting all displayed content - which in the case of Walgreens contained user names, medical conditions, and prescriptions.
Finally, while websites hosting session replay scripts may themselves be protected by the encrypted HTTPS protocol, the session replay dashboards may use the vulnerable HTTP, like those provided by Hotjar, Smartlook, and Yandex, the CITP researchers noted. HTTP would allow attackers to use man-in-the-middle attacks to get access to the user data as it is transmitted to third-party servers. Yandex in a statement to Motherboard responded to the claims, and said, "HTTP is used intentionally, as session recordings load websites using iframe. Unfortunately, loading HTTP content from HTTPS websites is prohibited on the browser level so HTTP player is required to support HTTP websites for this feature."
Among the sites that use session replay scripts, major names include Bonobos and Fidelity, apart from the already named Walgreens. After the publication of the CITP study last week, Bonobos told Wired it has ended data sharing with FullStory and was reviewing its protocols to better protect user data. A Fidelity spokesperson told Motherboard that the protection of customer data was its highest priority, but didn't clarify if it would stop using such scripts. Walgreens took the same tack as Bonobos, and said it had in an "abundance of caution" stopped sharing data with FullStory while it investigated the claims.
The study notes that ad-blocking lists and tracking protection services like EasyList and EasyPrivacy do provide some measure of safety, but do not block everything. Motherboard reports that Adblock Plus has been updated post the publication of the CITP study to block all named scripts

Friday, March 23, 2018

What is the Windows Experience Index?

What is the Windows Experience Index?

The Windows Experience Index measures the capability of your computer's hardware and software configuration and expresses this measurement as a number called a base score. A higher base score generally means that your computer will perform better and faster than a computer with a lower base score, especially when performing more advanced and resource-intensive tasks.
Each hardware component receives an individual subscore. Your computer's base score is determined by the lowest subscore. For example, if the lowest subscore of an individual hardware component is 2.6, then the base score is 2.6. The base score is not an average of the combined subscores. However, the subscores can give you a view of how the components that are most important to you will perform, and can help you decide which components to upgrade.
You can use the base score to buy programs and other software that are matched to your computer's base score. For example, if your computer has a base score of 3.3, then you can buy any software designed for this version of Windows that requires a computer with a base score of 3 or lower.
The scores currently range from 1.0 to 7.9. The Windows Experience Index is designed to accommodate advances in computer technology. As hardware speed and performance improve, higher score ranges will be enabled. The standards for each level of the index generally stay the same. However, in some cases, new tests might be developed that can result in lower scores.
Picture of Performance Information and Tools in Control PanelPerformance Information and Tools

To view your computer's base score

  1. View the Windows Experience Index base score and subscores for your computer. If you recently upgraded your hardware and want to find out if your score has changed, click Re-run the assessment. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation. If you don't see subscores and a base score, click Rate this computer. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Show contentHide content About your computer's base score

The base score represents the minimum performance of your system, based on the capabilities of different parts of your computer, including random access memory (RAM), central processing unit (CPU), hard disk, general graphics performance on the desktop, and 3‑D graphics capability.
Here are general descriptions of the experience you can expect from a computer that receives the following base scores:
  • A computer with a base score of 1.0 or 2.0 usually has sufficient performance to do general computing tasks, such as run office productivity programs and search the Internet. However, a computer with this base score is generally not powerful enough to run Aero, or the advanced multimedia experiences that are available with Windows 7.
  • A computer with a base score of 3.0 can run Aero and many features of Windows 7 at a basic level. Some of the Windows 7 advanced features might not have all of their functionality available. For example, a computer with a base score of 3.0 can display the Windows 7 theme at a resolution of 1280 × 1024, but might struggle to run the theme on multiple monitors. Or, it can play digital TV content but might struggle to play high-definition television (HDTV) content.
  • A computer with a base score of 4.0 or 5.0 can run new features of Windows 7, and it can support running multiple programs at the same time.
  • A computer with a base score of 6.0 or 7.0 has a faster hard disk, and can support high-end, graphics-intensive experiences, such as multiplayer and 3‑D gaming and recording and playback of HDTV content.
If a particular program or Windows 7 experience requires a higher score than your base score, you can upgrade your hardware to meet the necessary base score. If you install new hardware and want to see if your score has changed, click Re-run the assessment. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation. To view details about the hardware on your computer, click View and print details.

Show contentHide content About your computer's subscore

The subscores are the result of tests run on the RAM, CPU, hard disk, general desktop graphics, and 3‑D gaming graphics hardware components of your computer. If your base score isn't sufficient for a program or Windows 7 experience, you can use the subscores to figure out which components you need to upgrade.
The base score is a good indicator of how your computer will perform generally. The subscores can help you understand your computer's level of performance for specific experiences:
  • Office productivity. If you use your computer almost exclusively for office productivity experiences, such as word processing, spreadsheets, e‑mail, and web browsing, then high subscores in the CPU and memory categories are important. Subscores of 2.0 or higher are usually sufficient in the desktop graphics and 3‑D graphics categories.
  • Gaming and graphic-intensive programs. If you use your computer for games or programs that are graphic-intensive, such as digital video editing programs or realistic first-person games, then high subscores in the RAM, desktop graphics, 3‑D gaming graphics, and CPU categories are important. A subscore of 3.0 or higher is usually sufficient in the hard disk category.
  • Media center experience. If you use your computer as a media center for advanced multimedia experiences such as recording HDTV programming, then high subscores in the CPU, hard disk, and desktop graphics categories are important. Subscores of 3.0 or higher are usually sufficient in the memory and 3‑D graphics categories.

Show contentHide content If your base score or subscores can't be updated

The following conditions might prevent Windows from updating the Windows Experience Index:
  • Running on batter power.Windows automatically tries to conserve power when running on a battery alone. So if your computer is running on battery power, a performance assessment won't reflect its true capabilities. Plug your computer in, and then re-run the assessment.
  • Not enough free disk space. The Windows Experience Index assessment tool creates a test file on your hard disk. If there's not enough free disk space to create the test file, the assessment can't be complete. You can use the Disk Cleanup tool to free up disk space. For more information, see Delete files using Disk Cleanup.
  • The assessment is already running. If the Windows Experience Index assessment tool is already running, your scores can't be updated.
  • The display driver is older. If your computer is using an older version of the display driver, your scores might not be updated. For more information, see Update drivers: recommended links
  • No multimedia support. If your computer doesn't have multimedia support, your scores can't be updated.

Thursday, March 1, 2018

Equifax says another 2.4 million victims were affected in massive data breach

Equifax says another 2.4 million victims were affected in massive data breach


Last year, Equifax discovered that 145 million consumers had their information stolen in a data breach. Now, a further 2.4 million Americans have been identified in the leak.

Tuesday, February 27, 2018

Berkeley Lab: It Takes 70 Billion Kilowatt Hours A Year To Run The Internet

Berkeley Lab: It Takes 70 Billion Kilowatt Hours A Year To Run The Internet


America’s myriad server farms and data centers operate 100 million drives that hold 350 million terabytes of data — everything from your decade-old emails to lolcat videos and the collected offerings of Netflix NFLX +18.52%.
new report from the Department of Energy’s Lawrence Berkeley National Laboratory figures that those data centers use an enormous amount of energy — some 70 billion kilowatt hours per year. That amounts to 1.8% of total American electricity consumption. At an average cost of 10 cents per kwh, the annual cost of all that juice is on the order of $7 billion.
Seventy billion kilowatt hours is such a giant number that it’s helpful to put it into some other terms. For comparison purposes, 1 kwh is enough power to keep ten 100-watt lightbulbs illuminated for one hour, or to keep your smartphone charged for an entire year.

To generate 70 billion kwh you’d need power plants with a baseload capacity of 8,000 megawatts — equivalent to about 8 big nuclear reactors, or twice the output of all the nation’s solar panels.
Sliced up per capita, the average American uses about 200 kwh a year for his or her internet use, costing about $20. For those of you obsessed with carbon footprints, your internet use is responsible for the emission of about 300 pounds of carbon dioxide per year.
But our internet addiction is only growing. According to Nielsen, the average adult in the United States spends 10 hours and 39 minutes a day consuming digital media. That’s up an hour a day in the past year. And we’re spending most of that additional time peering at our smart phones, which now occupy us for an hour and a half each day.

Environmental effects --Toxic computer components[

Toxic computer components[edit]

The central processing unit contains many toxic materials. It contains lead and chromium in the metal plates. Resistors, semi-conductors, infrared detectors, stabilizers, cables, and wires contain cadmium. The circuit boards in a computer contain mercury, and chromium.[11] When these types of materials, and chemicals are disposed improperly will become hazardous for the environment.

Environmental effects[edit]

According to the United States Environmental Protection Agency only around 15% of the e-waste actually is recycled. When e-waste byproducts leach into ground water are burned or get mishandled during recycling it causes harm. Health problems associated with such toxins include impaired mental development, cancer, and damage to the lungs, liver, and kidneys.[12] That's why even wires have to be recycled. Different companies have different techniques to recycle a wire. The most popular one is the grinder that separates the copper wires form the plastic/rubber casing. When the processes is done there are two different piles left; one containing the copper powder, and the other containing plastic/rubber pieces.[13] Computer monitors, mice, and keyboardsall have a similar way of being recycled. For example, first each of the parts are taken apart then all of the inner parts get separated and placed into its own bin.[14]

Monday, February 19, 2018

Visualize your Website"s Stats.

Visualize Your Website's Stats

Add the ClustrMaps hit tracker to your site or blog and see a real-time map of your visitors from around the world! Proudly show and grow your hidden community of interest

End-to-end encryption

End-to-end encryption

Privacy and security is in our DNA, which is why we have end-to-end encryption in the latest versions of our app. When end-to-end encrypted, your messages, photos, videos, voice messages, documents, status updates and calls are secured from falling into the wrong hands.

Wednesday, January 17, 2018

Certificates --digitally signed statement

A public key certificate, usually just called a certificate, is a digitally signed statement that binds the value of a public key to the identity of the person, device, or service that holds the corresponding private key. One of the main benefits of certificates is that hosts no longer have to maintain a set of passwords for individual subjects who need to be authenticated as a prerequisite to access. Instead, the host merely establishes trust in a certificate issuer.
Most certificates in common use are based on the X.509 v3 certificate standard.
Typically, certificates contain the following information:
  • The subject's public key value.

  • The subject's identifier information, such as the name and e-mail address.

  • The validity period (the length of time that the certificate is considered valid).

  • Issuer identifier information.

  • The digital signature of the issuer, which attests to the validity of the binding between the subject's public key and the subject's identifier information.
A certificate is valid only for the period of time specified within it; every certificate contains Valid From and Valid To dates, which set the boundaries of the validity period. Once a certificate's validity period has passed, a new certificate must be requested by the subject of the now-expired certificate.

Saturday, January 6, 2018

Meltdown (security vulnerability)


https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)

Meltdown (security vulnerability)

Meltdown is a hardware vulnerability affecting Intel x86 microprocessors and some ARM-based microprocessors.[1][2][3] It allows a rogue process to read any physical, kernel or other process's mapped memory, regardless of whether or not it should be able to do so.
Meltdown affects a wide range of systems. At the time of disclosure, this included all iOS and Mac devices,[4] in addition to machines with affected hardware running any not yet patched version of Microsoft Windows, or any but very recent versions of Linux. Accordingly, many servers and cloud services were impacted,[5] as well as a potential majority of smart devices and embedded devices using ARM based processors (mobile devices, smart TVs and others), including a wide range of networking equipment. A purely software workaround to Meltdown has been assessed as slowing computers between five and 30 percent in certain workloads.[6] Companies responsible for software correction of the exploit are reporting minimal impact from benchmark testing.[7]
Meltdown was issued a Common Vulnerabilities and Exposures ID of CVE-2017-5754, also known as Rogue Data Cache Load,[2] in January 2018. It was disclosed in conjunction with another exploit, Spectre, with which it shares some but not all characteristics.

dd

dd
rrr

using a Sim card registered in someone TZ

using a Sim card registered in someone


Artificial Intelligency Brain

Artificial Intelligency Brain
A. I. Mind

BIG BROTHER

BIG  BROTHER
BB WATCHING

Listen

Listen
Hear

SONIC ENERGY

SONIC ENERGY
SOUND

Observe

Observe
Look and Watch

My Visitors

Counter

My Browser is .....

My I.P. Address

ONLINE USERS 112

ONLINE  USERS 112
REAL TIME MAP

TODAY

Search This Blog

TRANSLATE

https://fast.com/#

https://fast.com/#
https://fast.com/#

Cookies Policy

Our website uses cookies to store your settings, recommend content, target ads and gather statistics. This information is shared with 3rd parties. By using our site, you agree to our use of cookies.

https://www.flightradar24.com/

https://www.flightradar24.com/
https://flightradar.live/

browsers

browsers
top five

search

search
engines

INFORMATION & STATISTICS

INFORMATION & STATISTICS

Your browser will also display a padlock icon to let you know a site is secure.
Your account was recently logged into from an unrecognized browser or device. Was this you?
is-your-smart-device-spying-on-you ?
TOP 500 WEBSITES--POPULARITY
ONLINE ACTIVITIES FOR DIFFERENT AGE-GROUPS
WHO IS SPYING ON ME ? FACEBOOK AND GOOGLE ???
do not track
tracking
cookies
carbon foot prints
visitors
where do my visitors come from
spying--PRIVACY IS RIGHT
spy wares
phishing
ad targeting browsing behaviors
browsing behavioral or history
web master
hackers --taking control of your computer

Over 400 Popular Sites Record Every Keystroke, Claims Princeton Study




We noticed a recent login for your account.
If this wasn’t you:
Your account may have been compromised and you should take a few steps to make sure your account is secure. To start, reset your password now.

By continuing to use the website,
you agree to our Use of Cookies.


THE INTERNET HAS TRUST ISSUES !

PRIVACY POLICY

For each visitor to our Web page, our Web server automatically recognizes only the consumer's IP address, but not the e-mail address.

We collect e-mail address of those who purchase from us and from those who opt-in to our e-mail list. The information we collect is used by us to contact consumers for marketing purposes. If you do not want to receive e-mail from us in the future, please let us know by sending an e-mail to peter@protectionbay.com.

With respect to cookies: We use cookies to record session information, such as items that consumers add to their shopping cart.

If you supply us with your telephone number we will only contact you if we have questions regarding an order you have placed on-line.

We do not share your information with anyone. This includes your e-mail address.

With respect to security: We always use industry-standard encryption technologies when transferring and receiving consumer data exchanged with our site.

We have appropriate security measures in place in our physical facilities to protect against the loss, misuse or alteration of information that we have collected from you at our site.

If you feel that this site is not following its stated information policy, you may contact us at the above addresses or phone number.

Suspicious sign in prevented

Suspicious sign in prevented

Suspicious sign in prevented

Suspicious sign in prevented
Suspicious sign in prevented

AVG

AVG
PROTECTION

COUNTER

computer

computer
hacked

KEYBOARDS watch

Laptops Shipped With Hidden Keylogger

came with a preinstalled program to capture the keystrokes

TAGS

TAGS

Devices , software , connection , network

M25G

M25G

Speed GUIDE

Speed  GUIDE
COMPARE WITH STANDARD

Computer Purchasing

Our Recommended Computer Specifications

Currently, ITS recommends that faculty, staff and students request the following specifications when buying new personal computers:

When ordering from the HP store ITS recommends purchasing from the EliteBook series for Laptops and from the EliteDesk series for Desktops. When purchasing from the Apple store ITS recommends purchasing from the MacBook Pro series for Laptops and from the Mac mini for Desktops.

  • Processor - dual core 2.4 GHz+ (i5 or i7 series Intel processor or equivalent AMD)
  • RAM - 16 GB
  • Hard Drive - 256 GB or larger solid state hard drive
  • Graphics Card - any with DisplayPort/HDMI or DVI support - desktop only
  • Wireless (for laptops) - 802.11ac (WPA2 support required)
  • Monitor - 23" widescreen LCD with DisplayPort/HDMI or DVI support - desktop only
  • Operating System - Windows 10 Home or Professional editions, or Apple OS X 10.12.3
  • Warranty - 3 year warranty - desktop only
  • Warranty - 4 year warranty with accidental damage protection - laptop only
  • Backup Device - External hard drive and/or USB Flash Drive
  • Please note: The extended warranties listed above must be added at the enhancement page when selecting your hardware for purchase.

Minimum Specifications

The current minimum computer specifications to ensure the ability to run the basic software most end users operate is:

  • Processor - dual core @ 2.4 GHz (i5 or i7 Intel processor or equivalent AMD)
  • RAM - 8 GB
  • Hard Drive - 320 GB 5400 RPM hard drive
  • Wireless (for laptops) - 802.11g/n (WPA2 support required)
  • Monitor - 19" LCD - desktop only
  • Operating System - Windows 7 with Service Pack 1 or Apple OS X 10.11
  • Backup Device - External hard drive and/or USB Flash Drive

Other Specifications

The majority of Clark's computing resources and backend systems are built on the Windows platform. Support is available for Apple's OS X operating system, but we currently do not provide support for the Windows operating system on an Apple computer. Since the choice between an Apple and a Windows system is usually a personal preference, we recommend that you come to campus with which ever operating system you are most comfortable with. If you have no preference, ITS recommends you contact the ITS Help Desk (helpdesk@clarku.edu) for purchasing advise. If you are coming to Clark with a particular program of study in mind, you may want to check with your academic department to see if they have a preferred computing platform.

Privacy is a myth !!! Your ISP usually Records your Browsing history.

Privacy is a myth !!! Your ISP  usually Records your Browsing history.
Your online activities is Open to the World.

os

os
windows overview

USB

USB
128 G

modem

modem
wireless

os

os
app

Browsers requirements

browsers*

Windows Browsers • IE 11 and higher • Firefox 31 and higher • Chrome Desktop 36 and higher Macintosh Browsers • Chrome 36 and higher Firefox 31 and higher • Safari 5 and higher iPad Browsers • Safari on iPad 4+ with iOS 6+

smart phones

smart  phones
iphone

massive data breach

massive data breach

Equifax says another 2.4 million victims were affected in massive data breach

Last year, Equifax discovered that 145 million consumers had their information stolen in a data breach. Now, a further 2.4 million Americans have been identified in the leak.

ELECTICITY REQUIREMENTS OF THE INTERNET

Berkeley Lab: It Takes 70 Billion Kilowatt Hours A Year To Run The Internet