Jump to content

Search the Community

Showing results for tags 'google'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

  1. Summary: Over 2 billion people do not have access to safe drinking water. H2E was a project at X that aimed to tackle this challenge by creating a device that individual households could use to harvest water from the air. The team aimed to build a highly lightweight, portable, cheap (<5% of user’s income) device that an individual could use to produce 5L of drinking water per day. This is no longer an active project at X, so we are releasing our technical documents to allow others to build on our progress to date. To do so, we have made the following items public: Nature paper with key findings Tools/code that enabled findings shared in the paper, and others in the AWH community can use, including: “AWH-Geo” which can estimate the water output over time of any AWH device. This can then be used to estimate the potential user base and impact of an AWH device. On GitHub “JMP GeoProcessor” which uses geographic information systems (GIS) to process the UNICEF/WHO data and join them to proper geographic boundaries. In FigShare Much of the data analysis code used to produce the figures & charts in the study. On GitHub Two datasets on FigShare Hardware assembly documentation CAD files of our prototype device: These can be found in the folder called “CAD_files” “Assembly_documentation.pdf”, this document details our prototype assembly process and learnings Patent Non-Assertion Pledge Data and geospatial tools around access to safe drinking water are provided here to aid academic reproducibility and advancement in the context of the Nature Paper “Global Potential of Harvesting Drinking Water from Air using Solar Energy”. They should not be used for decision making without extensive validation. This caveat applies even more strongly outside the field of atmospheric water generation, where assumptions and approximations made may not be suitable . Users are encouraged to use the official public sources (primarily WHO/UNICEF JMP) from which they are derived. Data and results capture a snapshot at the time of research, and are compiled at the time of publication (2021-10-27). They will not be updated, even as underlying realities change. The prototype described here is a purely experimental device. While substitutions and modifications are reasonably straightforward, water harvested with this experimental device is not intended to be ingested. Among other design choices, adhesives were selected for experimental performance and would need to be substitued with ones meeting food grade standards. The views expressed in the paper and co-released documentation are the author’s, and not necessarily the views of authors’ employers. Download: h2e_technical_documentation-main.zip or git clone https://github.com/google/h2e_technical_documentation.git Source
  2. Salut, Deţin un site iT/Tech, vara trecută numărăm peste 7000-10.000 vizitatori zilnic din articole, trafic organic şi din Facebook. În momentul de faţă mă chinui cu 1000 de vizitatori pe zi. Aş vrea să salvez chestia asta. Înainte de toate vreau să vă spun că am avut şi o perioadă în care nu am putut să mă ocup de site, perioadă a fost cam septembrie - decembrie, perioada în care am avut ceva "motive" personale. Totuşi nu ştiu cât de mult a contat acest lucru pentru că am plătit în continuare redactori pentru a scrie pe site. Aveam articole ce erau pe primul loc în Google, acum au scăzut foarte mult şi se afla printre ultimele rezultate pe prima pagină, deci nu mai sunt accesate aproape de nimeni. De la 1 decembrie am început să fac SEO off-page, am plătit pentru înscrierea în directoare prin programul promodesk (nu ştiu cât de benefic a fost acest lucru). De asemenea am şi făcut ceva parteneriate cu alţi bloggari, la fel nici o creştere, decât scădere în continuare. Vin pe acest forum pentru a găsi un ajutor, probabil că este vorba despre optimizare on-page, ştiu şi eu basic, dar poate mi-a scăpat ceva. Pentru cei interesaţi să mă ajute aştept un PM, unde putem discuta preţul şi ceva detalii despre cum mă puteţi ajuta. La comentarii, de asemenea toate gândurile constructive sunt bine-venită. Mulţumesc,
  3. Many people realize that smartphones track their locations. But what if you actively turn off location services, haven’t used any apps, and haven’t even inserted a carrier SIM card? Even if you take all of those precautions, phones running Android software gather data about your location and send it back to Google when they’re connected to the internet, a Quartz investigation has revealed. Since the beginning of 2017, Android phones have been collecting the addresses of nearby cellular towers—even when location services are disabled—and sending that data back to Google. The result is that Google, the unit of Alphabet behind Android, has access to data about individuals’ locations and their movements that go far beyond a reasonable consumer expectation of privacy. Quartz observed the data collection occur and contacted Google, which confirmed the practice. The cell tower addresses have been included in information sent to the system Google uses to manage push notifications and messages on Android phones for the past 11 months, according to a Google spokesperson. They were never used or stored, the spokesperson said, and the company is now taking steps to end the practice after being contacted by Quartz. By the end of November, the company said, Android phones will no longer send cell-tower location data to Google, at least as part of this particular service, which consumers cannot disable. It is not clear how cell-tower addresses, transmitted as a data string that identifies a specific cell tower, could have been used to improve message delivery. But the privacy implications of the covert location-sharing practice are plain. While information about a single cell tower can only offer an approximation of where a mobile device actually is, multiple towers can be used to triangulate its location to within about a quarter-mile radius, or to a more exact pinpoint in urban areas, where cell towers are closer together. The practice is troubling for people who’d prefer they weren’t tracked, especially for those such as law-enforcement officials or victims of domestic abuse who turn off location services thinking they’re fully concealing their whereabouts. Although the data sent to Google is encrypted, it could potentially be sent to a third party if the phone had been compromised with spyware or other methods of hacking. Each phone has a unique ID number, with which the location data can be associated. The revelation comes as Google and other internet companies are under fire from lawmakers and regulators, including for the extent to which they vacuum up data about users. Such personal data, ranging from users’ political views to their purchase histories to their locations, are foundational to the business successes of companies like Facebook and Alphabet, built on targeted advertising and personalization and together valued at over $1.2 trillion by investors. The location-sharing practice does not appear to be limited to any particular type of Android phone or tablet; Google was apparently collecting cell tower data from all modern Android devices before being contacted by Quartz. A source familiar with the matter said the cell tower addresses were being sent to Google after a change in early 2017 to the Firebase Cloud Messaging service, which is owned by Google and runs on Android phones by default. Even devices that had been reset to factory default settings and apps, with location services disabled, were observed by Quartz sending nearby cell-tower addresses to Google. Devices with a cellular data or WiFi connection appear to send the data to Google each time they come within range of a new cell tower. When Android devices are connected to a WiFi network, they will send the tower addresses to Google even if they don’t have SIM cards installed. “It has pretty concerning implications,” said Bill Budington, a software engineer who works for the Electronic Frontier Foundation, a nonprofit organization that advocates for digital privacy. “You can kind of envision any number of circumstances where that could be extremely sensitive information that puts a person at risk.” The section of Google’s privacy policy that covers location sharing says the company will collect location information from devices that use its services, but does not indicate whether it will collect data from Android devices when location services are disabled: According to the Google spokesperson, the company’s system that controls its push notifications and messages is “distinctly separate from Location Services, which provide a device’s location to apps.” Android devices never offered consumers a way to opt out of the collection of cell tower data. “It is really a mystery as to why this is not optional,” said Matthew Hickey, a security expert and researcher at Hacker House, a security firm based in London. “It seems quite intrusive for Google to be collecting such information that is only relevant to carrier networks when there are no SIM card or enabled services.” While Google says it doesn’t use the location data it collects using this service, its does allow advertisers to target consumers using location data, an approach that has obvious commercial value. The company can tell using precise location tracking, for example, whether an individual with an Android phone or running Google apps has set foot in a specific store, and use that to target the advertising a user subsequently sees. Via qz.com
  4. In cazul in care doreste cineva sa ramana cat mai anonim (sa stearga mai toate datele cu caracter personal pe care le gasesti usor prin Google), acest link va poate ajuta: https://support.google.com/legal/contact/lr_eudpa?product=websearch&hl=ro Aici puteti face o cerere catre Google pentru a sterge link-urile nedorite din cautarile Google daca se cauta numele vostru si sunt gasite prea multe date personale, spre exemplu (puteti pune oricate link-uri care ofera prea multe date cu caracter personal la cautarea pe Google). Exemplu: In cazul meu am pornit de la emailul personal, si am gasit si telefonul personal, ce proiect de practica am avut, ce note am luat la facultate la proiectul de practica respectiv, cand am facut facultatea, cand am facut practica, ce cont de student am avut la facultate, aproape ca puteam ghici de pe Google si ce grupa eram (colegii de facultate oricum ii gasisem cu toate informatiile si pe ei). Daca cineva afla prea multe informatii despre tine poate chiar sa obtina acces la contul de mail (depinde de cat de mult ai tinut la securizarea email-ului sau conturilor respective, dar oricum ai atatea informatii de pe Google). Stiu ca aceasta decizie legata de datele personale si motoarele de cautare e din 2014, dar nu am gasit pe forum nimic de genul ( am cautat link-ul, cuvinte cheie, etc). Cu asta puteti face curat, sa ramaneti cat mai anonimi, sa nu se faca prea multe legaturi intre conturi si date personale confidentiale care ajuta la accesarea conturilor! Edit: Rog un moderator sa mute threadul daca gaseste un loc mai potrivit in care sa fie postat. Eu am postat aici deoarece e cel mai apropiat de tema SEO (cu motoare de cautare).
  5. Salut, Are cineva de vanzare vreun cont Google Apps din cele care au fost create gratuit inainte ca Google Apps sa fie pe bani? Daca aveti un cont in plus si nu aveti ce face cu el, m-ar interesa sa-l cumpar sau sa facem schimb sau whatever. Astept mesajele voastre pe privat. Multam fain!
  6. Am avut nevoie sa gasesc repede link-uri directe la aproape 50 de carti dupa amazon asa ca am scris 10 linii de cod si gata. Requirements: Python 2.7 pip install google googlesearch.py from google import search from time import sleep import sys def direct_search(title, ext, multi='off'): print title sleep(2) for url in search(title + ' ' + ext, stop=10): if (url.endswith('.pdf')): print url if (multi == 'off'): break if __name__ == "__main__": if (len(sys.argv) < 4): print 'usage: ./%s file.txt format multi=\'on/off\'' % sys.argv[0] print 'ex. : ./%s book-titles.txt pdf off' % sys.argv[0] else: with open(sys.argv[1], 'r') as file: for line in file: line = line.rstrip() links = direct_search(line, sys.argv[2], sys.argv[3]) if not line: continue file.close() Se foloseste in urmatorul fel: Creati un fisier si puneti in el numele de la carti listate unu sub celalt in urmatorul fel: fisier.txt Test-Driven Development with Python Fluent Python 1st Edition Foundations of Python Network Programming 3rd edition Python Network Programming Cookbook Si apoi rulati applicatia cu: ./googlesearch.py fisier.txt mp4 off daca vreti sa salvati linkurile intrun fisier: ./googlesearch.py fisier.txt mp4 off > urls.txt In caz ca nu va da rezultate incercati sa schimbati stop cu o valuare mai mare de 40.
  7. La intrebarea "de ce da Google vps gratuit?" raspunsul e: are bani de la Apple ========================= Alphabet's Google has quietly scored a major coup in its campaign to become an enterprise cloud computing powerhouse, landing Apple as a customer for the Google Cloud Platform, multiple sources with knowledge of the matter told CRN this week. Since inking the Google deal late last year, Apple has also significantly reduced its reliance on Amazon Web Services, whose infrastructure it uses to run parts of iCloud and other services, said the sources, who all requested anonymity to protect their relationships with the vendors. Apple has not abandoned AWS entirely and remains a customer, the sources said. http://bcove.me/f9j5ajd4 According to the sources, Google executives have told partners that Apple is spending between $400 million and $600 million on Google Cloud Platform, although this couldn’t be independently confirmed. Also unclear is whether this range refers to an annual spending rate or a set amount of capacity. AWS said Apple's move to work with Google does not signify "competitive defection." “It’s kind of a puzzler to us because vendors who understand doing business with enterprises respect [non-disclosure agreements] with their customers and don’t imply competitive defection where it doesn’t exist," said the AWS spokeswoman in an emailed statement sent to CRN late Wednesday. Spokespeople from Google and Apple weren’t immediately available for comment. Morgan Stanley, in a report released last month, estimated that Apple spends around $1 billion annually on AWS, but speculated that Apple may look to reduce that figure by moving more computing to its own data centers. Cupertino, Calif.-based Apple is spending $3.9 billion to build new data centers in Arizona, Ireland and Denmark, the first of which is set to open later this year. While it might seem odd for Apple to give business to a cloud service run by a bitter rival in the mobile device market, such arrangements aren’t uncommon in a public cloud market that’s seeing intense pricing pressure, particularly in compute and storage services. Reports of Apple using AWS and Microsoft Azure to run parts of its cloud services date back to 2011, although neither AWS nor Microsoft has ever confirmed that Apple is a customer. But in an Apple iOS Security white paper published in 2014, Apple acknowledged that encrypted portions of some iOS files are stored in Amazon S3 and Microsoft Azure. Mountain View, Calif.-based Google, which last November hired VMware co-founder and former CEO Diane Greene to lead its cloud business, is said to be aggressively forming partnerships and swinging deals to bring in large enterprise customers. Last month, Google signed up Spotify, which runs part of its streaming music service on AWS, as a cloud customer. CRN reported last month that Google and Verizon were in talks about a strategic partnership involving a Verizon-branded hybrid cloud service running on Google Cloud Platform. Although Google doesn’t break out cloud revenue, signing up Apple -- no matter what the size of the deal -- would give a huge boost to a vendor widely perceived as the distant No. 3 player behind AWS and Microsoft Azure in the public cloud. In the fourth quarter of last year, Google sales for only its Infrastructure-as-a-Service and Platform-as-a-Service products -- Compute Engine and App Engine -- came in under $300 million, according to an estimate from Synergy Research. That's seven times less than the respective business for AWS, John Dinsdale, Synergy's chief analyst, told CRN. Google entered the cloud market with a vow to undercut Seattle-based AWS on pricing, and industry watchers said Apple could gain pricing leverage with AWS and Microsoft by virtue of its Google cloud deal. Google's extensive fiber network linking its data centers is said to be a major competitive advantage when it comes to networking bandwidth costs. Cheaper networking would present significant savings for Apple data services like iCloud, iTunes and App Store, which must either push content to customers or shuttle massive amounts of backup data to the provider. "Google is laying a lot more fiber in a lot more areas, so they have a lot more reach [than other cloud players]," Michael Fraser, CEO of InfiniteOps, a cloud vendor that works with Google and other public cloud vendors, told CRN. Although Fraser said he doesn’t have direct knowledge of Apple's deal with Google, he believes that Google is getting better at winning enterprise customers because it offers superior performance and pricing. "Google is actually the cheapest play in the market when you take into consideration everything they're doing and when you take into account their various incentives," Fraser said. "[They offer the] most cost savings, lowest pricing for what you actually get." Fraser said Google Cloud Platform, according to his company’s internal testing, has "better performance than any of the other major cloud providers." While AWS is the cloud of choice for many startups that can't afford or don't want to build their own infrastructure, it also has a growing list of big-name enterprise customers. Google has seen a slower march of customers to its cloud, a list that includes Snapchat, PricewaterhouseCoopers, General Mills, Coca-Cola, HTC and Best Buy. AWS has such a huge lead in the public cloud space -- with a 31 percent share of the market in the fourth quarter compared with Google's 4 percent, according to Synergy -- that losing some of Apple’s business likely won’t leave a lasting impact. Market researcher Gartner said last May that AWS has more cloud capacity in use than its next 14 competitors combined. SOURCE
  8. Image via Flickr For a few moments, Sanmay Ved owned one of the most recognizable names on the Internet and he only paid $12 for it. In a detailed post on LinkedIn, the web enthusiast was testing out Google’s domain search tool when its own domain showed up as available. According to the Daily Dot, the going rate was only $12. After making the purchase, he began receiving notifications that confirmed his status as the new owner. However, a new notification quickly informed him that the order had been canceled and that his credit card was not charged in the process. Except, it was. Check out the proof below: Sursa: This Guy Purchased the Google Domain for $12, Owned It For a Minute | Complex
  9. SURSA SophosLabs researchers recently uncovered a hack being used by unscrupulous web marketers to trick Google's page ranking system into giving them top billing, despite Google's ongoing efforts to thwart this sort of search poisoning. Over on the Sophos Blog, technical expert Dmitry Samosseiko explains how the scammers did it, and how SophosLabs spotted what they were up to. Here on Naked Security, we decided to take a look at why search engine poisoning matters, and what we can do as a community if we see that something is not what it seems. The power of search Put your hand up (literally, if you like) if you have ever done either or both of these: Set out to research a topic or a product thoroughly. Used your favourite search engine. Then gone no further than the first couple of results on the very first page. Job done. Used a search engine to gauge whether a business or website has been around a while and built up trust in that time. Seen it near the top of the first page of results. Job done. If you have, you aren't alone, and that's why doing well in search results is so important for a modern organisation. And that, in turn, is why Search Engine Optimisation (SEO) exists: you make every effort to write your web pages so they are clear and relevant, and you do your best to build up a reputation that makes already-trusted sites want to link to you. When others link to you, that acts as an implicit recommendation, and search engines let you bask in some of the reflected glory of the sites that have linked to you. Poisoning the chalice Of course, getting high up in the search rankings gives great results for cybercrooks too, and they don't play by the rules. Treachery by cybercrooks gives search companies a double whammy: the search engines end up not only giving away artificially high rankings for free, but also conferring trust even on web pages that put users in harm's way. As a result, the search companies have been in a constant battle with the Bad Guys to stamp out tricks that poison search rankings. One search poisoning technique involves being two-faced: looking honest and reputable when a search engine visits in the course of indexing the web, yet serving up malevolent content when a user clicks through. This trick is called cloaking, and it's been going on for years. As you can imagine, the search engines have become adept at detecting when websites feed back content that doesn't look right. For example, they can compare what happens when their own search engine software (known as a spider or a crawler) comes calling, and what shows up when a regular browser visits the site. Servers often tweak the pages they present depending on which browser you're using, so some variation between visits is to be expected. But if a browser sees a story about apples while the crawler is being sold on oranges, then something fishy is probably going on. Additionally, a search engine can analyse the pages that its crawler finds in order to estimate how realistic they look. Google's crawler is known – officially, as you see in the HTTP header example above – as the Googlebot, and it has been taught to be rightly suspicious of web pages that seem to "try too hard" because they've been artificially packed with fraudulent keywords. Scamming the Googlebot But even Google doesn't get it right all the time. Indeed, SophosLabs recently spotted dodgy web marketers using a surprisingly simple trick to persuade the usually-sceptical Googlebot to accept bogus content. The trick inflated the reputation of dubious pages, and sent them dishonestly scooting up the search rankings. Our researchers immediately informed Google so that the problem could be fixed, but the story makes for fascinating reading. Dmitry Samosseiko of SophosLabs has published a highly readable report about what happened; we're not going to spoil the fun by repeating it here, so please head over to our Sophos Blog for the details.
  10. Got Chrome? Google Just Silently Downloaded This Onto Your Computer | We Are Change Update via @Andrei: "Seems like Google has reversed their decision in the last release Google Chrome 43.0.2357.130 () NaCl Enabled Yes Microphone No Audio Capture Allowed Yes"
  11. Vreau sa indexez cateva lincuri pe google , am nevoie sa imi apara pe search la google , stiu ca este o chestie usoara , nu ma pricep , am nevoie urgent . platesc
  12. Buna dimineata. Numele meu este Ioan, am 46 de ani. Sunt angajat de peste 6 ani la Google. Primul interviu pentru Google l-am acordat in Douglas County, Georgia. Dupa partea practica, am fost acceptat pentru pozitia de Data Center Program Manager, Technical Fit-Out. Nu, sa nu credeti ca am vreo legatura cu programarea in cazul de fata, 99% din munca se face in viata reala. Dupa ce au trecut cativa ani, am fost transferat la datacenterul din Singapore, primul datacenter creat de Google in Asia de sud. Sunt incantat sa aud de voi de peste oceane, si sunt sigur ca ne vom putea imprieteni intr-un anumit fel. Pentru staff-ul care se pune pe cautari: Calmati-va, e un simplu tunel Nu vreau sa-mi arat "faima" vreau sa demonstrez ca noi Romanii nu suntem oameni de nota 2, ci de nota 8+, putem si o demonstram. Toate cele bune, astept mesaje din partea voastra.
  13. Want to find out all the things Google knows about you? Here are 6 links that will show you some of the data Google has about you. 1. Find out what Google thinks about you In order to serve relevant ads, Google collects data about you and creates a profile. You can control and review the information Google has on you here: Ads Settings Google also has a tool called Google Analytics, that helps publishers see what pages you have viewed on their website, how many times you have visited it, how long did you stay etc. You can opt out if you don’t want this type of data to be collected: Google Analytics Opt-out Browser Add-on Download Page 2. Find out your location history If you use Android, your mobile device may be sending your location to Google. You can see your entire location history here: https://maps.google.com/locationhistory 3. Find out your entire Google Search history Google saves every single search you have ever done. On top of that, they record every Google ad you have clicked on. This log is available in Google web history controls: https://www.google.com/history/ 4. Get a monthly security and privacy report from Google Google offers an Account activity page that tells you about all the Google services you are using. You can even enable a monthly report that will be sent to your email: https://www.google.com/settings/dashboard 5. Find out all the apps and extensions that are accessing your Google data The Account activity page also offers a list of all the apps that have any type of access to your data. You can see the exact type of permissions granted to the app and revoke access to your data here: https://security.google.com/settings/security/permissions 6. Export all of your data out of Google Google lets you export all your data: bookmarks, emails, contacts, drive files, profile info, your youtube videos, photos and more here: https://www.google.com/takeout Google also keeps a history of your YouTube searches. You can find it here: https://www.youtube.com/feed/history/search_history Source: http://www.google.com/goodtoknow/online-safety/security-tools/
  14. Salut, am facut cerere la google adsense dar m-au respins... Eu am un site de stiri. Treaba e ca am luat stiri de pe alte site-uri precizand sursa si aveam si un oarecare adult content pe acolo. Acum nu inteleg o chestie... De ce celelate site-uri de stiri au google adsense pe site si au deasemenea si continul adult (adica ei cred ca daca vad o ?â?? ascunsa pe acolo gata zice ca e porno:O ) si au si stiri copiate de la alti. Am vazut atatea continuturi adult pe site-uri populare de stiri si stiri copiate. Ca pana la urma eu luam stiri "adult" de la ei si totusi ei aveau adsense si eu nu. Care e explicatia????????
  15. Salut tuturor! Ma numesc Andrei si lucrez la programator php junior pentru o firma din UK. Am ajuns intamplator pe acest forum cautand ceva pe Google si am decis sa imi fac cont deoarece sunt multe chestii interesante pe aici.
  16. Apple chief Tim Cook has made a thinly veiled attack on Facebook and Google for "gobbling up" users' personal data. In a speech, he said people should not have to "make trade-offs between privacy and security". While not naming Facebook and Google explicitly, he attacked companies that "built their businesses by lulling their customers into complacency". Rights activists Privacy International told the BBC it had some scepticism about Mr Cook's comments. "It is encouraging to see Apple making the claim that they collect less information on us than their competitors," Privacy International's technologist Dr Richard Tynan said. "However, we have yet to see verifiable evidence of the implementation of these claims with regard to their hardware, firmware, software or online services. "It is crucial that our devices do not betray us." 'We think that's wrong' Addressing an audience in Washington DC, Mr Cook said: "I'm speaking to you from Silicon Valley, where some of the most prominent and successful companies have built their businesses by lulling their customers into complacency about their personal information. "They're gobbling up everything they can learn about you and trying to monetise it. We think that's wrong. And it's not the kind of company that Apple wants to be." Mr Cook had been given a corporate leadership award by the Electronic Privacy Information Centre, a US-based research group. According to TechCrunch, he later added that Apple "doesn't want your data". Google has not commented on Mr Cook's comments specifically, but a spokeswoman referred the BBC to the privacy section of its website, which the company has recently updated. "Ads are what enable us to make our services like Search, Gmail, and Maps free for everyone," one page reads. "We do not share information with advertisers in a way that personally identifies you, unless you gave us permission." Facebook suggested this page outlining how it collects user data. While Apple does not hold the same wealth of data looked after by Google and Facebook, it does use personal information to target advertising. A page for marketers on Apple's website offers "400 targeting options" for reaching users. It reads: "Whether you're looking for moms or business travellers or groups of your own customers, we've got you covered." Apple's lack of data, when compared with some of its rivals, could be a disadvantage for future devices. Services such as Google Now, which use stored data to predict what information users may need, require vast amounts of personal data to be effective. Advertising Mr Cook also spoke at length about encryption. His company introduced encryption measures by default to its devices late last year, a move heralded by privacy campaigners but heavily criticised by several governments. Mr Cook hit out at governments that had pressured technology companies to allow for so-called "backdoors" to aid with counter-terrorism and other enforcement. "There's another attack on our civil liberties that we see heating up every day," Mr Cook said. "It's the battle over encryption. Some in Washington are hoping to undermine the ability of ordinary citizens to encrypt their data." He added: "If you put a key under the mat for the cops, a burglar can find it too." Source
  17. Vulnerabilities in the Google App Engine cloud platform make it possible for attackers to break out of a first-level security sandbox and execute malicious code in restricted areas of Google servers, a security researcher said Friday. Adam Gowdiak, CEO of Poland-based Security Explorations, said there are seven separate vulnerabilities in the Google service, most of which he privately reported to Google three weeks ago. So far, he said, the flaws have gone unfixed, and he has yet to receive confirmation from Google officials. To exploit the flaws, attackers could use the freely available cloud platform to run a malicious Java application. That malicious Java app would then break out of the first sandboxing layer and execute code in the highly restricted native environment. Malicious hackers could use the restricted environment as a beachhead to attack lower-level assets and to retrieve sensitive information from Google servers and from the Java runtime environment. Technical details about the bugs, noted as issues 35 through 41, are available here, here, here, and here. In an e-mail to Ars, Gowdiak wrote: Gowdiak took to the Full Disclosure e-mail list to disclose the bugs and to call Google out for not responding to his private advisory, which he said included proof-of-concept exploit code. "It's been 3 weeks and we haven't heard any official confirmation / denial from Google with respect to Issues 37-41," Gowdiak wrote. "It should not take more than 1-2 business days for a major software vendor to run the received POC, read our report and / or consult the source code. This especially concerns the vendor that claims its 'Security Team has hundreds of security engineers from all over the world' and that expects other vendors to react promptly to the reports of its own security people." Google has received criticism in the past when its Project Zero has disclosed vulnerabilities in Windows and Mac OS X before Microsoft and Apple had patched them. Asked for comment on Gowdiak's Full Disclosure post, a Google spokesman issued the following statement: "A researcher recently reported a known issue affecting a preliminary layer of security in Google App Engine. We’re working with him to mitigate it; users don’t need to take any action." Source
  18. VirusTotal Scan Results Report retrieved: 12. 5. 2015; 11:24 +2, Report Date: 2012-09-24 10:48:43 CAT-QuickHeal 12.00: McAfee 5.400.0.1158: TheHacker None: K7AntiVirus 9.152.7632: F-Prot 4.6.5.141: Symantec 20121.2.1.2: Norman 6.08.06: TotalDefense 37.0.10086: TrendMicro-HouseCall 9.700.0.1001: Avast 6.0.1289.0: eSafe 7.0.17.0: ClamAV 0.97.3.0: Kaspersky 9.0.0.837: BitDefender 7.2: Agnitum 5.5.1.3: ViRobot 2011.4.7.4223: ByteHero 1.0.0.1: Sophos 4.81.0: Comodo 13641: F-Secure 9.0.16440.0: DrWeb 7.0.3.07130: VIPRE 13208: AntiVir 7.11.44.4: TrendMicro 9.561.0.1028: McAfee-GW-Edition 2012.1: Emsisoft 5.1.0.11: Jiangmin 13.0.900: Antiy-AVL 2.0.3.7: Kingsoft 2012.9.4.139: Microsoft 1.8800: SUPERAntiSpyware 5.50.0.1016: GData 22: Commtouch 5.3.2.6: AhnLab-V3 2012.09.24.00: VBA32 3.12.18.2: PCTools 8.0.0.5: ESET-NOD32 7509: Rising 24.29.00.01: Ikarus T3.1.1.122.0: Fortinet 5.0.26.0: AVG 10.0.0.1190: Panda 10.0.3.5: http://data.hu/get/8748399/Google_Siteripper_Full_version.rar PASS: LOGMAXER professional knows how to use and non-professionals can search for information on Google
  19. VirusTotal Scan Results Report retrieved: 12. 5. 2015; 11:18 +2, Report Date: 2015-04-30 22:33:39 MicroWorld-eScan 12.0.250.0: nProtect 2015-04-30.01: CMC 1.1.0.977: CAT-QuickHeal 14.00: McAfee 6.0.5.614: Zillya 2.0.0.2162: SUPERAntiSpyware 5.6.0.1032: K7AntiVirus 9.203.15767: Alibaba 1.0: K7GW 9.203.15767: TheHacker 6.8.0.5.559: NANO-Antivirus 0.30.24.1357: F-Prot 4.7.1.166: Symantec 20141.2.0.56: WS.Reputation.1 Norman 7.04.04: TotalDefense 37.1.62.1: TrendMicro-HouseCall 9.700.0.1001: Avast 8.0.1489.320: ClamAV 0.98.5.0: Kaspersky 15.0.1.10: BitDefender 7.2: Agnitum 5.5.1.3: ViRobot 2014.3.20.0: ByteHero 1.0.0.1: Tencent 1.0.0.1: Ad-Aware 12.0.163.0: Emsisoft 3.0.0.600: Comodo 21953: F-Secure 11.0.19100.45: DrWeb 7.0.12.3050: VIPRE 39832: TrendMicro 9.740.0.1012: McAfee-GW-Edition v2015: Sophos 4.98.0: Cyren 5.4.16.7: Jiangmin 16.0.100: Antiy-AVL 1.0.0.1: Kingsoft 2013.4.9.267: Microsoft 1.1.11602.0: AegisLab 1.5: GData 25: AhnLab-V3 2015.05.01.00: VBA32 3.12.26.3: AVware 1.5.0.21: Baidu-International 3.5.1.41473: Zoner 1.0: ESET-NOD32 11559: Rising 25.0.0.17: Ikarus T3.1.8.9.0: Fortinet 5.0.999.0: AVG 15.0.0.4339: Panda 4.6.4.2: Qihoo-360 1.0.0.1015: http://data.hu/get/8748377/Google_Extensa_Scanner_v3.0.0.1.rar PASS: LOGMAXER Google Extensa Scanner Scan dorks check admin finder professional knows how to use and non-professionals can search for information on Google
  20. Salutare,o noua stire umbla pe internet si anume cu ajutor unei extensii vom putea evita atacurile de tip Phising din Chrome.Atacurile de tip phising sunt folosite de hacker cu scopul de a fura datele unor persoane online.Pentru c? mul?i dintre noi folosesc Chrome, iar un cont Google a devenit aproape indispensabil, o nou? extensie v-ar putea oferi un confort psihologic sporit. În nou? din zece cazuri, în cea mai mare parte a timpului, folosi?i preponderent ca ?i browser Google Chrome sau Mozilla Firefox. Fiecare dintre ele vine cu avantaje ?i dezavantaje, dar, mai mult decât atât, include suport pentru extensii. Aceste mici aplica?ii ancorate în browser amplific? într-un mod semnificativ func?ionalitatea Chrome ?i Firefox. De aceast? dat? facem referire la o nou? extensie lansat? zilele trecute de cei de la Google pentru browserul companiei. Aceasta din urm? este foarte eficient? în a preveni atacurile cibernetice de tip phishing. Conceptul de phising se refer? la anumite website-uri mali?ioase care, pentru c? sunt foarte similare cu website-uri oficiale, gen Google, Yahoo sau Apple, reu?esc s? v? conving? s? v? trimite?i, f?r? voia voastr?, datele de autentificare c?tre grupuri de hackeri ce au creat o afacere din furtul de identit??i online. Extensia poart? numele de Password Alert ?i poate fi desc?rcat? gratuit din Chrome WebStore. Singurul ei minus, dac? îl putem numi a?a, const? în faptul c? v? protejeaz? doar contul de Google ?i contul de Google Apps for Work, nimic altceva. Atinge aceast? performan?? scanând foarte atent codul HTML din spatele fiec?rei adrese web ce pare similar? cu accounts.google.com. Dac? este descoperit? o problem?, sunte?i automat avertiza?i printr-o pagin? similar? cu cea de mai sus, iar dac? a?i f?cut deja gre?eala de a c?dea victim? unui atac de tip phishing, sunte?i obliga?i s? v? schimba?i imediat parola. Mutumesc pentru timpul acordat!
  21. Salutare acum 2 luni mi-am facut un site de xxx video . pe o platforma de wordpress . Am instalat All in ONE SEO pack . Am facut cont pe google webmaster si am bagat sitemap . Din 3720 de indexuri google mi-a indexat doar 132 in 2 luni . Ce as putea face pentru a le indexa pe toate . Aveti idee unde este problema ? Imi puteti da un sfat . Am incercat si manual cu un index crawler am facut sitemap l-am urcat pe hosting l-am linkat la webmaster si mi-a indexat 72 . Nu stiu ce sa mai fac astept sfaturi . Daca este nevoie de denumirea site-ului o dau in privat pentru a nu face aici reclama . Multumesc!
  22. Google has been obliged to revise its Password Alert anti-phishing protection just hours after releasing it when security researchers showed how the technology was easily circumvented. Security consultant Paul Moore (@Paul_Reviews) has published a proof-of-concept JavaScript exploit that skirted the defensive technology with just seven lines of code. The Password Alert for Chrome browser plug-in is meant to trigger alerts for users in cases when they are induced to hand over their password to counterfeit sites impersonating Google (other online services aren't covered). The extension only kicks into action after users have signed into their Google account; thereafter it puts up warnings to reset Gmail passwords in cases where users are taken in by a phish. The problem is these alerts can be shut down with minimum effort and a few lines of JavaScript planted on counterfeit sites. More specifically, Moore's script looks for a warning banner every five milliseconds before removing anything it detects. Other approaches aimed at preventing humans actually seeing a warning – effectively killing off alerts kill as soon as they are generated – might also have been possible. Moore posted a short video on YouTube to highlight his concerns. Bypassing Google's Password Alert "Protection" Chris Boyd, a malware intelligence analyst at security software firm Malwarebytes, backed up worries about how easily Password Alert might be bypassed in a blog post that explains the issue in greater depth here. To its credit, Google responded promptly to the issue, updating its technology hours after El Reg flagged up the problem and requested a comment. "[The] issue is now fixed and the current version of Password Alert includes the patch," a spokesman told El Reg by email on Friday morning. Google's anti-phishing tech was only released on Wednesday so early teething troubles are arguably to be expected. Relying on Password Alert is, in any case, maybe not enough and users should consider turning on two-step authentication and/or using a full fat password manager such as LastPass to protect them from phishing attacks. Google researchers and a team from University of California, San Diego recently warned (PDF) that the most effective phishing attacks can succeed 45 per cent of the time. Source
  23. Salut! Trebuie sa fac si eu un atestat la informatica (oracle) avand ca tema un spital (pacienti,angajati, etc.). Am tot cautat pe google, insa nu am gasit nimic bun. O sugestie?
  24. Google launches its own mobile network for Nexus 6 owners Google is now a mobile carrier. Today the company has made official its plan to offer wireless service to owners of its Nexus 6 smartphone. It's called Project Fi, and Google is launching an early invite program beginning today. "Similar to our Nexus hardware program, Project Fi enables us to work in close partnership with leading carriers, hardware makers, and all of you to push the boundaries of what's possible," the company wrote in a blog post. The service is only available for the Nexus 6 and requires a special SIM card for Project FI — it will work with both existing Nexus 6 devices and new ones. Google is says that right now the service is only available as an "early access program," and during that program it won't work on other phones. Google's new offering is unique in that the company will charge consumers only for the data they use rather than hit them with a flat monthly fee that comes with a preset amount of data. If you fail to use all the data you've paid for, Google will refund you the difference. If you go over your plan, Google will simply charge you at a pro-rated rate of $10 per GB. In other words, if you pay for data and don't use it, you get refunded. If you don't buy data and use it, you end up paying the same amount. There are no family plans available, but neither does it require a contract of any kind. As reported previously, Google will operate its wireless service with the help of both T-Mobile and Sprint; customers will have access to both networks, and Google's service will intelligently switch between them and Wi-Fi to maintain strong reception. "We developed new technology that gives you better coverage by intelligently connecting you to the fastest available network at your location whether it's Wi-Fi or one of our two partner LTE networks," the company said. Project Fi also supports voice calls and texting over Wi-Fi, lending subscribers more flexibility and how and where they can communicate with their contacts. Google also says it's using secure tech (there's a key that shows up in your menu bar) for when you're using public Wi-Fi hotspots. Google says Project Fi phone numbers "live in the cloud," according to Google, enabling you to text and place voice calls from a laptop or tablet without your actual phone nearby. When you are on the phone, Google says calls can seamlessly transition to LTE when you leave a Wi-Fi network. Google seems to be using the new, combined Hangouts / Google Voice infrastructure in some way for Fi, as its FAQ references it often. If you're interested in being part of Google's mobile experiment, the signup page is here. Google says it'll be sending out a small number of invites every week starting now. Sursa: Google launches its own mobile network for Nexus 6 owners | The Verge
×
×
  • Create New...