Home » Posts filed under Tech News
Windows 8 Security: What's New?
Microsoft has been adding and improving advanced security features and capabilities in its Windows operating system and other applications over the past few years. Each iteration of Windows has featured improved security—necessary to withstand the constant barrage of attacks—and Windows 8 coming is no exception.
In Windows 8, Microsoft expanded its support for embedded hardware security, bundling a full-blown security suite into the operating system, introducing secure boot and signed applications, and enableing alternate authentication schemes, to name a few. Some of the latest innovations are aimed specifically at enterprise users and meet business needs, but there are plenty of improvements that end-users will notice right off the bat, too.
Secure Boot
Microsoft designed Secure Boot to protect the computer from low-level exploits and rootkits and bootloaders. A security process shared between the operating system and Unified Extensible Firmware Interface (UEFI, replacing the BIOS), Secure Boot requires all the applications that are running during the booting process to be pre-signed with valid digital certificates. This way, the system knows all the files being loaded before Windows 8 loads and gets to the login screen have not been tampered with.
Microsoft designed Secure Boot to protect the computer from low-level exploits and rootkits and bootloaders. A security process shared between the operating system and Unified Extensible Firmware Interface (UEFI, replacing the BIOS), Secure Boot requires all the applications that are running during the booting process to be pre-signed with valid digital certificates. This way, the system knows all the files being loaded before Windows 8 loads and gets to the login screen have not been tampered with.
If a bootloader has infected your computer and it tries to load during the boot-up sequence, Secure Boot will be able to undo all the changes and thwart the attack. Having Secure Boot means it is that much harder for attackers to try to compromise the start up sequence.
While PC makers have to have Secure Boot enabled in the UEFI firmware by default, if they want to be able to slap the Windows logo outside the box, the feature can be disabled within the UEFI interface. Anyone who wants to install a non-Windows operating system on Windows 8-certified hardware would first have to manually disable SecureBoot.
Windows Defender
As PCMag's lead analyst for security Neil Rubenking noted a few weeks ago, Microsoft decided to release Windows 8 with built-in antivirus. This is a much more robust application than Microsoft Security Essentials, the free anti-malware software that users could download and install manually in previous versions.
Windows Defender (Microsoft repurposed the name for the anti-malware product) is enabled by default, right out of the box, which means users have some form of security protection as soon as they turn on the machine. While it can't be uninstalled, it can be disabled if the user wants to install a different security product from another vendor (AV-Test has certified several as being Windows-8-ready). In fact, Windows Defender must be disabled if you want to install a third-party security suite.
Loading the AV First
Regardless of whether you are using Windows Defender or a different anti-malware product, Windows 8 has tweaked its load process so that security software runs first. Early Launch Anti-Malware (ELAM) insures that the first software driver loaded into Windows 8 is a driver from the user's anti-malware software.
Regardless of whether you are using Windows Defender or a different anti-malware product, Windows 8 has tweaked its load process so that security software runs first. Early Launch Anti-Malware (ELAM) insures that the first software driver loaded into Windows 8 is a driver from the user's anti-malware software.
In previous versions, if the malware executed and was loaded into system memory before the operating system and the antivirus, it was difficult to detect and remove. SecureBoot prevents rootkits from interfering with the OS, and ELAM ensures that pre-approved anti-malware software drivers are loaded before any other application.
Whether or not it is effective is unknown, but Goretsky noted in the whitepaper that the concept was "fundamentally sound."
SmartScreen
Originally an Internet Explorer security feature, Microsoft added SmartScreen to Windows 8. When a user downloads a program or a file from the Internet, the SmartScreen filter checks to see if other people have downloaded the same file as well. If so, there is a rating for the file based on its popularity and whether it was considered malicious. Users trying to download something with a low rating while Smart Screen is enabled will see a warning message. This can be good for detecting fake antivirus and other rogueware programs.
Since SmartScreen is now part of Windows 8, the filter will kick in regardless of what browser the user is running, not just Internet Explorer
Controversial ESP Study Fails
A study published last year in a scientific journal claimed to have found strong evidence for the existence of psychic powers such as ESP. The paper, written by Cornell professor Daryl J. Bem, was published in The Journal of Personality and Social Psychology and quickly made headlines around the world for its implication: that psychic powers had been scientifically proven.
Bem’s experiments suggested that college students could accurately predict random events, like whether a computer will flash a photograph on the left or right side of its screen. Scientists and skeptics soon raised questions about Bem’s study and methodology. For example Ray Hyman, a professor of psychology at the University of Oregon at Eugene who previously evaluated the efficacy of psychic abilities for the Pentagon, found many flaws in Bem’s study. At the time Hyman told Discovery News, “I’m puzzled as to how four referees and two editors of a prestigious journal could allow Bem to publish as 'experiments' studies that violated accepted methodological standards.”
As I wrote when I first reported on this study, “Bem has replied to his critics and stands by his findings. Ultimately, of course, either the findings will stand the test of time and be replicated by other researchers, or they won’t.”
NEWS: Flawed ESP Study Sparks Uproar
Replication is of course the hallmark of valid scientific research—if the findings are true and accurate, they should be able to be replicated by others. Otherwise the results may simply be due to normal and expected statistical variations and errors. If other experimenters cannot get the same result using the same techniques, it’s usually a sign that the original study was flawed in one or more ways.
So far it’s not looking good for psychics; the experiment was replicated, and failed. A team of researchers Professor Chris French (Goldsmiths, University of London), Stuart Ritchie (University of Edinburgh) and Professor Richard Wiseman (University of Hertfordshire) collaborated to accurately replicate Bem’s final experiment, and found no evidence for precognition. Their results were published in the journal PLoS ONE.
Ironically, the publication that had originally published Bem’s study refused to publish the latest research calling that same study into question. “Our submission was rejected without being sent for peer review on the basis that the journal has a policy of not publishing replications,” said French. “Our paper has opened up the debate on the proper place of replication in the scientific literature.”
In other words, The Journal of Personality and Social Psychology’s editorial policies actually violate standards of good science by preventing the publication of studies designed to ensure that research it originally published is valid. As French wrote in a piece published in The Guardian, “Although we are always being told that ‘replication is the cornerstone of science’, the truth is that the top journals are simply not interested in straight replications – especially failed replications. They only want to report findings that are new and positive.” Wiseman said that he hoped that “academic journals and popular media alike will offer the same weight to negative results as given to eye-catching positive results.”
NEWS: Psychics And Airline Security
Bem, who had encouraged other researchers to replicate his study, acknowledged that the latest findings do not support his claims, writing that “I believe that Ritchie, Wiseman, and French have made a competent, good-faith effort to replicate the results of one of my experiments on precognition.... Nevertheless I consider it premature to conclude anything about the replicability of my experiments on the basis of this article.... In mainstream psychology it usually takes several years before enough attempted replications of a reported effect have accumulated to permit an overall analysis.”
As before, Bem has replied to his critics and stands by his findings. Ultimately, of course, either the findings will stand the test of time and be replicated by other researchers, or they won’t.
Photo credit: Corbis
The new iPad is on 16 March in the shops
Apple gives a clear signal to its competitors: The next iPad will remain the king in the tablet market. With the improved technology, the device can remove the classic PC more and more tasks. The iPad is clearly the new focus of the Apple world.
Apple unveiled on Wednesday its third-generation iPad tablet. The device receives, among other things a much better screen, faster processor, can record video in full HD resolution and supports the higher speed wireless standard LTE.
iPad 2 remains on the market, but cheaper
After weeks of guessing whether the new device is now about 3 or iPad iPad would be called HD, Apple is now speaking simply of the "new iPad". The launch is on 16 March, the prices remain stable even with the new generation. At the same time will provide the current iPad 2 with a reduction in market price and competition should be as favorable Tablets stand up. The cheapest iPad 2 cost 399 euros in Germany now. A similar strategy also runs on Apple's older iPhone models in the smartphone market.
The new iPad has 3.1 million pixels on the screen. As with the Apple iPhone is called a "retinal display" in which the human eye can detect at a certain distance of no more pixels. The resolution is 2048 to 1536 - significantly more than for a high-definition television.
Apple CEO Tim Cook left the important task of the evening - the idea of the iPad - marketing chief Phil Schiller. In a clear challenge to the game console manufacturers Schiller devoted much time to the demonstration demanding games on the iPad. With Apple TV you can play on TV screens.
Another new feature Apple's iPhoto photo management software comes from the Mac on the iPad. This gives Apple yet another signal that the tablets to make the personal computer less and less important over time. On the new iPad you can edit photos with a resolution of up to 19 megapixels - enough for demanding photographers.
Battery of the new tablet will hold ten hours
The battery life will be as before for ten hours. And even when operating with LTE, which is considered to be energy guzzlers, there are still nine hours, promised Schiller. The LTE networks are still under construction and are very sketchy. The new iPad is slightly thicker: 9.4 instead of 8.8 millimeters. This was expected because the technology needed for the better screen a little more room.
The third generation iPad will keep rivals such devices with the Google Android operating system at a distance. This year will also add another competitor: Microsoft launches in the fall of its next operating system Windows 8 on the market, which is also intended for tablets. In a direct swipe at the competition on stage Cook demonstrated that apps on Android tablets would look much worse.
Apple wanted to create a new device, but a new category
Cook picked up the start of the presentation of the concept of "post-PC world," on which was placed in the late autumn of Apple founder Steve Jobs in issue: "We speak of a world in which the PC is no longer the center of their digital world. It is a world in which was the equipment that you use most, personal and must be more mobile than the PC ever. "Apple has sold 172 million last year, equipment for the post-PC era, the 76 percent of the Group revenue brought in. "When we designed the iPad, we did not want a new device, but created a new category," said Cook.
Still Think Facebook's Not Threatened by Google+? Facebook Now Supports "+" Tagging
In order for the Google + users who are on Facebook on the move (or vice versa), do not get confused, and pages users can now also place a "+" are marked.
The functionality is no different to the @ character. Just a status update, or enter a comment and it appears the familiar + selection.
One good thing as we find that it's already happened to me often that I have either entered an on Facebook + Google + or an @.
On both sides now, both the marker works via @ + and easily.
How to Make Screw Thread ?
Making a Screw Thread
Machine screws are extensively used for securing parts. The number of different types and sizes of machine screws, nuts & bolts prohibit the possibility of introducing them all here so the following information addressed the elementary information only.
Almost of the thread have triangle shaped threads. On the other hand, square shaped and trapezoid shaped thereads are used moving machinery which need high accuracy, such as a lathe.
In respect to thread standards, there are a metric thread (M), a parallel thread for piping (PF), a taper thread for piping (PT), and an unified thread (UNC, UNF). The following information is related metric threads, because they are the most widely used in Japan and many countries around the world.
Figure 1 shown an image of a thread. One of the most important terms used is that of the outer diameter. In the case of a metric thread, the bolt is named in accordance with its outer diameter e.g a bolt with a 5 mm outer diameter is known as an M5 bolt. The "Pitch" of the tread is another important feature of a thread. The pitch is defined as the interval (distance) between adjoining threads. e.g. Nuts & bolts must have the same pitch as well as diameter if they are going to be used together. The principles of cutting threads in nuts and bolts is that the bolt (male thread) is usually cut from a rod of material which has the same diameter has the intended finished bolt. The nut is made from a larger stock witch has a hole drilled through it that is slightly larger than that of the rod diameter. A thread of the same pitch is then cut which results in two mating threads. The same principles apply for cutting holes in places and other work pieces. (such an in the cylinder discussed earlier.) | Fig.1, Terms of Screw |
Fig.2, Imagine of Thread Cutting Processing
Screws are typically used for securing mating parts. When two pieces are joined together using screws, one piece is made with threads, and another piece is made with clearance holes, which have bigger diameters than that of the screws. If the diameter of the clearance hole is too small, the piece cannot be assembled as the screw will not fit through the hole. Also, if the diameter of the clearance hole is too big, , the piece will be loose as the hole will provide a sloppy fit. Therefore, we must provide make suitable diameter clearace holes. As a "rule of thumb", the diameter of the clearance hole has more 10 % than the diameter of the screw. For examples, the clearance hole for a M3 screw has 3.2 mm or 3.5 mm diameter. the clearance hole for a M4 screw has 4.2 mm or 4.5 of diameter. And we would make a hole with 5.5 mm of diameter for a M5 screw. | Fig.3, Screw and Clearance Hole |
Figure 5 shows taps which are used to make female threads. They are usually used with a tap handle as shown in Figure 6. In respect to the tread cutting process, we first, we make a hole with suitable diameter and suitable depth (see Table 1). Next, we start to turn the tap in a clockwise direction. There are typically three types of taps used as seen in figure 5. Of the three tap types there is a tapered tap to facilitate the initial thread cutting, an intermediate type that is used to progress the thread after it has been started and then finally, a "Bottoming" thread which is used to obtain the full thread depth when cutting a thread that does not go the whole of the way trough the piece. Taps can be easily broken and if the tap is broken in the work piece, it can be almost impossible to remove. It is therefore, very prudent to take care to ensure that metal chips do not build-up in the tap and also that the tap does not overheat as a result of the cutting process through the use of a cutting lubricant. | Fig.5, Taps |
Fig.6, A Tap with a Tap handle | Fig.7, Teread Cutting using a Tap |
Table 1 lists diameters of hole sizes for metric female threads and piping threads (PT, PF). Please note that the diameter of the hole equals the approximate difference of the diameter of the thread and the thread pitch. It may be necessary the allow a grater hole clearance if for example we were making a thread in hard stainless steel. |
Figure 8 shows a die and a die handle which are used to make male threads. The procedure of the threading is the same of the taps. But it is more difficult to start the thread cutting process than with tapping as dies do not have an equivalent to a tapered starting tap with perpendicular than the tapping. The thread cutting process using a die usually typically results in a smaller diameter of the original piece so care needs to be taken in selecting the correct size stock. If the stock is too small, this will result in a shallow thread depth resulting in an unsatisfactory thread. The die also created a bevel on the thread which is necessary for a close fit. If you have a lathe, the job of cutting a thread can be easier as it is possible to use the "STOPPED" lathe to assist in starting the thread as shown in figure 9. The die is pushed by the drill chuck aligned perpendicularly to the piece and after. After enough thread is cut, the drill chuck is removed and the die handle is then turned by hand. | Fig.8, A Die and A Die Handle |
Fig.9, Thread Making using Die
How does the screw make perpendicularly? If the thread needs to be held perpendicular to the piece, then it is important that the thread incorporate a shoulder to act as a "load bearing surface" as depicted in figure 10.The threaded section does not have the mechanical properties necessary to remain perpendicular without such a shoulder. | Fig.10, How to Make Perpendicular Screw |
Popular Posts
-
Anna Hazare led a movement for passing a stronger anti-corruption Lokpal (ombudsman) bill in the Indian Parliament. Mohd Shahnawaz has ...
-
One of the questions commonly asked in the internet fraternity and among the internet users is what a Blog is ? Although the question se...
-
Sometimes your windows 7 may behave weird because of some corrupted windows file. In such case you will want to scan for corrupted files and...
Recent Stories
Connect with Facebook
Sponsors
Search
Archives
Categories
Recent Comments
Tag Cloud
Tech News
Featured
How To
Facts
facebook
Blogging
Google
Windows
Internet
OMG
adsense
About
Mobile
Windows 7
Windows 8
firefox
Browser
Social Networking
Interview
Mahindra Satyam
Medical
News
Thesis
Wordpress
airtel
blogger
chrome
Adobe
Coupon Code
Domain
Facial
Flash Media
Free Facebook
Mp3
Offer
Promo Code
Questions with Answer
Reliance
Salary
Skype
Top
USB
Wallpaper
Web
adwords
bookmark
convert
fan page
free
online
stylish
yahoo
404
Accurate
Albums
Allergy
Amazon
BIOS
Beauty
Beer
Benifits
Birds
Bootable
Broadband
Business
Communication
Cut
Dandruff
Diamond
Doctors
Documents
Dolphins
Download
Explorer
Facial Recognation Technology
Free Ware
FriendSheet
Fungus
GSM
Genuine
Grammer
Grandma
Hacked
Improve
Installer
Ipad
Ipad 3
Job Alerts
Junglee
Kindle Fire
Laptop
Marathon
Mark
Market
Mediastinal Seminoma
Monitors
Mouse
Mozilla
Negotiate
Nokia
Olympic Gold Medal
Power Cut
Profile Picture
RIP
Recognition
Repair
Rich
Rio
Security
Signal
SkypeIn
Smartphone
Space
Tallest Man
Tamilnadu
Temple
Theme
Tips
Treatment
Types Of Blogs
USSD
Vehicle
Videocon
WIFI
WMA
What
Women
Xp
Youngest Mother
Youtube
Zuckerberg
add more
android
anna Hazare
apple
application
audio
backup
balance
banned
birthday
blank
buying
chief minister
chromebook
cleanup
computer
customisation
delete
details
develop
disk
edit
error
extension
fax
footer
galaxy
games
giveaway
google plus
index
information
ios
join
kerala
launches
light box
mac
messange
microsoft
notifications
number
office
orbits
own
pc
pdf
photos
pigeon
pinterest
planetary
read more
regedit
registration
restore
ring2skype
rss
ryt
samsung
scan
skin
software
sound
steve jobs
subscribers
tab
teasers
timeline
tool
trick
twitter
widgetized