Saturday, February 28, 2015

Google warns of sites with unwanted software – Tech News

Google warned users of all the search engine if they want to download malware or visiting websites that attempt to install malware, now the search engine also displays a warning when users arrive at websites that offer unwanted software.

 Google Alert

This is a warning if there is software available which affects the Internet, for example, by adjusting the start or the display of advertisements on the website. In the case of Chrome, there is a striking warning present which shows the explanation that it is not wise to visit the website. To prevent Internet users through the search engine on these sites fall leaves Google Search now see signs that warn of this kind of misleading websites.

Google has also started off ads that are sent to unwanted software.

LikeTweet

Friday, February 27, 2015

Intel promotes software startup IreckonU – Computable

<- googleoff: index -> <- googleon: index ->

Intel invests in the hotel software startup Ireckonu. The software runs on a server from Intel. In addition, the chip supplier Ireckonu promotes include a video in order to bring more servers to the type of Xeon to the man

.

IreckonU offers a solution for hotels, where existing software current suppliers can be used more efficiently. The solution is similar to a power strip, in which all systems of hotel booking and payment modules on the site to plug in to the data from the minibar. This makes these modules can effectively communicate with each other.

The hotel software should give a boost to personalized guest experience in the hospitality sector. By integrating eg CRM systems is the favorite drink of the guest in the minibar and the room reaches the desired temperature. If the TV, AC, tablet, etc. does not work or if a room is not cleaned properly, the system will automatically block this room for publication and without the guest noticing it, reserving another room.

The system is currently being implemented at CitizenM hotels. Mark Voermans, commercial director at Ireckonu, is pleased to be working with Intel and hopes that several hotel chains, this innovation will follow.

This year presented for Computable Computable Awards are also a prize for the best start-up in the Dutch ICT market. A jury selects the ten best start-ups that may present themselves during the Computable Awards to the crème de la crème of the Dutch ICT market. Start-ups that appearance March 4 log, a chance to win free tickets to the event Party like a start-up on March 6 at Club ABE Amsterdam.Meld in your start-up or to nominate a start-up in your eyes Best ICT start-up of the Netherlands.

LikeTweet

Research BSA: ‘Illegal software and malware closely linked’ – Dutch IT channel

The use of pirated software increases the chances of becoming infected with malware. Companies and governments should avoid the use of unlicensed software on their networks, therefore, to reduce the risks of cyber security incidents

This allows BSA |. The Software Alliance based on research conducted by international research firm IDC. The analysis shows a correlation between the amount of unlicensed PC software in a country and the amount of malware that exists in this country. “Malware infections can cause major problems. Organizations are looking for the best way to protect themselves against, “said Jodie Kelley, Senior Vice President and General Counsel of BSA | The Software Alliance. “The analysis shows that there is indeed a link between the use of pirated software and malware. This means that good software management is an essential first step to reduce cyber security risks. “

Link between pirated software and malware
research firm IDC compares in the statistical analysis the installed pirated software on PCs in 81 countries with the amount detected malware on these PCs. This data is maintained by BSA | The Software Alliance member Microsoft. The analysis shows a strong positive correlation (r = 0.79) between the amount of unlicensed software and the number of malware incidents. Further analyzes show that the amount of pirated software in a country is a strong predictor of the number of times a country is faced with malware. ?? The research is a continuation of previous research by BSA | The Software Alliance to the worldwide use of unlicensed software. The BSA Global Software Survey Report 2014 shows that in the previous year, 25% of the software installed in the Netherlands was unlicensed, compared with 43% worldwide. It also appears to prevent malware to be the main reason for computer users to use legitimate software. Of all the risks that entails illegal software, 64% of users consider the unauthorized access from hackers as the main risk. 54% mainly looking at the loss of data. ?

‘Perform internal audits’ BSA |? The Software Alliance encourages organizations to implement internal controls, such as ISO affiliates Software Asset Management activities (SAM). With these controls, organizations are assured that all software installed on their systems is fully licensed in order to reduce its cyber threats.

LikeTweet

Thursday, February 26, 2015

Self-learning software from Google breaks highscores Atari 2600 – Inside Gamer

Say goodbye to your hand against your old Atari 2600 highscores. A program from Google makes it requires short shrift.

The new software can learn independently games by watching and do not need to know the rules before it. The program is doing quite well, because of the 49 games that taught it, has broken the 23 high scores of professional players.

The game is especially good in simple games like Pinball and Breakout, but who knows what the software may be in the future. Instead of an aim-bot you just use a game-bone.



LikeTweet

Wednesday, February 25, 2015

XSO renews TimeWriter software – Computable

<- googleoff: index -> <- googleon: index ->

XSO’s TimeWriter, a user-friendly program for timesheets, has undergone a thorough renovation. The most striking advantage of TimeWriter uncluttered hours grid, which is a glance to check that all hours are booked

. Various Over the years, added modules for budget control and leave management. Now, version 5 has become available. Some notable improvements are the fresh and modern appearance, availability for Windows PC, Mac OS X, Android and iOS, the cloud database, the client (only in cloud database) and comprehensive reporting, exports, graphs and PivotTables.

TimeWriter is suitable for freelancers (freeware version), SME (standard version) and large companies (pro version).

LikeTweet

Monday, February 23, 2015

Beware: many software does SSL hijacking – Computerworld.nl

Background The extremely unsafe root CA Komodia is not alone in Superfish, but also in numerous other software. Variants SSL hijacking are widespread.

The scandal over the unsafe Superfish-adware on Lenovo laptops expands. The malware uses the SSL interception module Komodia, who own root CA in the root store of Windows and browsers nests. In this way, all https traffic is intercepted and decrypted while the browser neatly shows a green lock

Komodia scourge

<-.! dfp ad # ad_mpu-mob ->

Now, researchers at the dive shop, opens a cesspool. Exactly the same Komodia tool also appears to be in other software, including the same private key “protected” with the same default password komodia. Several security experts come up with lists of software ranging from browser helpers similar Superfish themselves to tools for parental control and proxy software to hide IP address. But ironically also software that presents itself as AdBlocker or security software, such as Lavasoft ‘web protection.

Lavasoft with his ironic security claims

In addition, serves PrivDog, a privacy tool from the CEO of certificate giant Comodo, from SSL hijacking, though not using it the library of the Israeli Komodia, reports Ars Technica.

One certificate for all domains

Komodia The code also shows a rotten Swiss cheese. Not just use the same key and default password in all instances, there is no validation or limitation on the number of domains whose SSL traffic can be hijacked, discovered Filippo Valsorda, researcher at CloudFlare. It is about ‘alternative names’, an existing X.509 extension to the certificate, other (sub) adding domains for which the certificate is valid. What? That is wide open. Any domain that is entered in the ‘alternative’ field of the Komodia certificate is signed blindly. And the browser displays a beautiful green lock.

Is there nothing to do against such SSL hijacking? No, not really. This possibility is in fact widely used by aggressive firewalls and deep packet inspection systems, and is therefore ‘legitimate’. Also certificates ‘pin down’, as Chrome has been doing, and Firefox since last year, only protects against man-in-the-middle attacks in the network. Once ensconced in the root store of the operating system or browser, such Komodia even swallow Chrome and Firefox these false certificates for granted.



HP spins yarn

The first lawsuits against Lenovo are now a fact. The group comes under public pressure again with a mea culpa. In addition, the PC maker has released a new tool that Superfish and the damned root certificate removed automatically. Meanwhile competitors cash in on the scandal. For example, HP comes with this sneer on Twitter:


LikeTweet

Google gives developers more time to seal leaks in software – Techzine

Google has decided to software developers to give more time to seal a leak before Google decides to publishing them. Be very much larger Google’s terms, but it’s moving. Google previously published after 90 days the details of a zero-day vulnerability, a leak that has not been found before. Now it is possible to apply for 14 days extension of it.

Google has already received twice for each other to get the ire of Microsoft on his neck. Google published a vulnerability in Windows 8.1 two days before the patch would be available. Microsoft thus felt that Google is not doing to a safer environment for the user but to other companies put in a bad light.

Google initially held on to his 90-day rule and defended even that it is in the interest of consumers. Now the company still seems to come back by developers to allow 14 days to ask for extra time. Furthermore, Google is going to take into account weekends and holidays, so that a developer has enough time to work on a solution. Finally, Google is preparing to move to the date when it is really necessary, but it does not go into the details that involves.

In addition to publishing vulnerabilities in Microsoft Windows, Google has also been three vulnerabilities in Apple’s Mac OS X gepubliceeerd

LikeTweet

Sunday, February 22, 2015

Software Quality Conference 2015 – Emerce

Breda, February 16, 2015 On April 23, 2015, the first edition of the Software Quality Conference in De Fabrique in Utrecht . This conference originated from the Dutch Testing Conference (DTC) and the conference Bridging the Gap. The Software Quality Conference is a unique conference for professionals and business users who want to keep abreast of current trends and developments in the development of quality software.

Where Dutch Testing Conference on Bridging the Gap was focused on software testing, the focus of the Software Quality Conference is the entire process of the development of quality software with software testing as an integral part. Topics such as business & amp; analysis, design & amp; development, testing & amp; acceptance and Operations & amp; maintenance are key.

Central theme
The central theme of the Software Quality Conference is “Expand your insights on agile, testing and DevOps to Improve Your software reliability. Christa Greeks, project manager of this conference: “ In the age where society is more dependent than ever on software solutions, quality and reliability is more important than ever. The translation of business goals in poor software solutions can lead to large capital losses, privacy violations, and reputation damage. This conference provides ideas for all parties involved in the software development process, so the above problems can be avoided ‘

Dion Kotteman
Keynote at this conference is Dion Kotteman, State CIO. After a tour d’horizon on current developments in the field of software development Dion discusses the conditions for project success: leadership and take into account the human factor, the soft controls

View the full program. overview of the other lectures http://softwarequality.heliview.nl/sessies.aspx

Registration for this conference
Would you also miss the Software Quality Conference 2015 ? Please register via the website http://softwarequality.heliview.nl/. Participation is free of charge provided you meet the conditions, otherwise the cost of participation € 645, –

About Heliview & amp.; Conferences & amp; Training BV
Heliview Conferences & amp; Training BV is the organizer of conferences, training and events. These events have gained a prominent place as a meeting place and networking day for managers and senior specialists from different branches. Through include targeted access policy, we offer our business partners and conference delegates the opportunity to network a day, to exchange knowledge and to generate leads

For more information:. Www.heliview.nl/conferences

LikeTweet

Safely download and install software, if you do that – Computer Total

01 Extras

People love free. But if the income of a program does not come from the users, software developers often combine additional programs from third parties, for which they are paid by the third party to connect to it. Is still relatively harmless as, for example, a trial version of a commercial program is installed together, but it can also worse. For example if the start page of your browser is adjusted and you suddenly have another search engine that you can no longer change.

If you think that only shadowy programmers are guilty of bundled software, we must get out of the dream help: even reputable companies trying. So what happens when you do not pay attention to bringing in Adobe Reader or Java also McAfee Security Scan Plus on your computer.

Ook reputable companies are guilty of bundling software

02 Bait advertising

<-.! dfp ad #ad_mpu_article ->

Some free programs are actually inducements to persuade you to buy a commercial program. Take for example a tool to optimize your system. This category is notorious that they install junk, but sometimes it is even more insidious. Such a free program for instance takes place during the optimization of your computer to solve a variety of known problems and issues that you have to pull the purse for the Pro version. Do you do anything? Then the program continues to sow fear (because more often not) by your regularly report that your system is at risk or problems to be solved quickly

Some free utilities provide all kinds of warnings to purchase entice you a paid program.

03 Problems prevent

In order to avoid problems with downloaded programs we have developed a number of precepts. This will help you in many cases avoid the misery, but they are not one hundred percent waterproof. If your system still rising slightly, it is useful to return to a previous situation. The program Toolwiz Time Machine (see from step 9 to 12), this is possible and you can safely experiment with software. All adjustments are disappearing to turn back by restarting from a recovery point or through your computer.

Plugins and install extensions from your web browser is always a risk, especially if a site insists on it.

Sandboxie and VirtualBox

The precepts and solutions discussed in this article make sure that you download safer and can experiment with programs. Two additional enhancements which we do not want to remember his Sandboxie and VirtualBox. Sandboxie offers for 15 euros an isolated experimental environment where you can safely operate without your computer or files at risk. The free VirtualBox provides a bare virtual machine you can install Windows (or other OS). The VirtualBox system operates completely independently of your Windows operating system. Everything goes wrong in your VirtualBox system remains in the VirtualBox system. VirtualBox also has a snapshot function to take a snapshot of the virtual machine.

VirtualBox provides the ultimate experimental environment: a complete virtual PC

04 Download Administrators

Some websites are very well found by Google and appear reliable. , but the programs that are offered there are possible adapted. If you search on Google for example, ccleaner , you see https://www.piriform.com/CCLEANER first result and http://ccleaner.nl.softonic.com second in the list. The first link will take you to the website of the creators of this popular tool, but with the release of CCleaner you will be offered via the second link gives you allow a download manager inside. Download managers are completely unnecessary. If you’re lucky, the download manager installs end the program, but in practice there is fanatically tried to install all kinds of junk that can accommodate even spyware

Beware of vague download managers.

LikeTweet

Protime 360: social software in the workplace – Computable

<- googleoff: index -> <- googleon: index ->

The International ICT company has introduced Protime Protime 360. The software employees in one online platform (SaaS) collaborate regardless time and location. This puts Dutch-Belgian company fully in the new work and workforce empowerment. Protime wants companies that enable it to be more effective with more autonomous employees who work together efficiently

. Via Protime 360 ​​companies can make their goals for their employees to transparent team level and even individual level. The employees work on this online platform together on activities, documents and projects directly contribute to the objectives and closely matched with their skills and passions.

In addition, several processes can be linked within Protime 360, such as recruitment, competency management, time tracking, time tracking, recording and availability absence, onboarding, exit procedures, marketing, strategic projects and follow up meetings.

The new software has come a complete solution on the market that allows companies to apply the new work in primary work, says Protime.

LikeTweet

New software can recognize any face perfectly – AD.nl

Produced by the editors
18-2-15 – 20:51 source: DeMorgen.be
How do you look or laugh, the new software should recognize all the faces © Deep Dense Face Detector.

In TV shows like ’24’ and ‘CSI’, it’s all very easy. Nevertheless, search engines analyze blurring of faces and since then the right to search persooon still far away. A study by Yahoo and the American Stanford University can change that in the short term. And there probably is not anyone happy.



Actor Sylvester Stallone is detected by Deep Facebook Facebook © Facebook .
The software would have to recognize faces even when a hand held © Deep Dense Face Detector.

Technology to recognize faces has been around longer, but is now mostly used in cameras and smartphones to sharpen photos. Also, Apple and Nikon make quite a while using the ‘Face’, but this does not always good.

Facebook used in the United States for an extended technology to recognize faces. The software can Deep Facebook user photos automatically recognize their friends and other Facebook users, without being tagged. But, in the European Union, this technology of Facebook prohibited.

Cathedral
Most recognition software that exists now is pretty ‘dumb’ and very limited in their capabilities. For example, most faces are identified only when they look straight into the camera, or moving images.

The new algorithm, which was developed by search engine company Yahoo and from Stanford University, is based on the analysis of hundreds of thousands of pictures of faces from different angles. A database of 20 million images of various environments without it faces should serve as a reference.

Deep Dense Face Detector
The program, Deep Dense Face Detector is called, sounds promising. It can even recognize faces as shown upside down – this is impossible with recognition software of the previous generation. The detection system learns more and in and gets smarter.

The specialized website MIT Technology Review of the Massachusetts Institute of Technology called a breakthrough and a ‘remarkable accuracy.

Recognized at old photos
The question now is whether this technology will be released or that Yahoo is a search engine that consumers can use. But the technology and there is that it will be possible within the shortest possible time, is obvious.

Still, the discovery is also controversial. If the technology is made widely available, not only to search future images. Also, all the old images that can be searched on the Web for. And that photographs are of people who do not want them to come to the surface again.

LikeTweet

Toshiba presents digital signage software – Computable

<- googleoff: index -> <- googleon: index ->

Toshiba presents its latest digital signage software, Business Vision. The software is available in both a standard version and an advanced version. Both are designed for easy administration of info screens and are suitable for both large and small companies. They complement Toshiba’s current and future range of information screens.

With Business Vision Toshiba, content can be managed flexibly and in a variety of configurations, planned and shown, and can be managed device information. In developing the new software takes into account individual preferences, with multiple installation options for a more flexible content management. There can be chosen for a standalone installation for a single screen, a local server installation for multiple screens at the same location, or a cloud-based system for remote control of multiple screens at different locations for any business there is a customized solution.

Because the software is initially available on a ops unit (open pluggable specification), it can be installed on most professional digital signage equipment from Toshiba. This gives the user quick and easy control over every aspect of the information display solutions, content and layout to institutions and management.

The advanced contentmanagementysteem supports a wide range of formats, allowing an external device is no longer needed . Video, images and text can all be combined into a fully custom tuned digital message. In addition, other types of content, such as social media widgets, URLs and RSS feeds are displayed.

LikeTweet

‘Superfish certificate Lenovo laptops is in more software’ – NU.nl

This enables security expert Marc Rogers on his blog.

The relevant certificate, he says, comes from the Israeli company Komodia. Also Superfish itself points to this company as the culprit.

The certificate would have ended up without the knowledge of Superfish in its adware. Rogers says that Komodia in other software flour evert the same certificate, including a program for parental controls on Internet use by children.

All software Komodia would place themselves between a user’s computer and the server made a connection and so much less secure private connection up.

That would by attackers can easily be replaced by an amended certificate because the programs Komodia not properly check whether that certificate is real from the maker said.

This showed the security expert Filippo Valsorda to. Valsorda has already created a website to quickly check whether Superfish on a computer installed. He has now extended to also look for the presence of Komodia products.

Lenovo has now also released its own program to remove Superfish. Since January, the adware is no longer included on computers

By:. NU.nl

LikeTweet