تعديل

‏إظهار الرسائل ذات التسميات تقنيه. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات تقنيه. إظهار كافة الرسائل

الاثنين، 6 مارس 2017

How to buy car with low price?5 way to buy car with low price

بسم الله الرحمن الرحيم

السلام عليكم ورحمه الله وبركاته


We were all there. You want to buy a car first, or second or third. You have no idea what needs to be done. Maybe you got a bad deal really the last time I was scared. Just do not go to the car dealership and ask for what you want? Do you rent or buy a car? Why April mean? Residual value? Do you go through a broker may or may not have your best interest in mind? There are many ways to go about shopping car, but once you are in the negotiating room with the sales person there are only 5 easy tactics that will ensure you get the best price. If you're in the market to buy a new car, or just wondering what these tactics, and verified on the following page.
1. Do your research before you go to sell cars

Imagine this. I conducted a series of full research on the car you want to buy before the walk in the sale. You know every option, every price, every color, and gas mileage, engine specifications, even the internal dimension of the cabin. Now imagine that you know most of the car salesperson knows. Many cars and new vendors, or work on the volume, they do not have time to learn all the specific aspect of each car they sell. You can get instant credibility upper hand in negotiating at the "Know what you are talking about." Confidence in the negotiating situation is the key, now imagine the kind of deal you'll get when you feel like you know more than the person who sells you a car! Keep your chin up, and ask for a free cup of coffee, get comfortable, and lift your feet on the table if you can, and watch as you can get on the car of your dreams for the lowest price.



2. skip the sales person and talk to the director

Sales person in the store to sell cars usually have a man in the middle of the back and forth between the client and director of dealer floor. When you can, ask to speak directly to the manager. Tell him / her something like, "I'm here to buy or lease a car today, let us deal directly with the manager." Take our checkbook, or credit card and put it on the table. Remember, the salesperson to work with you, to get you out of the building with a new car. Go straight to the source and talk directly with the charge of discounts and deals cuts of precious time wasted Director and gives you the most powerful communication if you decide you want to buy another car in the future.



3. Never get collateral or wear and tear programs

This is by far one of the top items the profit margin of a car dealership can sell you. They earn a lot of money on maintenance packages, and wear and tear and programs, and additional guarantees last manufacturer warranty. Most cars come with standard security programs decent. The chances of you using additional security programs are slim to none. In most cases, the charges sell $ 2,000 to $ 5,000 extra for these items, packaged and which will be deducted so far as to entice you to bite. Do not fall for discounts on these add-ins that do not cost anything for sale are usually a net profit out of your pocket.

4. No use of additional features or options

Extra features in cars these days are what make companies sell most of their money and the car. Most options such as Bluetooth and sunroof may come standard on some models. But in excess, such as "cool seats", or "heated steering wheel," and are usually very expensive, and are rarely used. Make sure that when you're dealing with salespeople they do not "trick" you get a car with options that do not need. Many car dealerships and car manufacturers give a big big discounts on cars with fewer options because they are considered less desirable. Go for these cars if you're looking for the lowest price possible.



5. Low ball always have the lowest price

When you start talking numbers with a car salesman The first thing you will be asked is. "What is your budget," or "How much are you willing to pay each month?". This is an easy way for a sales person to put the ball in your court and make you tell them the price they can make money off easily.

One of the best tactics here is to be mysterious and tell them something like this:

"I'm looking for the lowest price you can give me." "What is the best sale you might happen to this car now?" "Show me your price first, and I will let you know if it fits my budget."

If I must say that the dollar amount, and the sales person is pushing you. Find an ad in the paper and tell them the number of the 10% to 20% less.

I hope that I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new




مدونه المعرفه للمعلومات

This Week in Getting Hacked: Coachella Goers

Welcome back to ‘This Week in Getting Hacked’—the world’s greatest cybersecurity-related link dump! Each week, we bring you the best news stories from the cybersecurity field, letting you know who’s getting hacked, who’s hacking, what data is leaking, and about what you should take with caution. So strap in, change your password, and let’s find out who’s getting hacked this week!
On to the links…

Popular music festival Coachella alerted attendees that their data had been stolen, although no financial information was hacked.
cochella hack
Photo Credit: (pitchfork.com linked above)
Thousands of women in sun dresses and flower crowns were alerted in an email that everyone who bought tickets through their website—a requirement to purchase tickets (so, everyone)—was compromised. AEG, the company behind Coachella said:
“We recently discovered that unauthorized third parties illegally gained access to the usernames, first and last names, shipping addresses, email addresses, phone numbers and dates of birth individuals provided to Coachella.”

In case you needed more assurance that the Internet of Things is more unsecure than an open window, a “connected” teddy bear that was able to record messages to share between loved ones living far away and their children has been breached, leaving millions of personal messages and account details exposed for anyone to take.
Spiral Toys, makers of the CloudPets line of internet-connected plush toys, stored its customer data on a database that was neither behind a firewall or protected by a password.
The data included hundreds of thousands of passwords and emails that were easily cracked. The software on the toys was also able to be overcome and turned into a spying machine. So you know, don’t buy connected anything.

New York’s Stewart International Airport left its servers filled with 760 GB of data unprotected for over a year.

Surprise! Surprise! Yahoo got breached again—this time to the tune of 32 million accounts. There might as well be a sign on all their user data that says, “Take this, please.”

And finally…
The Foreign Intelligence Surveillance Act, or FISA, was first revealed when Edward Snowden disclosed the NSA’s secret surveillance programs in 2013. FISA allows for broad, sweeping, and intrusive surveillance of emails and other electronic communications, and two provisions laid out in Section 702—Upstream and Prism—allow for gathering of Web traffic data, and messaging data from tech giants, respectively.
Those two provisions have faced criticisms on both sides of the aisle, with many in Congress calling for reforms for surveillance on American citizens. However, the White House has recently come out stating that they are for the renewal of the law without any revisions or reforms, citing that it’s important for national security.
That’s it for this week! Stay safe out there!

الأحد، 5 مارس 2017

كاسبرسكي لاب تكشف عن نظام التشغيل KasperskyOS


بسم الله الرحمن الرحيم

السلام عليكم ورحمه الله وبركاته



المعرفه


Russian Internet security and anti-virus for much kasperskyos had expected, after running on safe microkernel architecture, which was designed specifically for network devices, industrial control systems and the Internet of things based system design.

 Operating system is make your average home computer, instead, it is supposed to protect the industrial and systems an integral part of devices from online attacks by preventing any third party or malicious code from the implementation part.

 Kaspersky Lab CEO Eugene Kaspersky confirmed rumors of the new operating system on the official blog published on Monday the system, say this project under the codename 11-11 has been in the works 14 years and has been designed from the beginning.

 The reason behind developing kasperskyos simple: Internet-scale cultivation of the things embedded devices in industrial control systems (center) to power critical infrastructure.

It is very easy for most companies to get rid of the virus infected computer, because it is all he has to do is infected them from the network, according to Kaspersky, but since the Industrial Control Systems separation (center) and usually critical management are processes or infrastructure that must support all the time and can not be taken offline for even some of the time, the malware targeting this interim certification systems is a challenging problem.

So, according to Kaspersky, the solution lies in securing the operating system with strict safety requirements online that can help reduce the chances of documented function, and thus reduces the risk of online attacks that target the center or iot devices.

It's safe, but kasperskyos not Linux! Yes, this operating system is not just a Linux flavor. One of the major distinctive features of Kaspersky operating system is that the GUI less operating system was built from the beginning and does not contain even one series of Linux code in it.

"All popular operating systems are not designed with security in mind, so it is simpler and safer to start from the ground up to do everything correctly. It is just what we did," said Kaspersky.

 The new operating system has been designed to allow programs to implement only documented operations under strict security policy. Just what is determined by a policy that can be implemented, including the functions of the same operating system, where customers can also examine the source code of kasperskyos to make sure that the operating system has no documented capabilities.

 In also operating system independent security engine that allows users to implement the policy that suits its security goals.

 kasperskyos is not a general-purpose operating system, instead, it is designed for embedded devices, including iot, telecommunications equipment, Valet parking, and industrial control systems.

 To create a package that can be applied in several different areas of the granular customization, Kaspersky has developed three products: an operating system (kasperskyos independently Safe hypervisor) (ksh) to run virtual machinesa interaction between the operating system components secure system (kss) kasperskyos designed not only solves security issues but also addresses the regulatory and business challenges related to secure application development for embedded systems


I ask God to have benefited
And I hope that I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new



مدونه المعرفه للمعلومات



Way to run a USB device powered over Ethernet


بسم الله الرحمن الرحيم


السلام عليكم ورحمه الله وبركاته

Many devices such as Wi-Fi-cams get power being plugged into a nearby outlet through USB. But if you want to put this device somewhere where an outlet is not nearby, you can use existing Ethernet drops (or run Ethernet yourself) to operate the camera by using the handy adapter.

المعرفه

Keep in mind that some devices will already comes with Ethernet built in, which is used for both the power of the camera and connect it to the local network or the Internet. Others, such as Wi-Fi cameras, and will only get the power from the USB cable that plugged into the outlet using the power adapter. But if you have a house wired with Ethernet cables are moving all over the place, you can edit and use Ethernet port instead.

Before you begin, you need to make sure your Ethernet lines supports Power over Ethernet.


What is a Power over Ethernet (PoE) and?

المعرفه


As mentioned above, the cameras have the most wired Ethernet control built in, allowing them to take advantage of the so-called "Power over Ethernet" (or "Bo" for short). And it can transmit video and audio over Ethernet connection, but drawing power on the same cable as well.


However, in order to Bo to work, you need a router or Ethernet switch that supports Bo (it will have a habit of "Bo" written somewhere near the Ethernet ports). Otherwise, you can buy the so-called injector Bo, which will turn the ordinary into an Ethernet line support Bo Ethernet line. Basically, you are turning Ethernet cable from your cable data only cable that can transmit data and power.

How to add poE to a USB device with Bo adapter to USB?

المعرفه

If you have a router that supports Bo but the device that does not (in our case, Kam Wi-Fi, which counts more than USB), you can power this device over Ethernet with Bo adapter to the USB (sometimes called a traitor only Bo). You will need one that can provide 5 volts and 10 watts of power, which is most of them.

This $ 20 one works great, so it comes with a USB connector female (in the form of adapter) that will allow you to plug in any USB cable. Some splitters Bo does not come with USB connectors, but merely a power connector year, so watch out for it if it matters to your setup.

To install Bo adapter to USB, only locate an Ethernet drop the closest to your device. More than likely, perhaps you already have an Ethernet cable plugged into it, but that's not a problem.

Disconnect the cable and then plug in the Ethernet connector male from Bo Ethernet jack adapter.

Then, take the Ethernet cable that you plugged into the wall and connect it to an Ethernet connector female poE adapter.


Then, take the Ethernet cable that you plugged into the wall and connect it to an Ethernet connector female poE adapter.


If you do not have an existing Ethernet drops, but still want to run an Ethernet cable to your device, you will connect it to an Ethernet connector female Bo adapter and discard the males in that case connector.


In any case, now that you have an Ethernet segment every drug addict, take a female 
USB adapter and plug it into the power connector in the poE adapter.

Then take the USB cable from the device and connected to the female USB connector.

Should automatically on power and connect the device to act like a regular outlet so all the time. Unfortunately, we have a Wi-Fi camera is not able to get an Internet connection of Ethernet cable, so we still need to connect it to our Wi-Fi network as usual, and make sure they are in the range we have directed. But Power over Ethernet worked well.


I ask God to have benefited
And I hope that I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new


الاثنين، 27 فبراير 2017

Inside forward, the former Google employees Adrian Aoun idea of the doctor's office of the future

بسم الله الرحمن الرحيم


السلام عليكم ورحمه الله وبركاته

A new kind of future doctors office launched its first site in the heart of the financial district in San Francisco at the beginning of this year. Some in the industry had their doubts about the health of the doctor's office with fitness tools like body scanner, a stethoscope and her own lab at home.

So we asked the founder of Google employees and former Adrian Aoun to show us around the place.

Of course, seeing and testing are two different things. We can not verify the authenticity of this proprietary tools for ourselves at this point, we still do not know how to start a lot of help and filed so far, but hopefully enough to ensure the fancy tools give patients an accurate reading.

What we do know is the forward taken in money from quite a few companies solid project like Khosla, Founders Fund, the first capital round, SV Angel, as well as angel investors John Doerr, Eric Schmidt, Marc Benioff, Garrett Camp, Aaron Levy and Joe Lonsdale, the one can hope they did due diligence on this new endeavor.

السبت، 25 فبراير 2017

5G specifications

بسم الله الرحمن الرحيم

السلام عليكم ورحمه الله وبركاته
 

المعرفه


The total download capacity for a single 5G cell must be at least 20Gbps, the International Telcommunication Union (ITU) has decided. In contrast, the peak data rate for current LTE cells is about 1Gbps. The incoming 5G standard must also support up to 1 million connected devices per square kilometre, and the standard will require carriers to have at least 100MHz of free spectrum, scaling up to 1GHz where feasible.
These requirements come from the ITU's draft report on the technical requirements for IMT-2020 (aka 5G) radio interfaces, which was published Thursday. The document is technically just a draft at this point, but that's underselling its significance: it will likely be approved and finalised in November this year, at which point work begins in earnest on building 5G tech.

I'll pick out a few of the more interesting tidbits from the draft spec, but if you want to read the document yourself, don't be scared: it's surprisingly human-readable.

5G peak data rate

The specification calls for at least 20Gbps downlink and 10Gbps uplink per mobile base station. This is the total amount of traffic that can be handled by a single cell. In theory, fixed wireless broadband users might get speeds close to this with 5G, if they have a dedicated point-to-point connection. In reality, those 20 gigabits will be split between all of the users on the cell.

5G connection density

FURTHER READING
How to search the Internet of Things for photos of sleeping babies
Speaking of users... 5G must support at least 1 million connected devices per square kilometre (0.38 square miles). This might sound like a lot (and it is), but it sounds like this is mostly for the Internet of Things, rather than super-dense cities. When every traffic light, parking space, and vehicle is 5G-enabled, you'll start to hit that kind of connection density.
5G mobility

Similar to LTE and LTE-Advanced, the 5G spec calls for base stations that can support everything from 0km/h all the way up to "500km/h high speed vehicular" access (i.e. trains). The spec talks a bit about how different physical locations will need different cell setups: indoor and dense urban areas don't need to worry about high-speed vehicular access, but rural areas need to support pedestrians, vehicular, and high-speed vehicular users.

5G energy efficiency

FURTHER READING
UK approves roll-out of white space networks to alleviate spectrum crunch
The 5G spec calls for radio interfaces that are energy efficient when under load, but also drop into a low energy mode quickly when not in use. To enable this, the control plane latency should ideally be as low as 10ms—as in, a 5G radio should switch from full-speed to battery-efficient states within 10ms.
5G latency

Under ideal circumstances, 5G networks should offer users a maximum latency of just 4ms, down from about 20ms on LTE cells. The 5G spec also calls for a latency of just 1ms for ultra-reliable low latency communications (URLLC).

5G spectral efficiency

It sounds like 5G's peak spectral efficiency—how many bits can be carried through the air per hertz of spectrum—is very close to LTE-Advanced, at 30bits/Hz downlink and 15 bits/Hz uplink. These figures are assuming 8x4 MIMO (8 spatial layers down, 4 spatial layers up).

5G real-world data rate

Finally, despite the peak capacity of each 5G cell, the spec "only" calls for a per-user download speed of 100Mbps and upload speed of 50Mbps. These are pretty close to the speeds you might achieve on EE's LTE-Advanced network, though with 5G it sounds like you will always get at least 100Mbps down, rather than on a good day, down hill, with the wind behind you.

The draft 5G spec also calls for increased reliability (i.e. packets should almost always get to the base station within 1ms), and the interruption time when moving between 5G cells should be 0ms—it must be instantaneous with no drop-outs.


I ask God to have benefited
And I hope that I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit and win zakah Science without fatigue or discomfort

Do not forget Likes page
To receive the all-new


مدونه المعرفه للمعلومات

الخميس، 23 فبراير 2017

الرئيس دونالد ترامب موقع الويب الخاص اخترق؛ تشويه العراقية هاكر

In the name of of Allah the Merciful
Peace, mercy and blessings of God




During the presidential campaign in 2016, he reported about how safe the e which is run by the Trump Organization's service to anyone with a little knowledge of computers can almost everything presents for Trump and his campaign.

Now, some unknown hackers calling itself "Pro_Mast3r" was able to distort the official website associated with fundraising presidential campaign President Donald Trump on Sunday.


Pirates, who claim to be from Iraq, said server distortion, secure2.donaldjtrump.com behind the content management system in the CloudFlare platform security.

Server appears to be the official campaign Trump server, according to Ars, and the server certificate is legitimate, "but said, referring to a picture on another site is not secure, which led to a warning on Chrome and Firefox that connection is not secure."

Distortion display an image of a black man hat site included a text message, which reads:

Infiltrated by Pro_Mast3r ~
E-government striker
Nothing is impossible
Peace in Iraq


At the time of writing this report, the server is now offline, there is no official statement from the Trump penny campaign team yet.

According to the latest Ndwinh President Donald Trump's website hacked; Iraqi distortion hacker published by journalist Paolo Attivissimo technology that, does not contain the source code of any software distortion malicious script server.

Instead, it includes a server up to JavaScript on the now non-existent account Google blog, "masterendi", which was linked to cyber attacks on three other sites in the past.





Source 

السبت، 18 فبراير 2017

Jouhl disclose sensitive Windows that Microsoft has failed to correct it

بسم الله الرحمن الرحيم
السلام عليكم ورحمه الله وبركاته


Microsoft once again face the embarrassment for not correcting weaknesses in time.

Yes, I have again the project team zero Google publicly disclosed vulnerability (with POC exploit) affecting Microsoft Windows operating systems ranging from Windows Vista Service Pack 2 for the latest Windows 10 that have not been corrected.



المعرفه




A few months ago, search engine giant Windows critical weaknesses to the public only ten days after the disclosure of a bug to Microsoft revealed.

However, this time Google revealed the weakness in the Windows operating system to the public after that Microsoft has failed to correct it within the framework of 90 days provided by the company.

The zero project by Mateusz Jurczyk Google responsible security vulnerability in a library (GDI) and the graphics device interface for Windows' Microsoft Security team on June 9 last year.
The weakness affects any program that uses the library, and if exploited, could allow hackers to steal information from memory.

While Microsoft has released a patch for the weakness in the June 15, the company does not fix all the issues in the GDI library, forcing the project to zero researcher reported back to Microsoft with proof-of-concept on 16 November.

"As a result, it is possible to reveal bytes uninitialized or outside the boundaries of the pile through the color pixels, in Internet Explorer and other customers GDI that allows the extraction of the displayed image data to the attacker," Jurczyk notes in a new report.

Now, after giving a grace period of three months for the company, Google released the details of exposure of the public, including hackers and malicious actors.

Project Zero Google team routinely find security holes in various programs, and calls for software vendors affected publicly to detect bugs correction within 90 days of discovery. If not, the company automatically makes bugs along with the audience details.


Although Windows users need not panic, hackers will require physical access to the host machine to exploit the weakness, the Redmond giant is to launch emergency patch released before it is developed sophisticated exploits.

Microsoft recently delayed this month's Patch Tuesday for a month because of "the issue at the last minute that could be some customers and not resolved in a timely manner affect for the planned updates [Microsoft]," in the February 14.


Therefore, if there is not expected emergency patch this month, will be leaving this gap was unveiled recently open to hackers for almost a month to exploit - just as we saw last time when Russian hackers actively exploiting the then unpatched Windows kernel error in the wild - which means that the users Windows in the potential risks.




I ask God to have benefited
And I hope that I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new


مدونه المعرفه للمعلومات



قراصنة تستخدم الروبوت البرمجيات الخبيثة للتجسس على الأفراد العسكريين الصهاينه

بسم الله الرحمن الرحيم


السلام عليكم ورحمه الله وبركاته



A group of highly sophisticated hackers state-sponsored spying on the Israeli army by hacking the personal Android phones for soldiers to control the activities of individuals, and data theft.



المعرفه
The newly released search by Kuyt and Kaspersky suggests that believed more than 100 Israeli soldiers from the Israel Defense Forces (IDF) to targeted with spyware.

Called ViperRAT name, and has been specifically designed malware to kidnap Israeli soldiers smartphone "Android-based and after exfiltrate valuable data, including images and audio recordings, directly from the risk devices.
Mode of action have been identified
According to security companies, and members of the Israel Defense Forces has been breached by social engineering techniques - where he was luring soldiers through Facebook Messenger and other social networks to enter the communications with the hackers who were on the attractiveness of various countries such as Canada, Germany, Switzerland and women.
Then the soldiers were tricked to install a version trojanized two different, usually legitimate Android apps chat, chat and Real YeeCall Pro, to facilitate communication.
As it has been the distribution of malware using the dropper hidden in the smart phone applications and other Android including billiards game, the player Israeli love songs, and transfer to the application IOS, which is shared between Israeli citizens and available in the Google Play store.

The application then scanned soldiers smart phones and downloading malicious applications that masqueraded as an update to last a pre-installed applications, such as WhatsApp, and deceive the victims to allow different permissions to carry out surveillance.
This, in turn, allows an attacker to execute commands on demand, enabling them to control the phone's microphone, camera, and eavesdrop on conversations soldiers, peers in the footage live cams.
In addition to this, malicious ViperRAT software combines a wide range of data from computers at risk including geolocation, Call Log, personal photographs and text messages, cell phone tower information, and network and metadata device, surf the Internet, download the application date.


May God have benefited
And I hope I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new





مدونه المعرفه للمعلومات




Learn anything you want by YouTube (ethical hacker courses, courses in programming, courses, photoshop ...... ......

بسم الله الرحمن الرحيم
السلام عليكم ورحمه الله وبركاته

Learning is now easier than ever before, you can learn everything you want for free and without leaving home by YouTube, blogs and can be accessed very easily by search engines all you have to do is book you want to teach
This is a favorite among many young people if not all of them.
In order to easier and easier for you, dear reader, I will introduce you range of courses that you can learn from them

المعرفه


His role in the ethical hacker provided by the Association Hereafter
Provided by the engineer Waleed Sami started
هناYou can if you want to learn from entry 

Courses in programming:

دورة في لغة الHTML 



Networking sessions and information technology:
دورة في شهادة MCITP




You do not have an excuse now education came at home
I wish you success and God abound note.


I ask God to have benefited
And I hope that I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new



مدونه المعرفه للمعلومات


Twitter Delicious Facebook Digg Stumbleupon Favorites More