Tuesday 11 August 2015

How to Unlock Your Samsung Galaxy S6 or S6 Edge


Did you know that there are some awesome hidden features on your Galaxy S6 or S6 Edge, that you can activate by navigating to system/csc/Features.xml and adding the corresponding line to the end of the file for each feature? It’s recommended that you do a backup before this process, and then you can safely enable: camera during call, continuous music while using camera, scheduled messaging option in your messaging app, and much more.
Samsung_galaxy

Your device has a lot of potential, but you need to know how to unlock it in order to benefit from it. And I do mean “unlock it” in its literal sense. Unlocking your Galaxy S6 or S6 Edge will allow you to get your favorite cell phone plan, no matter what carrier offers it; it will help you escape outrageous roaming fees when you travel outside the country, by using local SIMs; it will make you more money when you sell your device to upgrade to a newer model.

Those are your benefits for unlocking your Samsung Galaxy S6 or S6 Edge. Now let’s see what your options are for unlocking it:

  •  Go to a local phone repair shop. The prices aren’t high, but the risk of damaging your phone is real because they use a piece of hardware to do so. And on top of that, you have to leave your phone with them - can you imagine staying a day without it? 
  •  Go to your carrier. Network providers are obliged to unlock your phone, for free or a fee, but they don’t advertise this. The downside is that you’ll most likely have to wait for your contract to expire, in order to benefit from this. 
  •  Go to an online unlocking platform or app. UnlockUnit.com and UnlockScope.com are good examples, because they have great reviews on ReviewCentre. Other people’s experience is a great indicator of the quality of the service. They help you buy the unique unlocking code attributed to your phone in the factory, from the comfort of you own home.
They both have a turnaround time of 1 to 6 hours for Samsung Galaxy S6 and S6 Edge devices, and a discount that’s running for a limited time on the site.

How to unlock your Galaxy S6 or S6 Edge safe, fast and secure

First of all, you’ll need to check and make sure that your device is locked. Then, for the unlocking process to go smoothly, you’ll need internet access, a second SIM card from a different network provider and, obviously, your locked smartphone
Samsung

All good? Now head to the order page and quickly fill in the form with the country and network provider you bought it from, your 15 digit IMEI (which you can find out by calling *#06# or going to Settings > More > About device > Status), and your email address. At this point, this is all you have to do.

Then, you’ll be redirected to the payment page. You can pay for your unique unlock code through credit card, PayPal, Skrill, MoneyBookers or Bitcoin. Cool huh?

Once the payment is completed, your order has been successfully submitted and, at any moment, your code should arrive in your email inbox.

Then simply insert the SIM card from a different network provider, and your device will display the message “SIM Network Unlock PIN” or “Enter Unlock Code” and an empty box (see the image below). In that empty space you have to insert the unlocking code received.

Right after hitting the unlock button, your Samsung Galaxy S6 or S6 Edge will be permanently unlocked and, from now on, you can use it with any carrier in any country in the world.
Samsung_3

If you prefer to do this through an app rather than on your computer, you can download the UnlockScope app from Play Store instantly. If you have any questions or would like to share your unlocking experience with us, please leave a comment in the section below.

Monday 10 August 2015

Watch Out for These Serious Mac Attacks

Apple’s esteemed line of Mac devices are about to go through troubled times with the emergence of new age advanced bugs and glaring loopholes in Apple’s operating system. Security researchers had unearthed a new kind of vulnerability in the Mac devices, which allows the hackers install devious ad-wares like VSearch without even requiring the password. VSearch is a notorious malware, which infects the Mac devices with numerous pop-up ads and redirects the users to different search engine whenever they try to use Google.

VSearch bug reported earlier by vigilant security researcher

A German security researcher named Stefan Esser had made this bug public earlier this week. It should be noted that the generally accepted protocol is to inform Apple about the new bug discoveries not to disclose it to the public and cause a furor. Some of the hackers had already taken advantage of this bug found by the German researcher. They had actively used this newfound vulnerability to attack Macs devices as said by a security company named MalwareBytes in their blogpost.

How this bug works and how it can be neutralized?

This bug is designed to effectively take advantage of the Mac OS X 10.10 (Yosemite) features that determines which programs are allowed to make changes on the computer without the need of password. Yosemite makes a list of those programs and keeps it hidden in a file named Sudoers. However, this bug allows the malware to get listed in the Sudoers file which simply means that the malware gets the capability to install any in any part of the OS without users approval via password.

Esser had provided a fix to solve this malware issue. It should also be noted that next patch for the Yosemite will include the bug fix because even Apple about this vulnerability for a while.

Another deadly bug, which take over the control of Mac device

Another group of security researchers had found a more threatening bug, which has the ability to take permanent control of the Mac device. Users can effectively get rid of most vicious malwares by reinstalling the operating system but this new vulnerability in Mac devices turn the game away from the users. Using this particular vulnerability hacker can easily install the malware directly in the computer’s firmware, which is responsible for booting up the computer.

A team of researchers had developed this worm and named it Thunderstrike 2 which can easily take the advantage of this security flaw in Mac deices.

This worm can be installed on the computer just like any other malware where people happen to click on wrong links or fails to the ploy of phishing scam. Once installed this malware takes a nastier turn and keeps looking for the devices connected to Mac in order to load them with worm. Other users when uses the same infected Ethernet adapter happens to get their Mac devices infected too. This bug has not been fixed till now by the Apple.

How Google Quietly Revved Up Its Very Own Car Company



Google_Car
Google is all set to surprise the big names in automobile industry by secretly registering its car company way back in 2011. For a long time Google tried to work with big names in the car industry to develop its ambitious self driving cars. At the North American Auto Show, which was held in January, Google announced that they were having serious talks with major car plays such as General Motors, Toyota, Ford, Volkswagen and Daimler.
 
The project lead for the Google’s self driving cars Chris Urmson even went on to say that manufacturing cars is hard and a tedious job which is aptly done by the car manufacturers and it will be wise to find a partnership rather do everything by oneself. Unfortunately, no partnership had come into being till now.

Chris Urmson emerges as Google Auto LLC CEO

The most viable reason of not coming up with any partnership is that Google already had its own Company named Google Auto LLC registered in California. This company is registered as a passenger vehicle manufacturer with both the national and international organization across the world. Google subsidiary as ‘car manufacturer company’ received its license last year as a dignified car maker in California and being headed by no other by than Chris Urmson.

Legal documents brings more insights

All this is revealed by the Guardian had after obtaining legal documents through Public Records Act request in California. Legal documents even show that Google Auto was formed as a limited liability company, which was used initially by the parent company to modify and test its fleet of driverless Lexus SUV’s. Google Auto LLC finds itself mentioned as the sole manufacturer of 23 autonomous Lexus cars registered in California. Interestingly all the vehicles have been involved a number of minor accidents in and around Google’s home town of Mountain View. However, no law suits were filed in these accidents and it is quite common among the large businesses to set up subsidiaries in order to try new and risky projects.

Signs of Google’s rising ambition

Over the years, Google had shown incredible sign in the rise of its driving technology marvels. But nobody had perceived this might have grown with presence of a secret car making company in the veil. Google Auto LLC was in being since 2011 and just last Google appointed Chris Urmson as the manager of the Google Auto which gave him the reigns of company’s daily operations. By the nest day Google took the world by surprise when it announced that it is all set to build 100 prototype self-driving cars right from the scratch. The prototype cars created a sensation when it was said that these cars will not contain any steering wheels, accelerator or brakes.

Google Auto LLC applied even for the VIN codes in order to identify each of its self-driving cars like other car manufacturer. It organized emission testing in California and in order to avoid safety requirements and crash, test it and kept its cars lightweight with low speed capability. All of these activities simply show that Google’s ambition is always to go through research to the end product with doubt.

Behind the Scenes with Facebook's New Solar-Powered Internet Drone and Laser Technology

facebook

Facebook’s Large Solar Powered Aircraft

Facebook has developed a large solar powered aircraft in order to blanket the planet with Internet connection. According to Jay Parikh, Facebook, vice president of infrastructure engineering, during a media event at Facebook’s campus in Menlo Park, had stated that the unmanned aircraft known as Aquila has wingspan of a Boeing 737 though weights aboutthe third of a Toyota Prius car.

Aquila would be responsible to beam Internet signals back to rural locations on the Earth which tends to lack the type of communications setup required in maintaining internet connection. As per Parikh, about 10% of the population in the world seem to live in rural areas, some identified in certain regions of Africa and India, besides others, are unable to gain access to the web.

A team of Facebook engineers in the UK have spent around 14 months constructing the plane, though Facebook has refrained from disclosing the number of employees employed in the project. It is said that the Aquila’s wings seem to be made of a kind of material known as carbon fibre and when the material tends to undergo a type of heating process called curing, it get stronger than steel for the same mass of material, as explained by Yael Maguire, Facebook Connectivity Lab director, in a blog post. The material also explains why the drone seems to be so light.

Launching the Plane in the Sky with Big Balloon

Facebook intends launching the plane in the sky with the aid of a big balloon which could carry the aircraft to the stratosphere and will float between altitudes of around 60,000 to 90,000 feet. The aircraft at these altitudes would be far from the airspace of commercial airliners that fly as well as free from storms or other weather disturbances, according to Parikh.

Moreover, the Facebook team have also covered Aquila with solar panels, fitting the craft with batteries together with an electric motor in order that the plane stays in the sky for a period of 3 months. Within that period of time, the drone would be beaming the Internet down without any interruptions or even the need for refuelling. Maguire has informed reporters that when the plane comes back to the planet it would land like a glider due to its aerodynamic design.

Aquila will be accountable in providing the Internet to the people on Earth within a radius of 50 kilometres while in the air. Maguire had mentioned in a post that small cellular towers as well as dishes will tend to receive the signals that are sent by the aircraft and will convert those signals into a Wi-Fi or LTE network which people could connect to their cellphones as well as smartphones.

Breakthrough for Data & Information From Drone to Drone

Facebook has also mentioned that it has achieved a breakthrough for the data and information to be transferred from drone to drone and if Facebook tends to fly numerous planes it would be able to shelter bigger swaths of land.

With the use of laser communication technology, Facebook has apparently developed a system to stream data between drones at a rate of 10 gigabytes per second at a speed which is as fast as what fibre-optic services could provide to U.S. inhabitants, like those living in Minneapolis. Parikh clarifies that the discovery in laser communications is the outcome of the software based networking developments Facebook has been continuing out in its data centres. Maguire states that the communications signals that are sent through the sky seem to be so accurate that they can actually `hit a dime from 11 miles away’.

Accuracy seems to be important if drones are to be capable of sending signals to and from each other resulting in less Internet infrastructure, essential in building it on the ground. According to Maguire, this begins to look like a backbone of the Internet using lasers in the sky.

Aim to Setup Aerial Internet Infrastructure

It is important to remember that Facebook is not near to launching these planes to power the Internet but has only constructed on drone till now with plans for more in the pipeline. Parikh has not estimated when Facebook would fly multiple drones over the Earth but has only informed that this will be an effort which they will invest in for several years to come, but presently, the plan is to spend the second half of this year doing flight testing.

He has also pushed back on a query suggesting that Facebook could only permit the Facebook site or certain websites to be sent to rural locations through its determinedproject. Parikh has stated that Facebook has no plans in becoming an Internet service provider but aims to setup the aerial Internet infrastructure and thereafter enable major carriers to operate and distribute the web in the same way how they do so, on Earth.

Facebook’s Connectivity Lab had developed the drone project that comprised of earlier researchers from NASA’s Jet Propulsion Laboratory and the National Optical Astronomy Observatory besides others. The lab is said to be a fragment of Facebook’s Internet.org enterprise in bringing the Internet to places where connectivity is lacking.

Saturday 8 August 2015

U.S. Researchers Show Computers can be hijacked to send Data as Sound Waves


Keyboard
With the dawn of technology, crimes have shifted accordingly to target the wide array of electronic gadgets, most of which are sitting ducks to any sophisticated attack. Such has ben the case of “Funtenna” by Ang Cui, a recent PhD graduate from Columbia University. This demonstration of sorts shows the situation that we might have to face on a larger scale in future. What is this “funtenna” ? Well, for starters, imagine your printer, which is supposed to print your documents, secretly transmitting data wirelessly over air without using WiFi or traditional radio channels. Sounds absurd? Well that is exactly what has happened. But before going in to the details, let us understand the basics behind all the cruft in there.

A basic primer

All digital electronic device use electrical signals to work. These signals are manipulated and in case of digital ones, between two voltage levels, they oscillate. These eletrical signals are carried through by conductors which generate small EM signals as well as a side-effect. Now, communication today uses such varying EM signals (modulated signals) for the process. Thus with sufficient effort, one can, in theory, use these stray EM signals to transmit data which can then be picked up by an attacker. Imagine a confidential document sent to print and the printer silently transmitting all the contents to an attacker. Scary!

Diving into the details... 

Cui, with about 4 lines of code, injected to the embedded firmware of the printer, can program it so that it can transmit data using these stray EM signals. But there range is so short that it is almost useless. This is where the cleverness comes in – in order to generate waves which can transmit information, they need to be sufficiently powerful and this is done by switching the states of the digital electronic circuitry at variable frequencies to generate the carrier waves which can then carry the modulated signal which has the actual information. Though Cui’s current demonstration can only beam the information to a few metres, he predicts that the range can be increased to more than 30m and the signals can even penetrate reinforced concrete walls.

The possible ramifications

With the age of Internet-of-Things dawning upon us, such an easy hack could prove to be a tremendous security hole which can be hard to plug. Since the medium of transport is not something monitored (its not WiFi or over wires), The trick performed was on a cheap laser printer and thus implies that anything with an embedded computer can be used in this attack renndering all the connected devices to emit information to attacker at will. This calls for stricter rules and better electronic components. Such leakage can be stopped but will come at a price hike. EM sheilding can be done with metal cages but may not be feasible always and might need better methods.
The funtenna experiment by Cui demonstrates basically that with persistence and ingineuity, almost all digital electronic device can be used to transmit information in secret without being detected. With the IoT age upon us, we need to significantly step up our security game or it maybe too late...