Twitter: millions of passwords may have been stolen and sold
Millions of the Twitter account passwords may have been stolen and sold in the ‘dark web’. The Russian hacker who claimed to be got hold of the enormous database with data from Twitter account put it...
View ArticleGoogle, artificial intelligence makes progress with video games
DeepMind, Google’s division in charge of research projects in the field of artificial intelligence, documents the most recent progress in the effort to educate the machine to face a game at Montezuma’s...
View ArticleLenovo: the shoes that become a controller for gaming
Among the novelties presented at Lenovo Tech World ’16 do not miss the prototype of running shoes with smart functionality. In addition to supporting the tracking of physical activity, the particular...
View Article10 Coolest Windows Shortcuts
Keyboard shortcuts are the essence of PC productivity. While newbs slowly mouse around their screens in search of buttons to click, seasoned tech vets hammer through a day’s work with ease thanks to a...
View ArticleXbox One S: first images and features. Thinner and with 4k video support
A few hours after the press conference that Microsoft is preparing to hold at E3 arrives the first images and details on the new Xbox One console version. Design redesigned, thinner body, 2TB HDD, and...
View ArticleYahoo Messenger, after 18 years of honorable service closes the old app
The company has announced that the Yahoo Messenger “legacy” client will no longer be supported as of 5 August. Those who want to use the service will have to download new applications More than 18...
View ArticleASUS ZenFone 2 ZE551ML and ZE550ML receives the update to Android 6.0...
ASUS has started to send the update to Android 6.0 for the two marshmallow Zenfone 2 more distinctive, with Intel processors and 4GB of RAM After Zenfone 2 Laser and Zenfone Max, Asus started the...
View ArticleBluetooth 5 Official: faster, ready for the IoT and arriving at the end of 2016
The Bluetooth SIG (Special Interest Group) officially presents Bluetooth 5, the new wireless interface standard that promises doubled speed performance, with no negative impact on consumption. The...
View ArticleGitHub, violated account credentials retrieved from other services
June 14, GitHub has undergone numerous intrusion attempts by an attacker in possession of e-mail and password combinations retrieved from the violation of other online services On June 14 someone in...
View ArticleLG, TV anti-mosquito for India
In India, where mosquitoes are a health scourge and not just a nuisance, LG introduced to list a number of relatively inexpensive LCD TV also equipped with an autonomous ultrasound system, which keeps...
View ArticleFunker W6.0 Pro 2, the new midrange Windows 10 Mobile with Continuum support
Funker W6.0 enriches the offer of 10 Windows Mobile smartphone with support for Continuum mode. A mid-range product, based on the Snapdragon processor 617. The selection of terminals based on Windows...
View ArticleHack the Pentagon, bug hunt with a reward for the US Department of Defense
The Department of Defense expands Hack the Pentagon program that allows the public to find and report bugs and vulnerabilities behind a monetary reward The Department of Defense United States of...
View ArticleTencent buys Clash of Clans
The Finnish software house Supercell, a leader in mobile computing, is now the property of the Chinese Tencent. After weeks of rumors, the acquisition of Supercell by Tencent’s official. Chinese gaming...
View ArticleWindows 10 Mobile starts to support electronic payments via NFC (US only)
Microsoft introduces support electronic payments via NFC by releasing an updated version of Microsoft Wallet for Windows Insider users using build 14360 (and higher). The new feature is currently...
View ArticleGalaxy Note 7: name and part of the specification confirmed by Evleaks
New rumors about the new Samsung phablet home from the always active Evleaks confirming the model name and part of the specification, including, among others, display 5.7 “QHD, iris scanners, 12...
View ArticleA new malware is spreading on Facebook via Google Chrome
Sources report the spread of a new malware via the Chrome and Facebook notifications system. What appears to be notified instead it leads to the infected file downloads It’s not news that hackers and...
View ArticleSSH Protocol
SSH (Secure shell ) is a UNIX based command line and protocol for remotely connecting to the machines in a secure way. Authentication process it is validated via a digital certificate from both sides....
View ArticleThe Origins of Telecommunications
Telecommunications means remote transmission of information. At the dawn of human civilization, to communicate was used smoke signals, the mirrors that reflected the sun’s rays, then the couriers on...
View ArticleThe diode as rectifier
An electronic component from the very peculiar behavior is the diode. We have seen that applying a certain voltage to a resistor, the current through it corresponds to the ratio between the applied...
View ArticleThe zener diode
On the “The diode as rectifier” there has been a talk of the inversely polarized diode behavior; it is seen that, by applying a positive voltage to the cathode than the anode, a current flows only very...
View Article