Showing posts with label exclusive. Show all posts
Showing posts with label exclusive. Show all posts
Amazon: Jeff Bezos was hacked on WhatsApp by Saudi Arabia Prince

Amazon: Jeff Bezos was hacked on WhatsApp by Saudi Arabia Prince

Jeff Bezos, Amazon CEO and the world's richest man, had his WhatsApp account hacked. According to the British newspaper The Guardian, the Prince of Saudi Arabia used a stolen video file, transmitted during a conversation with the billionaire, to access the account. Many personal and professional data would have been stolen.



This is a totally incredible story. Jeff Bezos, CEO of Amazon and the world's richest man with $ 115 billion in his pocket, had his WhatsApp account hacked. And not by anyone. As the Guardian newspaper reported in a punched investigation, Prince of Saudi Arabia Mohammend Ben Salmane is believed to be directly involved in the operation.

The case dates from May 2018. Jeff Bezos and the Prince of Saudi Arabia converse amicably on the instant messaging application. The two men met a few weeks earlier on his majesty's trip to Los Angeles. During their exchanges, the prince sends a video to Jeff Bezos in which was hidden malware. According to The Guardian, computer experts hired by the businessman were able to trace the hacking trail, to Mohammed Ben Salmane's laptop.

When the video file was opened, the malware was able to get onto Jeff Bezos' laptop and steal a large amount of personal and professional data, without going into the exact details. What happened to this data and how was it used? It remains a mystery, for the moment.

Murder, sex and blackmail

Jeff Bezos does not suspect that his cell phone has been hacked. Meanwhile, a pro-Trump newspaper, the National Enquirer, posts intimate texts from Amazon boss and his lover. What will earn him a very expensive divorce with his wife Mckenzie Bezos. The billionaire then decides to launch an investigation to understand how the tabloid could end up in possession of such information. This is how Saudi piracy was discovered.

It’s at this very moment that the affair takes on the appearance of spy films. In summary, the National Enquirer, President Donald Trump and Saudi Arabia were collaborating in a vast blackmail operation targeting the CEO of Amazon. It is common knowledge that Donald Trump and his son have had excellent relationships with the Saudi royal family, remnants of their careers in international trade. So why Jeff Bezos in particular? Because the business man is none other than the owner of The Washington Post newspaper.

A prestigious newspaper for which worked Adnan Khashoggi, journalist brutally murdered in obscure circumstances in Saudi Arabia. Following the murder, the Post's editors mobilized to uncover the truth and repeatedly highlighted the alleged Saudi government responsibility for the assassination.

In fact, for Andrew Miller, expert on Middle East issues and national security adviser to the Obama administration, this hacking was only intended to put pressure on Jeff Bezos, so that he ordered journalists to the Washington Post to stop their investigation. After the Guardian article appeared, Saudi Arabia responded quickly.

"Recent media reports suggesting that the Kingdom is behind a hacking of Mr. Jeff Bezos' phone are preposterous. We request an investigation into these allegations so that we can know all the facts, "said the Saudi Embassy in the United States on its official Twitter account.





Source : The Guardian








Windows 10 19H1: Can not Install May Update When a USB Key Is Plugged

Windows 10 19H1: Can not Install May Update When a USB Key Is Plugged

"This computer can not be updated." Many users may encounter this error message when trying to install Windows 10 19H1, the operating system update expected for the month of May 2019. In a bulletin published on a support page, Microsoft explains that this message could be displayed on many computers due to a bug. The only solution is to unplug all external storage devices.
 Windows 10 USB Key
 With a little delay, the 19H1 update of Windows 10 will finally begin to be deployed in May. But before, Microsoft warns users of the existence of a bug that could prevent them from installing the new version of the OS. Many members of the Insiders program have complained about this problem when installing a system preview. They ended up with the message "This computer can not be updated".
 

Windows 10: the May 2019 update has a problem with USB sticks


External storage devices are causing this problem. Microsoft explains that for most computers, users will need to remove all USB keys, SD card or external hard drives before being able to install the update. And for good reason, a bug in the assignment of letters to the discs forces the firm to display this error message in case a computer is at risk.

Are concerned, the computers trying to pass from one of the updates of 2018 (April or October) to the update Windows 10 19H1 of May 2019. The problem that arises exactly is the following: suppose that the partition main door letter C and a USB key letter D. These assignments could be reversed during the update due to a bug.

To avoid this situation, Microsoft has decided to display an error message when the computer is at risk. In case you encounter this problem, you should unplug the external supports. But the Redmond firm says that internal hard drives could also cause the same concern. A patch is under preparation and will be deployed in a future update.

Recover hidden files by viruses using this Un-Hider program

Since the advent of massive amounts of computers, we have also been dealing with viruses and malicious codes to the extent of diversification. Nowadays, there are already all sorts of malicious codes, capable of carrying out any action to affect the functioning of the system. However, even today there is still something very common, and very annoying which has been ignored by anti-virus and is a virus hiding files.
 Recover hidden files by viruses using this Un-Hider program
Although some viruses of this kind are harmless, the first impression when you run the device and not see your saved files is a disaster. However, you can solve this problem using the Un-Hider program.


Different forms of this virus are different, able to take your files and change their attributes to "hidden", so that when connected, we will not be able to see any file. This virus is really harmless and will not damage files, but it can quickly replicate between computers, so it's best to eliminate it from the root.

There are many ways to solve this problem without using additional software, and Un-Hider is responsible for eliminating malicious software from its roots. To use it, just download and run it, because it is a portable program.
  
After that, you will be asked to select the volume. Then click "Un-Hide", it will only take seconds before the computer application leaves the infection free. You can repeat the process with all your storage partitions on your device.
 
To understand the program see the following video

A great program to create animations videos

You must one day search for a video tutorial about a subject and surprised by the wonderful video because it contains animation is a graphic sketches nicely drawn and beautiful and no doubt you wanted to make such videos but you do not understand little About animation and drawing, but today with this program you will be able to create wonderful animation videos in a short time.
A great program to create animations videos,videoscribe,videoscribe app
The program is not free of course, but the good is that it gives you a trial period of seven days to experiment, all you have to do is access to the site and registration, the process is simple Just enter your email and password and you are finished, after the site takes you to the download page.
After downloading and installing the program you will see an interface to enter your account information, and finally you have completed access to the interface of the program which is as follows:
 A great program to create animations videos,videoscribe,videoscribe app
As you can see in the picture a small animation video you can start editing it or create a new video in your own way. One of the advantages of this program is that you can attach any audio file with the video or recording your voice in sync with the video and it contains a library of large animated images such as personalities, houses, trees, emoji and many, many other things.
Download and download link: videoscribe


Beware of applying this famous weather because it sells your data and hurry up to delete it

If you're a person who likes to be familiar with everyday weather conditions, it's very likely that you've downloaded the Weather Channel application
  Your smartphone is one of the most popular and successful applications.
However, it is clear that not everything glows gold, because it is a very good application, but the dark side is that it steals data from its users and then sells it to other companies with advertising purposes.


Beware of applying this famous weather because it sells your data and hurry up to delete it

It may not seem to be a serious issue, but if you consider it to be reported to users from the start, it turns out that it may also do other terrible things. For this reason, the Los Angeles attorney general sued IBM, the company that owns the application.

Beware of applying this famous weather because it sells your data and hurry up to delete it 

 The lawsuit case was filed simply, for years the company lied to people by not allowing them to know that their information would be used and exploited for purely commercial purposes.
According to the lawyer who has been assigned the case, the application is expected to pay $ 2,500 per violation, which means that in the end you will have to pay a very large sum.




















 

A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

Sometimes, when we do something, we have to stop suddenly and turn off the computer for more important reasons, but this is really annoying because when you restart the machine, you have to restart all the programs you use, Again, if you're working on editing a video and I wanted to extract it and found that it would take a long time and then I had to turn off the device, then when you reboot you will have to re-wait for that long time from the beginning, and this is what we all hate, so in the post Today I will try to give you a simple technique that will enable you to keep a For running programs even though the computer is turned off permanently, so you will be able to resume work when you reboot without any problems, so continue with us.

 A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

 1. Turn immediately to the command wave

 A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

 2. Type the shutdown / h command

A great trick to turn off the computer while keeping the programs and tasks you left running, will enable you to resume work better when you restart

3. Press enter and this will turn off the computer and you will notice that when you reboot all the programs you left are running and still are the same.

 
















What is the most demanding area in the job market today and get paid courses in this field for free

In the past years, many people believed that the Internet was only a passing technological technology and it was never possible to predict the success of the latter. Simply, the Internet became a second world in which we live next to the real world, where everything has become Digital Even money and currencies are becoming more digital than they are digital. This is the case with some of the areas we recognize today, such as artificial intelligence, huge data and many other areas that will in the future become one of the most successful fields in the job market.

What is the most demanding area in the job market today and get paid courses in this field for free

The field of artificial intelligence is one of the scientific developments that has been able to add itself in all fields of various kinds and has also helped in the development of many technological companies and among the known fields Is also a large data area or what is called in English Big Data, which is simply a collection of large databases difficult to be analyzed and processed through the use of tools known and used so a set of modern techniques to address the rules of This data is accurate.
The reason for my participation in this post is not to check the fields and know how it works, but to share the best paid courses only, which you can download for free and without payment of any amount of money.




Top 3 cpa sites to start a free online business + a very successful strategy

CPA is one of the most powerful areas of profitability on the Internet, as many freelancers rely on this area in the profit of hundreds, if not transfer thousands of dollars per month without any trouble and without any experience, as it depends only on your ability to persuade people to complete the tasks Such as registering on a site, downloading an application and other things that earn a profit rate for each individual you bring to complete the task. You can simply adopt the foreign Facebook packages (especially the American) interested in a particular niche, preferably this niche is far from the field of informatics, And movies, for example, and then you search for a show from a m Cpa texts corresponding to the same idea of the group, for example a presentation by people to enter their mail to get a book about the secrets of cooking, or for example download an application that can follow the new sports or movies, and then short link to this presentation using bit.ly and posted on the group , Since Facebook automatically monitors and deletes a cpa link, so it should be abbreviated first using a non-profit link service.

Top 3 cpa sites to start a free online business + a very successful strategy
At this point, you will be able to achieve at least a few dozen dollars a month in the worst case, because many people will complete the task, especially as the foreign teams know a great interaction. As for the best cpa platforms to start the task, we chose 3 sites we have adopted many criteria in the selection For example, because there are other platforms giant and more professional, such as maxbounty, but it is very difficult to accept them if they are not from America or Europe.
 cpalead

 2 - crack revenue platform

crakrevenue
 
adworkmedia

You can now choose one of these platforms and start working from this moment. In my view, adworkmedia remains the best option due to the many characteristics that distinguish it from other platforms, such as simplicity of interface and ease of use, in addition to the multiplicity of offers for which the responsible people pay very respectable sums. Do not waste time and start a new adventure in the field of cpa on one of these platforms.



The best site to design a professional video cover for your Facebook page in seconds

All Facebook users are always looking for a cover for their personal page because it reflects your page, which is the first thing anyone who visits your page on Facebook has recently launched a new feature that is the possibility of placing a video in the cover of any page on Facebook. For this reason it is important that the image creates the best possible impression, and moves the object that aims to deliver it exactly.

The best site to design a professional video cover for your Facebook page in seconds

If you want to make a professional video of your page on Facebook and you do not have any knowledge of the design, you are here in the right place. Today we will know how to create a video for your page or your Facebook account based on this website that allows you to design professional video For Facebook as well as writing ability

The best site to design a professional video cover for your Facebook page in seconds

 All you have to do is enter the site and go down as shown in the picture and then you will be surprised by the presence of Facebook ready for this site, so you can easily modify the cover and change the words in the cover you chose and write the texts you want to appear In the cover of your page and with the knowledge that all of these images are available for use and do not have the copyright and thus you become a Free Facebook cover

 The best site to design a professional video cover for your Facebook page in seconds

 A great site for designing your personal cover photo easily. You can create a cover for your Facebook page for free and online with great templates and effects according to your choice or the content of your page.







Computer science and computer engineering


What is the difference between computer science and computer engineering? We must all think about this at least once in our lives. If you are still not answered or have no clear idea, continue reading to find more details. The ultimate goal for both areas is to make advances in technology and make life easier, both through software upgrades or hardware innovations. So, first of all, let's look at the definitions of either.
 Computer science,computer engineering

Computer Engineering or Computer Engineering (CE) is a combination of electrical engineering and computer science. It deals primarily with computing in all forms, from microprocessors to embedded computing devices to laptop and desktop systems to supercomputers.

On the other hand, Computer Science or Computer Science (CS) is a study of how data is processed, stored, and reported by computers.

In simple terms, CE deals with computers while CS deals with software / software in computers. Now that we have laid out the basics, let us look at how they differ at the university / college level from the perspective of career choices.

Based on what we choose as our area of study, whether CE or CS; both have shared courses and different courses / options at the university. All courses begin with the basics of programming. For example, everyone passes C / C ++ / JAVA / HTML / DBMS basics. Then, based on their field, they branch out to topics that deal primarily with their domain directly.

Computer engineers begin by learning more deeply and more specifically about computer architecture, mainly the CPU and other components involved. They also take half the classes that electrical engineers take, such as introduction to electronics, ring analysis, digital electronics, embedded systems and many more.

On the other hand, computer scientists focus mainly on the design and analysis of algorithms, programming and mathematics to solve some of the famous algorithms and improve the efficiency of their symbols while reducing the time taken to solve a problem.

But eventually CE and CS go hand-in-hand to solve everyday problems effectively and efficiently.


6 consumer devices used in your home can hacker penetrate

Smartphones, home automation systems and virtual personal assistants can make life easier for all of us, but everything has its price and challenges. The biggest concerns in this area are piracy, yes piracy and hacking are the biggest threat to devices and the new life system based on Internet-related technology devices permanent.

6 consumer devices used in your home can hacker penetrate

Breakthrough now not only threatens computers and smart phones, but a set of technologies and devices that you use in your home can be vulnerable to penetration. In this post we will identify the six consumer devices used in your home can hacker penetrate.


1. Refrigerators

 Refrigerators

 Home refrigerators are simply cooled food and drinks, but smart refrigerators have been developed and incorporated into tablet PCs to allow you to view calendar, play music, watch videos and even make purchases online. Future smart refrigerators can also identify the food and drinks inside, and automatically alert you to the need to buy missing items. These functions can make everyday life a little easier, but you have to be very careful with such devices.

A digital security company discovered that two weeks ago, between 23 December 2013 and 6 January 2014, cybercriminals hacked 100,000 smart home appliances, including refrigerators. They even used the Internet connection of these refrigerators to send malicious messages to others!

2. LEDs


 LEDs

 Hackers can connect to various devices connected to the Internet and this is something known. But smart lights are particularly vulnerable to piracy, as researchers from Israel and Canada discovered last year. Hackers may be able to remotely control these bulbs remotely, such as turning them on or off, and changing the light level.

3. Printers


 Printers

 Just like computers and smart phones, some printers come with Wi-Fi connectivity, which makes them a victim of hackers. After hackers can break through the printer, they can see what is being printed on the device, and the computer with which the printer is connected may be attacked. In February 2017, a hacker wrote automated text to manage more than 160,000 printers connected to the Internet without a firewall. Although he can print threatening messages or steal confidential data from these printers, he only prints the messages shown in the following picture:



4. Games



Some toy companies, which produce smart dolls equipped with sensors that transmit all kinds of data, from sound recordings to all vital indicators of the child. Earlier this year, pirates had access to 800,000 client accounts using such games, which could threaten the confidentiality of sound records stored in their system.

5. GPS device


GPS device

Regardless of whether is an independent device or built-in car, GPS can greatly reduce the time of the person when traveling. But hackers can penetrate the GPS on the phone or in the car to track the owner's location, send a person to a dangerous place or even cause an accident. Using a GPS simulator, hackers can also rig coordinates to change location data.

6. Cars


jeep car

In 2015, two security researchers were able to penetrate and control the Jeep, while Charlie Miller and Chris Falasik managed to control the radio, windshield wipers and air conditioning in the car. Furthermore, the researchers also managed to change the car's speed, brake and track movement with the GPS.













 



Sunway Taihulight: Fastest computer in the world that entered the Guinness World Records Book

The China-US dispute over the technology market has been drastically undermined in many markets and sectors, and the Asian nation has already demonstrated its strength in many technological fields against a competitor on the other side of the world - the United States.

Fastest computer in the world

China has overtaken the United States in the field of supercomputers or supercomputers, which are large devices that process and analyze large amounts of data and mathematical equations, and accomplish in a second what other computers need to accomplish in millions of years.

 
 From 2017, China has the majority of most supercomputers on the list of the world's top 500 computers. And
China now has 202 supernatural computers, compared to 143 for the United States, while Japan has 35, Germany 20, France 18, and 15 United Kingdom.


 Guiness World Records

 The Chinese computer "sunway taihulight" leads the list of the fastest supercomputers in the world and is located in the National Center for computers in the city of Wuxi, and another computer from the same country ranked second. Between the fastest US computer ranked fifth after the computer of Japan and Switzerland.



 What does this mean ?
 
This superiority and rapid transformation of China shows that the Asian country continues to invest heavily in supercomputers, capable of working efficiently in various scientific fields, from astronomy to the military, to weather forecasting. Most importantly, these computers are Chinese-made, which confirms that China is trying to rely on itself in the manufacture of supercomputers and the dependence of dependence on the United States of America.















Android: a security vulnerability allows to spy on you since 2013

Android: a security vulnerability allows to spy on you since 2013

Android is the victim of a serious security breach. With this breach, an attacker can easily install malware on your smartphone to collect your personal data, including your browsing history. All versions of Android, from Kit Kat (released in 2013), are affected.

Android security vulnerability allows spy since 2013     
 "A flaw allows attackers to access sensitive information from all Android devices, including web browser history, messages and banking application data," said Sergey Toshin, cybersecurity researcher at Positive Technologies. Only users of a web browser that uses the Chromium rendering engine, such as Chrome or Samsung Internet, are affected.
 

A serious security vulnerability has been identified on Android: Google deploys a patch


According to the researcher, the flaw is in the WebView component, which is preinstalled on your smartphone. It is basically used for displaying web pages in Android apps. By exploiting this vulnerability, an attacker can easily hide malware or malicious applications in your device. "The WebView component is used in most Android applications, making these attacks extremely dangerous," says the expert.
 Once this is done, the hacker will be able to siphon "information from WebView from other applications", which includes the history of your web browser or your login credentials online, Facebook or Twitter for example. According to Sergey Toshin, there is no evidence that the flaw was used by a pirate to launch an attack.

Fortunately, Google has fixed the flaw with the release of Chrome 72 last January. "Since Android 7.0, WebView is implemented via Google Chrome and, therefore, updating the browser is enough to correct the problem," says the researcher. We invite you to update your browser without further hearing. For users of an earlier version of Android Nougat, update WebView without delay by going to the Google Play Store.














Amazon laid the foundation stone for its Cincinnati airport project

Amazon laid the foundation stone for its Cincinnati airport project

Jeff Bezos was on hand Tuesday to officially launch the work of this terminal to become a relay point for Prime Air. Estimated at $ 1.5 billion, the project will be delivered in 2021, and must allow Amazon to honor its promise to deliver its premium subscribers in one day.
 
amazon airport project
 
Jeff Bezos rolled up his sleeves. On the occasion of the inauguration of the airport hub project launched by Amazon in Cincinnati, the richest man on the planet donned a hard hat and set up an excavator to start the work.

In the pipes since 2017, this terminal estimated at 1.5 billion dollars must see the light of day by 2021. According to Associated Press, the giant of the e-commerce signed two years ago a lease of a duration of 50 years with airport managers, for an area equivalent to 360 hectares.
 
What to deploy 24 parking spaces for the cargo aircraft of the Prime Air division of the group. Eventually, Amazon intends to ship 32 of its aircraft, for a total of 64 daily flights. Cincinnati, an unfortunate candidate at the reception of the new headquarters of the group, also finds its account in the operation. The Seattle giant is committed to creating 2,000 jobs in a region where it is already well established.
 

Halve delivery times


Since it has not yet been able to launch its drones deliverers of packages in the sky, Amazon currently operates a fleet of 40 aircraft in the American sky. The group announced last December want to add 10 aircraft for its Prime Air division; it is expected to open another airport terminal in 2019, near Fort Worth, Texas. Objective: to be able to keep promises of delivery time, especially with its premium subscribers.
 
In February, the group promised its premium subscribers delivery in one day (instead of two currently). "This hub (at CVG) will allow us to deliver parcels to customers more quickly. It's a big investment. We are going to upgrade the Prime deliveries from two days to one day, and this center will help us achieve this, "said Jeff Bezos on the sidelines of the inauguration.

The delivery service is a cornerstone of the group's business model. In 2018 alone, shipping costs reached $ 27.5 billion, or nearly 16 percent of Amazon's online sales.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Abolish Internet neutrality in the United States, What it mean?

The United States decided to abolish so simply, but what is meant by the neutrality of the Internet? How will it affect the freedom of the intended Internet in the United States and the world?

 Abolish Internet neutrality

 Internet neutrality means that Internet providers and governments must treat all users in one form without distinction of any kind, content, location, application, platform, tools used or method of communication.

Internet neutrality is not born today, but dates back to 2015 under President Barack Obama, when a set of laws that define the behavior of Internet service providers, on the basis of which Internet services are treated as utilities or public services subject to regulatory laws. Which obliges Internet companies to deal with all digital content with complete impartiality, without preferring a service or website to another.


 Don't let corps control free speech

 The principle of Internet neutrality In short, Internet service providers are not allowed to add to their consumers more financial costs for quick access, for example, to YouTube, Netflix or any other site, meaning that the site is faster for those who pay more. This principle also deters these companies from imposing restrictions on certain sites on a particular type of content.

The decision by the US Federal Communications Commission on Thursday to kill the rules of net neutrality, which provides for equal access across the Internet for all types of content, is likely to lead companies to be able to control what users can access.





Of course the cancellation of the principle will undoubtedly have serious repercussions both on the cost of communication with the user as well as competition between sites, as well as freedom of expression and political views, as we know freedom from the advantages of the Internet as anyone can record video or create a site criticizing anything even the head of state, Or giving opinions on various issues that have returned to you the opportunity to speak in official channels. Abolishing the principle of Internet neutrality means that companies can suppress your voice by blocking or slowing news sites for any reason.


The abolition of Internet neutrality may take months before it becomes effective, and then it is expected that American companies will raise the balance and members of lawsuits against this decision in the United States. But if all these efforts failed and the decision was implemented, be sure dear Arab that the Arab countries will be The following countries that would strongly like to adopt the same or more repressive law.

















Thiscloseit site to publish your secrets anonymously

All people have lifelong experiences that generate pleasant and bad memories, some prefer to forget them, because they hide behind them without knowing friends or relatives.

 Thiscloseit site to publish your secrets anonymously

 There are websites that offer the opportunity to inform people of all these experiences anonymously in order to share a secret or curious position with other users around the world. Sometimes disclosing what is inside you helps you to take a deep breath, but this time anonymously, so you will learn In this post on the most common sites you can list and read the secrets of people also online.

Thiscloseit

On this page, you can post 400 characters to your past and keep private with yourself and share them online with other users who belong to this site.
Just type in the password and press the "Submit" button to publish it on the page and make it easy to read on the user, as well as access to the latest secrets of people in the case of browsing.


Is the perfect page for spreading secrets and reading for other people. For this purpose, you can vent all those special situations that you have not had the courage to share with anyone in your environment.
You can type your password out of 420 characters, also indicating your age and type as it will accompany the publication that will be displayed as soon as it is rated by other users, annotated, or shared on social networks.