Epson Adjustment Program (Software Resetter for Epson Printer)

Love is like sunshine. It brings a golden glow to its beholder’s face. And a warm feeling all over their body. It awakens souls and opens eyes. And when its over, it leaves billions of small memories called stars. To remind the world, that it still exists.

[to my love – rahmat]

————————–

*******************

Epson Adjustment Program (Software Resetter for Epson Printer)

These softwares works only for TX720WD & TX700WD Epson printers.

[wpdm_file id=32]

 

The Xbox One Tunes In On TV

Hardcore gamers are up in arms, but Xbox One will be a hit with casual gamers and even non-gamers.

When the Xbox One was unveiled this week, Microsoft made it abundantly clear that this was not the Xbox we were used to.  The original Xbox, and even the Xbox 360, were designed to be primarily, if not exclusively, game platforms. The Xbox One is designed to offer a connected, living-room entertainment experience. The Xbox 360 now serves as the primary streaming video device for many gamers, whether it’s on Netflix or HBO Go. Microsoft wants to keep those streams going and also control the hours people spend watching live TV. The Xbox One won’t just be for gamers; it will be for anyone that wants a state-of-the-art entertainment experience. There is a lot in the Xbox One that is annoying to gamers, but there is even more that mainstream users will love.

One thing to remember is that the Xbox one is still five, maybe even six months away from shipping. Although the hardware and overall functionality won’t change much, there are a lot of little details that could change before then. And it is a lot of these details that are most concerning to gamers.

A lot has been written about always-on. At this point, it seems like you will be able to play single-player games without an active connection to the Internet. However, you must have an Internet connection in order to set up the Xbox One. You must regularly connect to the Internet to authenticate your account; one executive suggested this connection may be required daily. Clearly, an Internet connection isn’t exactly optional. More concerning is the idea that used or traded games will only run if you pay an additional fee to Microsoft.

Source: PCMAG

Google Considering ‘Wireless Balloons’ to Deliver Internet to Countries

Google’s news about its ambitious plans to build wireless networks in “emerging markets” like Africa and Asia isn’t nearly as interesting as how the company might ultimately end up deploying Wi-Fi to these areas – not via conventional cable-stringing but, rather, by balloons.

While Google appears to be planning a fleet of CPUs and Android phones to connect its wireless networks together – over airwaves commonly used for television broadcasts, reports the Wall Street Journal – the company is also allegedly planning a few more esoteric methods for getting wireless access up-and-running in areas previously underserved.

Among these methods includes satellite Internet and the aforementioned “balloons” plan, which would use “high-altitude platforms” to blast a wireless signal across an area spanning hundreds of square miles.

In other words, these aren’t just conventional Wi-Fi routers strapped to weather balloons. They would also use frequencies different than those used for television broadcasts – an area that the company would need to get a governmental blessing from in order to fully deploy, given the regulations involved.

As for why Google’s planning to invest such a great deal of hardware and engineering think into underdeveloped areas, the Wall Street Journal postulates that Google’s simply interested in connecting more users into the Googlesphere of apps and devices. Doing so, in turn, helps add to Google’s considerable success in Web advertising. With more than half the globe not even connected to the Web, even gaining a small sliver in this ignored population would give Google a healthy new base to draw from – a critical note, given that the company pulls most of its annual revenue from its advertising.

The move would also allow Google to get to this new population first before other carriers descend en masse. With numerous cable companies and wireless carriers in the U.S. and Europe crying foul that Google benefits from running “over the top” apps and services their networks with little benefit to the carriers themselves, Google’s first-to-market wireless service in these underdeveloped areas would allow the company to get out ahead of its “competition” and circumvent their ability to prevent Google from effectively serving new audiences.

Google’s ambitions are comparable to its launch of “Free Zone” in fall of 2012. This service allows users in the Philippines, Indonesia, and South Africa to use Google services and click through to search results without incurring any data charges on their phones. If users continue to surf the Web beyond the results of their searches, however, data costs apply.

Source: PCMAG

Iranian Cyber-Attackers Target US Energy Companies

Cyber-attackers backed by the Iranian government have breached and infiltrated several US-based energy companies in an ongoing campaign, according to the Wall Street Journal.

Iranian cyber-attackers launched a series of infiltration and surveillance missions against energy companies in the United States, and successfully accessed control-system software they could have used to manipulate oil or gas pipelines, the Wall Street Journal reported Thursday. The attackers have collected information on the control systems and “acquired the means” to disrupt or destroy these systems in the future, current and former officials said, according to the report.

They got “far enough to worry people,” a former official told the Journal.

The attackers appear to be focusing on oil and gas companies, but it’s not clear at this point which companies have been infiltrated, or how many. The Journal also did not say how long these campaigns have been in progress.

But the U.S. has “technical evidence” directly linking the hacking of energy companies to Iran, the Journal reported.

Adversaries Other Than China
It’s no surprise that attacks against critical infrastructure have been escalating, Ken Silva, senior vice president of cybersecurity at ManTech International told SecurityWatch. The stakes are much higher, and attack methods are evolving rapidly, he said.

“Nation-state attackers in China, Iran, Russia and South American countries are becoming more brazen and their attacks more complex, involving elaborate plans to steal intellectual property and money,” Silva said.

Unlike the recent reports of attackers from China targeting US companies to steal intellectual property, the Iranians appear to be more interested in disrupting operations and outright sabotage. “Unlike many other nation-sponsored attacks, the purpose is disruption versus IP theft or espionage,” Darien Kindlund, manager of threat intelligence from FireEye, told SecurityWatch.

“To single out the Chinese when it comes to nation-sponsored attacks is a mistake,” Kindlund said, noting that attacks originating from the Middle East are generally “noteworthy for their sophisticated methods of infection and evasion.”

Iranian Response: Not Us
“Although Iran has been repeatedly the target of state-sponsored cyberattacks, attempting to target Iran’s civilian nuclear facilities, power grids, oil terminals and other industrial sectors, Iran has not ever retaliated against those illegal cyberattacks,” Alireza Miryousefi, Iran’s spokesman at the United Nations, told the Journal. “We categorically reject these baseless allegations used only to divert attentions,” he said. 

Cyber security  was an “international issue” that needed the “collective efforts” of all the countries to reach comprehensive international agreement similar to the ones currently in place for nuclear, biologic and chemical weapons, said Miryousefi,  according to Iranian online news site Payanz.

Defending Critical Infrastructure
Most people don’t realize just how interconnected industrial control systems such as those used to control oil and gas pipelines are interconnected with the Internet, said Tom Cross, director of security research at Lancope. The systems are also highly vulnerable because security flaws are unlikely to be fixed right away. The systems aren’t designed to be patched or restarted after installing a patch.

Cyber-security experts have sounded the alarm for years, and President Obama’s executive order on cyber security is a step in the right direction, said Chris Petersen, CTO of LogRhythm. “However, as today’s reports tell, we may be running short on time,” Petersen said.

There is a “fine line” between regulation and voluntary standards, said Lila Kee, GlobalSign’s chief product and marketing officer. Regulations cannot be so rigid that it can’t evolve with the threats, and voluntary standards can’t be so lax that they are worthless. Kee believes an industry-government model where standards “are developed by those who understand the exact challenges of this industry” is more likely to be accepted by individual companies, she said.

Source: PCMAG

Malware, Adware in This Week’s Dangerous Android Apps

Bad Android apps can take many forms. Whether they are out to steal data, sign you up for premium rate SMS services, or pushing dodgy and malicious links via advertiser networks, users need to beware. SecurityWatch is partnering with a handful of security companies who monitor apps on Google Play and third-party marketplaces to identify malicious apps you should avoid.

If you happen to already have it, immediately remove the apps from your Android device and check your bill for unexplained charges.

Theoretically, malware can target any mobile platform. There are Zeus-in-the-mobile variants targeting BlackBerry devices, Java exploits targeting Symbian phones, and the occasional proof-of-concept going after iOS devices. But for the most part, when anyone talks about dangerous mobile apps, they mean Android apps.

For this week’s list (Memorial Day edition) we have three apps Appthority found on third-party Websites and a bonus app BitDefender flagged on Google Play for using aggressive ad networks.

[1] Fake Google Play Installer
Appthority found Fake Google Play Installer on a third-party Website that had “Google” in its domain name. Part of BadBadPiggies and Android.FakeInstaller malware families, this bad app targets European and Russian users.

When the app is running, it displays a fake progress bar that doesn’t do anything and sends text messages to premium rate numbers in the background. The app sends statistics, such as the mobile device identifiers and the number of premium rate SMS messages it has sent, over to a Google account “Android Cloud to Device Messaging.”

[2]  Zoukmobile Top Music
Zoukomobile Top Music is one of the several fake apps Appthority found on a third-party platform. When the app is running, it displays a list of popular artists, such as David Guetta, along with songs that users can listen to. The app uses the SMS subscription service “Zoukmobile” (a reference to wireless application service and SMS subscription provider in Malaysia) to charge users around $4 a week for streaming music.

The app actually has a terms of service agreement where it explains that users will be charged a fee for the streaming service. “The app is using commercial music that likely was downloaded illegally and charging an absurd amount, giving it a malware rating from us,” Appthority said.

[3] Fake Tank
Appthroity found Android.OpFake malware inside Fake Tank, which was distributed through another Website. When the app runs, the user sees a form pointing to another Website that Website informs you—via a terms of service page—that you are being signed up for a premium SMS subscription service while the app is sending messages.

[4] Fart Sounds Machine Version 2.2|10
BitDefender found Fart Sounds Machine, version 2.2 on Google Play. The app has a four star rating and has been downloaded between 500,000 to a million times. This app uploads the device’s unique id to static.leadbolt.net and AirPush—an aggressive ad network. The app also uploads your phone number, location, and email address to AirPush. AirPush is known for displaying ads in the notification area and advertisement icons on the user’s Home screen.

Source: PCMAG

Missing LOGSTYLE Config Line in /etc/wwwacct.conf

Hello,

If you are getting “Missing LOGSTYLE Config Line in /etc/wwwacct.conf” error while creating the account from WHM >> Create a new account then the file /etc/wwwacct.conf is not configured properly.

Make sure that you have WHM > Basic Setup > Apache Access Log Style > set to combined

That will solve your problem. Just try to create the account now.
Enjoy..

Make sure that you have WHM > Basic Setup > Apache Access Log Style > set to combined

Windows7 will not let me edit the hosts file and save it

It’s a built-in safety feature.  There is an easy workaround.  ClickStart ->All Programs -> Accessories.  Right-clickNotepad, and then click Run as administrator.  If you are prompted for an administrator password or for a confirmation, type the password, or clickAllow or Yes.

Open the Hosts file (from the notepad you just opened) , make your changes, and then click File ->Save.

 

Enjoy

MASROR.COM

Windows 7 – Edit the Hosts File

Need to figure out how to edit the Hosts file in Windows 7? For the most part, it’s pretty much the same as Windows XP and Vista, but with a few extra hiccups!

Just if case you don’t know, the Hosts file is where you can manually enter a hostname and an IP address pair, thereby bypassing the DNS server. This can be pretty useful in certain situation, especially for anyone in IT.

The path to the Hosts file in Windows 7 is the same as usual:

%systemroot%system32driversetc

where %systemroot% is usually c:windows unless you installed Windows on a different partition. By default, you cannot see these hidden folders since they are system folders.

To show hidden folders in Windows 7, press the ALT key while in Explorer to bring up the File menu. Click on Tools and thenFolder Options.

hosts file windows 7

Click on the View tab and then click on the Show hidden files, folders, and drives radio button under Hidden files and folders.

show hidden files windows 7

Now navigate to the directory above and open the hosts file and make your changes.

edit hosts file

Note that this method for editing the Hosts file will not work. You will get a message saying you do not have permission to save in this location.

windows 7 hosts file

In order to edit it, you have to click on Start, type in Notepad and then right-click on Notepad and choose Run as Administrator.

run as administrator

Now navigate to the drivers/etc folder again and make sure to choose All files for File Types otherwise you won’t see the Hosts file.

view all files

Make your changes to the Hosts file and click File and Save to save all changes. Now you will not get the error about not being able to modify the Hosts file. Enjoy!

Terrafugia TF-X: The vertical take-off flying car

Terrafugia, the Woburn, MA, company developing the Transition flying car, has plans for a vertical take-off and landing (VTOL) sibling. The proposed Terrafugia TF-X would be a tilt-rotor flying machine that would take off and land like a helicopter. Instead of a runway, the TF-X could use a helipad or parking lot. That’s important because Terrafugia’s devices aren’t so much flying cars as roadable aircraft that take you from the airport to your destination a few miles away. The closer you land to your destination, the better. Don’t sell your Cessna 400 just yet. The TF-X is a decade away and will likely cost on the high side of a half-million dollars. Maybe a million.

The Terrafugia TF-X is a small fuselage with four road wheels on the bottom, along with stubby wings with electrically driven rotors that point vertically for liftoff, then rotate horizontally for level flight. The transition from vertical to horizontal flight is tricky in a VTOL plane. Terrafugia says the TF-X electronics manage that, as well as the rest of the flight. In other words, the pilot decides when to lift off — and how high — before starting to fly horizontally, and the plane actually manages those orders. That’s not unusual; some military aircraft wouldn’t fly without computers controlling stability.

Propulsion appears to be a gas turbine for horizontal flight and hybrid electric for ground travel. For liftoff and landing, the rotors would be turned electrically via a generator and battery storage, as would the road wheels.

Same concept as the Osprey tilt-wing

The TF-X  appears to work much like the Marine Corps V-22 Osprey, which is good news because the technology now works, the defense department says, and bad news because early Ospreys crashed a lot and the project ran over budget. Thirty years after the concept Osprey project kicked off, the Marine Corps now says its fleet has half the accident rate of other Marine aircraft. (The Marines have most of the 140 or so Ospreys deployed.) The Osprey carries 24-32 soldiers at a cost of about $70 million, about twice as much as the cost of a helicopter with the same payload.

The Terrafugia TF-X has been described as a nearly vertical take-off and landing aircraft, needing an area with a diameter of about 100 feet. That’s still easier to find than a 2,500-foot runway.

Ubuntu Touch will be stable by the end of May

Canonical announced Ubuntu for phones back in January, and then quickly promised to ship hardware by October of this year. Now, developers of the Ubuntu Touch project are promising a usable build of the software by the end of the month. Even so, major features like app installation and camera functionality are still a ways off.

On his blog, VP of UbuntuEngineering Rick Spencer posted about how the Ubuntu Touch developers have committed to making a usable build by the end of May. Spencer explains that to truly gauge what needs work, the developers need to “eat our own dogfood,” and use Ubuntu Touch day in and day out. Getting this software into a state suitable for daily use is a big step towards readying it for the public. That said, don’t expect this to replace your vanilla Android install just yet — it’s still early days.

Ubuntu TabletsIf all goes as planned, phones running Ubuntu Touch at the end of the month will be able to make and receive calls, send and receive text messages, use WiFi and 3G to browse the web, add and edit contacts, successfully use the proximity sensor, and retain user data after software updates. That’s only the basic functionality, so important features will still be missing at that stage. Spencer specifically notes app installation and Nexus 7 camera functionality as notable absent features. Still, the hope is that this dog food mentality will help accelerate the development, and allow for more polished software by October.

Are you dead set on trying out this unfinished software? Well, the power is in your hands. If you have a Galaxy Nexus, Nexus 4, Nexus 7, or Nexus 10, you can install the Touch Developer Preview for Ubuntu by flashing your firmware. It’s extremely unstable right now, and it could even potentially brick your device. Unless you’re willing to turn your smartphone or tablet into a paperweight, just wait until the finished version is ready in a few months.

It remains to be seen if Ubuntu Touch will be the open platform that Android always wanted to be, or if this will stay a quirky niche project relegated to a tiny sliver of marketshare. Either way, Linux fanatics have a lot to look forward to in the coming months. Canonical is taking the mobile market very seriously, and it has its work cut out for it as Mozilla gears up for the release of Firefox OS.