taner
Reklam alanı

ASUS ZENFONE 6 STOK SORUNU ÇÖZÜLDÜ!

Uzun süredir ülkemizde zincir mağazalarda satışı olan fakat kimse tarafından stok bulunamayan Asus Zenfone serisi ürünlerin en büyük ekranlı modeli Zenfone 6 sonunda ülkemize büyük bir stok sayısı ile giriş yapmış durumda. Ülkemizde satışının başladığı günden itibaren çok kısa bir sürede beklenen satış sayısının çok üstünde bir satış sayısına ulaşan Zenfone 6’lar için Asus’un telefonları çok uzun süredir susmuyordu. Bunu göz önüne alan Asus Türkiye yetkilileri hızlı bir atak ile üründen daha çok stok oluşturup akıllı telefon pazarına sürmeyi başardı. Kullanıcıların zincir mağazalarda aldıkları stoklar tükendi cevabını artık almayacaklarını söyleyen Asus yetkilileri güzel bir atak ile ürünü Teknosa ve Kliksa dışında Vatan Bilgisayar’da da satışa sunduğunu açıkladı.
1609963_727199694001762_2227721533987135180_n
Zenfone hakkında daha detaylı bilgi için: http://asusturkiye.com.tr/system/zenfone/

Kaynak : Teknoapsis
Devamını oku…

Yahoo-Google Co-op!

Yahoo and Google about e-mail security is a collaboration between the whispers.

Two former rivals Yahoo and Google, but the two company's engineers to exchange ideas on specific issues from time to time as they are known. Google some time ago, encrypted e-mail service launched a new initiative to give. Yahoo agreed to participate in this initiative and its e-mail service to make it safe, even if very openly entered into a partnership with Google.

Google initiated purpose of secure e-mail interference users read by email to prevent the third person. Intelligence agencies, especially the emergence of the interest in e-mail traffic, together with the worldwide Google, Microsoft, Yahoo, offered by companies such as communication services, a serious insecurity has occurred. Users quickly have sought safer options. The great discomfort of the situation, Google has launched initiatives secure e-mail.

Google will use this new initiative system in many ways to show similarities with PGP. According to this e-mail users will use to encrypt the keys of their computers, tablets and phones will be stored in such devices. No contribution in the encryption process will not be Google's only encrypted data transfer to undertake.

This system is theoretically one of the most difficult to break an encrypted e-mail to those who want to browse related primarily stored on the user's computer needs to access the key. In this case, a random snapshot of Internet traffic makes it impossible to look into the e-mail is pulled.

The greatest advantage of this system is to Google the company by any government or intelligence agencies as they are compressed, saying that back in the hands of encryption key to provide information that will be able to get rid of. Thus, in the eyes of consumers get a little bit lost confidence is expected to be recovered.

On the other hand, Google's advertising to be able to create user profiles for e-mail content to be browsing, advertising side of this system raises the question of how it will affect. Another problem, e-mail traffic could create completely encrypted weakness in the fight against crime. Google previously obtained from a variety of criminals e-mail the information to the police in the apprehension of wanted criminals helped by sharing.
Devamını oku…

Twitter's new feature in the test

Twitter's innovations to be made irrelevant and uninteresting doubt know that the testing of accounts. This time the test procedure "aleefbaypay" looks like made ​​out of an account named. 
"Aleefbaypay" and shared the screen from photos taken from the account in accordance with your friends at Twitter Follow you do not follow some of the popular tweets of accounts is an innovation of the future will fall. 
Twitter's innovations have always believed that such testing is considered accurate when the innovations to come. However, this innovation by Twitter implying no explanation was given.
Devamını oku…

Like us on Facebook collection cycle is closing!



Social media giant Facebook, a number of changes in the policies of the previous day Go to the platform announced. According to Facebook's new policies, no force closes appreciation gathering speed.
As you know, some applications on Facebook or page content to reach them "like" we have. Social media giant finally imposed by the company to end the followers collection strategies. Facebook users as well as companies that will benefit both in thought. Said the main reason for decision; people are really interested and want to follow the platform "liking" to provide a more robust user experience.

Social media giant, announced that it has useful applications in case of late on November 5. Therefore, further appreciation of the companies had to collect only 3 months.
Devamını oku…

Coca-Cola was hacked

Israel 's, protesting against the attacks on Gaza Ayyıldız Time Coca-Cola's web sites were hacked.

Continuing for days on social media to call for a boycott of Coca-Cola, Ayyıldız Time moves came from.
Ayyıldız Tim coca-cola.co addresses and con-cola.com.tr they carried out their protest by hacking.

Ayyıldız Tim's Facebook page said the "Gaza for the children who died were blocked Coca-Cola!" information was shared.
TURKS managed it.
Devamını oku…

PureVPN one of the world's best VPN service is now in Turkish!

6 continents and 45 key countries, more than 300 server and the many countries of the particular site and services are unlimited and fast access, giving PureVPN, so far more than 1 million users with disabilities Internet access to the site, the internet provider speed limit me, P2P file-sharing barriers, online games and restrictions many internet usage against similar solutions offered intervention.


   Windows, Mac OS, Android, iOS, such as DD-WRT Linux and simultaneously on multiple platforms capable of supporting 5 PureVPN account login, anyone anytime anywhere you guarantee maximum freedom. PureVPN Turkey in particular, the ever expanding server, networking, seamless and easy to use software, various information, encryption tools, authentication protocols, 7/24 customer service and specific to Turkey attractive payment options with users all in one offering solutions. Domestic and foreign most popular social media, video streaming, games, music sites, COIPER services and P2P file-sharing environments, transportation, Turkey for the users all over the world 44000 IP address with support much easier and effortless becomes.
Devamını oku…

Badusb name of the new virus may be the greatest threat ever...

If you have Internet viruses, trojans, bad sectors, trojan horses, and you do not even know the name and you'll never know, maybe you have to deal with many things more. Anti virus software is distinguished with the force you sometimes, and somehow are causing you to not have to waive your performance.

Which will begin next week in Las Vegas at the Black Hat Security Conference is said that the introduction of a new virus in the history of this virus also underlines that the biggest threat.


The system, called Black Hat has been infected with this virus attached to infect every technological tool and would cause different symptoms in each of the six proliferate. In particular, smart phone web browser underlined that this virus could cause serious damage to the programs and not directly with manufacturers like format seçenke ürünlereat could be fixed with firmware that is emphasized.

Be the first sources you do not know something downloading to your computer. Particularly large proportion of torrent sites hosting trojan remember that. System files are files that are important to you, never store between. Necessarily a good antivirus program and a licensed use.
Devamını oku…

Crouching Yeti still active cyber espionage campaign targets in Turkey are in!

Crouching Yeti is still active and also wants to expand the list of victims. Kaspersky Lab, the company's Global Research and Analysis Team (great) made ​​by, Crouching known as the Yeti has announced details of cyber espionage campaign. Origin, dating back to the end of 2010, the campaign is still alive today certainly is looking for new victims every day.

Kaspersky Lab's Chief Security Researcher Nicolas Brulez this threat-related, said: "Energetic Bear, Crowd Strike by their terminology according to this campaign, the first name was. Crowd Strike the campaign of Russian origin, believes., Kaspersky Lab, is still present all the clues are investigating, but currently on both sides a strong conclusion could not be reached. Additionally our analysis, aggressive global focus electricity producers is much wider suggest that,. based on these data, these cases a new naming decided to: a bear evocative and mysterious origin, a Yeti ".

Threatens many different sectors

Energetic Bear / Crouching Yeti, a large number of advanced persistent threat (APT) was included in the campaign. According to Kaspersky Lab's research of the victims, a much wider range than previously thought seems to be businesses. Victims in large industrial / machinery, manufacturing, pharmaceutical, construction, education and information technology sectors.

Known total number of victims worldwide more than 2,800. Among them, Kaspersky Lab researchers have succeeded in defining the organization's 101. This is a list of victims, Crouching could put up interest in the Yeti's strategic objectives at the same time a large number of mostly unknown by some groups in other institutions interested in the show. Kaspersky Lab's experts, these groups of secondary victims might be, but still Crouching Yeti only fairly in a certain area level with goals as a campaign, but also in different sectors in the interests of a broad campaign that the re-identification of the sense might be to believe.

Organizations often attacked the United States, Spain and Japan, while Germany, France, Italy, Turkey, Ireland, Poland and China also became victims. Given the nature of the known victims of the attacks of the main effects of highly sensitive information such as trade secrets and technical information that was seen to emerge.

Crouching Yeti is a sophisticated campaign hard to say. For example, attackers exploit software logs commonly found on the Internet instead of using codes for their exploits have been seen. Nevertheless, the situation of the campaign to remain under the radar for several years did not prevent.

Kaspersky Lab researchers have been violated by attackers to collect valuable information from systems
malware used five have found evidence that:

Havex trojani
NEW DOMAIN trojan sys
ClientX back door
Karagany relationship back door and stole software
Movement means and the second stage channel
The most commonly used tools, Havex Trojan was new. Kaspersky Lab researchers that a total of 27 different versions of malicious programs, and industrial control systems, including data collection tools for a variety of additional

discovered that the modules. Kaspersky Lab products, all used in this campaign malware is detected and eliminates derivatives.

Crouchingyet Havex and other malicious software that is used by vehicles, command and control, to a large network of hacked website is connecting. These sites contain information about victims and additional malware
modules with service gives commands to infected systems. In the present Havex Trojanı the attacker to collect and publish data from certain industrial IT environment that enables very special to have two modules
are known.

The origin of the mysterious

Kaspersky Lab researchers, the culprit behind this campaign will be able to sign national origin has been observed that some meta-features. In particular, the file timestamp of 154 samples were analyzed and compiled many of 06:00 and 16:00 UTC have concluded. This, as well as in Eastern Europe can point to any country in Europe.

Experts also the language of the actors were also analyzed. The strings in the malware analysis (native
Written by non-English) English. Unlike many researchers have analyzed this campaign Kaspersky Lab's experts, as well as the actor of Russian origin could not reach a definitive conclusion. Nearly 200 pieces of malicious binaries and related operational content in all Kaspersky Lab's Red October, Miniduk A, Cosmicduk of Snake and teamspy research studies documenting the finding that, unlike Cyrillic content (or translated) deficiency is present. In addition, French and Swedish spoken clues that were found.
Devamını oku…

Facebook emergency hotline froze...

Facebook is the second time within a period of less than two months to collapse, the United States has caused chaos in the city of Los Angeles.

Facebook, which occurred on June 19 after a technical failure on Friday once again access was interrupted. Interrupted for more than half an hour in the morning, caught residents of Los Angeles, 911 phoning come back when asked on Facebook.

From the face of thousands of calls from desperate Sergeant Burton Brink Crescenta Valley office, via Twitter 'call us' message sent.

In Brink tweets, "Facebook is not an issue of concern to the collapse of law. Please say that Facebook's work and call us to ask what time will get better! 'he said.

Brink, in response to a tweet against him, 'they always get such phones, cable tv impaired even when they are looking for people', he said.

Inability to access to Facebook across the world, thousands of tweets on Twitter with the hashtag #facebookdown caused loot. Facebook, the response on the 'API (application programming interface) and website issues affecting their lives and they are working to fix the problem he said. Social networking, would not comment further about the problem encountered.
Devamını oku…

Sam Sung company outfit sales pulled

Apple employees creates a great irony of the name of Sam Sung, redundancy and blue uniforms with badges to collect donations for the children was to auction over the internet.

The company's employees at the store in Vancouver Pacific Centre, Sam Sung, his work continued for nearly three decades has announced that shortly before leaving. Due to the name of Apple's biggest rival Samsung mind and a great irony that signing Sung, the older generation is used for the task of official badges and blue shirt pulled up for auction on eBay. Be aware of the special circumstances in voicing Sam Sung, entertainment and fundraising purposes only states that from such a work.


So all of the income generated from the sale established for children to Children's Wish Foundation of bağışlayag adds. After 8 days the bid price at auction will end at the moment has exceeded 80 thousand dollars.
Devamını oku…

Internet Explorer plug-in enhances security against

Your internet browser add-ons can be safe, but this does not mean that it is safe against. Microsoft in the Internet Explorer browser to add greater protection against the vulnerabilities is poised to take a major step. Updates will be released on August 12 along with Windows 7 SP1 and IE8 + and Windows 8 desktop version of IE11 in the old ActiveX plug-ins will be blocked.

If you want to enable ActiveX controls in Internet Explorer plug-in that uses an old when you visit a website, you will need to disable alerts.

Microsoft's new application user can cause discontent, but in Chrome and Firefox plug-ins to prevent than to provide a safe Internet experience.

Microsoft's new security measures will be launched on August 12th, Windows XP users make up a quarter of ekositem remind that cover.
Devamını oku…

Android Wear'a Facebook Messenger desteği

Android Developers surprisingly quickly began work on Weir. Now on the market are only two Android-powered device Weir and only 27 percent of the smart phone supports Android Weare. Wear your smartphone to use Android because Android 4.3 and higher versions have to work with. 

  Last update Facebook Messenger includes support for Android Weir. Now directly via smart-hour notice, you can like, you can mute the voice answer and. 
  Weir Facebook Messenger for Android updated with some additions for anyone who has any Google smart time to come.
Devamını oku…

Twitter: Up to countries requesting content removal Turkey

Between January-June 2014. from Twitter user data, content removal requests and copyright notices Twitter transparency report covering the recent worldwide increase shows that demand from governments Twitter. Twitter, according to a recent report 65 court decisions, demanding more than 121 government requests for content removal and account shut down the country in Turkey.

The government claimed that the Twitter user information did not show an increase of 54%. Most users who request information, the United States stands out as the country. Many countries demand from the United States in 1257 when opening Turkey's demand for user data stands out as the 24. However, compared to previous periods of this demand in Turkey has increased two-fold as it will also not be overlooked.

Tweet removal and Twitter accounts worldwide in blocking requests from the government in this regard requests increased by 14%.

  In recent total area of ​​432 content removal requests in accordance with Twitter's recent transparency report, Turkey 65 court order, 121 other officials with requests for content removal and blocking the most more than one account in the applicant countries.

Turkey's demands while covering a total of 304 accounts at the end of this demand Twitter account has blocked 17 lifts and 183 tweets.
Devamını oku…

Our site is online

technology, hardware, software, mobile, internet, news, game, security, tablets, smart phone
Devamını oku…

[Security News][vertical][recent][5]

[Game News][vertical][recent][5]

[Software News][carouselslide][recent][9]

[Mobile News][gallery1][recent][10]

0
ASUS ZENFONE 6 STOK SORUNU ÇÖZÜLDÜ! ASUS ZENFONE 6 STOK SORUNU ÇÖZÜLDÜ!

Uzun süredir ülkemizde zincir mağazalarda satışı olan fakat kimse tarafından stok bulunamayan Asus Zenfone serisi ürünlerin en büyük ekranl...

Devamı »

0
Yahoo-Google Co-op! Yahoo-Google Co-op!

Yahoo and Google about e-mail security is a collaboration between the whispers. Two former rivals Yahoo and Google, but the two company...

Devamı »

0
Twitter's new feature in the test Twitter's new feature in the test

Twitter's innovations to be made irrelevant and uninteresting doubt know that the testing of accounts. This time the test procedure ...

Devamı »

0
Like us on Facebook collection cycle is closing! Like us on Facebook collection cycle is closing!

Social media giant Facebook, a number of changes in the policies of the previous day Go to the platform announced. According to Facebook...

Devamı »

0
Coca-Cola was hacked Coca-Cola was hacked

Israel 's, protesting against the attacks on Gaza Ayyıldız Time Coca-Cola's web sites were hacked. Continuing for days on social m...

Devamı »

0
PureVPN one of the world's best VPN service is now in Turkish! PureVPN one of the world's best VPN service is now in Turkish!

6 continents and 45 key countries, more than 300 server and the many countries of the particular site and services are unlimited and fast ac...

Devamı »

0
Badusb name of the new virus may be the greatest threat ever... Badusb name of the new virus may be the greatest threat ever...

If you have Internet viruses, trojans, bad sectors, trojan horses, and you do not even know the name and you'll never know, maybe you ha...

Devamı »

0
Crouching Yeti still active cyber espionage campaign targets in Turkey are in! Crouching Yeti still active cyber espionage campaign targets in Turkey are in!

Crouching Yeti is still active and also wants to expand the list of victims. Kaspersky Lab, the company's Global Research and Analysis T...

Devamı »

0
Facebook emergency hotline froze... Facebook emergency hotline froze...

Facebook is the second time within a period of less than two months to collapse, the United States has caused chaos in the city of Los Angel...

Devamı »

0
Sam Sung company outfit sales pulled Sam Sung company outfit sales pulled

Apple employees creates a great irony of the name of Sam Sung, redundancy and blue uniforms with badges to collect donations for the childre...

Devamı »

0
Internet Explorer plug-in enhances security against Internet Explorer plug-in enhances security against

Your internet browser add-ons can be safe, but this does not mean that it is safe against. Microsoft in the Internet Explorer browser to a...

Devamı »

0
Android Wear'a Facebook Messenger desteği Android Wear'a Facebook Messenger desteği

Android Developers surprisingly quickly began work on Weir. Now on the market are only two Android-powered device Weir and only 27 percent ...

Devamı »

0
Twitter: Up to countries requesting content removal Turkey Twitter: Up to countries requesting content removal Turkey

Between January-June 2014. from Twitter user data, content removal requests and copyright notices Twitter transparency report covering the r...

Devamı »

0
Our site is online Our site is online

technology, hardware, software, mobile, internet, news, game, security, tablets, smart phone

Devamı »
 

[You may also be interested in][featuredpost][random][5]

Yandex.Metrica

[Hardware News][carouselslide][recent][9]

Recent Comments

teknoloji
Teknoloji Haberleri
Araç Gereçler
DMCA.com Protection Status

Yandex.Metrica
FLATtC v1
Bu blogta bulunan resimler ve yazılar izinsiz Kopyalanamaz.