Tuesday, October 14, 2014

Autodesk provides their software … for free! – CHIP

It is estimated that the value of the initiative, Autodesk will be over 80 million. This initiative will support teachers in nearly 13 600 secondary schools in Poland.

Progress in the development of technology for 3D design and manufacturing result in a change in professions related to designing and creating. The development of mobile technology and cloud-based also means that you can design at any time and place. Almost everyone who has a good idea, can turn concepts into reality, and we believe that it is the present students will shape the future face of the world “- says Wojciech Jędrzejczak, CEO of Autodesk in Poland. “ educational institutions providing free access to Autodesk software, we provide schools with the tools used by professionals around the world in their daily work .” – Adds Wojciech Jędrzejczak.

Portfolio of solutions for 3D design and Autodesk teaching materials are used in educational institutions to increase learning outcomes by:

  • Raising the skill levels of students (ranging from junior high schools) in the subjects related to the natural sciences, technology, engineering, or mathematics digital art .
  •  

  • Transfer of pupils and students with specialized knowledge and skills in 3D design to facilitate the achievement of personal goals and subsequent professional success.

  •  
  • Support teachers in inspiring creative and innovative thinking, using an interdisciplinary approach to education, to develop cooperation skills and practical problem-solving, which are essential in today’s job market.

  •  

This is another part of Autodesk’s commitment to education in Poland. For several years, because students and faculty can enjoy free access to Autodesk software for personal use through the Autodesk Education Community portal. Currently, the company is expanding access to free software to schools and secondary schools. As part of this offer by Autodesk Academic Resource Center, students can use in class with a full portfolio of professional solutions Autodesk 3D design, as well as cloud applications, widely used in various industrial sectors.

Science based on the solutions commonly used in the industry allows for more efficient training, to better prepare young people to enter the labor market. 3D modeling, simulations and analysis allows students to more easily understand the principles of product development, it gives a great sense of impact on the reality and triggers creativity. “- says Tadeusz Lewandowski, Vice-Rector for Student Affairs. Wroclaw University of Technology.

From the point of view of school education – access to modern 3D software is a huge asset. Our experience with the pilot project Design the Future, confirmed that education and spatial thinking skills related to the design are important elements of the curriculum. These tools trigger students’ creativity, technical sense, the desire to create. Youth is open and ready to learn. What’s more he realizes that the knowledge and ability to use design software will be able to also use in later professional life “. – Says Grazyna Knast, Deputy Director of Middle School No. 11 in Poznan.

To apply for free access to Autodesk, visit www.autodesk.com/academic.

LikeTweet

Thursday, October 9, 2014

Malware infecting ATMs – PC Format

cybercriminals operate at night – only on Sundays and Mondays. Without inserting a bank card bring a combination of numbers on the keyboard ATM, call for further instructions from the operator, introduce another set of numbers and ATM starts to cash. Then leave the place without arousing any suspicion.

Action criminals consists of two stages. At the beginning of gain physical access to the ATM and put in the boot CD to install malware, which Kaspersky Lab has given the name of Tyupkin. After re-booting the infected ATM is under the control of attackers. After a successful malware infection triggers an infinite loop, waiting for a command. To attack was more difficult to identify, the malware intercepts commands Tyupkin only at a specific time – on Sunday and Monday night. In these hours, criminals can steal money from an infected machine.

Recordings obtained from security cameras in infected ATMs showed the method used to access the cash machine. For each session, a newly generated key is composed of a unique combination of numbers (based on the random numbers). Thanks to any person outside the gang will not be able to accidentally benefit from fraud. Then, a person standing at the ATM receives instructions over the phone from another gang member who knows the algorithm and is able to generate a session key based on the number shown. This is to prevent attempts to independent cash withdrawals by those intermediaries for infecting ATMs.

If the key is correctly entered, the ATM displays information about how many resources are available in each cartridge with money, encouraging the operator to chose which cassette wants to rob. Then, ATM seems 40 notes at a time from the selected cartridge.

Malware Tyupkin

At the request of one of the financial institutions , a team of experts carried out an investigation on the present cybercriminal attacks. Malware identified and named Backdoor.MSIL.Tyupkin have so far been detected in the ATMs in Latin America, Europe and Asia.

“The last few years have seen a significant increase in the number of attacks on ATMs using the equipment to clone credit cards and malware. Now we are witnessing the natural evolution of this threat, in which cybercriminals are climbing up the chain and attack the financial institutions directly. They do this through self-infecting ATMs or carrying out targeted attacks on banks. Tyupkin Malware is an example of the use by attackers ATM infrastructure vulnerabilities “- said Vicente Diaz from Kaspersky Lab.” We advise banks to examine the physical security of their ATM machines, and network infrastructure, and consider investing in appropriate security solutions “- he added.

How banks can reduce the risk

– Examine the physical security of its ATM and consider investing in a high quality security solution.

– Replace all locks and keys universal in the top cover ATM and resign from the manufacturer’s default settings.

– Install the alarm and ensure that it is efficient. The cybercriminals behind the software Tyupkin infecting only ATMs that do not have the safety alert.

– Change the default password, the BIOS ATMs.

– Ensure that machines have an updated anti-virus protection.

Photo principal comes from the source: © 123RF / Picsel

LikeTweet

Wednesday, October 8, 2014

Warner Bros uses software piracy, which … – PCLab.pl

Warner Bros uses advanced robotics to track pirated content hosted on the network. One of the largest film studios was forced by the court to disclose data on its anti-piracy system, which was important as motivated public interest. From the available data we learned some interesting information on the operation of the robots themselves.

The emergence of the network of official data on anti-piracy systems Warner Bros aftermath ending settlement litigation on Hotfile file hosting service. Under the framework of film production companies paid $ 80 million. Initially, Hotfile founded his case to Warner Bros., in which the company was accused of abuse by searching the database files on your host. In time, however, withdrawn from the prosecution.

 Warner Bros

The case would have died a natural death, if not for the Electronic Frontier Foundation, whose representatives have asked the court for disclosure on how the Warner works. Label of course, opposed the proposal, explaining that only through secrecy antipiracy system is so effective. However, the court dismissed the complaint and ordered the disclosure of all data related to searches your network for unauthorized content.

The company reluctantly, but released on the web first set of documents. It turns out that the collection of information is a specially designed software that is described in the text as robots. Interestingly, these programs are so programmed to mimic human behavior, so finding specific content to be very simple. The script searches about 200 selected sites for keywords and on this basis defines what type of materials has to deal with.

This method is not very precise, because the found files are in no way verified. It may therefore be that the robot finds a material named as one of the films released by Warner Bros., report it, and this really will not have anything to do with him. Therefore, in section antypirackim company also people are employed, namely seven people. Information about their tasks have been classified by the label.

Many questions still remain unanswered. It is not known example. Why software developed by the company has been focused on monitoring the application users JDownloader. We do not know the numbers of false positives and the process of verifying the authenticity of entries. It is possible that successive waves of publication of secret documents tell us about it a bit more.

Middle-earth: The shadow of Mordor – Review

LikeTweet

Tuesday, October 7, 2014

How much is the system and how much the software. – Swiatobrazu.pl

It is Friday, October 7, 2014, 12:37


How much is the system and how much the software.

Author Message

doing great

Posting Freak

Joined: on Monday, March 17, 2014, 19:35
Location: 77

I’m interested in is the only original software to create movies and burn them, but also programs do not unnecessary.

System /> Windows 8.1 – price
Windows 7 – price

program for video editing:
EDIUS – price
Sony Vegas Pro – price
Adobe Premiere Pro CS6 – price

program to burn DVD:
Nero – price
CloneCD – price
CD Burner XP – price

others /> …..

Tuesday, October 7, 2014, 09: 30 View Profile

Star

Active Freak

Joined: Thursday, March 17, 2005, 13:59
Location: 1346
Location: Ruda of Silesia

Whom to target this question? Why do not you do this statement alone? Is Google the name you associate with something?


_________________ /> Sony HXR NX 70, the SONY CX-560 Processor: Intel Core i7 3820 3,60GHz, 32GB 1600MHz DDR3, Graphics: Nvidia GTX 570 with CUDA, RAID0 2TB + 1TB HDD, Windows 7 64 bit, Blackmagic Intensity Pro card, BLU -RAY HD LG GGW-H20L, Adobe Production Premium CS 5.5.
Tuesday, October 7, 2014, 9:35  View Profile

Pinto

Active Freak

Joined: Monday, January 23, 2006, 15:20
Posts : 1548

Summit laziness, ineptitude or insolence?

Tuesday, October 7, 2014, 10:15  View Profile







Who is online

Users browsing this forum: trek and 2 guests




can not post new topics
can not reply to topics
can not edit your posts
can not delete your posts
Do not can post attachments


LikeTweet

Monday, October 6, 2014

Software Projekt95Pro a risky machine … – Computer World (press release)

The Exchange pro Richard is a true philanthropist.
 And this despite the fact that according to its advertising film was
 deceived and exploited. That is why he abandoned his well
 paid employment expert financial software
 and made to the program Projekt95Pro earning money already
 only for him. But now he wants to share with us your
 secret – and it’s almost free!

What is behind advertised on a massive scale in spam
 financial programs, which every layman to immediately
 do exchange shark? For computer experts from the World of Finance
 looked at the programs economic miracle – and warn
 before them.

Pro Stock Exchange without the know-how?

The persistent message of advertising videos and spamming
 the message is clear: who on Projekt95Pro, AnyOption or
 other such programs do not earn 1,000 euros a month, he
 is a must! Rain of money is to bring automated
 trade binary options (par courses). You do not buy
 any shares or other listed values, only bet change
 their course.

 ryzykowna_maszyna_do_pieniedzy.jpg

In fact, these are the simple betting with the odds of 50: 50.
 However, according to video advertising programs using
 superserwer, they can check stock prices, commodity
 or foreign currency and in fractions of a second to calculate their trends.
 This is to ensure tips that increase your chance of winning
 up to 81 percent. The programs convert these tips on Options
 purchase, which offer the user. This only needs to click on the
 “Buy” and enter the amount you want to invest
 in the transaction. Arbitrarily defined lower limit is
 mostly 10 euros. According to the advertising claims, profits can be
 paid out within a few hours. For example, the operator
 Projekt95Pro asks for your guidance only 5 percent share
 in profit. The remaining amount is to be getting comfortable with online bank
 user account.

The Temptation of virtual money

In order to gain the trust of users, Projekt95Pro has a demo mode. There
 You can check the software using virtual 500 euros.
 Computer World is tested. Indeed: in one
 hours account with virtual money until it was thicker
 about 800 euros. In this way, the demo mode does the job
 and tempted to play with real money.

As interested in demo mode and so must assume
 account operator is now just when they click on the “recharge
 account. “This can be done either by credit card or wire transfer. Price
 the entrance is salty: Users Projekt95Pro must put
 at least 200 euros.

Configure a demo account requires the addition of such information,
 as the e-mail address and phone number. A operators
 absolutely use this information to convince users
 to play for real money. Just a few minutes after
 opened an account for the user falling rain message
 Packet hiring, for example, “a deposit 1000 euros
 and get 500 euros a gift. “But that’s not all:
 the phone does not give us peace. Several times a day report
 the ladies of the call center from London and from other
 places around the world, inquiring why still only works
 the demo mode.

Anything but quick profits

Less euphorically look evaluation of the program in various fora.
 Former users told how tempted fast profit lost
 your entire contribution. Talk about fake. Once you have paid
 money, so chatty before operators cease
 the contact. Even when he appeared modest profit, it does not land on
 in the pockets of users, just raking it operator – such
 things we find in relationships defrauded. In addition, the duped
 users often can not determine who is behind the financial
 software.

Experts advise: keep out of it

Even the experts have trouble financial supervision
 the identification of the perpetrators. Finding the most frequently leads to
 Cyprus. Reason: In the matter Cyprus banking law is
 not particularly strict, and binary options transactions are
 have long been permitted.

In the case of software Projekt95Pro Computer World
 set the entire grid companies. And so the footer is given
 company Regal Options. This again is a financial group Cedar
 Finance, which in turn is associated with TBSF Best
 Strategy Finance. However, none of these companies do not have the necessary
 authorization for the provision of banking services.

In general, we should always be careful when we are
 attacked by telephone or spam when the pressure is on us
 time pressure or when the operator is tempting exclusive interests,
 you have to decide very quickly.

We ask an expert

 wojciech-matysiak.jpg

Wojciech Matysiak – Expert in the Office of Research
 Macroeconomic Bank Pekao SA

Programs like Projekt95Pro
 promise a risk-free profits between 73 and 91 percent. Do
 This scam

It is impossible to make a profit without risk,
 and in the case of such high profit investment risk is
 particularly high. Risk is an inherent part of each investment
 and depends on the type of financial instrument, to which it is
 subject. For the risk-free rate is most commonly accepted
 return on investment in treasury bills or bonds
 guarantees are subject to the state treasury. As shown, however, the last
 Europe’s debt crisis, a government guarantee
 associated with some risk.

Can I use the software, you can
 safely calculate short-term forecasts
 courses

Safe forecast exchange rates in the financial markets I consider
 excluded. This is due to the independence of the behavior of the participants
 financial market. It is impossible to predict the strategies of each
 market participant.

Some programs offer an account
 demo where users can invest virtual
 money. Then always wins …

If the tempting profits in demo mode, it is a procedure
 marketing. In demo mode, often do not accept commissions from
 transaction and the costs for the use of the program,
 and therefore need less income to generate a profit. Since
 easier to make a profit, you willingly tempted to buy
 the full version. After taking into account fees and expenses,
 likely to achieve profits decrease. In addition, vision
 profit in demo mode may be more appealing
 than discouragement in the event of a loss of virtual deposit ..

Trading in options and it is quite
 risky. Do consumers in this market can sensibly invest
 money

You can invest, guided by sensible arguments
 and analysis, but as with any investment should be expected
 risk. All apply the same basic principles
 investment: attention to costs, reducing the risk, mastering emotions
 and adaptation methods and the risk of investment for its own
 investment profile.

Photo .: alphaspirit, Sergey Nivens / 123rf.com

LikeTweet

Sunday, October 5, 2014

What cybercriminals steal? For example. Training software … – InSilesia.pl

Increasingly, we go to the reports of mass thefts of credit card data or personal pictures of celebrities stolen from network drives. We talk a lot about the dangers lurking on the users of portable equipment. Today we know that a good application comprehensively protective equipment is essential. However, it is known that criminals hunt, network also other information.

A few days ago, the Justice Department accused because four suspected of stealing technology training helicopter pilots! Accusations also included the theft of other applications, including games.

Hackers came into possession of Apache helicopter training software, used by military pilots and developed for the United States Army by Zombies Studios. The prosecution insisted that the stolen data was confidential and used in most modern American technology.

In the course of investigation it was established that among the victims were the manufacturers of gaming companies such as Microsoft, Epic Games and Valve. Stolen dedicated applications were for Xbox One Microsoft and Xbox Live network. These included, among others, Preliminary versions of the game Call of Duty: Modern Warfare 3 and Gears of War 3.

The accusations posed is quite long: copyright infringement, fraud, e-mail, conspiracy to commit computer fraud and identity theft. Two defendants have pleaded guilty. The stolen data was estimated to be 100 – $ 200 million.

How did they do?

The hackers allegedly used the stolen data certified staff and other methods such as SQL Injection . – Available information mention that the networks were stolen access codes, created the software application source code and other trade secrets, copyrights, and a range of confidential and proprietary information. Also leaked financial data affected companies and information about their employees. Pages swear, however, that customer data had not been exposed to danger – says Marek Markowski of MARKEN Anti-virus systems, representing the company in Poland Bitdefender. – American events show that caution should be exercised in today’s electronic world – rounds out Markowski.

LikeTweet

Friday, October 3, 2014

ShareVR – Polish VR software storming Kickstarter – CHIP

ShareVR is a software that will allow you to stream video games (Windows, Mac) HD smartphone. Support includes all titles utilizing DirectX version from 9 to 11 Importantly, the software also allows you to translate the readings from the sensors movement (accelerometer, gyroscope) to the actual movement of game characters.

Although the software itself costs only 10 pounds, we must remember that not every smartphone can handle the stream bearable. Here check only efficient flagship high-end having the best display True HD IPS. For this we have to buy any goggles, to which we put your smartphone. This can either be the cheapest Google Cardboard (60 zł) and more comfortable Durovis Dive (250 zł). Compared to the already finished goggles as described in the table (eg Oculus Rift and Samgung Gear VR) idea of ​​Martin actually falls attractively, especially since the technology is still going ahead and replacing each phone will receive more and better display.

ShareVR can operate wirelessly – via WiFi – or the cable but to get the smallest delay (at 30 milliseconds) it is necessary to take advantage of this second solution.

The software will go on sale in January next year under the provided that the campaign will be successful. To deploy your project Marcin needs 50 thousand. pounds. Under THIS link can support ShareVR.

LikeTweet

Thursday, October 2, 2014

Game Portal 2 develops the brain more than the specialist … – eurogamer.pl

One study conducted by the University of Florida compared the puzzle game Portal 2 with specialized software used to train the brain. Result: Valve title game gives you more benefits.

1

GLaDOS in any home soon

The scientists invited to study 77 people. Participants were randomized and spent eight hours with Portal 2 or the Lumosity program, for development of the brain and praising the high efficiency in improving memory, attention, information processing, spatial or logical thinking.

Before and after the study, the volunteers performed a series of tests to measure three criteria: problem solving, spatial orientation and perseverance.

People playing in Portal 2 improved in all three areas, while the time spent on Lumosity did not translate into any differences (thanks Gamasutra).

The researchers noted that with such a small group of patients and the check only one title can not draw definitive conclusions. However, the results are certainly promising.

10 best and 10 worst horror games You may be scared and you can laugh. 10 best and the 10 worst horror games & # XF3, in

LikeTweet

Wednesday, October 1, 2014

Malware attacks Mac users … – Interia

1 hr. 7 minutes ago

Kaspersky Lab experts have estimated the chances of entering the malicious program to a device running OS X from Apple. Data from the Kaspersky Security Network suggests that the active Internet user is attacked by malicious software for OS X at least 10 times a year.

Kaspersky Lab collection contains 1 800 unique samples of malicious files for Mac OS X.

/ AFP

Windows 10 – this name will have a new system Operating the Redmond giant. Windows 9 was just a code name. The system will debut next year and has combined the best features of Windows 7 and Windows 8 read more

In August 2014. Likelihood of unwanted interference with the malicious software was about 3 percent. In comparison to 21 percent. risk of infection faced by Windows users, the situation on the Mac seems much better. However, if we extrapolate this to the number of potential incidents, the problem no longer seems so trivial. During the first eight months of 2014. Experts at Kaspersky Lab have registered nearly 1 000 unique attacks on computers running OS X. The company’s collection includes one of 800 unique samples of malicious files for Mac OS X (in some cases, one sample can describe a variety of threats ).

Malware software for OS X that most stands out in the collection is a backdoor Callme that allows cybercriminals to remotely access the system and, under the additional features, stealing contacts the owner of the device – which are probably the future victim. Another backdoor Laoshu is signed with a trusted certificate creator – apparently malware writers are preparing to spread it through the official store AppStore. Laoshu action consists in performing screenshots every minute.

Third spyware, which is worth mentioning Ventir, provides the functionality of a secret remote control and is able to record the characters entered from the keyboard.

The collection also features a spyware iPhone, the first encryption module files for OS X and the first Bitcoiny stealing malware for OS X.

“Over the past four years for the Mac threat landscape has changed significantly – from individual cases to a global epidemic caused by a worm Flashback, which resulted in 2011. infected was 700 000 computers with OS X over the world. It was a turning point – after that every year there are hundreds of new malicious programs for Apple hardware. What’s more, OS X was the center of high-profile espionage operations in the media, such as The Mask / careto and Icefog “- said Eugene Kaspersky, Chairman and CEO of Kaspersky Lab.

Kaspersky Lab data shows that users in the United States and Germany were by far the most affected by the attacks in 2013-2014 – in these countries registered to 66 000 to detect threats to OS X. In the following five countries on the list – the UK, Canada, Spain, Italy and Australia – were recorded for 7 700 to detect.

10 simple tips that will improve the protection of your Mac

1. Every day working with an account that does not have administrator privileges.
2. Use a browser that includes a mechanism sandbox (sandbox) and has a good reputation when it comes to quick repair security issues.
3. Uninstall Flash Player and Java, if it is necessary.
4. Install all updates of the operating system and applications used immediately after they appear.
5. Use a password manager to protect yourself against phishing.
6. Disable IPv6, AirPort and Bluetooth when not in use.
7. Enable full disk encryption (FileVault).
8. Block the ability to install applications from untrusted sources (‘Preferences’ & gt; ‘Security and Privacy’ & gt; ‘General’ & gt; ‘Allow programs downloaded from the’: & gt; ‘Mac App Store’ or ‘Mac App Store and from identified authors’) .
9. Update Adobe Reader to the latest version.
10. Install a good security solution.

LikeTweet

Malware attacks Mac users … – Virtual Poland


  Kaspersky Lab experts have estimated the chances of entering the malicious program to a device running OS X from Apple. Data from the Kaspersky Security Network suggests that the active Internet user is attacked by malicious software for OS X at least 10 times a year.
 

 – In August, 2014. Likelihood of unwanted interference with the malicious software was about 3 percent. Compared to the 21-percent risk of infection faced by Windows users, the situation regarding the Mac seems much better. However, if we extrapolate this to the number of potential incidents, the problem no longer seems so trivial.
 

 – During the first eight months of 2014. Experts at Kaspersky Lab have registered nearly 1 000 unique attacks on computers running OS X.
 

 – The risk that a computer running Mac OS X is infected, is about 3 percent.
 

 – Kaspersky Lab collection contains 1 800 unique samples of malicious files for Mac OS X (in some cases, one sample can describe many different threats).
 

 Malware for OS X, which most stands out in the collection of Kaspersky Lab Callme is a backdoor that allows cybercriminals to remotely access the system and, under the additional features, stealing contacts the owner of the device – which are likely future victims. Another backdoor Laoshu is signed with a trusted certificate creator – apparently malware writers are preparing to spread it through the official store AppStore. Laoshu action consists in performing screenshots every minute. Third spyware, which is worth mentioning Ventir, provides the functionality of a secret remote control and is able to record the characters entered from the keyboard. The collection also features a spyware iPhone, the first encryption module files for OS X and the first Bitcoiny stealing malware for OS X.
 

 – In the last four years the threat landscape for Mac has changed significantly – from individual cases to a global epidemic caused by a worm Flashback, which resulted in 2011. Infected was 700 000 computers with OS X over the world. It was a turning point – after that every year there are hundreds of new malicious programs for Apple hardware. What’s more, OS X was the center of high-profile espionage operations in the media, such as The Mask / careto and Icefog “- said Eugene Kaspersky, Chairman and CEO of Kaspersky Lab.
 

 Data from Kaspersky Lab shows that users in the United States and Germany were by far the most affected by the attacks in 2013-2014 – in these countries registered to 66 000 to detect threats to OS X. In the five countries on the list – the UK, Canada, Spain , Italy and Australia – were recorded for 7 700 to detect.
 

  10 simple tips that will improve the protection of your Mac
 

 1 Casual work with an account that does not have administrator privileges.
 2 Use a browser that includes a mechanism sandbox (sandbox)
and has a good reputation when it comes to quick repair security issues.
 3 Uninstall Flash Player and Java, if it is necessary.
 4 Install all updates of the operating system and applications used immediately after they appear.
 5 Use a password manager to protect yourself against phishing.
 6 Disable IPv6, AirPort and Bluetooth when not in use.
 7 Turn on the full disk encryption (FileVault).
 8 Block the ability to install applications from untrusted sources (‘Preferences’ & gt;’ Security and Privacy ‘& gt;’ General ‘& gt;’ Allow programs downloaded from the ‘: & gt;’ Mac App Store ‘or’ Mac App Store and from identified authors ‘).
 9 Update Adobe Reader to the latest version.
 10 Install a good security solution.
 

Large selection of laptops at the lowest prices. Leads

LikeTweet