Ads 468x60px

Saturday, June 2, 2012

Sony Xperia S, First Premium Android from Sony

After the 'divorced' from Ericsson, Sony's new step in the mobile market with the brand Sony Mobile Communications initiated with the launch of its first premium smartphone, Sony Xperia S. Claimed as a premium smartphone, of course, Sony Xperia equip S with a number of capabilities and features. Following a review of the ability of the Sony Xperia S.

Design Xperia S

Starting from design, the surface of the phone comes with a touch of smooth without any physical buttons that adorn. Despite having a large and visible body stiff from the front, the back of the phone is curved just feels comfortable when held and not heavy.

Meanwhile, a fairly prominent one of these phones, the iconic design that circles the base phone, which is a transparent line with white backlight. This transparent line serves as a marker of buttons on the phone, that is to back, home and menu. But the third had a transparent design can not be pinched, but at the top is marked with three small white dots.

Sony seems so to minimize the presence of buttons on the Xperia S. There are only three small buttons on the phone, the volume and camera buttons are located on the right side of the phone, as well as the on / off at the top of the phone. While the USB port located on the left side and HDMI on the right side of the phone.

Unfortunately, plastics material which binds up the phone a price of approximately Rp5.499 million of this decrease on the phone a premium impression. As for the operating system, Sony complete with Android Gingerbread, but take it easy because this phone can be upgraded to the Ice Cream Sandwich in the second quarter of this year.

Equipped with Dual Core processor 1.5 GHz Qualcomm, this phone has to offer performance is quite satisfactory. Users can quickly access the menus and applications in mobile phones, without having to wait long.

Armed with an internal memory of 32 GB, Sony also offers NFC technology (Near Field Communication). Unfortunately, the user must cuup satisfied with only 32 GB of internal memory, because Sony does not give a microSD slot.

Xperia S has a battery that integrates with the body, so if you want to lose your mind, replace the battery menggonta easily. In addition, one thing to note, users should use the micro SIM on this phone.

Reality Display 4.3-inch screen


Carrying the HD screen (High Definition) 4.3-inch (1280x720 pixels) with the Mobile Bravia Engine, making phone has a sharp and clear. For example, view photos or video on this phone comes with a fairly sharp color.

Like most other Android phones, this phone also has a five homescreen. Mobile phones with touch screen can be quite responsive, so it becomes more fun when doing a sweep on the screen without any lag.

For the convenience of typing, when used as position of the phone stand (portraid) feel less comfortable because of the size of a small virtual keyboard. But to handle it, can try to type in the phone's position as a virtual keyboard landscape was going to be a little bigger, so it becomes more comfortable when used.

Camera Performance

Traffic aiming for an object, then the Sony proved to give special attention. In the Xperia S, the Japanese company behind the camera equip with 12 MP sensor Exmor technology and R. With a 12 MP sensor and auto focus, of course, the resulting images provide adequate image quality.

When tested Okezone, when photographing an object with a fairly bright light, the resulting image appear quite sharp, both in terms of color or contrast of objects. Meanwhile, when used with low-light shooting, noise in the shots are still visible.

While the camera back has a sensor that is large enough for up to 12 MP, is inversely proportional to the front camera is only 1.3 MP (720p). In addition, the phone can also record HD video (1080p) that supports 3GPP and MP4 format.

Ease of capture important moments with spontaneous greatly helped with the Quick Launch mode on this phone. Users just simply pressing the camera button on the right side of the phone, the camera will automatically shoot straight in about 2 seconds from standby.

Specifications:
OS: Android 2.3 (Gingerbread), can upgrade Ice Cream Sandwich
Processor: Dual Core 1.5 GHz Qualcomm
HD Screen: 4.3 inch (1280x720 pixels)
Camera and video: back 12 MP (LED), front 1.3 MP, video recorders HD (1080p)
Internal memory: 32 GB
Connectivity: USB 2.0 support, HDMI, Bluetooth, NFC
Battery: - talk time of up to 8 hours 30 minutes - up to 420 hours standby time.

Internet Explorer 10 Adoption Features Do Not Track

Microsoft announced that Internet Explorer (IE) browser 10 will be the first to adopt the features of Do Not Track (DNT) by default. DNT is currently used for the user's habits on the Internet can not be tracked.

"We decided on this step because it is sure to put the people as a priority. We believe that consumers should have more control in the tracking portion, sharing and use of information while online behavior (online)," said Microsoft Chief Privacy Officer, Brendon Lynch.

DNT is available as an option for controlling the tracking of user behavior on the internet. It is not quite got the attention of advertisers, but groups such as the Digital Advertising Alliance was uncomfortable with the announcement of Microsoft. So proclaimed The Verge, Saturday (02/06/2012).

The use of any features of DNT tends to be less common. According to Twitter, now available as an option DNT built-in in Internet Explorer 9, Mozilla Firefox 5, Safari 5.1 and Opera 12 up to the top. Meanwhile, Google Chrome is a browser extension to provide this feature.

Mozilla, on November ago had revealed that they have no intention to change the default feature perambannya DNT. They argue, tends to reduce the DNT feature select customers.

Galaxy S III, Premium Samsung Cell Phone Without Subsidy

Indonesia finally the arrival of the Galaxy S III, which went on sale early today. Sold at normal price of USD 6.999 million, this tablet smartphone is arguably the most premium phone in the Samsung family.

"We hope the Galaxy S III could be a market leader in smartphones our most premium class. Moreover, the gap with the Galaxy S II is long enough, a year," explained Head of Product Marketing Alven Desnecmen Samsung Indonesia, through the launch of Galaxy S III, in Central Park, Jakarta, Saturday (06/02/2012).

Long span of time with previous generations, said Alven, because the research and development Samsung wants to continue to deliver innovation required by the customer.

The result, some recent applications had been developed by Samsung, in particular in the Galaxy S III is. Call it of them, S-Voice, Smart pop up stay and play.

Meanwhile, when asked the sales target, as usual the Samsung answered diplomatically. "Sold only as much as possible. May," said Alven.

Along with its debut, Samsung also took the operator and two credit cards. Customers will get a discount $ 500 thousand when purchased with a credit card.

"While operators provide bonus data plan, each operator is different indeed. But clearly the operator does not provide subsidies. So the price of USD 6.999 million is the normal price," he said.

Flame and the threat of global cyber war

Flame discovery of computer viruses, which spread undetected for many years in the Middle East, showing the world has entered a new era of global espionage and sabotage.

Analysts said the cyber world, Flame is a malicious software (malware) that can be adapted and disseminated to a variety of vital infrastructure throughout the country in the world.

Iranian officials, the state alleged to be the main target of Flame attack, said the virus had attacked the Iranian oil industry, mid-April. The attack was sparked by Iranian technicians cut off all internet connections in the oil ministry office, platforms, oil drilling platforms and oil terminal on the island of Khark.

Khark Island oil terminal is the gateway for the export of about 80 percent of Iran's total oil production by 2.2 million barrels per day.

"The virus is through the various sectors, one sector of the oil industry. Fortunately we were able to detect and control one of these incidents, "said Gholam Reza Jalali, Iran's military commander antisabotase unit on Wednesday (30/5).

According to Jalali, the oil industry is the only institution which the Government of Iran seriously affected Flame attack, and now all the missing data has been restored.

The virus was first discovered and named "Flame" by Kaspersky Lab. The Russian computer security company that the virus hunt down the last few months at the request of the International Telecommunication Union (ITU), the UN agency that regulates information and communication technology in the world.

Marco Obiso, ITU cyber security coordinator, said the new virus is very complex and sophisticated. The size of the virus to 20 megabytes, or about 20-30 times larger than ordinary file virus.

The series of attacks

Flame has the ability to spy on and steal most of the activity of the infected computer data. Start recording keystrokes of keys on the keyboard (keystrokes), record the display screen is opened, to activate the computer's internal microphone (such as a laptop or webcam plugged in) to eavesdrop on computer users.

In addition, the virus is also able to activate the Bluetooth connection to connect to a computer and cell phone all around the computer to steal data, such as personal contact list.

Founder of Kaspersky Lab, Eugene Kaspersky, said Flame is still strongly suspected in a series with Stuxnet virus attack and the first Duqu found.

Two years ago, Iran's nuclear enrichment facility Stuxnet virus attack. Virus screwed centrifuge equipment control systems so that spin out of control and finally broke down. As a result of the attack, Iran's nuclear program was stopped a few times.

"Stuxnet and Duqu is a series of attacks, which raises concerns over global cyber war. Flame seems further malware phase of this attack, and easy to understand that cyber weapons as it can be easily used to attack any country, "said Kaspersky.

In contrast with conventional weapons that require dedicated resources to make it, a computer virus could in principle be used and modified by anyone with a computer programming skills.

"What is scary, the state no longer hold a monopoly on these capabilities," said Tom Kellerman, a former commissioner of the board of cyber security for U.S. President Barack Obama.

Thursday, May 31, 2012

Samsung Galaxy Tab 7.7 Review

Samsung Galaxy Tab 7.7 slide on the market with prices rising at the rate of about 7 million Rupiah. No doubt, he burst into the premium class of tablet. Curious as to what capacity?

Design

By design, the Samsung Galaxy Tab 7.7 has a stylish metallic body. He feels comfortable grip thanks to its light weight and size are not too large.

Yes, this device only has a thickness of 7.89 mm and weighing 340 grams in a 7.7-inch design. In addition to a sleek, one of which was that he was impressed by its design excellence lux, is directly proportional to the price of that cost.

Tracing the body, on the front, there is a front facing camera is 2 MP resolution. Then on the side there is a power button, volume control and a slot for microSD and Micro-SIM. There is also a proprietary 30-pin dock port, IR blaster, headphone and microphone jacks.

Was in the back of the body there is a resolution of 3 MP camera that is equipped with a LED flash.

Screen

Screen so users can enjoy crystal clear on this device. The clarity achieved by the Super AMOLED Plus screen has a resolution of 1280 x 800. No doubt when used to display photos or video, that look is a wealth of color and contrast of the feast for the eyes.

Application

This premium Samsung equip devices with a number of applications such as Photo Editor, Social Hub, Pen memo, Samsung Apps store, Voice search, a video player to music player.

Performance

Tablet devices from Samsung is running on the Android operating system version 3.2 (Honeycomb) which has no display UXnya TouchWiz. With that view, access content from the home screen can be done easily, as well as when used for multi tasking.

Galaxy Tab 7.7 to equip themselves with dual-core processor 1.4 GHz and 1 GB of RAM where it is included in the category of superior tablet. These advantages make it one of the most responsive Android tablet. Proved when used through the menus, detikINET not have significant problems such as lag. Then when used to perform full HD 1080p video playback it runs pretty smoothly.

Camera

Galaxy Tab 7.7 camera equipped with a resolution of 2 MP to 3 MP camera for the front and rear cameras. Are not very high resolution helped with the LED flash when used in super-dark shooting. However, the existence of this flash when shooting low light does not seem advisable, except in destitute circumstances, because the light is too harsh.

Camera features the flyer that came in Tab 7.7 is now supported by many manual settings, although do not expect much to be able to produce images that shine from this tablet. But the fun, this device also has a Panorama mode which can be used to take a picture with wide viewing angle.


Also for its fashion scene, it has the mandatory modes are usually found in compact cameras. Exposure and white balance settings also pinned to maximize the image in any shooting conditions. Own video recording capabilities already support HD 1280x720.

Conclusion:

The price rise is comparable to the performance of the Galaxy Tab 7.7. Coupled with its stylish looks, this tool is worthy of a friend to those who favor the performance and design.

Here are the full specifications of the tablet device:

- 7.7 inch Super AMOLED Plus display with a resolution of 1280 x 800 pixels
- 1.4GHz dual-core processors
- Android 3.2 Honeycomb
- CDMA and LTE
- Internal memory 16GB
- 1GB RAM
- Camera 3.2 MP + rear LED flash and video recording capability 1080p
- Front camera 2 MP
- Dimensions: 7.74 x 5.24 x 0.31 inch

Pros:

- Slim and stylish design
- Battery lasting

Weaknesses:


- High cost
- The camera is less reliable

Finpay, Smart and Honest "cashier" to Online Transactions

Owner and consumer shopping sites now do not be afraid to make transactions online. This is all thanks to Finpay. Finpay service is a service aimed at business payments online or e-commerce.

Finpay, initiated by PT Finnet Indonesia, a subsidiary of PT Telekomunikasi Indonesia, can be called as a cashier for online transactions.


Through service Finpay (www.portalfinpay.com), merchant or merchant, whether corporate, retail, business beginner (startup) or even an individual can receive online transactions.

Finpay service is able to receive such payment by credit card, bank electronic transfer, internet banking, mobile banking, or by e-money.

President Director of PT Telkom Tbk Arief Yahya explains Finpay service will support the growth of e-commerce business in Indonesia. The hope, also will grow the soul businessman (entrepreneur) in the country.

"The public need for convenience and security of online transactions is increasing. Finpay present as a payment solution that connects buyers and sellers online," Arief said after the launch service tower Bidakara Finpay in Jakarta, Wednesday (05/30/2012).

Finpay service is also in line with the vision of the Bank Indonesia to reduce the use and the velocity of cash in the community. In addition, this service will also realize the culture of a society without cash (transaction cashless society).

Indonesia President Director of PT Finnet Walden R Finpay Bakara added services will transform the practice of online business is becoming increasingly safe, comfortable, easy and reliable.

"This kind of service Finpay checkout for sellers and buyers in online business," added Walden.

Later, Finpay can also be used for payment TransJakarta tickets, taxis, trains, tickets, parking, kiosk, ticket highway to the grocery store.

Later, Finpay can also be used for payment TransJakarta tickets, taxis, trains, tickets, parking, kiosk, ticket highway to the grocery store.

"We will target the low end market, this market need to be educated so they can accept this cashless culture. Potential is enormous," added Walden.

For charging Finpay card, will be performed on the merchants who work with the Finpay. Later also, Finpay card can be recharged at an ATM.

Until now only about 50 merchants to join and use the service "checkout" Finpay. Target until the end of this year there are hundreds of merchants who join.

Vice President Online Merchant Finnet Indonesia PT Division Head Hasibuan added Finpay Mey is a kind of liaison services between sellers and buyers in online business. Inside there Finpay service systems that make sellers and buyers in online business can trust.

"Finpay This will prevent a fictitious online sellers and buyers online is bad," said Mey.

Illustration Finpay card usage is currently no purchases at online stores, the buyer is required to pay or transfer a sum of money. This transfer will be made to the account Finpay, either credit card, bank transfer, internet banking, mobile banking or emoney.

When the buyer has to pay with one payment method with Finpay, then Finpay will send notification to the seller that payment has been made and the goods ready for shipment.

When goods are received by the buyer, the Finpay will immediately send notification to the seller that the purchase money will be transferred.

"We will charge a fee to buyers around Rp 2,500 per transaction. But we're also going to charge to the seller, the amount depending on the price of goods," he added.

Last year, PT Finnet Indonesia turnover of about USD 165 billion. This year, the target will increase to Rp 200 billion.

While earnings in the last year of about Rp 13 billion. Profit targets this year will be USD 22.75 billion.

High target will be contributed from the Telkom Group's service payment system (about 80 per cent) and the rest of the payment of electricity and other payments.

Wednesday, December 28, 2011

DorkBot.Bx and its characteristics

As has become a schedule, beginning of each year and the end of the year, the makers of malware is usually 'release newest product' form of malware variants that have new ways of infecting computers. It also occurs at the end of this year where a new malware being intensively spread this month.

This malware is detected as Trojan.Generic.KD.440xxx or W32.Dorkbot.Bx. If the previous ones spread BitCoinMiner trojans and trojan variant Kolab, this variant is the 'new incarnation' of BitCoinMiner trojan trojan that uses methods Kolab. This is a group of trojan / backdoor designed to steal information or data of computer users, especially matters related to personal financial data, which is associated with internet banking. Just like trojans BitCoinMiner, DorkBot.Bx variant also has the ability to record information / data relating to personal data such as usernames, passwords, credit cards, and others. Not only that, the computer that is infected with a trojan was used as a tool for solving participated blocks BitCoin cryptography using BitCoin account of the owner of the trojan.
That was a bit of information about DorkBot.Bx, now we need to know how the characteristics of the computer has been infected by this malware. Here are some characteristics of the infected computer DorkBot.Bx:

1. CPU 100%

DorkBot.Bx will make the CPU becomes sluggish. Shows the percentage of CPU usage 100%. This is because the activities of trojans that attempt to break the cryptographic block BitCoin and actively trying to make sending data.

2. Wasteful of bandwidth

Not only is making a slow computer where the CPU usage to 100%, another thing to note is the activity of Internet bandwidth. This is because the result of trojans DorkBot.Bx makes your bandwidth to be extravagant.

3. Hiding a folder on a USB drive or removable disk

Not different from its predecessor, BitCoinMiner trojan, trojan DorkBot.Bx was also doing the same thing is to hide the folders on the USB or removable disk and create a shortcut similar false name of the folder. It seems the trend shortcut also inspire trojan DorkBot.Bx

4. Connecting to Server BitCoin

Trojan DorkBot.Bx attempt to connect to Server BitCoin to perform cryptographic delivery BitCoin blocks malware authors use the account on BitCoin. This is advantageous because the manufacturer can quickly and easily perform cryptographic blocks BitCoin through the help of computers already infected.

5. Connect to IRC / Remote Server

Trojan DorkBot.Bx also attempt to connect to IRC / Remote Server for the delivery of computer users BitCoin information required by the malware authors.

6. Downloading files malware

In order to simplify the action, trojans DorkBot.Bx also to download some specific malware files from IRC / Remote Server in order to stay updated and are not easily recognizable by the antivirus. Files of different malware is what sometimes makes it difficult to detect the presence of antivirus trojan DorkBot.Bx.

7. Downloading files Certificate Authority (CA)

Basically, the Certificate Authority (CA) is used in online payment transactions such as banks, PayPal, and thousands of other sites that use the SSL protocol. By downloading the file CA, malware makers want to ensure that victims of infected computers already have updated so that CAs can transact safely BitCoin.

8. Transfer data have been obtained

The main objective of the trojan DorkBot.Bx is getting information from the user's computer that is infected.

9. Open various ports

DorkBot.Bx Trojan also opens various ports on the victim's computer to be able to easily connect to the IRC / Remote Server, and perform various actions with impunity.

10. Adopting Facebook Chat

This method is probably the most common users. DorkBot.Bx provide a URL link that has been converted into a short, so users will be easily fooled. If the link is opened, then the user will download a file using the file name and icon are quite 'sexy'.

Another characteristic is to modify the registry and create some files to infect computers. In order to directly active when the user connects the USB or removable drives, trojans DorkBot.Bx exploit security holes of Windows is Windows Icon handler that makes the shortcut from the trojan file will be active once to access the drive.