Why on 7/29 is important for any Windows user 7 or 8.1?

Why on 7/29 is important for any Windows user 7 or 8.1?
As Microsoft is trying hard to deploy its new Windows 10 in any way, it was the first strategy is to make it free to all who wish to move him from the old systems like Windows XP, 7,8, and others. The second was to send notices are annoying to users in order to Anhm to upgrade to this new system.

It seems that the third strategy began this week, as Microsoft said last decided to chance as a free update for Windows 10 will be the 29th of July next month. This warning is stated in the official and prompt her blog mainly for all the old versions users of Windows .vama did not update in before that date This means that you will pay financial compensation to upgrade to Windows 10.



Windows 10 is now Mtbut in more than 300 million devices around the world, but even so still and Windows 7 the most widely used operating system on a large scale for desktop computers in Alm.almlaen people will lose the chance free update, because many did not want to do it and move on to Windows 10 because of the fear of the new privacy policy applied by Microsoft in this new system

In contrast, Microsoft confirms that Windows 10 is a secure version of Windows where another system. However, it is estimated that 48% at least of all desktop and laptop computers in the world after running for Windows 10 back again to Windows 7, or 8.1
Read More

5 reasons will push you to buy a new phone from Asus "ZenFone 3"

5 reasons will push you to buy a new phone from Asus "ZenFone 3"
Asus company of the world's leading companies in the field of technology, they have a clear and important imprint on laptops, and here it is today demonstrate high heel, even in the field of smart phones. This Taiwanese company unveiled RCI in this area, we are talking about her new "ZenFone 3 Deluxe" and the five reasons that may Tesfek to buy it instead of any other phone.
5 reasons will push you to buy a new phone from Asus "ZenFone 3"
  6GB of RAM
This feature is probably enough to waterless your attention to this revolutionary phone from Asus mainly, yes, this phone comes with 6 GB of RAM, this phone is one of the few phones that comes to this amplitude of RAM.

A giant screen
Phones now become more important than ever before, and are used more thanks to many applications online and provide fast task on them, so the screen size is very important to compete in the smartphone market, and this is what I've done already Asus company in this new phone, which comes a large screen size of 5.7 inches of type Super AMOLED and accurately full HD 1920 × 1080 pixels.



Powerful Camera
If you are a photography enthusiast and use your phone to pick up a lot of photos, this phone interested in this point and will not feel disappointed with the 23-megapixel camera with LED flash and lens aperture f / 2.0, which includes the latest imaging sensors from Sony. In addition to the autofocus laser technology, while the front camera are 8 MP.

Strong battery
Asus just like any other active companies in the field of smart phones, is also suffering from one of the main complaints of the owners of smart phones, a battery life. In her new Asus has integrated battery-sized 3000 mAh, in addition to the advantage of rapid shipping by QuickCharge 3.0 in addition to the port from the USB-C type.

competitive price .
Perhaps the world's most influential on the decisions of the group of users is price, but despite that the price of the phone in the Arab countries has not been disclosed yet, the value or price of the phone in the US market set at $ 499, and compared with the high-end smart phones like the Galaxy S 7 and iPhone 6S, Asus device is very cheap. 

Read More

How much time it will take Mark Zuckerberg, Bill Gates to fall on the list of the richest man in the world ?

 How much time it will take Mark Zuckerberg, Bill Gates to fall on the list of the richest man in the world ?
Everyone knows very well from being Mark Zuckerberg He does not need to be defined, when he started Facebook, he said he never imagined he would be rich as it is today: more than $ 50 billion in assets in his company Facebook, the size of the wealth made him the youngest person among the largest billionaires in the world, at the age of only 32 years.

Most of his fortune comes from his shares in the company he founded, so it linked the success of this company in recent years .alvesbuquebdo it's going as planned Marc, which is the determination to continue to expand his business to include other areas. After the transactions and agreed with them on a range of companies such as Watts August , Instagram etc ... makes Facebook become the path to becoming a global empire in the internet. This will make a fortune marc increase dramatically in the coming years.

This year, classified according to Bloomberg, the founder of Facebook is the second person who has achieved significant financial success, totaling $ 5 billion in the first 5 months of this year, which would make it far ahead of Bill Gates, the richest person in the world, which in practice has not changed his bank account since then.

This brings us to the next question: How long will it take to Zuckerberg beats Bill Gates? The chart below, based on statistics from the agency "Bloomberg" America, makes it clear that the CEO of Facebook narrows the gap between him and the richest man in the world.
These figures are based on the past two years, using the numbers on the first day of every month until May 2016. You can notice that Zuckerberg, in this period, multiplied Troth from 24.7 billion dollars to 50.8 billion dollars, while the wealth of Bill Gates stable at 80 Billion dollar .

And to maintain this pace Mark Zuckerberg will need just only four years to beat Bill Gates, founder of Microsoft.

Read More

Learn basic stages followed by the hackers to penetrate the sites Implementation process !!

Learn basic stages followed by the hackers to penetrate the sites Implementation process !!
The field of al Hacking of mysterious informatics areas in which everyone seeks to reveal some of its secrets, and in fact many people are really ignorant of the true meaning of hackers, as they believe that they are bad people always seek to sabotage IT systems and penetrate and make money Booze illegally, and this belief completely wrong about the concept of hackers because it is based on the intention of the hackers and the method employed for his skills, and the right is that hackers are basically a group of super-intelligence programmers having a high degree of familiarity with the skills to deal with various technical hardware, and software. And frankly all this, do not care to know as much as we care to know Ooualemrahal the way they are used by hackers to Implementation penetrate the sites, and this is what you will learn about it in a blog post today, saluting we will review with you the basic stages that penetrate security systems in general and positioning process of passing them in particular.
Phase I stage Poll (Reconnaissance).
Is the stage where hackers gather information and sufficient data to hack began the process, beginning with the IP Adress the site, and information about Alastzafh (Hosting) upon which the target site. And also programming languages ​​and the quality of supported database at the site, and other information that can be accessed by following some of the roads only Balhakrz himself, and whenever collecting information Aktar from the target site whenever they hack easier and faster process, and vice versa!
Phase II scanning stage (Scanning & Enumeration)
 At this stage, hackers start to look for gaps or ports (Port), which can be exploited to initiate the process of penetration, the more the site is protected and free from vulnerabilities, the more difficult it hackers Implementation This phase, which is considered a sensitive and fateful, Laket that if he could not Find any gap will not be able to pass other advanced stages of the piece he employs all its capabilities and skills to gain access to one of the gaps in the security system will employ the website target regardless of its importance this gap.
     IIIth stage to achieve access to the system (Gaining Access).
After the completion of the scanning process successfully and discover the largest possible number of gaps in the target site, hackers at this stage trying to access the control interface for the site, Laket become has some powers that enable him to check out some of the sensitive data of the site, and no requirement at this stage to reach to the powers of the administration, you as much as they care about the transition from being a regular user of the site to the stage of a person controlled to some extent by!
      The fourth stage Tetbit hack and build links to enter again (Maintaining Access)!
Now after he had managed to enter the site and controlled to some extent by and access to its database, in various ways trying to hackers at this stage to build a link or several of its own links can which later access interface for the site to control the spectrum in the case of what has been discovered that gap by site managers and downloaded bridging or in the case of what has been discovered is a breakthrough for the site by these managers, because the piece is rushing to do this step so as not to waste his effort in vain and can later easily enter the site, which has breaking through in spite of bridging that gap officials from party site, called the control program upon which hackers in these client b Shell.
      The last stage survey the effects of hack Covering Tracks.
Managers of large sites, which are heavily exposed to penetrate, periodically checks the activities that occur on the site by users, therefore, if we detect suspicious activity or raises doubts it inevitably increases the Alajrouat and security precautions by them, and also they can in state whether Akchwo that someone had infiltrated the site, they will punished for the attack in some way, or at least prevented the possibility of renewed access to the control interface for the site and what dearly fail in this Hah what Ida the hackers installed a hack on the site. And frankly these circumstances stage is marked by professional hackers from other hackers, if the hackers hacked site or certain security system and left some breakthrough triggered it remains in permanent fear and concern reached.

Read More